text
stringlengths
144
682k
There’s lots of talk out there about the benefits of clipless pedals, the different cleat styles, shoe options, dialing in your fit, etc… but if you’ve spent any time in a shop, on the support phones, or hanging out with a 5-year old, you know there’s one question that comes up every time they’re mentioned; “why are they called clipless pedals when you clip into them?” In today’s post, we’ll look back at the history of pedals, and how we ended up calling those clicky-grippers clipless after all. In the beginning… ok, maybe we don’t need to go that far back. It’s enough to know that some time after the creation of the universe, matter, and everything, someone made a bike and it was awesome. Once they got around to putting pedals on it, the bike got even better! Those early bikes were simple machines. Fixed gears, wooden-wheels, and platform pedals. The point was to make it work – and they did, beautifully. So well in fact, that some people decided to race them! Others began refining bikes into transportation work-horses, hauling people and cargo wherever they needed to be. And with those new demands came new expectations of engineering. Focus was put on efficiency, maximizing output to save riders’ energy and increase performance. It was that drive for improvement that lead us to toe clips. Toe-clips mount to the front of the pedal and work with straps to lock-in the rider’s foot so they can generate power on the “upstroke” by pulling up as the pedals go around. The straps really do more of the securing than the toe-clips, but the clips keep the straps open so you can easily slide a foot in and, because they grab your foot and the pedal in that binder-clip-y way of theirs, the name toe-clips stuck. So what do you call pedals that do away with the need for a metal toe-clip dangling off the front of your pedal? That’s right, clipless. The first clipless pedals were actually manufactured by ski-binding maker Look, and they’re still cranking 'em out today. Given the popularity of toe-clips at the time, they needed some way to differentiate and so the term clipless was born. And that make sense. You don’t really clip into clipless pedals anyway. Maybe you click into them, maybe you lock in, but it’s not a clip. The toe-clip is gone from the pedal and all that remains is a small catch to receive the cleat on your shoe. And the rest is history.
bollywood belly dance header An Introduction to Indian Classical Dance Colourful, enchanting and entrenched in local folklore and tradition - India's classic dance forms sit at the heart of the country's vibrant culture. Music, dance and folk performance are among the pillars of local cultural traditions in India. From Tamil Nadu in the south to Uttar Pradesh in the north, each of India’s historic provinces cultivates a rich culture of dance and music – with distinct styles of classical dance passed down through the generations. Wherever you travel across India, you’ll encounter dance, music and art at every turn. Performances of traditional dance are commonplace in all major Indian provinces, and local people are fiercely proud of their colourful, ancient cultural traditions. During a luxury escorted tour in India with Scenic, you’ll have the chance to witness the extravaganza of Indian classical dance as part of a handful of exclusive performances and events. So, to help give you a sense of what you can expect from such a showcase of culture and music, here we’re exploring eight of the most wonderful forms of classical dance to see on your visit to India. The origins of Manipuri dancing can be traced back to ancient times, to the isolated state of Manipur, northwest India. Here, inspired by the sacred dance forms of Shiva and Parvati, a unique cultural routine developed, and Manipuri dancing has since been a cornerstone of the region’s frequent religious festivals and rituals. Manipuri is, without doubt, one of India’s most storied and fascinating classical dance forms. Focusing prominently on the separation of Gopi and Radha from Krishna, the dance incorporates a number of forms, including Ras, Sankirtana and Thang-Ta, each of which has a multitude of different steps and movements. The ‘Thang-Ta’ portion of the routine, performed exclusively by men, is more akin to martial arts, and reflects the idea that Manipuri men were, traditionally at least, expected to defend their home and community from rival tribes and wild animals. The oldest and most widespread form of classical Indian dance; Bharatanatyam originated among the Hindu temples of Tamil Nadu, to the southeast of the Indian peninsula. Believed to date back to the 4th century BC, the dance form is best associated with the Devadasi culture – an ancient tribe of women who served as courtesans and performers in Tamil Nadu’s great temples. Today, Bharatanatyam is most often performed by a solo female performer, as is tradition. The repertoire of the dance can be divided into three categories, including ‘Nritta’, ‘Nritya’ and ‘Natya’, with each encompassing different steps, speeds and patterns. With dancers performing in traditional Tamil Hindu bridalwear – including a colourful sari and leather belts for hanging jewellery – a performance of Bharatanatyam is a colourful, vibrant spectacle. Originating among the travelling Kathakar – ‘storytellers’ – of northern India, the Kathak dance form is steeped in North Indian folklore, and today considered among the most popular of all India’s classical dances. The form’s steps, hand gestures, costumes and body-art all reflect different aspects of ancient Indian mythology, lending greater charm, colour and historical intrigue to the performance. Kathak dancing has been around for thousands of years, beginning among the Kathakar nomads of northern India and rising to the courts of the Mughal Empire. Though the popularity of the dance declined during India’s colonial rule, it has since revived, with Kathak dance troupes now among the most popular of all cultural performers, particularly in the northern provinces. Its costumes encompassing both Hindu and Muslim traditions, the Kathak promises an exciting, toe-tapping performance. Based on archaeological evidence, Odissi is considered the oldest form of classical folk dancing in India. Findings place the origins of the dance at the Hindu temples of Odisha, on India’s spectacular eastern seaboard, where it is thought to have been performed since at least 500 BC. The theoretical background of Odissi dancing is well documented in the ancient Sanskrit text, while its steps, forms and unique hand gestures are found inscribed on the sculptures and murals of Odisha’s Hindu temples and shrines. Odissi routines are based on mythical stories, devotional poems, and spiritual messages from Hindu texts, with dancers relying on ‘abhinaya’ expressions and ‘mudras’ gestures to the convey meaning. In the Odisha region, Odissi is today performed by a handful of religious factions, including Hinduism, Buddhism and Jainism. With its colourful costumes, story-driven narrative and elegant steps, Kathakali is among India’s most distinctive classical dance routines. Hailing from the state of Kerala, the dance focuses on retellings of India’s great folk epics, with every element of the performance – from the elaborate costumes to the face paintings – inspired by Kerala’s ancient ancestors, culture and folklore. One of the most distinctive aspects of Kathakali dance is the costumes and makeup which the performers wear during the routine. Tradition dictates that there are five types of ‘Vesham’ makeup worn by Kathakali dancers, including Pacha, Kathi, Thadi, Kari and Minukku. These different looks, which include ornamental headgear and lavish face paint, are intended to represent different characters within the story, including heroes, villains, demons and female characters, known as sages. The origins of Kuchipudi dancing, like so many forms of classical Indian dance, are rooted in ancient Hindu texts – chiefly the ‘Natya Shastra’, which is associated with the Krishna district of Andhra Pradesh. Early forms of this text, scribed in copper and found in the region’s ancient temples, describe a type of dance and cultural performance entrenched in the teachings of the Hindu faith, which were carried throughout India centuries ago by the country’s beloved travelling bards. Mirroring the structure of Bharatanatyam, Kuchipudi also incorporates the repertoire of ‘Nritta’, ‘Nritya’ and ‘Natya’. Here, ‘Nritta’ is the paciest, most technical part of the dance, while ‘Nritya’ is more concerned with story, the dancers using their body to communicate the narrative. Meanwhile, the ‘Natya’ part of the Kuchipudi routine is normally performed by a group, with elements of dance and movement bringing the dance to a vibrant conclusion. Alongside Kathakali, Mohiniyattam is a classic dance form of Kerala, which, like a handful of other traditional cultural dances, is documented in the ancient Sanskrit Hindu text of ‘Natya Shastra’. However, unlike Kathakali, Mohiniyattam is widely considered a much more feminine type of dance, with gentle steps, graceful body gestures, and lightly-coloured costumes designed to impart a sense of peace. Mohiniyattam follows the Lasya form of dancing, with a solo female performer producing light, graceful steps with musical accompaniment. Expressive gestures and hand motions touch on a simple narrative, with themes of peace, harmony and tranquillity. Dancers almost always wear a white or slightly off-white sari, embellished with gold jewellery, as well as a face of brightly-coloured makeup, which is designed to make her expressions more visible. Introduced in the 15th century, Sattriya dancing came about through Vaishnava, the patron saint and cultural reformer of Assam, a state in northeast India. Cultivated and kept alive through the centuries by Assam’s Satras Vaishnava monasteries, Sattriya is today among the most distinctive dance forms in India, drawing on the ancient folk rituals of Ojapali and Devadasi to create a dance that’s unique to the Assamese region. A performance of Sattriya dance is based on the strict rituals of ‘hastamudras’, or steps, and ‘acharyas’, which covers music. Drums and cymbals provide the primary musical accompaniment to the Sattriya performance, with dancers guided by a repertoire which incorporate steps from both the Ojapali and Devadasi schools of dance. Rhythmic, expressive and visual, a Sattriya performance is a must on your visit to the beautiful Indian region of Assam. Enchanted by the heritage, traditions and beauty of India’s classical dance forms? Join Scenic for a luxury escorted tour through India and Asia and experience the beauty of regional dance as part of a handful of exclusive Scenic Enrich and Scenic Freechoice events. For more information or to book your place, visit the homepage or call us on 0808 271 3471.
Wheatley Quarry • Recreation ground • Recreation ground Archive Notes: The Parish Pit or Village Pit was a major limestone quarry, providing some high quality stone for many Wheatley buildings and for the building of Windsor Castle, Wallingford Castle, Merton and Magdalen Colleges. As a pit, it was used for all sorts of unsavoury purposes, including bullbaiting, badger-baiting and cock-fighting and for burning waste. As a consequence of the latter, it was plagued by rats and snakes. It remained a pit until the late 1940s when it was filled in and became the 'King George VI' recreation ground in 1950. But if you go left to the row of trees, you will see the original depth of the quarry, and the cliff-face created. Archive Number:
This Sticker Absorbs Sweat—and Might Diagnose Cystic Fibrosis Photograph: Tyler Ray/University of Hawai'i at Mānoa Video: University of Hawai'i at Mānoa Pathologists also noticed. “Right when that paper came out, we were contacted by Lurie Children's Hospital,” says Ray. A researcher at the Chicago institution believed this type of sensor could collect enough sweat to give conclusive diagnoses. Ray’s team agreed that a wearable could probably collect more sweat faster. And to avoid the geographic barriers that come with needing a lab, they could embed most of the lab analysis steps right on the patch. Video: University of Hawai'i at Mānoa Their resulting stickers are circular and about one inch across. They can lie flat, hug the wide curve of an adult arm, or conform to small infant’s limbs. (They also look like stickers. Ray’s team placed popular cartoon decals on top, hoping to make them even more kid-friendly.) Sweat soaks up through the center and into thin canals that zigzag out to the sticker’s edge. To run the test, a clinician uses a weak electric current to drive a sweat-gland-activating gel called pilocarpine into the patient’s skin. This is the standard starting point for sweat tests, but what happens next is different. Five minutes later, the sticker goes on, and the patient’s sweat slips into its tiny capillaries for up to 30 minutes. It immediately mixes with a clear, gel-like pool of silver chlorinalite, a chemical that changes color when it bumps into chloride ions. If the sweat doesn’t contain these ions, the streams stay clear. But progressively higher ion concentrations quickly turn it a pale pink and then a dark violet. Clinicians then snap a picture of the color change, run the photo through an analysis app, and gauge the chloride levels. Ray’s team wrote algorithms to process images, read up on color theory, and experimented with different overlay hues and reference colors for the sticker. In the end, they found that a green overlay made subtle changes in color more visible: a smartphone could now capture differences down to about one millimolar—roughly the chloride concentration from one teaspoon of table salt dissolved in 100 liters of water—which is potentially accurate enough to make a diagnosis. In their study, the team tested the device on 51 people, ranging from 2 months to 51 years old. Their main focus was confirming that a flexible sticker would be better than other devices at slurping up sweat, so they compared their sensor to one commonly used in clinics today. On average, the sticker collected 33 percent more sweat, and the team reported no cases of insufficient collection. For one participant, the sticker banked nearly twice as much sweat in 18 minutes as the approved device did in 30. Video: University of Hawai'i at Mānoa Ray envisions the sweat sticker as an option for at-home testing and even daily chloride monitoring for people who already have a diagnosis and want to adjust their behavior to keep their levels down, the way that people with diabetes can use wearables to check their glucose. Daily monitoring could help people who want to understand their own response to drugs, exercise, or nutrition through their sweat chloride. (While the study used pilocarpine to make people sweat more, Ray notes that a warm bath could do the same thing naturally.) No at-home chloride monitors exist today, but Fong wonders if they could be used to detect rising chloride levels, which might be an indicator of worsening symptoms that need medical intervention. He notes, however, that more research is needed to prove whether there is a connection between real-time chloride measures and symptom prediction. Dexter isn't sold on the utility of at-home monitoring just yet but says that the idea is promising. “I think people haven't even really thought about what they’d do if they had a 24-7 sweat tests,” he says. But before that can happen, the stickers would need to be approved by the Food and Drug Administration. Ray’s team at Hawaii and Rogers’ at Northwestern are first pursuing approval for use as a one-time diagnostic. They hope to recruit participants for a much larger clinical trial—maybe more than 1,000 people, including newborns—to further test the sensors’ accuracy and consistency. Still, growing research interest in wearable health sensors has Ray feeling optimistic. L’Oréal debuted a UV exposure tracker in 2018, Rogers reported a clinical trial of wireless neonatal intensive care monitoring last year, and some labs are developing skin bioelectronics to track Covid-19 symptoms. "The idea of just being able to sense what's going on in yourself, simply by looking down at your smartphone or a sensor—it's just amazing,” he says. More Great WIRED Stories
Course Catalog CS 245 Computing Systems This course takes a top-down, cohesive approach from operating systems to assembly architecture with a comprehensive perspective of current types of operating systems from PCs, laptops to mobile devices and beyond as well as their microarchitectures. Fundamental concepts include threads, dynamic memory allocation, protection, and I/O. Programming applications include both with C/C++ programming, Unix system programming, command-line Linux tools, and operating system kernel code.
Rounding the Cape: Race and the Allure of Technological Progress By Clyde W. Ford Progress in technology is given. Progress in race relations is not. The last half-century, witness to an explosive rise in technology, has seen no such progress in race relations. From economic inequality to educational inequality to incarceration inequality to policing inequality to outright segregation, by nearly every yardstick applied, The Eisenhower Foundation, in Healing Our Divided Society[1], its fiftieth anniversary report honoring the 1968 Kerner Commission, conceded there is a yawning racial divide in America; and concluded that scant progress had been made in closing this divide. What's tech got to do it? Writing in the January 1999 issue of the Atlantic Monthly, Anthony Walton made the case concisely, "[t]he history of African-Americans during the past 400 years is traditionally narrated as an ongoing struggle against oppression and indifference on the part of the American mainstream, a struggle charted as an upward arc progressing toward ever more justice and opportunity." Walton goes on to say, "This description is accurate, but there is another, equally true way of narrating that history, and its implications are as frightening for the country as a whole as they are for blacks as a group. The history of African-Americans since the discovery of the New World is the story of their encounter with technology, an encounter that has proved perhaps irremediably devastating to their hopes, dreams, and possibilities."[2] But technology, the common wisdom proposes, is value-neutral. What built-in evil lurks in the meshing of gears, the spinning of wheels, or the glow of a cellphone or computer screen? What inherently nefarious purpose is found in bits of silicon used for an electronic circuit, or in the electrons shuttling between those bits of silicon? How can technology ever be viewed as thwarting the aspirations of any one group such as Blacks in America? Technology may be used in loathsome ways by certain individuals or groups but technology itself is neither inherently good nor inherently bad. Here, the common wisdom is wrong, or at least tragically confused. Martin Heidegger, the controversial German philosopher, wrote and spoke at length about this question of technology in the post-War era[3]. While some dismiss Heidegger because of his association with the Nazi regime, it may well be that because of this collaboration his insights into technology were so prescient and so profound. Technology, Heidegger put forth, may be neither inherently good nor inherently evil but it is not inherently value-free. Technology is not just a business enterprise, it is a world-view based on the exploitation of human and natural resources. Those meshing gears were once metal ore extracted from the earth; the rubber on spinning wheels once ran through the veins of trees; the fuel that turns the engines that spin those wheels once lay buried deep underground or under the sea; the glow from cellphone or computer screen comes from liquid crystals fabricated from natural resources, or fabricated by technology that is itself fabricated from natural resources; those bits of silicon that power so much of modern high technology originate from composite minerals found in ninety-percent of the earth's crust before extraction; and, our cellphones, computers, and other technology are manufactured by human beings, often working in harsh conditions in countries far removed from the technology's consumers. Technology exploits human and natural resources for the benefit of some, to the detriment of others. Along the shores of the Targus River in Lisbon, Portugal there stands now a magnificent one-hundred-seventy-foot steel and cement monument known as the Padrão dos Descobrimentos (Monument to the Discoveries), erected in 1960 to commemorate the death, five-hundred years earlier, of "Prince Henry the Navigator." Designed as the prow of a huge caravel, the principal ship construction of that age, the padrão features Henry standing at the bow pulpit, and behind him, along what would be the decks of this monumental ship, are thirty-three figures on the east and west sides, commemorating other significant explorers of the age. Magellan, Vasco da Gama, and Columbus are there. So, too, is Gomes Eannes de Zurara, who chronicled the rape, pillage, and plunder of the West African coast by these early European explorers[4]. In his hands, Henry holds a replica of a caravel or carrack, a ship whose sailing technology allowed the Portuguese to first round Cape Verde, the westernmost tip of Africa, and safely return. Older, shallower ships, known as cogs plied the Mediterranean for centuries before caravels, but cogs were ill-equipped for the Atlantic. Trade winds made the voyage south from Portugal to West Africa relatively easy, but the return voyage much more difficult and dangerous because cogs had to tack far out to sea—almost as far as the coast of South America—in order to catch prevailing winds affording them a way back to Europe. Caravels, however, were designed from cogs but built deeper, with three or four masts, and an enlarged cargo space. Caravels handled rough seas better, sailed closer to the wind, and made for shorter and safer return voyages from West Africa. Magellan, da Gama, Columbus, all of the early navigators sailed caravels. Caravel technology, which enabled the Portuguese to reach West Africa, was designed to extract the human and natural resources of the continent. Little wonder, then, that caravels, with their large holds, carried gold and other precious metals, but also enslaved Africans first to work in Portuguese colonies, then for sale in far-flung ports, notably in the Americas. Caravels ruled the slave trade until replaced by galleons in the seventeenth and eighteenth centuries, even better equipped for their mission as slavers. Throughout the centuries of slavery in America until today, technology has collided with race. By the late 1700s, the agrarian economy of the southern United States, built on slave labor, lay faltering and the economic wisdom of slavery lay in question. For reasons of geography and the economics of production, cotton, tobacco, sugar, indigo, and rice, the principal cash crops of the South, all required increasingly more money to produce, and returned increasingly less profit to southern planters. In particular, cotton plantations found themselves paying more and more for the upkeep of their slaves, with less and less returned from the sale of their cotton. This economic equation changed dramatically with the introduction of a new technology—the cotton gin in 1793, to which Eli Whitey lay patent claim. Whitney's gin could process fifty pounds of cotton lint a day—separating cotton fibers from seed. What southern planters now needed was an inexpensive way to grow and pick cotton to feed the hungry, new machines to produce the raw materials for northern textile mills, who then exported their textiles worldwide. For that, the South turned once again to the sale and purchase of slaves. Suddenly, cotton became wildly profitable, and a technology some hoped would save labor and thereby reduce the southern reliance on slavery, had just the opposite effect. The 1790 census recorded approximately 700,000 slaves in the South. By the 1860 census, that number had increased six-fold to nearly four-million human beings held in bondage[5]. With Emancipation, and the advent of automated cotton-picking machines in the later nineteenth century, the need for a huge labor force dwindled. Blacks, eager now for new opportunities and escape from the brutality of Jim Crow, headed for northern cities en masse in what is referred to as the Great Migration. Yet again, an advance in technology resulted in a decay in race relations as these internally displaced persons often traded the overt racism of the South, for the subtle, yet equally devastating, racism of the North—lack of housing, lack of educational opportunities, lack of health care, lack of jobs—the very same issues contributing to racial inequalities to this day. This peculiar relationship, where a rise in technology precipitated a fall in race relations, only accelerated with the senescence of the Industrial Age and the dawn of the Digital Age. Digital technology witnessed many early achievements directly at the expense of people of color, and others deemed racially undesirable. Punched card technology led the first wave of this digital revolution, and IBM led the creation, development and implementation of punched card technology. In the early 1920's, Thomas J. Watson, once a leader of National Cash Register's unscrupulous and ruthless henchmen known as the "knockout gang"—"We do not buy out, we knock out"—took over the helm of a company which then went by the name of the Computing Tabulating Recording Company (CTR), soon changing it to the International Business Machines Company. The "T" in CTR stood for the Tabulating Machine Company, one of four companies swooped up by businessman and war-profiteer Charles Flint in 1911. Established, and once owned by German wunderkind Herman Hollerith, the Tabulating Machine Company developed and manufactured punched cards and punched card equipment. Hollerith's erratic genius led to the adoption of his punched card technology by the U.S. Census Bureau at the turn of the century. Hollerith's technology soon became the worldwide standard for counting and maintaining information on national populations. But with the Tabulating Machine Company sold, and Hollerith no longer involved, Watson realized this technology could do far more than take national censuses. So, in 1928 Watson focused the attention of his young firm on solving the problem of eugenics. Eugenics flourished in America at the beginning of the twentieth century. Carnegies, Rockefellers, Kelloggs, Harrimans, Roosevelts, this so-called "science of race" brought together America's rich and famous in a movement to breed pure blond-haired, blue-eyed "Nordic stock," the eugenicists sought-after ideal. Eugenicists desired to eliminate the bloodlines of undesirables such as Blacks, Native Americans, Hispanics, Jews, Irish, and those mentally or physically ill. Eugenics promoted thinly veiled racism under the guise of pseudoscience. Eugenicists proposed several tools to cull America of undesirable human beings: sterilization, birth control, incarceration, miscegenation laws, immigration restrictions, and even death. In the early 1900s, as many as 30 states had passed eugenics laws that allowed for forced sterilization or restricted intermarriage between individuals of different races. American eugenicists, led by Dr. Charles Davenport, elevated their movement internationally with the help of prominent eugenicists in Germany. In 1926, Davenport, head of the Eugenics Research Association, an outgrowth of the Eugenics Record Organization, which he also headed, received funding for a two-year study of "pure-blooded negroes," whites, and their undesirable mixed-race offspring.In 1928, Davenport chose the island of Jamaica for the study. To identify mixed-race individuals in Jamaica, Davenport required a robust system of collecting, storing, and analyzing copious amounts of information. IBM's punch cards and Hollerith machines provided just what Davenport needed. With Watson's newly minted company eager for the business, IBM engineers worked with the ERO at the Cold Springs Harbor Laboratory, to design a punch card format for collecting all the information needed to report on racial characteristics. Watson's engineers also worked out the details of adjusting the various sorters, tabulators, and printers to provide Davenport and the ERO with the output they required. Thanks to IBM's assistance, the success of the Jamaica Project allowed Cold Springs Harbor Laboratory, and Davenport, to announce plans for a global study to identify mixed raced individuals as a first step toward their elimination in favor of "racially pure stock."[6] (In a tragic coda to this early story of eugenics, Cold Spring Harbor Laboratory was still enmeshed in the controversy over eugenics as recently as January 2019, this time through the disgraceful racist utterances of Nobel laureate James D. Watson, co-founder of the DNA double-helix and one of the laboratory's longtime fellows, whom they stripped of his honorary titles[7]) Five short years after the success of the Jamaica Project, Thomas J. Watson saw an even larger, grander opportunity for his infant company, this one also based on race. In 1933, Watson threw the knowledge and resources of IBM behind Adolph Hitler and the Third Reich. Hitler rebooted eugenics. Armed with statistical data courtesy of IBM equipment and engineers, Nazis went in pursuit of a master Aryan race—tall, strong, blond-haired, blue-eyed, superior intellectually and physically. Sterilization came first, to weed out Jews, the physically undesirable (those with mental or physical illnesses and infirmities deemed unacceptable) and the socially undesirable (homosexuals, pedophiles, the Romany, those who came into repeated conflict with the government). With data collected from medical offices, insurance companies, and employers, Dehomag, IBM's German subsidiary, created a punch card schema to record information about the physical, mental and social traits of German citizens in addition to the information already on-file about who was, and who was not, a Jew. In 1934, Germany performed 62,400 forced sterilizations based on this punch card data. By 1935 that number rose to 71,700. Ultimately, Nazi race scientists decided that the information available from IBM punch cards should be the basis of a more permanent solution—not merely determining who should undergo sterilization, but who should live and who should die.[8] For his service to Nazi Germany, Hitler created the "The Merit Cross of the German Eagle with Star," a medal festooned with swastikas, which he pinned on Watson in 1937. But IBM's expertise in automating horrific, race-driven agendas did not stop with the defeat of the Third Reich. Not long after the end of World War II, IBM began anew in South Africa, where another regime arose and required digital technology's dark arts to suppress those it deemed undesirable. Besides, the needs of the apartheid regime were thoroughly known to IBM—use digital technology to categorize and identify the population in pursuit of the brutal oppression of some in favor of the advancement of others. IBM, now under a new Thomas J. Watson, the founder's son, pursued a strategy developed in Jamaica and perfected in Nazi Germany, in support of apartheid. Only this time, with an arsenal of digital computers replacing older punched card equipment, IBM's strategy proved even more lethal. A system of passbooks governed apartheid. Outside of the Bantustans, White, Indian, and Colored South Africans required a passbook known as the "book of life." Inside Black areas, residents required a national identification pass, known colloquially as the dompas (dumb pass) to comply with government laws. In South Africa, with a majority of 10 million Black Africans and a minority of 6 million Whites, Indians, and Coloreds, combined, this two-tiered system of passes and racial identification presented a complex administrative and bureaucratic nightmare for the government. Enter IBM, once again, with digital technology in the service of racial classification and racial domination. Beginning in 1952, IBM leased Hollerith machines to the South African government through its South African subsidiary, much as it had with the Third Reich, to tabulate results of the 1951 census.[9] That census became the basis for determining the racial category to which a person belonged. In 1965, IBM bid unsuccessfully for the contract to create the passbooks designated for Blacks, but the company won the bid to create the "book of life," a passbook required of the non-Black population.[10] However, by 1978, IBM had seized control of the business of creating and maintaining passbooks both inside and outside of the Bantustans. With no research or manufacturing facilities in South Africa, IBM, from its New York headquarters, designed the hardware and software that automated South Africa's complex system of apartheid—writing the racial classification software, designing the database storage for racial classification, and constructing the equipment, such as printers, used to create the required passbooks. Through its South African subsidiary, IBM transferred this hardware and software to relevant South African governmental agencies, trained those agencies in the use of IBM equipment, consulted on and made fixes to apartheid software, and kept IBM equipment in good repair.[11] Separation of a country's population by race is illegal under international law. In knowingly supporting South Africa's system of apartheid, IBM appears to have directly contravened this and other international laws, many enacted after the Nuremberg trials and the defeat of Nazi Germany specifically for the protection of individual human rights.[12] Thirty years after apartheid, sixty years after Thomas J. Watson Sr.'s death, seventy years after the Holocaust, and nearly one hundred years after eugenics and IBM's founding, the company is still engaged in the application of the latest digital technology for racial classification.[13] In the years after the 9/11 attacks in New York City, as part of their major involvement in the Lower Manhattan Security Initiative (LMSI), which installed thousands of CCTV cameras around the city, IBM used secret camera footage of thousands of unknowing New Yorkers, provided by the New York City Police Department, to refine IBM facial recognition software to search for and identify people by "hair color, facial hair, and skin tone."[14] It's a painful, cruel irony that this IBM software is now known as "Watson Visual Recognition."[15] Rick Kjeldsen, a former IBM researcher working on facial recognition, provided a window into the minds of several generations of IBM engineers involved with racial classification technology. "We were certainly worried about where the heck this was going," he said in an interview with The Intercept. "There were a couple of us that were always talking about this, you know, 'If this gets better, this could be an issue.'"[16] Get better? Facial recognition did, as once again technology help to 'round the Cape. [1] Fred Harris and Alan Curtis. Healing Our Divided Society. (Philadelphia: Temple University Press, 2018). [2] Anthony Walton. "Technology versus African-Americans" in The Atlantic Monthly, Vol. 283, No. 1 (January 1999), p. 14. [3] Martin Heidegger. The Question Concerning Technology and Other Essays. (New York: Harper Perennial, 2013). [4] Gomes Eannes de Zurara. Crónica do Descobrimento e Conquista da Guiné (Paris, 1841). Edgar Prestage, trans., The Chronicle of Discovery and Conquest of Guinea. Vols. 1 and 2. (London: Hakluyt Society, 1896-1899). [5] Campbell Gibson and Kay Jung. Historical Census Statistics On Population Totals By Race, 1790 to 1990, and By Hispanic Origin, 1970 to 1990, For Large Cities And Other Urban Places In The United StatesHistorical Census Statistics On Population Totals By Race, 1790 to 1990, and By Hispanic Origin, 1970 to 1990, For Large Cities And Other Urban Places In The United States. Working Paper No. 76. (Washington: U.S. Census Bureau, 2005). [6] Edwin Black. War Against the Weak, p. 292. [7] Meilan Solly, "DNA Pioneer James Watson Loses Honorary Titles over Racist Comments," Smithsonian, January 15, 2019, [8] See Edwin Black. IBM and the Holocaust. (Washington, DC: Dialog Press, 2001).  [9] Michael Kwet, "Apartheid in the Shadows: The USA, IBM and South Africa's Digital Police State," CounterPunch, May 3, 2017, [10] Kwet, "Apartheid in the Shadows." [11]Balintulo v. Ford Motors Co., IBM, General Motors Corp, No. 14–4104 (2nd Cir. July 27, 2015), [12] Balintulo v. Ford Motors Co. [13] George Joseph and Kenneth Lipp, "IBM Used NYPD Surveillance Footage to Develop Technology That Lets Police Search by Skin Color," The Intercept, September 6, 2018, https://theintercept .com/2018/09/06/nypd-surveillance-camera-skin-tone-search/. [14] Joseph and Lipp, "IBM Used NYPD Surveillance Footage to Develop Technology That Lets Police Search by Skin Color." [15] IBM, "How IBM Is Improving Watson Visual Recognition Capabilities," March 15, 2018, -ibm-is-improving-watson-visual-recognition-capabilities/. [16] Rick Kjeldsen, quoted in Joseph and Lipp, "IBM Used NYPD Surveillance Footage to Develop Technology That Lets Police Search by Skin Color."
Growing Trends in Population for Canada! It is being projected by the government of Canada the population of the nation would increase tremendously. The main reason behind this is immigration which has become a factor more than what was expected to be in the past. Initially, it was being projected that by 2035, the total population of the nation would be around 39.4 million. However, now it seems the projections have increased. As of now, it is being anticipated a growth reaching 43.5 million by 2035. In 2010, many updated population counts along with new forecasts for population would be brought about. So, throughout the next years that 2011 and 2012, the results from findings conducted in 2010 would tabulated for different nations. British Columbia is the fastest growing province in Canada. It ranks the highest with a forecast of 7 million people by 2036. So, by that time the nation would be ranked between 33rd and 38th position for the most populous nations in the world. However, the above estimations cannot be considered as final. More revisions would be done with the current estimates moving upwards. This is because as a nation, Canada is prospering in the oil industry. This is especially in the provinces of Saskatchewan and Alberta. More so, when it comes to natural gas, British Columbia is prospering. With the current growth trends in place and with the constant rise in the population, it would not be wrong in saying that the nation’s population would be around 60 to 75 million by 2050. Such a population would place the nation at 25th position in the world when it comes to population. This would also exceed the expected population for nations such as UK or France. Leave a Reply * indicates required field
Home > Subjects > Law/Legal > Examination of School Shootings and Student Safety from Public Administration Viewpoint Examination of School Shootings and Student Safety from Public Administration Viewpoint School shootings are a rising issue in the United States. This issue has been residing in society for a long time, but its severity is increasing with time. Many policies have been introduced in recent times in order to provide security to schools. One thing that is worth noting is that this issue has gained momentum, and people are talking about it. The basic step in gaining freedom from this issue is acceptance. This research mainly focuses on how public administration is helping in getting control over these kinds of incidents and what new policies are being introduced. School shooting incidents are getting severe and serious in recent times that has greatly impacted the society. After the incident of 9/11, Americans have developed a sense of fear in them. This fear has led them to a sensitive point where every incident greatly impacts their minds. School shootings are a heinous crime that can never be justified. There are plenty of cases where school shootings and massacres were conducted out of personal grudges. Personal reasons surely put a whole new layer of pressure in order to control the shootings as be waring of some other person’s heart and instincts is quite hard.  This is why keeping track of public or school shootings is difficult and, in some cases, quite impossible. School shootings directly attack the freedom of young and innocent students. In some cases, the punishment to one cost several lives. This threatens the safety and security of students. There are a lot of incidents that have had happened in the United States that have really disturbed the mindset and freedom of several individuals. This is the point where public administration comes into the picture as the only way people can trust their children to schools is by effective and authentic policies to prevent such hazardous events. School Shootings and Student Safety Topic of Research School shootings are not just a shooting that took place at a certain school, but it threatens the whole nation. The safety and security of each and every citizen is the responsibility of the state. In the same way, maintaining the safety of every student is the responsibility of the school. Further, school as a whole is the responsibility of the state. Check and balance on each and every individual in the school comes under the administration of the school, but when something bad happens, public administration needs to come to the rescue. The whole point of this is that when an unfortunate event occurs, public administrations need to behave as a keen head by providing emotional support as well as evident and policies-based support that can prevent further unfortunate happenings. The responsibility definitely lies on the shoulders of public departments, and it is a basic human right of every citizen to have freedom and security at the same in a state. Showing responsibility, taking the blame, justifying the position, accepting mistakes, digging hard to find the criminals, ensuring justice, all are actions that bring a ray of hope for the sufferers and for the whole society as well. These actions can incline the image of public administrations in the eye of the general public. Along with all this, continuous efforts to serve justice also brings a lot of positive energy to the citizens. [sociallocker id=”35370″] The way public administrations react to an event describes how vividly an event has impacted the nation. Whenever shootings or other events like these take place, the only hope of people is the law and government. People become vulnerable and motivated after any event like school shootings or massacres, and they expect the government to react actively and vividly. How public institutes deal with the situation has keen importance in the prevention of such events. It’s evident that the aftermath of any unfortunate event gravely impacts the society. Help for the sufferers and survivors by both public and private departments is a sure act after any such event. The spontaneous reaction comes, and after that, no one can be found to propose solutions for the prevention of future situations like these. The only way for public departments to show their grief is by actually doing something to prevent further happenings. When people are vulnerable, any little act can make them appreciate the government, so the role of public administration holds great importance in this matter. Moreover, the amount of panic and fear caused by media also affects common people. Social responsibility is not just for a person or organization, but every citizen of the state has to react according to the situation. The goal should be to calm the people and giving them hope instead of developing a layer of fear around them. In matters like school killings, the social responsibility of each and every person is quite necessary. Every little detail holds importance. The participation of public departments, school administration, and general people are equally important. But the topic of research clearly depicts how social administration reacts to the conditions and matters is of great importance. Ensuring the safety of every citizen is the responsibility of the state. Public administrations can help by providing the victims with faith and confidence that they are secure everywhere. Not only the survivors or victims, but the general public sitting at home also feel comfortable when the confidence of security is provided by public departments. The center point of this topic is how social behavior is important in order to make the victims feel safe. Along with this, what are the privileges that the victims should entertain, and how public administration can help the people in gaining confidence in sending their kids back to school after such events? All these aspects are extremely important while discussing the effectiveness of the policies of public administration for the general public. In order to link the current shooting rates in schools with on-going security measures by the government, the confidence and trust level of affected parents and kids needs to be measured. Lack of acceptance has caused a lot of issues, and only if we can succeed in changing mindsets to accept the fault society will be a better place. Literature Review School shootings are not new to American society as many incidents have taken place in the previous years. This problem arose in the 1960s when many of the schools in America experienced this heinous crime. Its rate steadily increases, and in the late 2000s, its ratio rises to a higher level. The rate of school shootings is still lower than the off-campus violence, homicides, and mass shootings, but the impact it has is surely more than the others. A country’s future is in the hands of students. By providing a good learning environment for the students, a country can produce good competitors in the future. The safe and secure learning environment is the right of every person residing in a state, and ensuring this environment is the responsibility of the state. But over time, what we have been seeing is that schools are now not considered as safe places as described by Schildkraut, Elsass, and Stafford (2016). Moreover, they furtherly deduce from their research that the fear of crime among school-going students is rising. Their moral panic is valid and natural. Keeping in mind the present conditions, with time, the fear of parents and guardians of school goings kids is also rising. The security of students is at risk that has led many of them to undergo mental pressure and illness. Many parents feel insecure and at risk of sending their kids to school amid the public and school shootings for minor reasons. Cornell (2020), in his special issue called Threat assessment as a school violence prevention strategy, has stated that school shootings in the past 24 years i.e., from 1994 to 2018, have, on average of 23 victims. Of course, the data keeps on changing year by year as the shootings and incidents fluctuate timely. The reason for the conduction of these homicides attacks as classifies by him can be mental illness, school bullying, exposure to guns and warfare, and other non-observant issues. But a person cannot conduct any of such heinous crime on his own as suggested by his research. In most cases, groups or groups of people are involved in these happenings, mostly fueled by bullying, discrimination, peer pressure, or favoritism by the school administration, faculty, or other groups of students. Muschert (2007) has presented long research in the wake of school shootings in which he addressed the possibilities of why people choose to use guns in order to take down something or someone or for revenge purposes. He further essence that the complexity of school shootings increases when we dig deeper as the reasons and deductions keep on increasing. Moreover, another idea worth discussing was presented by him in which he discusses the wake of schools in the light of recent shooting incidents. Just diagnosing the issue is not enough but predicting solutions and examining required changes in the system is worth doing in order to prevent further dark events. Media is becoming a widespread means of communication, and its roots are growing deeper with time. The 21st century is all about the exposure of the public to the media. Violent and aggressive behavior of someone can cause stress and depression for others quite easily when promoted on media. The same goes for school shootings as well. A certain incident that took place in a certain place doesn’t simply remain to a certain place. Media is playing a major role in panicking the people around the globe, even when their neighborhood and area are quite peaceful, as described by Burns and Crwaford (1999). The media may be only showing news related to the incident, but the way news is presented, and the necessary pressure can somehow cause the nation to question each and every person around in order to feel secure and safe. Seeing the news, many questions arise in the minds. Muschert (2007), in his article Research in School Shootings also creates a link between the moral panic among the nation and the role of media. The fear becomes evident and grave when everyone is talking about a certain issue. This affects not only the social behavior of people but also mental illness. Those who have gone through the situation firsthand are obliged to fear and panic, but the wake of media causes so many issues for the entire world that creates a whole lot of pressure on the government in order to make the people feel secure. Whenever an event of school shootings took place, the panic among the public is obvious, but the behavior of public administrations is quite important. Panic and fear are natural, but the way social factors react and the actions they made, the strategies they follow are some of the aspects that can help the sufferers to calm down. F. Travis and Kiernan Coon (2005) gave a detailed national report on the analytics and statistics of school shootings and involvement of public administration and law enforcement agencies. They organized level by a level basis in order to measure the performance of law enforcement authorities in the aftermath of school shootings. The locations of schools matter the most in this context as they relate the performance and activeness of this public administration with urbanism, region, locating area and its neighborhood, and the school’s level and reputation. The measurement of how well public administration behaves with the suffering school and the victims were a primary deduction. The performance of public administration, as expected, was clearly discriminatory according to the reputation, neighborhood crime level, and location of the school. Another factor that makes its way in stopping them from cooperating with the victims was race and ethnicity. The biases towards a certain race and the hatred towards the other cause several mismanagements in the performance of public administrations, as described by Travis and Coon (2005). Their research also finds out that the role of urbanism is quite high as the mass and school shootings in urban areas mostly get more attention from both the public serving departments and media as compared to rural areas. In the wake of school shootings and student’s safety, many writers have argued about gun control and spontaneous reaction from law enforcement departments. Carrying a gun in school is illegal, and many schools have strict policies against it, but outside the premises of the school, students and other people can carry the gun even illegally until they are not caught. Kennedy (2012) has mentioned many writers who have argued about the issue that does gun control stir up the chances of a school shooting or not. In his thesis, the school shooter: a rapidly growing problem for homeland security, he evaluated how gun control can play a role in public shootings. The evaluation was straight and to the point. He gave the verdict that parents should not introduce their kids to weapons and warfare so they will have the least interactions with them, which will further lead to the least attraction. Moreover, Kennedy also claims through a series of references that self-defense techniques are necessary for every kid to learn. Every person, not only just students, need to learn self-defense in order to flee difficult situations. Some people develop instincts abruptly at a difficult time to get away with the situation, but proper learning of self-protection can surely play a major role as far as the security and safety of a person are concerned. Newman and Hartman (2017) also support the gun control verdict, just like Kennedy. They gave their stance that the general public is rooting for gun control as many of them have had experienced gun violence once in their life. The unavailability of on-point and instant service by emergency units of public administration is one of the main reasons why active shooters roam freely and fearlessly while conducting shootings. Metzl and MacLeish (2015) described this problem in detail. The inactivity of institutions that are specially designed to provide instant services has given confidence to criminals. Students and faculty both have the basic knowledge of calling the emergency numbers in case of any unusual activity, but it can be seen by many examples that authorities don’t take these calls seriously sometimes that also makes administration of the specific area of the country, on the whole, being responsible for events like school shootings. Metzl and MacLeish describe and linked this problem with political behaviorism. As public administration institutes are large-level departments, their service must be quick and efficient, but the present case scenario we are discussing, these departments do not take the emergency calls seriously that gave time to the criminal for not only conducting the crime but also fleeing it. Many writers like Cornell has declared this behavior of ignoring the emergency calls, the promotion of such unfortunate happenings. One thing that must be noted here is that this is not the case in the majority of the country, but some people in these cases have definitely faced this behavior of ignorance. It causes disappointment among people of all the country whenever an issue like this came to the mainstream media. Young minds are vulnerable and flexible that they can be molded into any shape. The mental health of students is deeply affected by school shootings of violence. The victims are the ones that receive engraved scars. There are many schools who have been the victims of school shooting previously and are still standing tall in their game. The students, as well as faculty members who have experienced such unfortunate events as front hand victims, are the latest one to recover. This surely implicates a responsibility on the school administration, parents, and social culture, and public administrations to make them at ease, as Martell L Teasley (2018) described in her article about the mental health of victims of school shootings. She greatly emphasized that the government needs to provide assistance in the field of mental counseling to the affected schools. Wolfe et al. (2015) wrote a detailed article about what law enforcement agencies need to do and what school administrators have to do in order to ensure the safety of students. First and foremost, responsibility definitely lies on the shoulders of public administrations to make feasible policies for the schools and students to follow. Secondly, they have stated that every school, according to its neighborhood and level, needs to hire and train its staff with arms. In order to protect the children and school, the guards and administration can work hand in hand. Analysis of Literature School shootings and similar events are not related to some area, culture, or race but are a worldwide issue. This issue has gained momentum recently and is being talked about. This is such an unfortunate event that its impact is deep that never lets people forget it. Events like these are a direct attack on the future of a country. It takes a lot of courage for parents to send their kids back to school after such events that put a lot of pressure on the government and public administration as well. The safety of students is the first and foremost priority of a State, so any such event directly implicates that improvement is required in the system. The panic of people is natural, and the anger of victims is justified in these situations for which always public administrations are held responsible. In recent times it can be seen that school shooters have become more vivid and unfearful that confuses the administration, and scares the public. Obviously, diagnosing the reason for these shootings is not an easy task, but still, the administration department should always be on duty so people can entrust their kids to them. There are a lot of cases where the criminal is found dead either by suicide or by police shootings that lead to a complex outcome of what could be the reason for the conduction of such a heinous crime. Any news spread like wildfire around the globe in today’s fast-paced world, which makes it difficult for the administrations to persuade the people and to control the situation. In some cases, the news on mass media is false that endangers not only the safety of the general public but also wastes the genuine efforts of public administration. So, it can be evidently said that mass media is making things difficult for public departments that are actually working hard for the safety of people. Gun legislation also holds great importance in this discussion. General citizens believe that gun control can sort out many issues related to violence in society. But many personal agendas come in the way that has allowed many people to use the gun for illegal purposes and getting away with this easily. Gun control among school kids is not as much under control as it should be. Apart from the law, it is also the responsibility of parents to tell their kids what good for them and what is not. Whenever the issue of school shootings is being discussed, self-defense instantly clicked the mind. As it has been said earlier that the reason diagnosis of these issues is quite difficult, so the basic need of the hour is to teach each and every individual the techniques of self-defense. The policies need to be introduced in the society on a higher and greater level. Everyone should be aware of the ways that how someone can save himself from difficult situations. Moreover, it should be treated as a responsibility by citizens rather than a simple opportunity. Apart from that, the training of security staff and faculty is also important. Armed training for the guards should be made compulsory by the law enforcement authorities. Social responsibility of people also comes into the picture at this point as simply seeing a crime and passing by is not a civil behavior. Everyone needs to take responsibility as a citizen. Public administration, on the other hand, has to have fast and effective services in every area of the country so no one would suffer for the irresponsibility of the public departments. The current state of the judicial system and public administration is not ideal. There are many cases where the instant unavailability of public administrations has played a role in causalities. The fault does not belong to a single person but to a group of people. But the plus point is, improvements can always be made, revolution can always be brought. Bringing everyone to justice is the key in order to revolutionize the current conditions. No one should be allowed to get away with crimes easily without paying the price of their deeds. The reason for the conduction of this research is not just diagnosing the issue but also providing the solutions. At this point, it would not be wrong to say that acceptance, taking responsibility, and justice is the three practices that can revolutionize the world of crimes into a peaceful living space for each and every person. In this process, public administration alone will never be able to bring change until people stand by them through thick and thin. Together as one whole, change can be made. This change can revolutionize not only the present but also the future. Shootings, whether at schools or at public places, are horrific crimes and can never be justified. The loss of even a single innocent person is something that can never be detained. By seeing the current statistics of these crimes, all society needs to come forward together. People that have once faced it can never be brought back to normal by simple verbal consolation, but the physical stance of the words is required for which only public administrations can take a stand. So, in order to gain the trust of people back and to remove illiteracy, the government needs to come up with solid policies and effective methods. Perseverance of law and effective practices need to be introduced. The public, on the other hand, needs to follow these policies with all their heart because genuine tries can literally sort the issue in a short span of time. Both public administration and general people need to go hand in hand in order to prevent such horrific crimes. Along with this, diagnosing the reason why people choose to commit such crimes is also important. This will help in eradicating the root of this issue that would make people live in peace. • Burns, R., & Crawford, C. (1999). Crime, Law and Social Change, 32(2), 147-168. • doi:10.1023/a:1008338323953 • Chrusciel, M., Wolfe, S., Hansen, J., Rojek, J., & Kaminski, R. (2015). Law enforcement • executive and principal perspectives on school safety measures. Policing: An International Journal of Police Strategies & Management, 38(1), 24-39. doi: 10.1108/pijpsm-11-2014-0115 • Cornell, D. (2020). Threat assessment as a school violence prevention strategy. Criminology & • Public Policy, 19(1), 235-252. doi: 10.1111/1745-9133.12471 • Kennedy, D. (2018). The School Shooter: A Rapidly Growing Problem for • Homeland Security. Monterey. • Metzl, J., & MacLeish, K. (2015). Mental Illness, Mass Shootings, and the Politics of American • Firearms. American Journal of Public Health, 105(2), 240-249. • doi: 10.2105/ajph.2014.302242 • Muschert, G. (2007). Research in School Shootings. Sociology Compass, 1(1), 60-80. • doi: 10.1111/j.1751-9020.2007.00008.x • Newman, B., & Hartman, T. (2017). Mass Shootings and Public Support for Gun Control. • British Journal of Political Science, 49(4), 1527-1553. doi: 10.1017/s0007123417000333 • Schildkraut, J., Elsass, H., & Stafford, M. (2015). Could it happen here? Moral panic, school • shootings, and fear of crime among college students. Crime, Law and Social Change, 63(1-2), 91-110. doi: 10.1007/s10611-015-9552-z • Teasley, M. (2018). School Shootings and the Need for More School-Based Mental Health • Services. Children & Schools, 40(3), 131-134. doi: 10.1093/cs/cdy015 • Travis III, L., & Kiernan Coon, J. (2005). The Role of Law Enforcement in Public School • Safety: A National Survey. Cincinnati. Related Posts Leave a Comment
Monday, October 25, 2021 Exactly What Is A Rules? Regulation is actually a methodical process of principles imposed and created by governmental or civic agencies to regulate perform, through an appropriate quality often a subject of longstanding disagreement. It really is typically described as study regarding proper rights along with a willpower of information utilized to explain how groups, folks and establishments to control their selves. This can be a human body of information produced after a while and is based on analysis into your background and current routines. In typical utilization, what the law states can be used to make reference to the main topic of authorized studies, though judicial perform is more generally designed to talk about the operation of using the regulation in practice. The willpower is broadly deemed the ideal path for studying the foundations of laws, its request for example career fields, as well as the modern society affecting regulations. If you treasured this article therefore you would like to receive more info with regards to more.. please visit the web page. In the past, study regarding regulation has had about three principal guidelines. Very first, early concepts pertaining to ideal and completely wrong were definitely captured in composed texts, most often in law treatises. Additionally, moral notions arose from problem for social wrongs and worry for teams, areas and folks. Thirdly, notions of accountability arose from suggestions about right and improper and society on the whole. As previously mentioned, the roll-out of law developed responding to individual and community requires. Thereby, moral hypotheses, together with some moral hypotheses, enjoyed a role. Realistic good reasons also led to the development of law. By way of example, to support handle misunderstandings between rivalling categories, expert was searched for, and in the act, it has become important to provide security and sequence, which brought about laws regulating personal carry out. An effective instance investigation of your evolution of rules would be the divorce of religion and govt, which taken place when religions began to be based on rules as anything apart from ethical coaching. Statutes that forbade worship and prayer had been made aware of end religions from impeding the public’s access to proper rights and ethical assistance. In a similar fashion, statutes that forbade cruelty, imply of penalty, have been unveiled in end routines including cruelty in the direction of pets, to protect pets from having difficulties. The idea that an action is morally wrong and as a consequence un-justifiable, is known as utilitarianism. Another person suggested that mainly because an actions is utilitarian, it is improper for an individual to acheive it. Some would state that utilitarian would cause equality and proper rights, on the other hand some would disagree that is. Depending on them, utilitarianism causes socialism, and socialism brings about wicked. We have moved off the ethical perspective when we use utilitarianism to warrant dealing with people unfairly. A utilitarian would state that the most significant great for people is perfect for the most significant variety of folks. Proper rights, or simply just sociable proper rights, was made in order to avoid unjust treatments for any person or group of people. This is basically the implementation of justice that make a difference, as is also the technique of morality, however it is not just the method of proper rights. Universal justice, often called standard morality, will be the idea that each people are equivalent in legal rights and dignity. Proper rights is absolutely not based uponrace and gender, or financial status, but on respecting others’ rights. Proper rights needs the responsibility of merely one group of people to regard the rights of some other. To put it differently, respecting the protection under the law of some others is available prior to personal legal rights. Therefore, any time a community has evolved a legal technique, it offers sometimes determined proper rights through legislation or has supplied people the electricity, by using a handling influence, to find out what is just and unjust by using laws they will produced. Instances of these kinds of community regulations consist of matrimony regulations, separation and divorce legal guidelines, and work legal guidelines. History of regulation starts off with the development of civil society, that was handled by kings. Kings, like other civil managers, fixed the rules for regulations. Civil regulation progressed into rules requirements that set the borders of practices for males in culture. It might be claimed that laws will be the regulations by which communities run. With no regulations, there will be no sequence without justice. The historical past of mankind has experienced significant interpersonal adjustments, just like the climb of democracy and flexibility, the expansion of human legal rights, and the roll-out of the legal system. Through the entire long outline higher than, communities happen to be in a position to change regulations to accommodate their requirements. It might be completely wrong to assume that societies can’t modify, because we see with several of the recently available interpersonal concerns world wide. History and study regarding rules continue on currently as societies carry on and build justice and principle by way of legal guidelines. If you loved this short article and you would like to obtain extra information about simply click the next document kindly take a look at the page. Even more ideas from advised publishers: Mouse click the following internet site click the up coming web site click the up coming post Back To Top
1. Forum 2. > 3. Topic: Russian 4. > 5. "Я иду со своим папой." "Я иду со своим папой." Translation:I am going with my dad. January 24, 2016 so when do I use c and when do I use co. The lesson sheet says with(someone or something) but I can't imagine a case that you use "with" and are not also including someone or something. Со is likely to be used when the next word begins with two consonants, like вт-, вс-, дн-, мн-, and others. So: со стола 'from the table,' со второго 'from the second,' со мной 'with me,' etc. (c + genitive = 'from,' c + instrumental = 'together with'). It's the same treatment with в, во and о, об,обо, right? Yes, it is right! I would say that in most cases if this noun (smn, smth) or just next word begins with C letter, you will see CO, in order to avoid double CC pronunciation. But that's not a rule and there are lots of exceptions, like Макароны с сосиской, Гулять с собакой... Is it more idiomatic to use Моим or Своим in this case? Почему "мальчик с девочкой" Переводят как мальчик и девочка, а "мальчик с папой" Нельзя перевести как мальчик и папа? Does своим suggest that i am a male in this sentence? Should females use своей? Or am I on the wrong track No, своим here is modifying папой (dad), not you (the subject) so that's why it needs the masculine instrumental ending -им. Папа is tricky also because it's one of a handful of nouns referring to male persons that look (and decline) like feminine nouns; but adjectives, pronouns, etc that modify them take masculine endings. So: мой папа = my dad, мой дядя = my uncle, мой дедушка = my grandpa. How would you say "I am going with her (or his) dad? Я иду с её папой (with her dad) / c его папой (with his dad). Его (his), её (her) and их (their) are odd in that they never change form: Вот её папа. (nom.) Вот книга её папы. (gen.) Я дал книгу её папе. (dative) Я знаю её папу. (acc.) Мы думали о её папе. (prepositional) Thanks! So своим is only used when the subject and the possessor are the same, right? I usually think of it this way: whatever is modified by свой belongs to the subject, but I think you're saying the same thing, so yes. :) "I am going with dad" doesn't work. Where in the sentence does it say 'my'? свой in this context means 'my.' Whatever свой refers to (папа, here) belongs to the subject; so Я иду со своим папой = I'm going with my dad, Ты идёшь со своим папой = You're going with your dad, Он идёт со своим папой = He's going with his [his own, not someone else's] dad, etc. Does it mean that if I want say that "he is going with someone else's father..." I should use genetive case to say that??? "He is going with his [someone else's, not his own] father" would be Он идёт с его папой. Папа becomes папой (instrumental) after с in the meaning 'together with.' Его (his) never changes form. Or should I use the instrumental case subject...Мной, тобой... Should be accepted as supposedly you wouldn't refer to anyone as "dad" except for your own. What is this word папой? How is it related to папа? Папой is the instrumental singular form of папа. When we use с in the sense of 'together with,' the noun needs to be in the instrumental case. Other examples: с Машей 'with Masha', со мной 'with me,' с этими студентами 'with these students.' In an earlier exercise, there was an exercise along the lines of "мы с папой" translated as "dad and i." Why do we sometimes say я с папой, which is effectively what we're doing here, and "мы с папой?" Did all these one-letter prepositions used to always have an о? Ко, со, во. I ask because I saw the verb соделать in an Old Church Slavonic hymn. Maybe the о got dropped over time, except in front of certain consonant clusters? If I say that I am going with Dad, it is identical in meaning to I am going with MY Dad. Including the word MY is unnecessary and you should accept the translation without MY Learn Russian in just 5 minutes a day. For free.
Answers in Genesis #fundie #dunning-kruger answersingenesis.org Neanderthals and Modern Humans Were Buried Together Perhaps the strongest evidence that Neanderthals were fully human and part of our biblical “kind” is that at four sites people of Neanderthal morphology and people of modern human morphology were buried together. In all of life, few desires are stronger than the desire to be buried with one’s own people. Skhul Cave, Mount Carmel, Israel, is considered to be a burial site of anatomically modern Homo sapiens individuals. Yet Skhul IV and Skhul IX fossil skulls are closer to the Neanderthal configuration than they are to modern humans.27 Qafzeh, Galilee, Israel, is also considered to be an anatomically modern burial site. However, Qafzeh skull 6 is clearly Neanderthal in its morphology.28 Tabun Cave, Mount Carmel, Israel, is one of the classic Neanderthal burial sites. But the Tabun C2 mandible is more closely aligned with modern mandibles found elsewhere.29 The Krapina Rock Shelter, Croatia, is one of the most studied Neanderthal burial sites. At least 75 individuals are buried there. The remains are fragmentary, making diagnosis difficult. However, the addition of several newly identified fragments to the Krapina A skull (now known as Krapina 1) reveals it to be much more modern than was previously thought, indicating that it is intermediate in morphology between Neanderthals and modern humans.30 That Neanderthals and anatomically modern humans were buried together constitutes strong evidence that they lived together, worked together, intermarried, and were accepted as members of the same family, clan, and community. The false distinction made by evolutionists today was not made by the ancients. To call the Neanderthals “Cave Men” is to give a false picture of who they were and why caves were significant in their lives. The human family is a unified family. “From one man He [God] made every nation of men, that they should inhabit the whole earth” (Acts 17:26).31 Ken Ham and Franklin Graham #fundie #wingnut #homophobia #transphobia answersingenesis.org It’s being described as “the most comprehensive assault on Christianity in America ever written into law,” “a dangerous threat to our nation,” “the Left’s woke new heresy code,” and “something no American should stand for.” What is it? The so-called “Equality Act” that was recently introduced to Congress. But it’s for anything but “equality”—it’s for destroying freedom of religion and freedom of conscience in this nation, as guaranteed by the First Amendment. Here’s how Franklin Graham describes the possible effects of this legislation in an email.[…] The Equality Act Will: * Designate schools, churches, and healthcare organizations as “public accommodations.” With this, schools, churches, and hospitals could be forced to accept the government’s beliefs and mandates about sexual orientation and gender identity. That would be highly intrusive and incredibly far-reaching. It will threaten everyday speech where people can be fined or lose their jobs for using the wrong name or pronouns. * Legislate that we allow boys in girls’ sports, boys in girls’ locker rooms, men in women’s shelters, and men in women’s prisons. It will force teachers and students to publicly pretend that a biological male is a female. Schools will be encouraged or mandated to instruct first, second, and third graders that they can choose to be a boy or a girl, or neither, or both, making biological sex (and science) a relic of the past. Avery Foley and Troy Lacey #fundie answersingenesis.org Grandmothers? What’s the Evolutionary Use? In an evolutionary worldview, human grandmothers are a bit of a puzzle. In most animal species, females do not survive long after their childbearing years have ended. Human females, however, can and often do survive for decades after menopause, the hormonal change which concludes their childbearing years at around age 50. Studies such as the one mentioned below apply an evolutionary worldview in an attempt to explain what (or in this case, who) we see around us. In this worldview, organisms are generally only helpful to the continued survival and evolution of the species if they can reproduce. Once an organism can no longer reproduce, it is merely taking up space and resources that could go towards either the reproducing or young members of the species. So why would evolution favor human grandmothers? Our life span should have evolved to be shorter, especially for women since, unlike men, there is a defined ending to their ability to reproduce. That is the evolutionary problem with grandmothers. There Must Be an Evolutionary Explanation of Why Grandmothers Exist! Defying evolutionary beliefs, grandparents have existed throughout recorded human history, and since we must have an evolutionary justification story for everything, the researchers of a new study have woven together an explanation with a slight twist.1 To be fair, this paper is looking specifically at how distance affected the “grandmother hypothesis,” which has been around at least since 2004. And that hypothesis was built upon “explaining old age by natural selection” in papers going back to at least 1966.2 In a nutshell, the “grandmother hypothesis” postulates that post-reproductive life spans are selected for in older women because grandmothers “gain inclusive fitness benefits by helping their daughters and grandchildren.”3 But in this new study, the authors looked at the distance between their mothers and their daughters to determine if there was a correlation. By looking over detailed church records from Quebec, Canada, in an age (1608–1799) where travel was much more difficult, they discovered slightly overall positive effects of the presence of the (grand)mother living in close proximity when her daughter was giving birth at a younger age and the number of offspring born, as well as lower chances of infant mortality.4 They also found that distance did affect the benefits, with grandmothers who lived over 50 km (31 miles) away providing severely decreased benefit to the mother or grandchildren, suggesting that geographic distance may constrain the ability of the mothers to help their daughters (and grandchildren), resulting in a decrease in fitness benefits with distance.5 But the authors admit that the evolutionary explanation is still elusive. The question of why prolonged PRLS [post-reproductive life span] has evolved remains unanswered. Evolutionary pathways to prolonged PRLS have yet to be supported. Future research should apply quantitative genetic analyses to test evolutionary genetic hypotheses and assess the relative importance of PRLS hypotheses. The indirect fitness benefits accrued by grandmothers in our study support the proposition that the grandmother hypothesis can, in part, explain PRLS.6 In other words, from an evolutionary perspective, they cannot explain why women live long past their child-bearing years. Although the study mentioned above did find a positive correlation, it was slight and could just as readily be explained as a result of religion and community (French-speaking, Catholic, founder settler population initially). If evolutionary biologists were to be consistent with their evolutionary paradigm, it would seem that the expenditure of community resources on non-reproductive members would outweigh or at least even out the “babysitter benefits.” Indeed, when one takes the evolutionary worldview to its logical conclusion, it becomes evident that euthanasia is the natural consequence. Euthanasia, typically defined as the intentional ending of the life of someone who is suffering, is increasingly being broadened to include those who are simply very elderly. In the evolutionary worldview that has increasingly permeated Western culture for over 150 years, this makes sense. Clear out the elderly so resources can be freed up for younger, healthier, and more productive persons. Ken Ham & Avery Foley #fundie answersingenesis.org If Humans Are Just Animals Then . . . Well, it’s important to first note the inconsistency of most animal rights groups. These groups claim to be against animal abuse, but are these same people against the abuse of millions of children who are brutally murdered in their mother’s wombs through abortion? It’s rather ironic that in PETA’s evolutionary worldview humans are just animals, yet PETA does not petition against the “animal cruelty” of killing unborn children. And what about a Save the Tapeworms Society or People for the Preservation of Fruit Flies? If all life evolved, shouldn’t these groups be against killing these creatures too? Yet most animal rights groups are not trying to preserve pests like these. This highlights their inconsistency. And if they are evolutionists, then all life, animals and plants, are related in the one big supposed evolutionary tree of life. So what about rights for plants too? Now some animal rights people claim they are Christians. If so, then they need to understand that God gave man dominion over creation (Genesis 1:26), including over the animals. This dominion does not mean we can deliberately abuse, neglect, or harm creation, but rather, we’re to use what God has made for our good and His glory. In Genesis 1:29 and 30, God told man to eat plants/fruits. But in Genesis 9:3 after the Flood, God said we could eat all things (plants and animals). Animal rights groups really want animals to have dominion over man. Yet, ironically, most would claim that man is just an animal. So if they want equal rights for animals, what rights should humans have if they believe man is just an evolved animal? For example if animals kill other animals, do animal rights groups think humans (if we’re just animals) should have equal rights to kill too? Why should we be held to some higher standard or different moral code from other animals? If animals steal from other animals, do animal rights groups think humans (if we’re just evolved animals) should have equal rights to steal? What about incest, cannibalism, or infant abandonment? Why are these things wrong for humans but not wrong for “other” animals? If animal rights activists were consistent, they should argue that it is okay to steal from animals, kill them, and eat them—since this is what we regularly observe in sin-cursed animals anyway. Where Do Rights Come From? In an evolutionary worldview, what makes animal rights activists think that rights exist in the first place? Rights are an abstract concept that comes from a biblical worldview, which is denied by the evolutionary position. The evolutionary position, which comes out of naturalism and materialism, cannot account for the concept of rights, because they are not material. In other words, the evolutionary materialist must borrow the concept of rights from Christians to argue against the Christian position of man being superior and in dominion over animals. If animals are no different from humans, then why aren’t ringworms making the argument for animal rights, instead of people? We don’t observe the organization of ringworms called the Ringworms for the Ethical Treatment of Animals or RETA. In the animal rights activists’ heart of hearts, they know man is above animals. What they don’t know is why. It is because man is made in the image of God (Genesis 1:26–27). Evolutionary Morality—Hopelessly Inconsistent Those who start with an evolutionary view of mankind have no absolute basis for morality. Because they have no foundation, they are forced to construct a moral code that is “right in their own eyes” (Judges 21:25). This leads to all kinds of inconsistencies. Evolutionists arbitrarily create or hold to a moral code for humans—which, in their view, includes not using anything that comes from or was even tested on animals—yet they believe we are just animals. So why should we be held to this arbitrary standard that no “other” animal is held to? "Let Them Have Dominion” Most animal rights groups start with an evolutionary view of mankind. They view us as the last to evolve (so far), as a blight on the earth, and the destroyers of pristine nature. Nature, they believe, is much better off without us, and we have no right to interfere with it. This is nature worship, which is a further fulfillment of the prophecy in Romans 1 in which the hearts of sinful man have traded worship of God for the worship of God’s creation. But as people have noted for years, nature is “red in tooth and claw.”4 Nature is not some kind of perfect, pristine place. And why is this? Because mankind chose to sin against a holy God. When Adam and Eve disobeyed God’s command, they brought death, suffering, and the Curse into creation (Genesis 2:17, 3:17). Now all of creation groans, waiting for the coming day when Jesus will liberate it from the Curse (Romans 8:20–22; Revelation 22:3). Creation was never designed to live in disharmony. We, and the animals, were originally created to be vegetarian (Genesis 1:29–30) and to live forever without any suffering or disease. But because sin changed all of that, we battle its effects every day. But this doesn’t mean that humans are a blight or disease. Despite our sin, we are the only ones created in the very image of God, utterly unique from the rest of creation. We were granted dominion over the earth and it’s inhabitants (Genesis 1:26). This was part of our “very good” (Genesis 1:31), pre-Fall purpose and mission, and it stems out of our position as image bearers of the Creator. Paul F. Taylor #fundie answersingenesis.org Paul F. Taylor #fundie answersingenesis.org Skeptics often claim, “The Bible is not a science textbook.” This, of course, is true—because science textbooks change every year, whereas the Bible is the unchanging Word of God—the God who cannot lie. Nevertheless, the Bible can be relied upon when it touches on every scientific issue, including ecology. It is the Bible that gives us the big picture. Within this big picture, we can build scientific models that help us explain how past events may have come about. Such models should be held to lightly, but the Scripture to which they refer is inerrant. That is to say future research may cast doubt on an actual model, without casting doubt on Scripture. The Hard Facts The dog kind diversifying Modern Recolonizations Oard has pointed out that certain observed features from the Ice Age cause problems for the evolutionist, not the creationist. Thus, a creationist explanation of the Ice Age better explains the facts. An example of such an issue is that of disharmonious associations of fossils—fossils of creatures normally associated with different conditions (such as creatures with a preference for hot and cold climates) being found in close proximity. The lack of great marsupials in other continents need be no more of a problem than the lack of dinosaurs. As with many species today, they just died out—a reminder of a sin-cursed world. One proposed theory is that marsupials—because they bore their young in pouches—were able to travel farther and faster than mammals that had to stop to care for their young. They were able to establish themselves in far-flung Australia before competitors reached the continent. Recolonization Theory Ken Ham #fundie answersingenesis.org Towards the end of our time together, I asked Bill to explain why he wore clothes. Again I wanted to show he had no moral basis for his worldview, but it was just subjective opinion. I then used Genesis’ account of the origin of clothing to explain the gospel to Bill. God gave Adam and Eve clothes because of sin. The first blood sacrifice was a covering for our sin, a picture of Jesus Christ, the Lamb of God who takes away the sin of the world. Unknown author #fundie answersingenesis.org Many people believe dinosaurs lived millions of years ago and died before humans were alive. But when we read the Bible, we find that isn’t true. GENESIS 1 tells us that God created all land animals on Day Six of Creation (the same day He created Adam and Eve). Dinosaurs are land animals, so they were created on the same day as Adam and Eve, only six thousand years ago! Unknown author #fundie answersingenesis.org The argument, “Only the uneducated reject evolution,” is a logical fallacy on many fronts. It’s an ad hominem fallacy because it attacks the creationist rather than challenging the creationist’s view. It’s a faulty appeal to authority because it appeals to particular experts without acknowledging that many experts dispute the claim of evolution. It’s a “no true Scotsman” fallacy because even though there are many educated creationists, they are reclassified as uneducated since supposedly no truly educated person would reject evolution. Those who believe that only the uneducated reject evolution perhaps do not realize that evolution, far from fact, does not even qualify as a theory. Evolution is a belief system about the past. Creationists also have a belief system about the past, but it is based on the historical account of the Bible, which claims to be the Word of God (2 Timothy 3:16). The Apostle Paul was a highly educated man who believed the Scriptures (Acts 22:3; Philippians 3:4–11). When Paul was on trial for his faith and testifying before King Agrippa, the governor Porcius Festus exclaimed, “Paul, you are out of your mind; your great learning is driving you out of your mind” (Acts 26:24). Festus could not attack Paul’s credentials or testimony, but he suggested Paul’s extensive education had driven him to insanity. Paul’s gracious response appeals to the truth and rationality of his faith: “I am not out of my mind, most excellent Festus, but I am speaking true and rational words” (verse 25). Paul had just explained his testimony how “according to the strictest party of our religion I lived a Pharisee” (verse 5) and how he had fiercely persecuted the first followers of Christ (verses 9–11) until his dramatic encounter with Jesus Himself (verses 12–18). He went from persecuting to proving Christ (9:20–22). Jesus appointed Paul as His witness (26:16) “to open their eyes, so that they may turn from darkness to light and from the power of Satan to God, that they may receive forgiveness of sins and a place among those who are sanctified by faith in me” (verse 18). Paul had lived faithfully to Christ’s commission, calling both Jews and Gentiles to “repent and turn to God, performing deeds in keeping with their repentance. For this reason the Jews seized me in the temple and tried to kill me. To this day I have had the help that comes from God, and so I stand here testifying both to small and great, saying nothing but what the prophets and Moses said would come to pass: that the Christ must suffer and that, by being the first to rise from the dead, he would proclaim light both to our people and to the Gentiles” (verses 20–23). So Paul not only had a personal testimony, but he also had the support of specific prophecies made hundreds of years before Jesus was born, which Christ perfectly fulfilled. 2 Let’s look at a few of these prophecies about the Messiah: Paul pointedly asked, “King Agrippa, do you believe the prophets? I know that you believe” (Acts 26:27). King Agrippa was apparently familiar with the Scriptures (verses 2–3). He also must have heard reports of Christ’s life, death, and Resurrection, since there were more than 500 eyewitnesses (Luke 1:1–4; Acts 1:1–3; 1 Corinthians 15:6). Paul asserted, “For the king knows about these things, and to him I speak boldly. For I am persuaded that none of these things has escaped his notice, for this has not been done in a corner” (Acts 26:26). So King Agrippa was faced with a true and rational testimony of an educated man, a clear explanation of the gospel, the verification of eyewitnesses, and the fulfillment of prophecies. Sadly, King Agrippa put off personally turning to the truth: “In a short time would you persuade me to be a Christian?” (verse 28). Paul gave further evidence of Christianity in his response—the evidence that he and many others were willing to give up everything, even their own lives, for the sake of the gospel: “And Paul said, ‘Whether short or long, I would to God that not only you but also all who hear me this day might become such as I am—except for these chains’” (verse 29). People today have as much evidence as King Agrippa had and even more because we have the completed Scripture with the addition of the New Testament to the Old Testament. Beyond these evidences, we have what AiG calls the ultimate proof of creation in that naturalism/materialism cannot provide any basis for laws of logic, absolute morality, and the uniformity of nature, yet the Bible gives us the basis for these. As Paul wrote in Romans 1:18–32, those who suppress the truth about the Creator are fools, no matter how educated they are. On the other hand, those who have repented and trusted Christ have nothing to boast about except in the Lord, who by the message of the Cross saves sinners, no matter how uneducated. Ken Ham #fundie answersingenesis.org I believe the message of the AiG ministry has been very “prophetic.” Even when I began teaching on creation vs. evolution back in 1975, I was already asserting that atheistic evolution and morality were connected and that, over time, immorality would grow as people rejected God’s Word and accepted evolution. I taught that the more people believed that life arose by natural processes, the more they would also believe that life was ultimately meaningless and purposeless—and morality could be whatever a person determined. Or, as Judges 21:25 states, when there was no king (or absolute authority) in the land, “everyone did what was right in his own eyes.” The late Dr. Henry Morris (considered the father of the modern biblical creation movement) had also been writing about this connection between evolution and morality in most of his early books. Over the decades, evolutionists have often mocked me for tying evolution to morality. They claim that evolution has to do with “science,” not morality. But notice that as generations have been indoctrinated into believing naturalistic evolution, Christian morality has declined. Armed with so-called “science,” secularists have become bolder in opposing Christian morality. In our Western world, we are seeing more and more people (like Bill Nye “the Science Guy”) who boldly claim that evolution is “science” and are using it to promote an anti-Christian worldview. More than ever, secular activists are vehemently opposing Christian morality, such as marriage being between one man and one woman and abortion being murder. And we are seeing very amoral and immoral behavior growing across the culture, especially, it seems, among the millennial generation. While we do not argue that evolution directly causes immorality, people can use Darwinian thinking to justify their behavior. Now, it’s a challenge to read Charles Darwin’s books like On the Origin of Species and The Descent of Man. His writing can be very convoluted and difficult to follow. But what is clear is that Darwin believed humans are not special as the Bible states (i.e., made in God’s image), but just animals. As a result, he declared that morality was a result of evolution, shaping man into a highly social species through the process of natural selection. In The Descent of Man, Darwin wrote, “Nevertheless, the difference in mind between man and the higher animals, great as it is, certainly is one of degree and not of kind.” My point is that there has always been a connection between evolution and morality. Over the years, I’ve heard many evolutionists (like Bill Nye) and even some Christians claim that evolution is all about “science.” They vigorously rejected my insistence that evolution involved a worldview that helps build a relative/subjective morality. That’s why many people were shocked (though I wasn’t at all) when Bill Nye released his new series on Netflix that pushes shocking immorality and is sometimes anti-Christian. Kids and adults enjoyed Nye’s TV series years ago where he did lots of fun things to teach science. Even if you watched his series back then, you would have noticed how he promoted evolutionary ideas in biology and geology. But he did it in such a way that most children would not have really noticed—and many parents probably didn’t see those pro-evolution sections. But kids were subtly indoctrinated. Even before his famous “Science Guy” program, Bill Nye had his television debut when he performed a comedy routine. It included a number of sexual innuendos. For the many of you who saw my 2014 debate with Bill Nye (available uncut online or as a DVD), you will remember how I emphasized that the creation vs. evolution issue was actually a clash of two worldviews. Nye rejected this, of course, claiming I was the one who was talking about religion, but he was all about “science.” In that debate I revealed the connection between naturalistic evolutionary beliefs and morality. Nye totally rejected this view. But people are now starting to see that what I stated in the debate is now being played out before their very eyes. A recent article in the Christian Post reported (please excuse the crudeness): On his Netflix show “Bill Nye Saves the World” on Sunday, the man famous for his 1990s series “Bill Nye the Science Guy” cheerily featured “Crazy Ex-Girlfriend” star Rachel Bloom performing a lewd number called “My Sex Junk” and a video called “Ice Cream Sexuality,” a clear derision of Christian sexual ethics. Nye’s new show occasionally references science and scientific language with the purpose of promoting left-wing causes. Michelle Cretella, president of the American College of Pediatricians, told the Christian Post, "These sad videos prove that atheistic Darwinians are so committed to blind faith that they very well may be invincibly ignorant.” But really, this is what the belief in naturalistic evolution has always been about! I’m sure many of you have heard of the book Brave New World by Aldous Huxley. He was an English novelist and grandson of the famous contemporary of Darwin, Thomas Huxley. Thomas Huxley was known as “Darwin’s bulldog,” who, as an aggressive secular humanist, heavily promoted Darwin’s evolutionary ideas. He clearly saw Darwin’s naturalistic evolution as a justification for his secular humanist worldview. Encyclopedia Britannica states the following about Brave New World: “The novel presents a nightmarish vision of a future society in which psychological conditioning forms the basis for a scientifically determined and immutable caste system that, in turn, obliterates the individual and grants all control to the World State.” In 1937, Aldous Huxley made this statement in his book Ends and Means: There was one admirably simple method of confuting these people and at the same time justifying ourselves in our political and erotic revolt: we could deny that the world had any meaning whatsoever. We’ve often said that this worldview struggle is ultimately one that started in the Garden of Eden over 6,000 years ago. It’s a battle between God’s Word and man’s word—a battle between two worldview religions. Answers in Genesis has been involved in this struggle for 23 years. It’s the battle our Creation Museum and Ark Encounter are engaged in. And the only way to ultimately win this struggle is for people to be redeemed by the blood of the Lamb: “knowing that you were ransomed from the futile ways inherited from your forefathers, not with perishable things such as silver or gold, but with the precious blood of Christ, like that of a lamb without blemish or spot” (1 Peter 1:18–19). This is why the Creation Museum and Ark Encounter exist. As we answer questions that will point people to the truth of God’s Word, we also clearly present them with the gospel. We’ve never hidden the fact that evangelism is our ultimate purpose—which is why we receive so much opposition from secularists. At the Creation Museum we present the saving gospel in different ways. That includes the stunning movie The Last Adam and the powerful new exhibit Christ, Cross, Consummation. We also make evangelistic tracts available free to our guests. At the Ark Encounter, the gospel is featured in a number of ways including through the new movie As in the Days of Noah. The gospel is also powerfully shown in the massive exhibit Why the Bible Is True, with a graphic-novel approach. In that exhibit, we walk guests through the various “doors” of Scripture and then challenge visitors to go through the most important “door,” the Lord Jesus Christ. We have just created a new gospel-witnessing tract on the “doors” of Scripture. It has been produced in conjunction with our new Ark exhibit, and we freely offer it to each guest who wants one at the Ark Encounter. I’m very excited about this new resource. It’s one more evangelistic tool to share the gospel at the Ark Encounter. And now you can order this “Doors of the Bible” tract from our online store and share it with someone who needs to hear the gospel. I ask that you pray for the Ark Encounter and Creation Museum outreaches. Everything we do at Answers in Genesis is for the ultimate purpose of sharing the life-changing message of the gospel. And it is through your prayers and support that you are enabling AiG to continue all its many vital outreaches—to impact millions of souls for the kingdom of Christ while countering anti-Christian influences, like Bill Nye. Avery Foley #fundie answersingenesis.org “So God created man in His own image; in the image of God He created him; male and female He created them.” (GENESIS 1:27) According to evolution, man evolved from an ape-like ancestor. Because evolutionists believe this happened they expect to find “missing links” between people and our supposed ape-like ancestors. We know from our Bible verse that people were specially made by God in His own image. We did not evolve from anything, so the “missing links” evolutionists are looking for will always be, well, missing! One fossil that is often called a “missing link” is a fossil skeleton known as “Lucy.” Many evolutionists believe that Lucy is a link between ape-like creatures and people. Lucy’s skeleton is missing a lot of her bones. Originally she had 207 bones, but 160 of these are missing including most of her hands, feet, and skull. Far away from where Lucy was discovered are a set of fossilized footprints that look just like the footprints you would make if you walked along the beach. Evolutionists believe that these footprints are too old to be human footprints, even though they look exactly the same as human footprints, so they decided that something like Lucy must have made them. These footprints couldn’t have been made by Lucy, though, because she didn’t walk upright like people do. Other fossils of the same species as Lucy have been found and they have curved toes and fingers just like modern apes do! They also have ape wrists and ape shoulders, which means that Lucy and her family did not walk upright. Instead, like other apes, they lived in trees and walked on their knuckles. Rather than a missing link in the evolutionary chain, Lucy is just an extinct ape! We can trust the Bible when it says that all people were created in God’s image! Ken Ham #fundie answersingenesis.org The Secularist Media War Against the Ark Continues A Recent Case in Point Let me give you a recent example. Reporter Linda Blackford wrote a recent front-page article on the Ark Encounter for the secular newspaper the Lexington Herald Leader of Kentucky (the state’s second largest paper). Her article was titled “Town Expected Flood of Business after Noah’s Ark Opened. So Far, It’s a Trickle.”1 After reading that headline and then her article, I was convinced that she (and probably her editor) had an agenda even before she began her research and writing. She was determined to convince readers that the Ark Encounter wasn’t successful and that it hadn’t had much of a positive economic impact or created jobs in Grant County. As she ignored overwhelming evidence to the contrary, the reporter misquoted the few people she did interview and deliberately wrote an article that hid the whole truth about the tremendous economic impact that the Ark Encounter has had on all of Northern Kentucky. Her motivation? Well, because her newspaper has been known for antagonism toward anything Christian, and AiG has experienced this agenda from the paper over the years, what’s occurred here is yet another example of its anti-Christian bias. Intolerant Atheists The Herald-Leader isn’t the only secular media outlet spreading such maligning anti-AiG propaganda. Many secular bloggers and organizations like the Freedom From Religion Foundation and Americans United for Separation of Church and State have produced videos and/or printed articles filled with misinformation and deliberate falsehoods in their attempt to hide the truth about the success of the Ark. Many articles, for example, have actually stated that the city of Williamstown, where the Ark is located, is liable for the $62 million dollar bond offering that was part of the funding for the Ark. That’s simply a lie. Answers in Genesis is totally liable for that bond offering, which states: The Series 2013 Bonds shall not be general obligations of the Issuer but special and limited obligations payable solely from the amounts payable under the loan agreement and from funds and property pledged pursuant to the indenture. The Series 2013 Bonds and the interest payable thereon do not now and shall never constitute indebtedness of the Issuer or the Commonwealth of Kentucky within the meaning of the Constitution or the Statutes of the Commonwealth, and neither the Issuer, the Commonwealth of Kentucky nor any political subdivision thereof shall be liable for the payment of the principal of, premium, if any, or interest on the Series 2013 Bonds or for the performance of any pledge, mortgage, obligation or agreement created by or arising under the indenture or the Series 2013 Bonds from any property other than the trust estate. Neither the faith and credit nor the taxing power of the Issuer, the Commonwealth of Kentucky or any political subdivision thereof is pledged to the payment of the principal of, premium, if any, or interest on the Series 2013 Bonds.3 Yes, the bonds were issued through the city, but the city is not responsible for one cent of this offering. Some articles even say the bond offering is part of the TIF—which is simply ridiculous! The amount of misinformation and outright lies about the Ark project is staggering. Why so many lies and misinformation? Simply because we are in a spiritual battle, and the intolerant secularists are so upset with such world-class attraction like the Ark (and Creation Museum) that publicly proclaim a Christian message. They will resort to whatever tactics they deem necessary to try to malign the attractions. Of course, negative reporting and commentary result in more advertising for our facilities! As I witness all this opposition and see such opposition backfiring, I am reminded again of what Joseph declared and how it applies to us today: Answers in Genesis #fundie answersingenesis.org Scientists first began studying the world around them because they wanted to understand and praise its Creator. Because God shows some of His character through creation, they tried to learn more about Him by studying His creation. Because they viewed the world through biblical glasses, many creationists made great discoveries and improvements in many different sciences. Steve Ham #fundie answersingenesis.org The Sufficiency of Scripture for Helping People in Need Author Steve Ham explores the consistency between the positions of biblical creation and biblical counseling concerning the authority of God’s Word and its sufficiency in the lives of all believers. Recently I had the opportunity to read and review the book Counseling the Hard Cases.1 This book places the biblical counseling movement on display as it reports the process and outcomes of real-life counseling cases. As a biblical creationist, I was continually encouraged to find the counselors’ dedication to the sufficiency of Scripture for helping real people with real problems. While preparing a review of this book as a graduate student at Southern Baptist Theological Seminary in Louisville, Kentucky, I became even more aware of the consistency between the positions of biblical creation and biblical counseling concerning the authority of God’s Word and its sufficiency in the lives of all believers. Biblical Authority and Medical Science I noticed the strong correlations between biblical creationists and biblical counselors in the first chapter of Counseling the Hard Cases. Both positions face accusations revolving around the nature of authority and science. For example, many “Christian counselors” are convinced that the use of such treatments as hypnosis or psychotropic drugs are based on strong scientific research and analysis.2 Persuaded that this research comes from an authoritative source, they then integrate it into their counseling methodology. Like most “Christian counselors,” trained biblical counselors typically take great care to refer counselees to doctors for necessary medical diagnosis and treatment of their physical ailments. However, for spiritual issues the biblical counselor seeks to ensure that Scripture is seen as the supreme authority and sufficient to help all believers deal with trials (suffering) or sin in their lives. Biblical counselors also should acquaint themselves with the research related to such things as medication, noting which recommendations are based upon repeatable, testable observations and which are based on assumptions influenced by a secular worldview. This is also why biblical counselors prefer to work in partnership with physicians who are Bible-believing Christians. In recognition of secular worldview influences in the medical community, many biblical counselors have armed counselees with questions to ask their practitioners who prescribe medications such as anti-depressants. Especially if a diagnosis is as broad as the term “chemical imbalance,” biblical counselors will encourage questions such as the following: • What tests were performed to prove that the problem exists? • What proof do you have that the problem you discovered is not merely a symptom of a deeper problem? • What proof do you have that the medication you are prescribing truly corrects the problem? Properly Diagnosing the Problem and Its Remedy In today’s world it seems nearly every social or relational problem known to man is categorized by a descriptively named disorder and often treated by some psychotropic drug. In many cases, counselors and others re-label sinful responses to situations in a way that removes personal responsibility. For example, lashing out at your children in anger is now known as Intermittent Explosive Disorder, and “it’s not your fault” that you act the way you do. If your son consistently disobeys your authority as his parent, he will likely be diagnosed with Oppositional Defiant Disorder. These disorders are often depicted as villains maliciously attacking their victims as if they were a force unto themselves. When seen in this light, these problems become the cause of debilitation for many people who find themselves lost in a hopeless dependence on secular psychological techniques and prescription medication. This wrong perception of relational problems that are ultimately rooted in sinful thoughts and behaviors has sadly become commonplace even in the church. Many counseling practitioners have attempted to make a compatible partnership between Christian doctrine and worldly philosophies in the diagnosis and treatment of the human soul.[ Scripture Is Sufficient to Help with the Problems of Life To address this issue, Counseling the Hard Cases reports on real-life case studies from eleven experienced biblical counselors. Compiled by editors Stuart Scott and Heath Lambert, the introduction clearly sets forth the theme for this collection of biblical counseling case studies.4 In the development of the modern biblical counseling movement over the last fifty years, persuasive evidence shows that “Scripture is comprehensively sufficient to do ministry with people experiencing profound difficulties in their lives” (p. 23). While the sufficiency of Scripture in counseling is the basic thesis of the book, in each of the hard cases the editors have been careful to display this concept practically in the lives of real people. Even for those who are not skeptical about biblical counseling, the results of these hard cases were amazing and gave great cause for rejoicing in the redeeming grace found in the Cross of Christ. The biblical counseling movement has been criticized by those who are skeptical of the sufficiency of Scripture for counseling. Secular psychology understandably views the Bible as irrelevant, but many “Christian counselors” acknowledge the Bible’s relevance yet deny its sufficiency in the way that they practically advise their counselees. We expect people with a purely naturalistic view of the human condition to dismiss biblical wisdom in counseling, and therefore this book primarily answers the criticisms of “Christian counseling.” One of the primary criticisms of biblical counselors is that they use the Bible to somehow replace science and therefore ignore the consensus of secular research for dealing with psychological problems. But the proof of scriptural sufficiency for biblical counseling is convincingly “in the pudding.”5 This book helps put to rest the misconception that biblical counselors ignore science as the reader observes them partnering with trained physicians to treat real and identifiable physical problems. It is in the power of the Holy Spirit and the gospel of Christ, through the voice of the counselor, that the application of biblical truth guides a responsive counselee to healing and sanctification. When discussing counseling methods, a key question to ask is this: does the authority to diagnose the many human dysfunctional behaviors come from man’s word or God’s Word? Heath Lambert is quick to point out that the counseling debate is profoundly centered in presuppositions. He refers to Jay Adams, who stated that his presupposition in counseling methodology is “the inerrant Bible as the standard of all faith and practice” (p. 8). It is clear that each of the contributing authors commences his or her counseling approach with the same presupposition as Adams. To some, this presupposition may seem like an intellectual debate about methodologies. But the ten extraordinary cases presented in the book consistently confirm the truth of this idea in real-life situations as the hope of Christ transforms lives and frees people from bondage to sinful thoughts and behaviors. So, a presuppositional approach to Scripture is not simply a debate about truth; it is also entirely practical. Can the Bible Help with the Hard Cases? Like biblical creationists, biblical counselors have never claimed that the Bible is a science textbook. Other accusations against the biblical counseling movement have come from a misinterpretation of the doctrine of the sufficiency of Scripture. Critics claim that the Bible is not a science textbook, and therefore it is ill-equipped to help with so-called psychological disorders. The answers to such claims are well stated in this book. First, secular psychology fails to prove that many of the human problems “classified as mental illnesses” are related to any real “disease or illness at all” (p. 8). This ultimately means that the “science” of secular psychology has its own problems with regard to the definition of observational (i.e., testable, repeatable) science, by which a hypothesis is repeatedly tested and either proven or denied. As a prime example, no one really knows how certain neurotransmitters relate to conditions like depression and anxiety. Yet various medications are prescribed to correct imbalances that have not been accurately defined. Second, critics from the Christian counseling movement suggest that biblical counselors are using the Bible in place of “science” or as a “science” textbook. But, like biblical creationists, biblical counselors have never claimed that the Bible is a science textbook. Within all the different genres that Scripture takes, the biblical counselor starts with a commitment to the authority of God’s Word. So, instead of viewing human problems in the light of a secular label such as a phobia or disorder, biblical counselors present human problems as Scripture does—in terms of the problem of human sin and suffering and the answer in the gospel. Real Help and Change in Transformed Living Reading through each of the hard cases, one soon comes to the realization that these scriptural truths are not just words on a page. Instead, the case studies show there truly is transformational power in the living Word of God (Hebrews 4:12). The same God who saves us from everlasting destruction also brings us into a life that exemplifies His grace. Even more enlightening is the fact that many of the people whose stories are told in this book found genuine healing after having first been disillusioned by the debilitating effects of anti-depressives, hypnosis, attempts to relive a better childhood, and various other secular treatments. The list of documented cases contains “disorders” that many pastors have dispatched in the “too-hard” basket. They include an extreme example of sexual abuse, obsessive-compulsive disorder, bipolar disorder, and more. A purely theoretical book cannot touch the impact of this book in retelling what these real-life experiences reveal about the sufficiency of Scripture in the counseling process. One final thing that should be mentioned in respect to these cases is the book’s consistent theme highlighting the believer’s satisfaction in Christ, confidence in the gospel, the power of the Holy Spirit, a commitment for prayerful reading and application of Scripture, and the supportive care of the local church community. The counseling process is shown to engage not only one counselor but God working through His Word and the community of believers in the heart and mind of the counselee. The Powerful Word of God I heartily recommend this book to pastors and any believer needing to witness the powerful nature of the Word of God to gain confidence and steadfastness in the faith—and anyone with a desire to help others: I myself am satisfied about you my brothers that you yourselves are full of goodness, filled with all knowledge and able to instruct one another. (Romans 15:14, ESV) 1. Stuart W. Scott and Heath Lambert, eds. Counseling the Hard Cases. Nashville, TN: B&H Publishing Group, 2012. 2. “Christian counseling” is a term most often associated with counselors who are prepared to integrate secular psychology’s methodologies and treatments into their counseling. 3. Answers in Genesis has produced an excellent video on this very topic called Counterfeit Counseling by Pastor Brad Bigney. 4. Dr. Stuart Scott, one of the editors of Counseling the Hard Cases, spoke at the Answers for Pastors conference in October 2013 on the sufficiency of Scripture in biblical counseling. 5. This is not to say that every biblical counseling case ends successfully. God’s Word—our fully reliable and sufficient source of truth—requires the believer to submit and obey in humility, but sadly, some people do not submit to the authority of Scripture. Ken Ham #fundie answersingenesis.org Bill Nye, “the Science Guy,” is getting his own film—Bill Nye: Science Guy. This documentary, funded on Kickstarter, is supposed to be “A film for science. A film for the cosmos. The full access, exclusive film about Bill Nye.” The page for the premiere of the event describes it as, Bill Nye is retiring his kid show act in a bid to become more like his late professor, astronomer Carl Sagan. Sagan dreamed of launching a spacecraft that could revolutionize interplanetary exploration. Bill sets out to accomplish Sagan's mission, but he is pulled away when he is challenged by evolution and climate change contrarians to defend the scientific consensus. Can Bill show the world why science matters in a culture increasingly indifferent to evidence? Based on that description, it doesn’t sound like a film for science—it’s a film to promote evolution and man-made climate change as fact. A number of well-known atheists are listed as featuring in this movie—and so am I! In addition to his movie, Nye will also have his own TV show again, Bill Nye Saves the World, on Netflix this spring. Although we don’t know for sure, it’s very likely this show will also dedicate time to defending evolutionary ideas and drastic man-made climate change. Ken Ham #fundie answersingenesis.org Third Anniversary of the Bill Nye/Ken Ham Debate Today marks three years since the widely publicized Bill Nye/Ken Ham debate on creation vs. evolution here at the Creation Museum. That was a very exciting event, and I praise God that I was able to clearly share the gospel several times, both to Bill Nye and the millions of people who were watching via YouTube live stream or later on our YouTube channel. I also was able to help people understand the following: 1. There’s a big difference between historical science and observational science. 2. Molecules-to-man evolution is historical science and thus is a belief system (a religion). 3. The real battle between Bill Nye and me was a worldview clash. 4. Bill Nye holds to naturalism, which for all intents and purposes is atheism. The Second Debate Since that debate we’ve opened the Ark Encounter in Williamstown, Kentucky. Well, the day after it opened in 2016, Bill Nye and his film crew came and toured the Ark. As I guided him through the Ark for over two hours, our conversation ended up being a passionate, but amicable, second debate. I was able to present the gospel to him again very clearly, and we pray that his heart will be softened and that he will recognize his desperate need to receive Jesus as his Lord and Savior. Bring Both Debates Home You can bring home both my original debate with Bill Nye and the second debate at the Ark Encounter. These resources are great conversation starters with unbelieving friends or family members. They’re also great for science classes, homeschool, or churches. Believers will be encouraged with answers to the skeptical questions of our day and will see firsthand how to respond to these objections. You can order both debates as a DVD combo (also available as a download) or order the download bundle that gives you instant access to both debates and includes the Inside the Nye/Ham Debate ebook (also available as a physical book and DVD combo). Inside the Nye/Ham Debate provides detailed answers to the many complex questions that I did not have time to answer during the debate. This is a great resource as you watch the debate! You can order the Two-Debate Combo or the Nye/Ham Debate Download Bundle, which includes the ebook, from our online store. Thanks for stopping by and thanks for praying, This item was written with the assistance of AiG’s research team. AIG staff writer #fundie answersingenesis.org Being a creationist for the wrong reason is wrong . . . Do we feel solidarity with Muslim creationists? The question is largely similar to whether we feel solidarity with those in the Intelligent Design Movement. On one hand, we certainly use many of the same arguments and agree that evolution is an unscientific, by-faith explanation of origins from a naturalistic standpoint. Just as those in the Intelligent Design Movement may generate scientific research we agree with, and just as they may point out societal problems evolution has led to, so also may Muslims. On the other hand, it is very easy to exaggerate the bond of Muslim and Christian creationists, as the Post article seems to do. The problem stems, first, from a focus on the creationist element of each group’s identity and, second, from forgetting that creationist views are intellectually submissive to religious views. Answers in Genesis is a ministry upholding God’s Word first and foremost—and, because of that, our mission is entirely incompatible with an organization promoting a Koranic worldview. Our position on creation is an outgrowth of a biblical worldview, and our mission is closely tied to defending that connection. Thus, to even imply that we would find Muslim creationists more like-minded than evolutionists (Muslim or otherwise) misses the point. Any worldview that fails to begin with God’s Word is ultimately flawed, just as any individual without a saving relationship with Jesus Christ remains responsible for their sins before a just God. Avery Foley #fundie answersingenesis.org Did Dinosaurs Evolve into Birds? According to evolutionary thinking, modern birds are descendants of dinosaurs. But the biblical worldview stands in sharp contrast to this. According to God’s Word, birds were created fully formed and functioning to reproduce after their own kind on Day Five of Creation Week. Dinosaurs, which are land animals, would not have been created until Day Six. So in a biblical worldview, birds would have actually been around before dinosaurs ever walked the Earth—a whole day before! Is there any compelling evidence that dinosaurs evolved into birds? Not at all! Dinosaurs were reptiles and share traits common among reptiles—not birds. They were likely cold-blooded, had lungs like other reptiles, and were covered in scales. Birds, on the other hand, are warm-blooded, have unique lungs, hollow bones, and are covered in feathers. They are completely and utterly different. Adding to the problems with evolutionary ideas about bird evolution is the fact that modern birds like parrots, loons, and owls are found in the fossil record in some of the very same layers as dinosaurs. How could modern birds have evolved from dinosaurs when modern, fully formed birds are found alongside dinosaurs in the very same layers?1 Did dinosaurs have feathers? In a biblical worldview, we do not expect to find feathered dinosaurs. Currently the evidence does not support the idea that dinosaurs were covered in feathers. Now while we may not know for sure what dinosaurs looked like, what we do know is that birds did not evolve from dinosaurs. They—like dinosaurs—were specially created by God in the beginning to reproduce according to their kind. Avery Foley #fundie answersingenesis.org Did Dinosaurs Have Feathers? Many scientists today have accepted the idea that dozens of different species of dinosaurs were covered in feathers. This has resulted in recent artist’s depictions showing dinosaurs covered in soft down or even flight-like feathers. These depictions are nothing short of bizarre and leave the dinosaurs looking quite ridiculous. But was Jurassic World wrong in leaving off the feathers and opting instead for the traditional scaly bodies? Feathers are highly complex structures that grow out of skin follicles, like human hairs. Scales, the traditional covering of dinosaurs, are folds in the skin. However, scientists now claim that many—if not most—dinosaurs had the ability to grow feathers. But the supposed evidence for feathered dinosaurs is scanty and speculative. Some dinosaur fossils have been uncovered that contain fibrous filaments. These filaments do not contain the same elements as feathers—shafts, barbs, or barbules—but instead merely have bristles. Fibrous filaments with bristles are a far cry from the complex structure of a feather! Despite the artistic license taken by many dinosaur sculptors and artists today, there is no conclusive evidence that any dinosaur had feathers. Why are so many scientists eager to accept the idea of feathered terror, like T. rex, if the evidence is so speculative and controversial? Well, this easy acceptance with so little supporting evidence highlights that this is a worldview battle. Evolutionists firmly believe that modern birds are the descendants of dinosaurs. This is such a firm belief that many dinosaurs are referred to as “non-avian dinosaurs” and birds are called “avian dinosaurs.” Some scientists will go as far as to say that dinosaurs are not extinct, they are alive today all over the world twittering on telephone wires, eating at our bird feeders, and flying in flocks above our heads. The desperate desire for evidence to substantiate this idea is so strong that many evolutionary scientists eagerly jumped on the feathery dinos bandwagon despite the lack of evidence! Really, it is an evolutionary worldview that drives this acceptance and continued promotion of the idea. Ken Ham & Dr. Andrew Snelling #fundie answersingenesis.org Dinosaur Footprint Wall in Bolivia A recent article highlighted the Cal Orcko archaeological site in Bolivia. This site in South America has numerous, well-preserved dinosaur footprints (originally listed as over 5,000), and another 5,000 tracks were discovered in 2015. Some of the dinosaurs that left these footprints were Ankylosaurs, Titanosaurs, Carnotaurus, and a juvenile Tyrannosaurus rex. These fossilized dinosaur footprints were originally discovered in 1985, but local mining of the limestone in the area has brought many more prints to light, starting in 1994. The area is now an official Bolivian paleontological site and an application has been submitted to designate it as a UNESCO World Heritage Site. But even more interesting is that the footprints are not on flat ground but rather on an almost vertical wall; and the vast majority seem to be moving in one direction (downhill as the geography now stands). Now this is a region that has had lots of tectonic activity in the recent past, so this was probably flat ground at the time the dinosaurs were making the tracks. Of course what makes this intriguing from a biblical creation and Flood geology perspective is that the tracks are preserved so well, and that we see a diverse grouping of what were considered to be both herbivores and carnivores. We also have tracks from juvenile dinosaurs—some alone and others side by side with adults of the same species. A couple of quotes about the Cal Orcko archaeological site from the Guardian website really stood out: That ankylosaur was running. It sank its four toes into the ground, rather than its heel. . . . So we have running dinosaurs and what appears to be alternating periods of water covering the sand flats and then receding for a short time, only to cover the area once again. This sounds a lot like an area where dinosaurs may have been fleeing rising floodwaters, which brought the sediment to quickly cover and preserve the footprints the fleeing dinosaurs left behind. Dr. Andrew Snelling, geologist and AiG’s director of research, had this to say: All claims about the environment in which these dinosaurs lived and how they left their footprints are mere speculation (i.e., based on historical science, not observational science), because no scientists were there at the time to observe and report to us what happened. So it is hardly an observed fact that this was a lake. But what we do observe is that these footprints were made in a sandy limestone, and that in that same limestone are the fossilized remains of snails, bivalves, fish, turtles and crocodiles.1 Furthermore, we know from observations that animals and footprints are not fossilized in lime sand that slowly accumulates and is exposed even for a brief period to bacteria, and the sun, wind and waves. Rapid accumulation and rapid burial are required. And lime sand is usually produced by turbulent ocean waters. Yet dinosaurs are land-dwellers. Thus these fossils of water-dwelling animals and fossilized dinosaur footprints found in this sandy limestone are consistent with the Flood cataclysm, when the rising ocean waters swept rapidly over the land in oscillating surges, repeatedly engulfing fleeing land animals as it buried their footprints with water-dwelling animals. These fossilized dinosaur footprints testify to these dinosaur herbivores and carnivores being more interested in fleeing en masse in one direction to escape the destructive waters than their next meal. Yet again we see evidence of the Flood that God sent as a judgment for mankind’s wickedness (Genesis 6:17) and of the Ark that He had Noah build—a reminder to us today of another Ark of salvation, Jesus Christ. These fossilized footprints stand as a reminder that observational science always confirms the Bible. Thanks for stopping by and thanks for praying, This item was written with the assistance of AiG’s research team. See Martin Lockley et al., “Titanosaurid Trackways from the Upper Cretaceous of Bolivia: Evidence for Large Manus, Wide-Gauge Locomotion and Gregarious Behaviour,” Cretaceous Research 23, no. 3 (June 2002): 383–400, doi:10.1006/cres.2002.1006. Ken Ham #fundie answersingenesis.org Where Did the Rattlesnake’s Rattle Come From? How did the rattlesnake get its rattle? A recent article about new research on the rattlesnake’s formidable rattle states, “The evolution of the rattle has baffled scientists because, unlike other complex physical traits like eyes or feathers, it has no obvious precursor or intermediate stage.” According to David Pfennig at the University of North Carolina at Chapel Hill, “There is no half-rattle.” Well, to those who start with the Bible, it’s no surprise that no such thing as a “half-rattle” exists. But for an evolutionist this is a major puzzle. Now evolutionists have suggested perhaps snakes started shaking their tails to warn predators, and eventually the noise-making rattle “evolved . . . as a more effective signal that took advantage of the pre-existing behavior.” But “how exactly the rattlesnakes then got their noisemaker is a more difficult question.” The article suggests two different ways: Some snakes were genetically pre-disposed to retain some extra skin on their tails when they shed, which made noise when they shook it and so this trait was selected for until it developed into the rattle. The other, more controversial idea is that the snakes developed a callus on their tail from shaking it against the rough ground, and if the propensity to develop a callus was affected by genetic variability, it would be selected for until the structure underwent “genetic assimilation,” and the rattle would form without the need for irritating the skin. But where the snake got its rattle isn’t actually a difficult question needing such an imaginative answer. It’s only a difficult question if you reject the true history recorded in God’s Word in favor of man’s ideas about the past. Observational science demonstrates that nearly 40 rattlesnake species probably belonged to one original created kind. There are no “half-rattles” because God uniquely designed this kind with a rattle. The rattle would be something we now call a defense structure, but it wouldn’t have been necessary as such before the Fall. Though a rattlesnake’s toxic venom wouldn’t have existed before the Fall, the rattle would become a merciful warning to the fangs behind it in a post-Fall world. (See more about a biblical response to these post-Fall defense/attack structures in the 2009 Answers article, “Designed to Kill in a Fallen World.”) By the way, where is there “half-anything” in living things today? If molecules-to-man evolution is true, why don’t we see “half-lots-of-things” all over the world? That’s because evolution is simply not true—it’s a fairy tale, an attempt to explain life without God. When we start with God’s Word, we don’t need to invent fanciful stories about what might have happened in the unobserved past. His Word provides us with the true history of the universe. Thanks for stopping by and thanks for praying, This item was written with the assistance of AiG’s research team. Ken Ham #fundie answersingenesis.org AiG’s “Million Dollar” Tracts Are Scaring Secularists This Halloween It’s almost Halloween, and the secularists are out scaring up drama about our unique Dino-Bucks and Noah’s Ark gospel tracts. These tracts look like—as one article pointed out—“fake” one million dollar bills (of course they’re obviously fake!). On the back, they feature what the author calls “some pretty rude messages”—i.e., the gospel. Secularists are acting as if they have just discovered a secret mission of AiG: to reach kids with the gospel during Halloween! We’ve got news for them: for decades now, we’ve been reaching children with the gospel at Halloween (and throughout the year)! It’s almost a shock to these secularists, as if Christians haven’t been sharing the good news of the gospel with the world since Christ’s death and Resurrection! Actually, I have more news for the secularists: the message of salvation was first given about 6,000 years ago as recorded in Genesis 3:15—and has been shared by believers ever since! So, yes, we’re guilty! We’ve been found out! AiG is sharing the gospel with kids of all ages! And yes, Christians have been warning people about a real place called hell for two millennia, because God’s Word does! The secularists only want children to hear their anti-gospel message! They want kids to be told they’re just animals in an evolutionary death-and-struggle world, bound for a purposeless, meaningless existence, and then oblivion as they die and cease to exist! The article states, “Luring [children] with fake money and threatening them with eternal damnation and pain is evil. It’s wrong and it’s abusive.” It’s true that one of our tracts reads, “Have you lied, stolen, or used God’s name in vain? . . . The penalty for your crimes against God is death and eternal Hell.” But these tracts don’t merely tell children about hell (and certainly don’t threaten them)—these tracts ask the “million dollar question” about what happens after death, and tell people how to get to heaven through a relationship with Jesus Christ. That’s the good news. But you also have to hear the bad news in order to receive the good news. What a horrible person a physician would be if he told a dying person that he’s fine. That patient needs to know the bad news that he’s dying in order to realize he needs the cure! The purpose of these tracts is to give the “cure” of the gospel! (Sadly, these secularists only want to focus on the bad news.) The article accuses me of thinking that “children are wretched, lying creatures” and of “damning children for celebrating a holiday that [Ken Ham] . . . assumes is pagan.” Well, though I wouldn’t put it in those terms, it’s true that all of us, even children, have sinful natures because of Adam’s Fall (Genesis 3). But neither I nor anyone else can send a person to hell—only a person’s sin of unbelief can condemn him to an eternity without God. The point is that God wants to save us from hell! Dr. Russ Humphreys' #fundie answersingenesis.org Creationists are trying to keep up with science . . . This is a review of Dr. Russ Humphreys' "A Young-Earth Relativistic Cosmology." In the first paper, he argued that the Bible does provide a foundation for cosmological thinking. It was suggested that the “expanse” (or “firmament” KJV) is the place where the sun, moon and stars are: interstellar space. The waters above the expanse were understood to be a water boundary to the created universe. The birds fly, not “in the expanse’, but “in the face of the expanse’-referring to the atmosphere of the Earth. (This perspective led to a reconsideration of the Canopy theory-which was rejected as neither biblically-based nor scientifically necessary.) ( Uh-oh, now we have no source of water for Noahs flood - Mr Spak)Several biblical texts refer to God stretching out the heavens: these were understood to mean that “God stretched out space itself at some time in the past”. This is an important point of the reinterpretation, as it is linked with a relativistic expansion of the universe during creation week. Humphreys considered the word “deep” (tehom) in the Bible (Genesis chapter 1 verse 2) and suggested that it should be understood as ordinary liquid water. The cosmological model that was developed from this framework considers all the galaxies in the universe to have been formed from the waters of this “deep”. Based on an estimated mass of the universe of 3 times 10 to the power 51 kilograms, Humphreys calculates that the “deep” would be a sphere of water with a radius of at least 1 light year. Since the expanse is formed in “the midst of the waters” (Genesis chapter 1 verse 6), it follows that the Earth must be at or near the centre of the universe. Humphreys suggests that the Bible teaches a cosmological geocentricity. The paper covers much more ground than can be reviewed here, but the 6 general conclusions are listed below. They all have relevance to the proposed relativistic cosmology. 1. Matter in the universe is bounded. 2. The universe has expanded. 3. The Earth is near the centre of the universe. 5.The original matter God created was ordinary liquid water. 6.God transformed the water into various elements by compaction. The question of how a biblically-based cosmology could be constructed was addressed in the second paper. Humphreys drew attention to the necessity of presuppositions when formulating cosmological models. Stephen Hawking and George Ellis have written: “…we are not able to make cosmological models without some mixture of ideology”. Their work makes use of the Copernican Principle: the universe has no edges and no centre-it looks everywhere broadly the same. This principle, it is important to note, is not a conclusion of science, but an assumption thought to be valid. The implications of the Copernican Principle for modern cosmology are profound. Humphreys argues that when these ideas are expressed mathematically and applied to the equations of general relativity, they result in Big-Bang cosmologies. Humphreys looks again at general relativity theory, but using different presuppositions. These are: the universe is of finite size and has a boundary; the Earth is near the centre; the cosmos has been expanded by God in the past; the cosmos is young. The picture that emerges is dramatically different from the Big Bang. The following scenario combines Humphreys” biblical framework and the results of his research into general relativity theory. When the “deep” was created, it was a black hole. Under gravity, it collapsed and the temperature, pressure and density increased to the stage where thermonuclear reactions occurred and nucleosynthesis took place. Intense light was everywhere inside the black hole. The collapse is considered to have lasted one day-and then, in a creative act of God, the black hole was converted into a white hole. The result was a rapid, inflationary expansion of space. This is when the waters above the expanse, the expanse and the waters below the expanse were differentiated. With expansion came cooling-and at about 3000 Kelvin, atoms would have been formed and the expanse would become transparent. Thermal radiation in the expanding expanse would be very uniform and the temperature would continue to drop. At the end of expansion, the temperature reached 2.76 kelvin (which we observe today). At some time during the expansion, the shrinking event horizon would approach the centre of the white hole-the Earth. Whilst this is suggested to have occurred on the morning of the 4th Day (Earth time), the time dilation effects of relativity theory permit “billions of years worth of physical processes [to take] place in the distant cosmos". Stars and galaxies formed, and time elapsed so that light was able to travel to every corner of the universe. Hence, Adam and Eve, on the 6th Day (Earth time) were able to look into the expanse and see the splendour of the heavens. The model thus claims to explain all three of the cosmological phenomena mentioned earlier: light from distant galaxies, galactic red shifts and the cosmic microwave background. It suggests that time elapsed at different rates on Earth and in the expanse (6 Days Earth time and billions of years cosmological time, possible because the Earth is at the centre of the universe). Danny R Faulkner #fundie answersingenesis.org Discussing the COBE background radiation data vs Genesis . . . However, there are some lingering questions. For instance, while the COBE experiment was designed to measure temperature variations, the variations allegedly found were an order of magnitude less than those predicted. Yet this is hailed as a great confirmation of the big-bang model. Some have written that the COBE results perfectly matched predictions, but this is simply not true. Since the COBE results, some theorists have recalculated big-bang models to produce the COBE measurements, but this hardly constitutes a perfect match. Instead, the data have guided the theory rather than the theory predicting the data. Ken Ham #fundie answersingenesis.org Various media reported that Nye had a great concern that the Ark Encounter (and the Creation Museum and Answers in Genesis ministry) will adversely influence children. Isn’t it amazing, 1) considering all the ardently evolutionary museums across America and around the world, 2) recognizing that evolution is taught as fact to millions of students in the public schools (in the United States and across the globe), and 3) noting all the evolutionary programs on TV and articles in magazines and so on, that secularists like Bill Nye are greatly fearing one Creation Museum and now one Ark? The secular arguments about origins and earth history are easily demolished. Thus secularists have to censor creation science beliefs from our schools. They fear they may easily lose people to creationist arguments. Watch some of the most captivating and eye-opening video segments of my Ark tour with Mr. Nye in this recent blog post. We have been blessed to have received many great testimonies from guests visiting the Ark Encounter in just its first week. Here is one that greatly encouraged me, and it came from a pastor: "[T]he Holy Spirit was strong in that place. I stayed choked up for the first two levels. The longer I stayed and the more I saw, the more I thought on the Word of God and what Christ did for us—I could hardly talk!" Tim Chaffey #fundie answersingenesis.org [In an article about how Ark Encounter was being "misrepresented."] Rosenau implied that every sign at the Ark contains scientific errors, but there are plenty of wayfinding signs that are scientifically accurate. That is, the exit signs identify the exits and the restroom signs direct people to the restrooms. Dr. Andrew Fabich #fundie answersingenesis.org With the Ark opening, there’s been a flurry of news headlines. Some are fair, but most are slanted. It’s no surprise: the media write slanted headlines. Many are even taught to do this. But there’s been a significant switch lately. I heard it first during the Ham-Nye debate. Bill Nye [“the Science Guy” of TV fame] kept referring to biblical creation as “Ham’s interpretation,” as if the young-earth interpretation somehow belongs to Ken Ham. In an effort to pigeonhole Ken as narrow-minded, they’re revealing just how narrow-minded they are. I can only fathom the shock of most journalists if they even checked unreliable Wikipedia to learn that Ken Ham isn’t “creation’s Lone Ranger.” If Ken’s alone in saying the earth is young, then why am I writing this blog? Because he isn’t alone! You know what? Others throughout history have said the earth is young. Even prominent scientists alive today agree with this position—and not just here in America. There are young earth creationists in other industrialized nations all around the world. In fact, a quick Wikipedia search (which isn’t always 100% accurate) even shows that the same views that Ken holds were well respected within Christendom in the past and are still respected now. You know, Christianity and biblical creation aren’t based on what Ken Ham has said, currently says, or will say. News flash: biblical creation depends on the authority of Scripture. I’m offended by how journalists misrepresent my personal beliefs. My faith isn’t based on “thus saith Ken Ham.” What’s more is that evolutionists would be equally as appalled if we called it “Nye’s evolution!” From preschool through PhD in secular education, I’ve never been taught “Nye’s evolution.” Calling it “Ham’s interpretation” is a straw man argument used in ignorance for emotional reasons. My point (like Ken’s and myriad others’) is that the Bible is authoritative. It’s ironic that journalists expect their readers to trust them as authorities (when they aren’t experts on the topics they report about) while holding others (like Ken who has studied the Bible and this topic for years and is using God’s Word as his authority) to a completely different standard. The Bible is the authority. Period. I beg the media: stop calling this “Ham’s version.” Call it biblical creation. You’re marginalizing your readership. I’m not saying, “Get rid of your slant” (in fact, you could read on the Answers in Genesis’ website about how we’re all biased). I am asking, “Do everyone a favor—quit calling this ‘Ham’s interpretation.’” Troy Lacey and Ken Ham #fundie answersingenesis.org Atheism Is Religion Atheists Down Under Are Worried Do atheists have beliefs? Of course they do! Atheists believe that matter arose by natural processes. Can they prove this? Not at all! Atheists believe the universe, all life, the laws of nature, and laws of logic arose by natural processes. Can they prove this? Of course not, but they believe it to be so. Atheists believe they cease to exist after they die. Can they prove this? No, but they believe this is what happens. Atheists believe no God exists. Can they prove this? Not at all—it’s their belief. Merriam-Webster dictionary defines the word religion this way: 1. a : the state of a religious <a nun in her 20th year of religion> b (1) : the service and worship of God or the supernatural (2) : commitment or devotion to religious faith or observance 3: archaic : scrupulous conformity : conscientiousness Even though he has not labeled himself as such, Bill Nye, for all intents and purposes, is a practicing atheist. Look at this short video clip as I was speaking to him recently at the Ark Encounter where he admitted to believing life arose by natural processes—he has a belief, a religion. Atheists have a “system of belief held to with ardor and faith.” Atheists are very religious people. Now, in the United States, atheists have conducted a propaganda campaign to try to brainwash the public into believing that people who believe in God are religious, but those who don’t believe in God are not religious. Because of this atheist propaganda, many have been indoctrinated to believe that when secularists get the Bible out of public schools, or crosses and nativity scenes out of public places, they removed religion so the situation could be neutral. However, the reality is that these secularists have imposed their atheistic religion on the schools and culture in general. As Jesus taught: “He who is not with Me is against Me, and he who does not gather with Me scatters.” (Luke 11:23) There is no neutral position. No person has no religion—everyone has a religion, and ultimately it comes down to those who are for the true God and those who are not. Now atheists from Down Under have been desperately trying to convince people in Australia that they have no religion. Tuesday, August 9, is Census Night in Australia (though people have several weeks to complete it). Every five years, all Australian citizens are required to fill out the census form. As in America, census results help the government figure out where and how government funds are allocated. These allocations can seriously impact Christian organizations such as Christian schools, charities, chaplain offices, and other religiously affiliated organizations. Of particular concern is question 19, which is the only optional question on the census form. This question is the religious identity question. Several different options are available, including six Christian denominations as well as Islam, Hinduism, and Buddhism. There is also an “other” category to mark, and then additional information needs to be supplied in a text box. But what makes this question stand out is that “no religion” is the first option to choose from. Now this is absurd, because no one can claim they have no religion! So that option should be totally deleted from the census form However, according to the Canberra Declaration newsletter,1 the reason why this choice occurs first is that the Atheist Foundation of Australia lobbied for it three years ago. It’s possible that some people may select this box simply because it appears first, especially if they are hurrying through the form or if at first glance they don’t see their own religious affiliation listed. This would be detrimental to religious organizations, as government subsidies may be cut or diminished based on the answer to this question. But a religious affiliation is a totally different matter from claiming one has no religion anyway! As well as listing various denominations, Islam, and so on, atheism should be listed as the religion (as opposed to “no religion”) for those who choose this affiliation. Much Campaigning about Nothing In fact this potential cutting of government funding may be just the hope of the Atheist Foundation. In the weeks leading up to tomorrow’s census, the Atheist Foundation of Australia launched a “Mark 'No religion'” website and have been conducting an advertising campaign to encourage people to do so. Some of the tactics appear aimed at making “unsure” or “undecided” people use this option. There has also been an attempt by the Atheist Foundation of Australia to encourage teens and children to be counted as “no religion,”2 claiming that only adults can validly claim a religion. Of course, part of the atheist campaign is to try to indoctrinate young people in particular that atheists don’t have a religion. But young people need to understand that atheism is a religion—and it’s a religion of purposelessness, meaninglessness, and hopelessness. The “other” box on this form has also been gaining momentum among some segment of the population. Apparently there has been an increase in the number of “Jedi” in the past few censuses.3 Ironically the aforementioned Atheist Foundation is trying to get people to quit claiming Jedi as a religion, as they claim it will falsely inflate the undefined religion category at the expense of their false idea of no religion. Apparently “the Force” is not strong with them. But when you really stop to think about it, why is there such a push by the Atheist Foundation of Australia for marking the “no religion” box? To get the “no religion” box put at the very top seems like it should be satisfaction enough; but no, an all-out media blitz has been (and still is) underway. As we’ve pointed out many times before, atheism is a religion. It’s a religion which explains life without God. As mentioned here (and outlined above), one definition of religion is “a cause, principle, or system of beliefs held to with ardor and faith.” Yes, atheism qualifies as a religion! Furthermore, why should the Atheist Foundation even care? In an atheistic worldview, when you die that’s it (or as Bill Nye said at the Ark Encounter, “When you die you’re done”). There is no ultimate basis for morality, for life, or even for logic. And although Bill Nye falsely claims that he arrived at his belief in atheism (and life by natural processes) based on the evidence,4 why should he trust his senses anyway? What gives him the basis for accepting what he perceives as reality? What makes his interpretation of the evidence right and a creation scientist’s wrong? Ultimately, to the Atheist Foundation of Australia, what difference should it make if one set of chemicals wrapped in a blanket of skin believes something different from another? In their worldview, our brains are just doing what the chemicals and electric impulses in them direct us to. They can’t even fall back on the relative morality of “what society decides goes” argument: at the last census (2011) only 22.3% claimed “no religion” as their option on the form.5 They also have to at least recognize that many of the religious organizations their strategy may impact are those that, even in an atheistic worldview, do good work. Homeless shelters, Christian-based hospitals, Red Cross centers, charities, and church food pantries all might be negatively impacted. So what does this show about their relative morality? It’s relatively worthless! And really what does it all matter in an ultimately fatalistic worldview? Ken Ham #fundie answersingenesis.org Bill Nye and Bananas Ken Ham #fundie answersingenesis.org Hammy vs the wrong creation myth . . .(much cutting and pasting - go to link for full effect) Imagine my shock when I discovered that some Muslim leaders were using their own form of “creation evangelism” to convert people to Islam! Stephen said that the speaker, in an excited, authoritative tone, declared: “The purpose of life is to be grateful to our Benefactor and conform to His rules.” The Muslim leader went on to discuss that we need a system designed to help us be grateful to the Benefactor and to conform … and that system is Islam. He also emphasized that the Koran and the teachings of Muhammad were the authority. Stephen and his pastor said that this was actually an Islamic “creation evangelism” lecture! It majored on design, which could have a major impact on many non-Muslims. But the argument of design was used to connect people to Islam! As I’ve often said, AiG isn’t about converting people to “creation.” AiG seeks to teach people the truths of God’s Word so they’ll understand and believe the gospel. Then I went into detail as to how people need to be taught that the Bible’s history in Genesis is true, that it’s confirmed by observational science and that the millions-of-years/evolutionary ideas that permeate the media and schools are not true. As we often state on our website, AiG uses the design arguments (among many others) to proclaim the Christian faith—which is how we need to use such arguments. AiG is at the cutting edge of evangelism today. We’re not just battling the secularization of the culture, but also against false religions like Islam. The message that God’s Word beginning in Genesis can be trusted is the answer for our world. Bodie Hodge #fundie answersingenesis.org When it comes to authorship of the Bible, of course men were involved. Christians would be the first to point this out. For example, Paul wrote letters to early churches that are included in the Scriptures (2 Peter 3:15–16). David wrote many of the Psalms. Moses wrote the Pentateuch, or the Torah (the first five books of the Bible). In fact, it is estimated that over 40 different human authors were involved.2 So, this is not the issue. The issue is this: did God have any involvement or not? Did God inspire the authors of the Scriptures?3 When someone claims that the Bible was written by men and not God, this is an absolute statement that reveals something extraordinary. It reveals that the person saying this is claiming to be transcendent! When one claims that God was not inspiring the human authors of the Bible, that person is claiming to be omniscient, omnipresent, and omnipotent! Omniscient: they are claiming to be an all-knowing authority on the subject of God’s inspiration, to refute God’s claim that Scripture was inspired by Him (2 Timothy 3:16). Omnipresent: they are claiming that they were present, both spiritually and physically, to observe that God had no part in aiding any of the biblical authors. Omnipotent: they are claiming that if God had tried to help the biblical authors, then they had the power to stop such an action. So, the person making the claim that the Bible was written by men is claiming to be God; but these three attributes belong solely to God. This is a religious issue of humanism versus Christianity. The person is claiming (perhaps inadvertently) that they are the ultimate authority over God and are trying to convince you that God is subservient to them. This needs to be addressed in responding to them. Andrew A. Snelling #fundie answersingenesis.org The Biblical Flood Perspective Skeptics claim that it is impossible for the chalk beds to have been rapidly deposited during the yearlong biblical Flood. They say it would take a long time for the trillions of foraminifers and coccoliths to breed, grow, die, and be buried to produce these thick chalk beds all around the globe. When they say this, they assume that ocean water conditions have always been like they are today. But during the global Flood cataclysm, water conditions were very different—hot volcanic waters and nutrients changed the water temperature and chemistry, which caused the rapid blooming of foraminifers and coccoliths in just hours, days, or weeks, not millions of years.6 These skeptics also ignore the fact that these chalk beds were deposited across the continents by ocean waters that rose high enough to completely flood the continents. Meanwhile, the chalk beds are not found under the ocean floor where the limey ooze is today. And today’s limey oozes are nowhere near as pure in calcium carbonate as the chalk beds formed in the past. Where do we see limey ooze slowly accumulating on the continents today—and burying and fossilizing huge ocean dwellers (like the extinct plesiosaurs and mosasaurs) together with large land dwellers (like the extinct dinosaurs and pterosaurs)? Or what about the fossil found in the Kansas beds of the voracious predatory fish Xiphactinus audax, 13 feet (4 m) long with a nearly perfectly preserved 6-foot-long (1.8 m) fish Gillicus arcuatus inside of it? Nowhere! We simply do not see such burial and fossilization happening today on such a massive and catastrophic scale. To fossilize such large creatures, ginormous amounts of sediments had to bury them instantly before the creatures had time to escape. Fish are known to decompose quickly unless they are completely buried within a few days. Yet the fish found fossilized in the chalk beds show no signs of decay. So the claim that the chalk beds accumulated slowly—one grain at a time falling to the bottom of a placid sea—is demolished by the evidence of all these catastrophically buried fossils. Now also remember that these chalk beds stretch around the globe. So a global distribution of the chalk beds required a global Flood cataclysm, just as the Bible describes. Chalk It Up to Assumptions So what is the underlying message we have dug up? Never be discouraged or dissuaded from believing what God’s Word teaches just because a few skeptics raise what seem to be difficult questions or insist they have evidence that contradicts the Bible. As in this case, closer examination reveals that what they claim as “evidence” is really their interpretation of the data based on their assumption that the Genesis Flood never occurred. Like the scoffers Peter warned about in 2 Peter 3, they are willfully ignorant or deliberately rejecting God’s Word, and thus they refuse to consider any interpretation of the evidence that would point to the Genesis Flood having occurred. Instead, they are trying to prove what they have already assumed. But for those of us who seek to know the Lord and understand His work, good answers can be found. Just look at common chalk. It offers phenomenal evidence for the veracity of the biblical Flood—yet another testimony that we can trust God and His Word. Chalk another one up to God’s Word. Dr. Danny R. Faulkner #fundie answersingenesis.org Spiritual Connection of Alien Abduction Claims Researchers1 have categorized some common elements to most claims of alien abduction. We need not discuss most of these here, but there are some important common themes. Many people report meeting a god-like creature or creatures during their abductions. Often these beings communicate universal-sounding messages or warn of impending nuclear or ecological disaster if mankind does not change his way. This amounts to a very hip, human-centered religious message. Another common element is that most people who have claimed these close encounters with aliens profess spirituality, with a belief in God. As such, there is a wide distribution of denominations and sects represented among those who have claimed alien abduction. People reporting alien abductions also report indulging in the occult and new age practices in much higher proportion than the general population. Conspicuously absent from those reporting alien abductions are those who are truly born again followers of Christ. In fact, many researchers have collected reports of alien abductions abruptly ending when abductees verbally mention the name of Jesus. These facts are extremely pertinent. If those who report alien abductions are sincere and truthful in relaying experiences that they firmly believe occurred, then we are left with the conclusion that there is a spiritual component, and that this spirituality is contrary to the Bible. This is just one front in a spiritual war to divert people away from the truth of Scripture. We have already seen that the implication of the Bible is that Adam’s race is the only race of sentient, physical creatures in the universe. That is, there are no ETs to fly spaceships to earth. But if one believes in evolution, one must accept the likelihood that life, even intelligent life, has evolved many times on other worlds. Thus, if life exists elsewhere, then that would argue against the Bible and hence the God of the Bible. So a very effective tool in undermining the authority of the Bible and the gospel would be to convince as many people as possible that life exists elsewhere. What better way is there to do that than with flying saucers and “alien” visitations? Ken Ham #fundie answersingenesis.org Major Ark Coverage Continues, Including Down Under We rejoice when the secular media cover AiG and the upcoming Ark Encounter theme park in a balanced way. That was the case today with a long segment about the life-size Ark that was broadcast on the popular TV program in Australia Sunday Night, which airs on the national TV network Channel 7. The program featured some stunning drone images of the Ark under construction and the design studio where our world-class exhibits are being built. We gave this crew almost three days of unprecedented access to our facilities and extended gracious hospitality, and then held our breath. Now, there were comments that made us cringe. For example, there was a statement by the producers that the Old Testament is supposedly my “rule book for life,” suggesting that the teachings of the New Testament and its gospel message are secondary. And by the way, twice we urged the crew to interview at least one of our PhD scientists, like geologist Dr. Andrew Snelling (an Aussie like me), to show how science confirms the Bible in Genesis, but they chose not to. And it would have been good for the producers to point out that hundreds of people who have been contracted to help us build the Ark did not have to sign our statement of faith. But watch for yourself and be encouraged by the coverage and see some good video shots of the Ark. By the way, notice how Bill Nye “the Science Guy” comes across as condescending and snide as he shows his disdain for those of us who believe God’s Word beginning in Genesis—once again illustrating the struggle of the secular world to understand Christians. Ken Ham #fundie answersingenesis.org “World’s Largest Atheist Party” Is Really a Worship Service! The Reason Rally 2016, advertised as the “world’s largest atheist party,” is really a kind of worship service. Why do I say this? Well, they worship man. Their rally in Washington, DC, in June will see people worshipping the god of self. They will exalt reason and declare that they have a blind faith that the universe and life arose by natural processes. You know, we need to be calling atheism for what it really is—a religion, an anti-God religion—a religion that exalts fallible human reason. In fact, atheist Lawrence Krauss, who is speaking at this rally, once said on video, “Forget Jesus—the stars died so you can be here.” You see, he is worshipping the stars. These atheists at the rally are no different from those the prophet Jeremiah spoke of: “Saying to a tree, ‘You are my father,’ And to a stone, ‘You gave birth to me’” (Jeremiah 2:27). And what will the message of the rally be? “Become an atheist, die, and that’s the end—there’s no ultimate purpose to life.” So that being the case, why do atheists even attack Christianity? Why rally in DC in June? Well, it is because they actively “suppress the truth in unrighteousness” (Romans 1:18). Atheists work hard against Christianity because they’re putting their hands over their eyes and ears and shouting, “I refuse to see and hear truth!” Their blind faith religion of believing that natural processes explain life without God is an anti-God religion. The words of Daniel (5:23) describe today’s atheists: “The God who holds your breath in His hand and owns all your ways, you have not glorified.” So, the atheists will worship man at the Reason Rally, just as stated in Scripture: “who exchanged the truth of God for the lie, and worshiped and served the creature rather than the Creator, who is blessed forever. Amen” (Romans 1:25). But God says, “You have lifted yourself up against the Lord of heaven” (Daniel 5:23). Thanks for stopping by and thanks for praying, Avery Foley #fundie answersingenesis.org Bill Nye Agrees: “There’s No Such Thing as Race” In a recent interview on Comedy Central’s The Nightly Show, host Larry Wilmore asked TV’s popular Bill Nye “The Science Guy” the question, “Does racism exist in the animal kingdom?” In Nye’s reply he made this statement, “We’re all the same . . . from a scientific standpoint there’s no such thing as race.” Bill Nye’s answer showed how much evolutionists have changed their position when it comes to the idea of different human races. Actually, this part of Nye’s answer is much more a biblical than an evolutionary view of humanity. Changing Evolutionary Views Bill Nye’s statement that “We’re all the same . . . from a scientific standpoint there’s no such thing as race” has been confirmed many times by observational science. For example, when researchers completed the incredible feat of mapping the human genome in 2000, they declared that, based on genetics, “there is only one race—the human race.”1 But this conclusion is not what was predicted in an evolutionary worldview. Darwin’s ideas about human evolution were inherently racist. He held that different groups of humans evolved at different times so some were closer to their ape-like ancestors than others. The late Stephen Jay Gould, an evolutionist, stated, “Biological arguments for racism may have been common before 1859, but they increased by orders of magnitude following the acceptance of evolutionary theory.”2 Evolutionary ideas about race led to all kinds of horrors such as members of pygmy tribes being put in zoos beside apes,3 injustices toward groups like the Australian aborigines,4 and atrocities like Hitler’s attempted extermination of groups like the Jews, Poles, Slavs, and Gypsies. Each of these horrors—and many more—stemmed directly from Darwinian ideas about evolution. So, according to evolutionary predictions, we should expect to see many different races of humans, each at different levels of evolutionary development. Darwin even predicted that the “Caucasian” should have exterminated all other races. This is a failed prediction by the “high priest” of evolution. Evolutionary ideas about race have largely changed, however, as a result of Christian challenges. As Bill Nye’s statement shows, observational science did not confirm the idea that there were many different races, but instead confirmed the biblical prediction of one race. The shade of our skin does not reflect evolutionary progress but is primarily the result of our genetic makeup that determines how much of a brown-colored pigment called melanin that our skin produces. More melanin produces a dark brown, “blackish” shade, and less melanin produces a lighter brown, “whitish” shade. There is no such thing as different races! This observation from science goes completely against what evolutionists of the past predicted, so evolutionists today were forced to change their ideas to align with the biblical view. Unchanging Word of God Now, if instead of starting with man’s fallible ideas about the past, secular scientists had turned to God’s Word and started their thinking with the infallible Word of God, they would not have made these erroneous conclusions that later needed to be corrected by observational science. God’s Word has always taught that there is only one race—the human race. We did not evolve but were specially and uniquely created in God’s image from the very beginning (Genesis 1:26–27). God did not create different races, but “He has made from one blood every nation of men to dwell on all the face of the earth” (Acts 17:26). Every single human being is a descendant of the first couple, Adam and Eve (Genesis 1:27, 3:20), so we are all related. According to God’s Word, there are not different biological races, there is only one. God’s unchanging Word had it right all along and man’s changing ideas about the past had to catch up with it. The Tower of Babel During his interview with Larry Wilmore, Bill Nye said, “So everybody’s from East Africa . . . You migrate into Mesopotamia . . . You have to have lighter skin. It’s this balance between Vitamin D production in your skin and the breaking down of . . . folic acid. Then you migrate across Eurasia . . . Then there’s an ice age. All the snow’s frozen up in the mountains so you can walk to . . . [Alaska]. And then you come down the west coast. [Racism] started because you have these tribes and they have different skin colors as a result of ultraviolet light.” Now, while there are several evolutionary assumptions in Bill Nye’s statements (such as the idea that humanity began in East Africa) and we would certainly not agree with the timeline that Bill Nye holds to for these events, his statements actually sound similar to something a creationist might say! According to God’s Word, all of humanity is descended from Adam and Eve. This first couple rebelled against God and introduced sin, death, and suffering into creation. Their descendants became increasingly wicked until “every intent of the thoughts of [their] heart was only evil continually” (Genesis 6:5), so God sent a global Flood to judge their wickedness. Only eight people, the righteous Noah and his family, were saved through the Flood. After the Flood, God commanded Noah and his family, “Be fruitful and multiply, and fill the earth” (Genesis 9:1). But instead of filling the earth, like they had been commanded to, Noah’s descendants gathered together and built a city and a tower (in Mesopotamia, no less). So God confused their languages, thus forcing them to spread out over the earth (Genesis 11:1–9). Shortly after the Flood and the Tower of Babel, much of the world was engulfed in the Ice Age that was part of the aftermath of the Flood. This would have exposed land bridges, such as the Bering Strait between modern-day Russia and Alaska. As people migrated from Babel, some of the groups walked across this land bridge into the Americas or came by boat where they eventually spread out from North America to South America. The Tower of Babel explains why we are so different. The different people groups did not begin as humanity migrated from East Africa. They began after God confused the languages and groups began to migrate from Babel on the Plain of Shinar in the Middle East. This also divided up the family group and split the gene pool, including various skin shades. Depending on where these groups lived and populated, the resultant genes were left to their descendants. Because these groups were reproductively isolated due to the language barrier as well as later geographical barriers, different features, like skin shade or eye shape, were associated with different groups. Babel explains our differences! Different people groups are not the result of evolution. They are the result of the division of languages at the time of the Tower of Babel. Eventually, the same forces that supposedly produced humans should cause humans to evolve into something new, different, and more fit for the environment. So for Bill Nye to say that “All you’re going to get’s a human. You’re not going to get some new thing” is completely inconsistent with his amoeba-to-astronaut evolutionary worldview, but it is completely consistent with both God’s Word and observational science. According to God’s Word, each organism—including humans—reproduces according to its kind. So we should not expect to see humans producing anything but humans. And this is exactly what the evidence confirms: humans produce humans. God’s Word Has Been Teaching One Race All Along Observational science did not confirm evolutionary religious ideas about the past. So evolutionists simply changed evolutionary ideas to match the new data. But what they should have done is realized that the observational evidence confirms what God’s Word has been teaching all along. If they had started with God’s Word, they would have had the right foundation for their thinking and would not have reached such erroneous conclusions. It is God’s infallible Word—not man’s changing and fallible ideas—that is true and is confirmed by the observational evidence.
Discuss Week 8 Give yourself time to look over ONE of the articles uploaded (you’re welcome to read both but together, they can be rather dense and consuming). The articles can be found in the “files” section of this course, in the “Legal Traditions” folder. There’s not really such a thing as “Islamic law” in the sense that it gets normally discussed. The tradition does have a concept of shari’a (literally “path”/”way”/”road”) as divinely revealed (and inclusive of lots of stuff that you wouldn’t think of “law,” such as washing your feet before prayer), but shari’a’s not exactly a set of laws. The Qur’an and hadith do not provide much in the way of absolute legal code. Fiqh represents the human effort to understand, interpret, and apply divine command, which has led to multiple schools of thought that disagree with each other on various methodological points. So most of the time that people in popular media talk about “shari’a,” it would be more accurate to say “fiqh.” Two points might help before you jump into the readings: In Sunni legal tradition, there have been many, many schools of law, but only 4 survived into the modern period: Shafi’i, Maliki, Hanafi, and Hanbali. For a majority of Shi’i Muslims, the main legal school is the Jafari school.  Anyway, here’s what we’re going to do this week: Choose one of the two articles provided (again, If you want to read both, of course you’re welcome to). Let us know which one you read and try to summarize its content and argument for your colleagues who read the other article. And let’s think about some of these conversation starters: From your reading, what impression do you have of Muslim legal traditions? How might the article complicate or challenge popular assumptions about “Islamic law?”  Did you encounter unfamiliar terms/concepts that obstructed your reading? Did you have to look anything up? Let’s talk about those too and I’ll be happy to fill in the gaps. Please ask a question! Calculate your paper price Pages (550 words) Approximate price: - Why Choose Us Quality Papers Professional Academic Writers Affordable Prices On-Time delivery 100% Originality Customer Support 24/7 Try it now! Calculate the price of your order We'll send you the first draft for approval by at Total price: How it works? Follow these simple steps to get your paper done Place your order Proceed with the payment Choose the payment system that suits you most. Receive the final file Our Services Essay Writing Services Admission and Business Papers Editing and Proofreading Technical papers
Remedies for Reluctant Readers, Part II When reading for pleasure is not an instinct, it can begin to feel like punishment for kids. This is not where we want to end up. It may not be possible to turn every anti-reader into a little bookworm, but there are plenty of strategies that parents and educators can use to help make the process less cringe-worthy. Additionally, some strategies, when put to regular use, can help students become stronger, more critical readers. Movement breaks Preview for background info Highlight as you go Along with previewing as a reading practice to boost engagement and comprehension, highlighting is a common tool for successful readers as well. This practice builds strong, active reading skills and helps visual learners at the same time. Students should be encouraged to mark areas of the text for any of the following purposes: Highlight answers to any of the questions that they asked themselves at the start of the reading; again, this is essentially the foundational skill for active, engaged reading. Distance Learning Support for Students on the Spectrum: Part III In addition to building strong relationships and maintaining consistency, students with autism who are struggling more than usual due to distance learning will also greatly benefit from specificity. Below are additional strategies that educators can use to help best support their students on the spectrum while we continue with virtual learning.  Make everything as specific as possible  When it comes to Zoom class sessions and online learning in general, teachers sometimes forget that students are not hanging on our every word like they would be more inclined to do in the physical classroom. Since Zoom meetings are often a passive form of learning—even when we try our hardest to keep it engaging—students, especially those with autism, are probably not absorbing every major point, example, instruction, etc. Because of this, students require significantly more repetition, clarification, and specificity to succeed with virtual learning. Teachers should consider taking the following steps to ensure that instruction, assignments, directions and tasks are as specific as possible: • When assigning reading homework, teachers should be careful to phrase the chapters and pages very specifically. For instance, when saying, “Please read chapters 1-3,” some students may interpret that to mean read up to chapter 3, not including it. Be sure to clarify specifically what page number students should stop reading for a particular assignment to avoid this miscommunication.  • As discussed in part two, naming or labeling assignments and resources consistently is key to streamlining materials for students. The same is true regarding specificity. Titling an assignment “Writing Homework #1” is too vague. This name does not help students to identify the details of the task when looking at Canvas. Remember, students have anywhere from 5-7 classes; therefore, specifically titling tasks in Canvas or other virtual portals will help trigger their memories and clarify the exact task that you are asking them to complete. • Provide specific times for assignment submission as well. Canvas allows you to just set a due date; however, some students may appreciate having a specific cut off time for submitting an assignment just to be sure. For example, I always set the time to 11:59pm whatever day the task is due. This way, students know that they always have that final full day to complete and submit without penalty.  • Consider providing students with a reference sheet that specifies what you mean when you say certain high-frequency, tier 2 and 3 vocabulary terms in class. Abstract words, such as analyze, evaluate, critique, and assess can cause stress and uncertainty for students with autism. Accompany these terms with specific examples and explanations so that students know exactly what is expected of them. This is a great practice for all students, especially when teachers are introducing key unit questions, objectives, and writing prompts.  When providing written feedback, especially since virtual learning leaves less time for 1:1 conferences and writing workshops, it is especially helpful for teachers to use a higher level of specificity. If students are not able to directly connect a teacher’s feedback to an area of weakness and how they can strengthen that weakness in the next assignment, then the feedback is essentially worthless. One worthwhile activity to gauge whether or not your feedback is specific enough is to ask students to reflect on the feedback that they received on an essay or project. This ensures that 1) they have actually read the feedback, and 2) that they fully comprehended their errors and areas for improvement. Social Emotional Learning Skills by Grade Level, Part I Social and emotional (SEL) skills involve more than just the concepts surrounding educational buzzwords like growth mindset, grit, and self-advocacy. SEL skills are being emphasized at an even greater extent now that students are limited in their opportunities to socialize, collaborate, and communicate with peers in person. Distance learning and virtual schooling have certainly created various obstacles for students when it comes to developing and growing their SEL skills. For this reason, SEL has become an even greater focus right now for school districts, parents, and educators. Besides providing resources for building SEL skills at home, it is equally important for families to be able to determine if children are reaching specific grade-level SEL standards. Early Elementary Grades (K-3) As expected, the SEL skills required for student success change or evolve as students progress through the grade levels. In elementary school, much of the SEL emphasis is on positive interactions with the world. Children are obviously highly dependent on adults during these years, yet they are beginning to enter their own social spheres with their peers as well. • Students should be able to recognize and articulate their feelings/emotions; they should be beginning to understand how feelings and reactions are connected to behaviors. • Students should be beginning to exhibit impulse control and regulating their emotions. • Early learners should be able to describe their preferences: What do they like/dislike? What are their strengths/weaknesses?  • They will begin to articulate personal opinions and needs. • Elementary schoolers should be able to identify when they need help and who is in a position to help them in certain situations, i.e., peers, family members, educators, etc. • Children should be able to roughly explain how learning is connected to personal growth and success. • Elementaryaged students should also be able to set personal goals regarding behavior and academics. • Students will be beginning to understand that other people have different perspectives or ways of looking at a situation; they’ll recognize that others may share the same experience, but have varying opinions and viewpoints at the same time. • Students will also be able to describe peoples’ similarities and differences. • Early learners should be able to actively listen to others’ viewpoints and recognize their feelings while listening. • Elementaryaged students should be able to recognize and describe positive traits in others; they’ll be able to give genuine compliments. • Students will begin to develop collaborative skills such as how to work/play with peers in constructive ways, how to solve and resolve problems and/or conflicts, and how to receive constructive criticism from others. • Young children should be able exhibit the ability to adapt to new or changing situations or environments.  • By the time children reach elementary school, they should be able to understand why hurting others is wrong, whether that be physical or emotional hurt. • Students should be starting to read social cues and adjust behavior accordingly. • Students should be exhibiting sound decision making and weighing right vs. wrong. • Elementary schoolers should be able to positively contribute to their classroom environment, including cleaning up after themselves and others, sharing, demonstrating kindness/understanding, and taking responsibility for themselves. Transparency and Parent Communication Schools being closed is certainly not ideal. However, if 2020 has taught us anything, it’s to look at the positive. It’s time to look for the silver linings in the Covid cloud we’ve been enduring for nearly a year now. One of those silver linings might actually involve the virtual learning model into which educators, students, and families have been unwillingly thrust. You see, online learning essentially lends itself to consistency, open communication, and transparency between parents and teachers. If utilized correctly, parents can use virtual learning platforms as a front row seat to everything that their child is reading, learning, and creating. Invite Parents into the Virtual World Whether teachers are using Canvas, Google Classroom, or any of the other instructional platforms available right now, parents should be encouraged to join as participants or viewers. Many schools made this information available at the start of the school year; however, not all parents were aware of the advantages that this form of “virtual classroom participation” would give them and their children. Educators should consider some of the following measures: • Send out a mass email to parents and guardians about joining the virtual classroom if anyone has yet to do so. • Be sure to make class codes, course numbers, and Zoom login information visible on your course home page; you can also include this information in the mass email to parents. • Post “parent-friendly” announcements to your course homepage to ensure that parents see these important notifications directly at the top when they login to check grades, review assignments, etc. • For students with chronic absenteeism, reach out to parents via email and/or phone about their child’s absences in case they are unaware of the missed classes. • Use the Canvas “grades” page to send mass emails to specific students and their “observers,” i.e. parents, when they have missed an important assignment deadline. This function allows teachers to email anyone who hasn’t submitted the assignment all at once without showing other recipients. • When interims or the end of the marking period is approaching, post a message to all students and “observers” about final steps and tasks for successfully rounding out the marking period. • Set up a parent page in Canvas for each course where parents can find important course information, class or weekly calendars, teacher contact info, Zoom logins, office hours, and FAQs. • Use Screencastify to create how-to tutorials for parents. These videos could include information on how to check grades, how to see if assignments have been submitted, how to view teacher feedback on written tasks, how to use Kami, etc. • Push out a parent survey using Google forms to obtain vital information about how e-learning is going at home. Ask questions like, How much hands-on homework support do you provide to your child on the average night? Does your child have access to his/her own computer for learning? Is there an older sibling or parent in the home during the average instructional day to provide tech support? Are there technology issues at home? Where does your child do most of his/her classwork? How many children are in the home participating in virtual learning at the same time? On average, how much sleep is your child getting on the typical school night? How much time is spent on homework over the weekend? What frustrations are you seeing with regard to virtual learning/instruction? Do you have easy access to your child’s grades, course materials, school resources, etc.? What steps could I take to provide more transparency/clarity to parents about our class? If your child needs more instructional support, do you know where/how to obtain those resources? • Finally, teachers should create engaging assignments that encourage discourse within the family. These family-centered prompts require students to bring their parents into the assignment for support and guidance, which allows parents to see firsthand what you’re teaching. For instance, ask students to interview a member of their household for a formative assessment on sentence structure. Have students write a personal essay about how they got their name, including direct quotes from their parents or guardians. Have students create a “family album” on Google slides including photos and fun facts about siblings, pets, parents, grandparents, etc. Helping Students Combat Zoom Fatigue Zoom fatigue is an unfortunate yet all too familiar side effect of our current educational circumstances. Depending on grade level, students are logged into a video conferencing platform for classes up to six hours a day. Yet those six hours of class are just the beginning. That time doesn’t account for the additional screen time necessary to complete homework assignments, read and respond to emails, and review online course content.  It is no wonder that students are experiencing high levels of burnout and exhaustion these days. Even more concerning is the domino effect that Zoom fatigue may be havingschool districts across the nation are reporting troublesome spikes in spotty attendance, prolonged absences, disengagement, lack of communication, and, of course, a noticeable drop in grades. Virtual learning is our present reality, and we have yet to know what the foreseeable future of this school year will look like. However, there are ways in which parents and teachers can assist now with Zoom fatigue. • Teachers should deliberately frame the lesson, as they typically would in the brick-and-mortar setting, but consider adding time estimates for each task. Having an idea of how long each topic, assignment, or activity will take helps students establish expectations and prioritize their mental stamina. • Beginning with an engaging, yet relevant, icebreaker goes a long way with student buy-in from the get go. If possible, incorporate movement into the opener. For example, ask students to take 30 seconds to find an object around them that represents an important memory. This allows students to get up and move. It also builds classroom community and allows students to share out about a personal anecdote.  • Establish “No Screen” blocks of time throughout the day and stick to them. Meal times and times in between classes and office hours should be strictly considered “screen free” times. This is the same idea behind brain breaks and movement breaks, which allow for a necessary mental reset for young learners. Teachers have limited time with face-to-face online instruction; however, it is crucial that students are getting small breaks during those instructional hours as well. Something as brief as a 5minute gap of time for students to walk away from the computer, grab a snack, or stretch can revitalize heavy eyes and foggy minds. • Encourage students to utilize office hours efficiently to reduce screen time during those non-instructional days. Office hours are certainly necessary. However, teachers can help reduce screen use by streamlining the process for office hours. For instance, tell students to login with specific questions in mind relating to the assignment or project. Keep the office hour fluid, meaning that, once students have asked their questions or gotten clarification, remind them that it’s okay to exit the Zoom early. If they have a quick question, consider an email instead of waiting to login for office hours. • Incorporate prerecorded asynchronous videos, demonstrations, presentations, etc. Of course, students need live instruction, but breaking up the session with these components can greatly help with Zoom fatigue. Incorporating small asynchronous components can also help make the lesson move quicker since students are working at their own pace. • If teachers have finished the lesson with a few minutes in the session to spare, don’t fill that time with extra instruction or busy work. It is okay to end the session and give students a bit more of a break between classes. Of course, offer to stay on Zoom until time has expired in case anyone has a question, but often, students prefer to logout early as a nice little treat. Close all other unnecessary tabs while in a Zoom class. This may seem obvious, but many students use Zoom classes for multitaskingmeaning that they have countless tabs open, documents and assignments for other classes underway, and a cell phone within reach. All of these things only work against their ability to focus, thus creating more fatigue. As difficult as it may be, remind children to stay engaged with the class and task at hand, i.e., no multitasking unless it is related to that class in particular. Put the cell phone away, as well, since this is just one more screen that’ll distract them during class. Essential Building Blocks for Reading Comprehension, Part II As mentioned in part one, much of the reason that young learners might struggle with reading comprehension is the fact that the process involves a compilation of other complex skills. Such foundational skills necessary for children to begin to master reading comprehension include: fluency, phonemic awareness, accessing prior knowledge/making connections, vocabulary, syntactical rules/conventions, working memory, and attentiveness.  Vocabulary Strategies • Instruct children about specific vocabulary terms, but make sure that the new words are connected to something they are currently reading, seeing, hearing, or learning about. It is important to avoid teaching vocabulary “in a vacuum.” Vocabulary words taught at random or with little context or connectivity to prior knowledge is not likely to make it into a child’s lexicon. • Preteach new vocabulary terms by relating them to concepts and terms that your child already knows. Then, when she encounters the word in a text, she will have prior exposure to the word and some sense of understanding. • Utilize root word instruction and practices. This might include creating root word charts with examples, opposite T-charts, visual word tree trunks with various prefixes and suffixes. Practice making new or nonexistent words using roots as a silly way to grasp root word meanings. • Use synonyms casually when speaking to your child. • Create a word web wall and add to the web as you make connections between new words. • Emphasize context clues while reading aloud; model how to actively engage with new words by making comments like, “I wonder what this might mean in the sentence given the surrounding information…” Syntax Rules and Conventions • Ask your child to rearrange the words in the sentence, but maintain the same meaning. For example, given the sentence “You can watch a show after you have finished your homework.” Your child should rephrase by saying something like, “You must finish your homework before you can watch a show.” • Demonstrate different ways in which sentences can be combined, separated, or punctuated. The key is to show them that, even with variations in sentence structure, the phrases mean the same thing. • Model the process of summarizing a short excerpt or sentence. Then explain how paraphrasing is slightly different. Practice this process aloud together. • Exaggerate the purpose of punctuation while reading aloud to emphasize each punctuation mark’s function.  • Provide examples of how punctuation can drastically change the underlying meaning of a sentence. One favorite example is, “Let’s eat, Grandma!” vs. “Let’s eat Grandma!” • Find fill-in-the-blank reading options, where children are provided with word banks or suggestions on each page, but must use the context of the story to correctly complete each missing word. Working Memory and Attention Strategies • Purposefully chunk down larger sections of text while reading aloud. Then ask clarifying questions or practice summarizing the section before moving to the next passage or chunk. • Ask your child to make predictions while reading to practice recalling and utilizing details that have already been mentioned in the text. • Plan for engaging questions while reading. Parents should preview the text and think about ways in which to connect the details to other aspects of a child’s life. Ask critical thinking questions as well, such as, “Why do you think the character did that?” “What do you think she meant when she said…?” “How would you have reacted differently if you were in the story?” • Sketch a visual timeline of events while reading. This doesn’t have to be a detailed, moment-by-moment recollection; you can use bullet points on sticky notes, a small white board, or index cards with events 1-3 on them. Be sure to deliberately emphasize the use of transition words, especially when focusing on chronological summaries. • Listen to an audio version of the text while following along with the physical book. • When reading together, once you reach the bottom of a page, ask your child which detail stands out to her the most. If she’s unable to recall a significant detail, encourage rereading. • Remove all distractions while reading, including background noise, cell phones/screens, etc. You can also find texts with larger print, reduced text per page, and print with extra space between paragraphs to help children visually focus on one aspect of the text at a time. Signs of Dyslexia by Grade Level According to the International Dyslexia Association, anywhere from 15-20% of the world’s population has a reading disability marked by symptoms of or relating to dyslexia. Since it is a language-based learning disability, dyslexia can impact a child’s reading, writing, and speech in various ways. While the symptoms and signs are vastly different from one learner to another, there are age or grade-specific indicators that parents can make note of for future discussions with doctors, special educators and specialists, if necessary. These are by no means tell-tale signs that your child has a learning disability; however, they could be reason enough to seek an evaluation by a professional. Before kindergarten, many children are just beginning to explore language in all forms. With that exploration comes inevitable blundersyoung learners will mispronounce and misspell words quite frequentlybut this is no cause for concern. Instead, early signs of dyslexia in toddlers and preschoolers are often of the auditory form, meaning that parents will hear these subtle issues before they’ll see it. Listen for the following: • Children may tell a story out of order or even retell a story or scenario that does not fit a chronological sequence. • They may also lack transition words or phrases, such as first, then, after, later, last, etc.,  when telling a story. • Children with early signs of dyslexia may begin speaking noticeably later than their peers. They may speak only in certain situations when prompted and/or only when they feel comfortable. • They may forget common words for everyday items or concepts. • They may be unable to grasp simple rhyming concepts, even with single syllables, such as dime, time, lime, crime, etc. • They may orally mix up syllables for common or everyday words. For instance, they may say “listpick” instead of “lipstick” or “caxi tab” instead of “taxi cab.” • They may add unnecessary or nonexistent vowels to consonant blends when pronouncing certain words. Here is what that might sound like: • “Fullufy” for fluffy • “Beraid” for braid • “Gulasses” for glasses • “Falower” for flower • “Sinack” for snack • “Sakunk” for skunk • “Teruck” for truck • Conversely, early learners may also have difficulty separating sounds, as well as blending them. If a child struggles to distinguish the two sounds in the word “no,” nnnnn—oooo, then there could be a potential problem. Elementary Age Since children are under somewhat of a language microscope in their early elementary years, dyslexia is more often diagnosed during this time. These are the formative years in terms of reading and writing, which is why it is that much more obvious when a child is struggling with a language disability. Signs include: • Difficulties pertaining to phonics, meaning the relationship between letters and sounds; they may pronounce p as b or d. • Elementary-aged children may struggle to read sight words, which are high-frequency words that appear in everyday reading and writing. These words are typically abstract and essentially have to be memorized, meaning that they do not have physical images to accompany them or their spelling. The expectation is that students will memorize and recognize these words automatically as they learn to read and write. Examples of some sight words include and, or, the, of, is, with, but, that, by, if, can, were, them, was, has, so, etc. • While reading, students may substitute certain words while reading or spelling. These are often synonymous terms or words that are in the wheelhouse of the intended term, such as “mom” instead of mother, or “home” as opposed to house, “kid” instead of child, etc. • Some learners may invert numbers or confuse mathematical signs; they may confuse a multiplication sign for an addition sign or a subtraction sign for a division sign, etc.  • They may invert letters when writing or reading. This often occurs with letters such as m and w, n and u, p and d, q and b, and s and z. Making Connections and Building Engagement Identity Collage “All emotions” Playlist Get Spontaneous on Zoom High Leverage Practices for Special Education: Collaborative Methods at Home In part one, we discussed the four different categories of high leverage practices (HLP) and how educators utilize these practices to drive instruction and learning. Whether in a physical classroom or not, the goal of HLPs is to ensure that young learners are engaged, supported, and challenged. Now that we’re all in the throes of virtual learning, where much of our schooling is happening at home, it’s helpful for families to be able to adopt and modify various high leverage practices for their own use. Collaboration is key, especially since much of the learning is currently happening outside of the classroom. Students are no longer experiencing a fully monitored, structured school day, which makes collaboration and open communication all that much more important. • Goal statement: Since the aim of collaborative HLPs is to ensure that all members of the child’s support system are on the same page, working towards the same goals, parents should use a goal statement as a starting point when reaching out to teachers. Whether in person, on the phone, or via email, parents should make a point to advocate for their child’s learning goals and reiterate them as needed to provide teachers with reminders about where they’d like their child’s learning to be headed. • Check-in: Yes, students receiving special education services already have formal documentation concerning learning goals, but it never hurts to remind the team of those goals along the way. Teachers can easily become overwhelmed throughout the quarter with IEPs, 504s, and numerous other learning plans for individual students. And while teachers are legally obligated to offer modifications and accommodations, the learning goals may receive less attention. This is why parents should make a point to check in regularly with their child’s teachers to ensure that everyone is aware of and working towards the child’s learning goals. • Reevaluation: These check-ins also allow for data updates, recent observations, and discussions about reevaluating or resetting goals if necessary. Be sure to ask for quantifiable updates, such as Lexile level, Map scores, attendance and participation, writing samples, etc. • Point person: To simplify the task of reaching out, especially with middle or high school students who have multiple teachers, parents can plan to send a weekly or biweekly email to their child’s counselor or special education case manager. This person will act as the point of contact and will be sure to disseminate all vital information to the teachers, while keeping you in the loop about all of the replies. • Student accountability: Bring your child into the collaborative effort by asking him to help track his own progress towards the goals set at the beginning of the year or quarter. It’s much more probable for a student to strive for success when he’s been part of the goal setting process. Involving your child in these discussions ensures that he’s taking ownership and feels invested in the effort he’s putting forth. • Positive reinforcementConsider small benchmarks or checkpoints along the way and make a point to acknowledge when goals are achieved. No matter your child’s age, kids benefit from positive reinforcement and thrive on recognition for a job well done. • Open communication: Another high leverage form of helpful collaboration is to connect your child’s teachers with any other “key player” on your child’s educational team. Teachers must have parental permission to correspond with pediatricians, therapists, psychologists, tutors, and even older siblings regarding a student. Therefore, if you want certain professionals to cooperate, you must first provide permission and then facilitate that correspondence. Remember, it takes a village, but you have to put all of the villagers in contact with one another, first. • Support groups: Another collaborative HLP that parents can modify for use at home is to facilitate a small virtual study group or neighborhood support group for certain ages, subjects, or classes. Reach out to neighbors about how their child is fairing with virtual learning. Ask if they are using any specific programs, tools, or methods that they find particularly helpful. During these times, many parents are finding that distance or virtual learning is all about trial and error. So why not collaborate with other parents in your neighborhood to help carry the load? Zoom Differentiation and Accommodations Virtual learning certainly has its challenges, especially when it comes to differentiating in the virtual classroom. For students with special education accommodations, teachers will need to get creative in order to account for every student’s unique needs and optimize learning opportunities. Thankfully, there are strategies and methods for providing special education accommodations in Zoom—we just need to think outside the box and modify what each accommodation looks like in the virtual realm. Zoom Chat: Since we are no longer physically in the classroom, proximity, prompting, and cueing accommodations pose a bit of a challenge for instructors. Yet, nothing has changed in terms of the student’s needs. In fact, students who struggle to focus and/or stay on task may need the prompting and proximity accommodations even more now that they are sitting in front of a screen. Online learning does not allow for physical proximity; however, teachers can utilize the chat function to maximize student engagement and provide an alternative form of proximity, prompting, and cueing. • Reaching out: The Zoom chat can be used to individually reach out to specific students with prompting accommodations to spur participation and to rephrase a question when necessary. • Clarifying: The chat also allows teachers to check for understanding by providing a platform for asking clarifying questions, follow-up questions, etc. • Advocating: Teachers should remind students of their chatting capabilities so that students with accommodations can advocate for themselves and speak up when they need assistance. • Tracking: The chat also acts as a data tracker; teachers can modify their settings in Zoom so that chats are saved. This allows for teachers to review correspondence with students and share questions and check-ins with parents. Teachers can also use saved chats to track the number of times a student initiates a task, asks clarifying questions, responds to polls or exit responses, etc. • Reminding: Teachers can use the Zoom chat as a method for reminding students of their extended time or reduced workload accommodations as well. This allows teachers to discreetly remind a certain student that his due date is extended without drawing attention to the student’s accommodations in front of the whole class. **Just be certain that, when chatting with specific students about these accommodations, you have selected the student’s name from the dropdown so that the chat remains a private, 1:1 conversation. Breakout Rooms: The grouping function in Zoom can also be beneficial when ensuring certain special education accommodations are offered. Teachers have the option to manually assign groups, which means that students with special education services can be grouped with a para educator or with other students who have the same accommodations. • Variance: Teachers should try to avoid always grouping special education students together, however, as to avoid drawing attention to certain small groups or stigmatizing students who need additional support. • Oversight: Teachers can randomly assign groups using the “automatic” option when creating breakout rooms. Then, while students work, the “host” can pop in and out of groups to act as a “check-in” for students with that accommodation. • Mobility: Teachers can also move the para educator from group to group during breakout room sessions so that every student receives supports throughout the collaborative activity. • Discretion: Breakout rooms also offer opportunities for differentiation. Teachers can modify assignments and link adapted materials in the chat to send to specific breakout rooms. From the chat link, students can click on the shared Google doc to access the modified material. This function can provide students with resources such as word banks, sentence starters, outlines, graphic organizers, glossaries, etc. The key is that each student who receives these accommodations will have access in a discreet manner and can choose to use the materials as needed.
IJG  Vol.5 No.11 , October 2014 Population Distribution Evolution Characteristics and Shift Growth Analysis in Shiyang River Basin Abstract: In recent years, the population size and scale of the Shiyang River Basin unceasingly expanding lead to a series of ecological environment: surface water reducing, land desertification and Ground water levels fall, etc. Research evolution characteristics of population distribution and migration growth of Shiyang River Basin contribute to river water resources and the industrial development of the comprehensive management. The article using the distribution of population structure index, population distribution center of gravity model and the population migration growth analysis model analyzes the distribution of the population evolution characteristics and population migration growth characteristics of Shiyang River Basin in 2000 to 2010. The results show that: 1) Considering Shiyang River Basin, population density is generally low, population distribution difference is bigger and concentration distribution in the middle corridor plain and three big population distribution center of Minqin oasis area, presenting a “point-areas-ribbon” structure characteristics. 2) The population distribution trend of Shiyang River Basin is constantly concentration, but the change is slow; the population distribution of Minqin is in the highest concentration degree, but the trend has been declining. 3) The focus of population density in river basin locates in Liangzhou district of Daliu country; in ten years, it migrates about 1209 m to southwest Wuwei City direction, but migration along the direction things is bigger than the north and south direction. The focus of population density and the basin geometry center is far away. 4) For ten years, at the township for basic statistics unit, each level population migration change within the overall is not significant: township level > prefecture-level cities level > counties level. 5) For ten years, there are significant changes in population migration between watershed township units, Wuwei City and Gulang Town are the two main concentrations of population centers. Cite this paper: Chen, M. , Wang, P. and Chen, L. (2014) Population Distribution Evolution Characteristics and Shift Growth Analysis in Shiyang River Basin. International Journal of Geosciences, 5, 1395-1403. doi: 10.4236/ijg.2014.511113. [1]   Yang, J., Pu, Y.X., Qin, X.-H. and He, Y.-M. (2010) The Spatial Distribution Pattern of Population and Its Analysis of the Spatio-Temporal Dynamics in Zhejiang Province. Chinese Journal of Population Resources and Environment, Jinan China, 20, 95-99. (In Chinese) [2]   Su, F. and Zhang, P.Y. (2010) Spatio-Temporal Dynamics of Population Distribution in the Middle and Southern Liaoning Urban Agglomeration. Progress in Geography, Beijing China, 29, 96-102. (In Chinese) [3]   Li, X.-Y., Xiao, D.-N., He, X.-Y., et al. (2006) Comparison on Changes and Their Driving Forces of Farmland in Oases of Middle and Lower Reaches: The Case of Liangzhou and Minqin Oases in the Shiyang River Basin. Ecologica Sinica, Beijing China, 26, 671-680. (In Chinese) [4]   Dai, R., Guo, L., Xue, D.-Y. and Sun, F.-M. (2010) Spatio-Temporal Characteristics of Agricultural Population Spatial Distribution in China. Chinese Journal of Population Resources and Environment, Jinan China, 20, 186-189. (In Chinese) [5]   Liu, D.-Q., Liu, Y. and Xue, X.-Y. (2004) China’s Population Distribution and Spatial Correlation Analysis. Science of Surveying and Mapping, Beijing China, 29, 76-79. (In Chinese) [6]   Tang, W., Zhong, X.-H. and Zhou, W. (2011) Study on the Evolution of Spatial Distribution Structure of Population in “Three Rivers” Area in Tibet. Chinese Journal of Population Resources and Environment, Jinan China, 21, 159-164. (In Chinese) [7]   Duan, X.-J., Wang, S.-G. and Chen, W. (2008) Evolution of Population Distribution and Growth Shift in Changjiang River Delta. Scientia Geographica Sinica, Beijing China, 28, 139-144. (In Chinese) [8]   Wu, W.Y. and Gao, X.D. (2010) Population Density Functions of Chinese Cities: A Review. Progress in Geography, Beijing China, 29, 968-974. (In Chinese) [9]   Xiang, Y.-B., Zhang, Y. and Zhao, H.-L. (2011) Spatial Evolution Characteristics of Population Distribution in Xiangjiang River Basin. Northwest Population Journal, Lanzhou China, 32, 34-42. (In Chinese) [10]   Cao, Y.H., Li, H.J. and Chen, W. (2004) The Spatial Structure and the Competition Pattern of the Container Port System of China. Acta Geographica Sinica, Beijing China, 59, 1020-1027. (In Chinese) [11]   Li, H.-J. and Liang, L.-K. (2010) Shift-Share Analysis on Competition of Inbound Tourism Destination in China. Geography and Geo-Information Science, Shijiazhuang China, 26, 98-102. (In Chinese)
 Polar Satellite Launch Vehicle Polar Satellite Launch Vehicle The Polar Satellite Launch Vehicle ( PSLV short, Hindi, ध्रुवीय उपग्रह प्रक्षेपण यान ) is an Indian launch vehicle for light to medium weight payloads. The missile is launched from the Indian Space Agency ISRO Satish Dhawan from the spaceport at Sriharikota Space Centre. PSLV was developed to launch Indian IRS - Earth observation satellites with their own rockets, since it was there previously dependent on the Soviet Union and Russia, and its carrier. The first launch took place in 1993, but was not successful. Although the first stage operated without any problem, occurred in the second and the third step, an error in the height control system, leading to a crash of the rocket. After about a year successfully launched the second PSLV. Since then, several PSLV both Indian as well as additional smaller foreign payloads successfully launched into space. The first Indian spacecraft Chandrayaan -1 was launched with a PSLV to the moon in 2008. PSLV is a four-stage missile, consisting of two solid levels (first and third stage ), and two liquid-propellant stages ( second and fourth stages ). In addition, the first stage is supported in the base version of six small solid boosters. In the version PSLV -CA (Core Alone) are omitted this, what the payload capacity of 1100 kg into a sun-synchronous orbit. The first stage is one of the largest solid rocket boosters in the world and burns HTPB (hydroxyl Terminated Poly Butadiene ) as fuel. The first stage contained only 129 tonnes of fuel until the third start ( PSLV - Dx) and was then increased to 138 t ( PSLV -Cx ), where from the PSLV - C4 also the maximum thrust was increased from 4430 to 4628 kN. It is also used as the first stage of the larger and more powerful GSLV. The boosters are filled with HTPB solid fuel rockets, which are fired consecutively (first four, then the remaining two ). The second stage burns liquid fuel and is powered by a Vikas engine, which is a product manufactured under license Viking -4A engine of European Ariane 3. The third stage also burns HTPB. The fourth stage has two engines that burn fuel combination of monomethyl hydrazine and nitrogen tetroxide. The height of the rocket is 44.4 m, the take-off mass 294 t (data for PSLV - C6). Since the first launch in 1993, the rocket has been constantly strengthened and improved, so that the version in use today, over 1,600 kilograms in an approximately 600 km high polar orbit can bring ( Erststartversion about 850 kg) and about 1000 kg into a geostationary transfer orbit. The last version ( the PSLV -XL) has improved booster and can even bring 1800 kg into polar orbit. The first launch of this version took place on 22 October 2008 for Chandrayaan -1. To start the Satish Dhawan Space Centre rocket has two starting systems, the second (SLP - Second Launch Pad ) was inaugurated with the launch of PSLV - C6 rocket in 2005. At the start of the PSLV - C17, a computer system was used for the first time, which used exclusively by Indian type processors Vikram 1601 in two redundant control computer. This had been tested in 2009 at the start of the PSLV - C12, where they were used in one of the two systems.
Causes and Risk Factors of Cardiac Arrhythmias The causes of cardiac arrhythmias are very varied. In many cases it's possible to identify them, but in some it isn't. For this reason, a medical check-up is essential. Causes and Risk Factors of Cardiac Arrhythmias Written by Maite Córdova Vena, 12 July, 2021 Last update: 12 July, 2021 The causes and risk factors of cardiac arrhythmias are as varied as their severity and medical consequences. For this reason, there are various ways to classify them. Despite the diversity of causes that exist, experts have found that at a cellular level, arrhythmias share common electrophysiological properties. They also explain that there are three main mechanisms behind them: automatism, triggered activity and reentry. Generally speaking, this means that when the heart’s electrical system has difficulty functioning, the electrical signals take different routes than normal, and they can even be delayed or blocked. For this reason, when the heart beats too fast, too slow, or irregularly, it’s called cardiac arrhythmias. In order to provide the patient with an adequate diagnosis and treatment, it’ll be essential to differentiate and understand what’s occurring. Common causes of cardiac arrhythmias There may be several underlying causes for arrhythmias, which is why it isn’t always easy to determine their exact origin. Even so, the following ones that we’re going to mention below are usually taken into account. Previous pathologies Causes and risk factors for cardiac arrhythmias include high blood pressure High blood pressure is often associated with the development of cardiac arrhythmias. Chronic diseases such as diabetes, hypertension, and obstructive sleep apnea may be the cause of arrhythmias. Also coronary artery disease and other congenital heart problems, such as mitral regurgitation. In addition to this, having undergone previous heart surgery makes the person more prone to experiencing arrhythmias. In addition to high blood pressure, it should be noted that the consumption of medication for high blood pressure can also cause arrhythmias. Heart failure As the experts from the Spanish Heart Foundation indicate, “heart failure occurs when there’s an imbalance between the heart’s ability to pump blood and the body’s needs.” This causes the heart to lose strength. Abnormal potassium levels in the body Electrolyte imbalances in the body can also lead to arrhythmias. Especially the imbalances of calcium, magnesium and potassium, which play a fundamental role in the cardiovascular system. Arrhythmias that don’t have a clear origin – even after having investigated them in depth – are included in the category of “idiopathic”. According to some specialists, it seems that these could have a genetic origin. However, they also tell us that it’s necessary to continue looking further into this matter. Risk factors Causes and risk factors for cardiac arrhythmias include obesity Some metabolic conditions such as obesity can predispose to the development of cardiac arrhythmias. Arrhythmias can occur both in healthy people (of any age) and in people with underlying heart disease. Some risk factors that may affect this would be the following: • Obesity • Smoking • A sedentary lifestyle • Dehydration • Stress or anxiety • Thyroid problems • Excessive alcohol or caffeine consumption • Illegal drug use • Some medications and supplements (such as over-the-counter cold and allergy medications, drugs for depression, antibiotics, etc.) • Genetic inheritance: increases the propensity to suffer arrhythmias • Aging: People may be more likely to experience arrhythmias in later life, and for this reason many of them will need pacemakers. When to consult the doctor? Some arrhythmias remit spontaneously, others by attending to the cause that has produced them, and, in other cases, the arrhythmias produce a significant impairment in cardiac function, and can be fatal. Therefore, in the event of any significant discomfort (which occurs regularly or suddenly), it’s best to consult with the doctor as soon as possible. It isn’t advisable to ignore the problem or postpone the consultation for a long time, as the sooner a diagnosis and appropriate treatment is received, the greater the person’s well-being. On the other hand, experts recommend improving lifestyle habits. If you notice dizziness, weakness, shortness of breath, chest pain, fainting or syncope, and other symptoms that prevent you from leading a normal life or which cause you to feel uneasy, it’s essential to seek urgent medical help. It might interest you... Diagnosis of Cardiac Arrhythmias Muy Salud Read it in Muy Salud Diagnosis of Cardiac Arrhythmias In addition to performing a physical examination, for the diagnosis of cardiac arrhythmias the doctor will order several tests.
「非当事者」にできること : 東日本大震災以後の文学にみる被災地と東京の関係What the “Unašected Parties” Can Do : Literature on Tokyo and the Ašected Areas in the Aftermath of the Great East Japan Earthquake加島, 正浩KASHIMA, Masahirothe Great East Japan Earthquakeaffected partiesviolence of writingrelationship between the affected area and TokyoKimura YusukeThe purpose of this article is to determine the significance of literature on the Great East Japan Earthquake written by authors who do not belong to one of the affected parties. It does so by analyzing a novel depicting the Great East Japan Earthquake, focusing on the relationship between Tokyo and the affected area. Immediately after the earthquake, when the threat of radioactive substances spreading to Tokyo loomed large, the author of this novel was able to write as one of the affected. However, later it became difficult for the author to write about the disaster as the impact of such first-hand accounts began to wear thin. This was due to consideration for the affected parties, who continued to live in Fukushima after the disaster. However, as this article argues, excessive consideration for the affected parties distracts people from realizing the true state of affairs in Japan, and when those other than the affected parties are discouraged from speaking out, it causes feelings of indifference and accelerates the “wearing thin” of the impact, ultimately forcing the affected area to take care of the problem on its own. The affected parties, who had to focus on restoring their everyday lives after the disaster, could not fight against this “wearing thin” of the impact. However, others could. Thus, writers who write about the earthquake disaster with due care are fulfilling their part.名古屋大学大学院文学研究科附属「アジアの中の日本文化」研究センター2017-03-17jpndepartmental bulletin paperhttps://doi.org/10.18999/juncture.8.180http://hdl.handle.net/2237/00031312https://nagoya.repo.nii.ac.jp/records/2912510.18999/juncture.8.1801884-4766JunCture : 超域的日本文化研究8180193https://nagoya.repo.nii.ac.jp/record/29125/files/JunCture8_15.pdfapplication/pdf1.8 MB2020-01-23
The Mahabharata is an Indo-Aryan epic about the dynastic struggle by Pandavas & the Kauravas for the throne of the Kingdom of the Kuru, held by Dhtrarastra, the blind king of the Kauravas. The Bhagavad Gita, (the Song of Bhagavan - God), appears just before the climatic war between the two parties; and is of central importance in questions of ethics & moksha (liberation). In it Dhtrarastra, the blind King of Kauravas asks for a report from Sanjaya his chief minister who has the gift of seeing at a distance: The first couplet of the first chapter of the Bhagavad Gita is: [Dhtrarastra said]: In the Kingdom of the Kurus, the land of Dharma War-like stand My men and the Sons of Pandu; what did they do next, O Sanjaya? What does Dharma stand for in the context of the Gita? I can discern three major concerns: 1. Arjuna questioning the consequences of the impending war in the first chapter - The Grief of Arjuna 2. Krishna counselling Arjuna on his duty as a warrior, and 3. and on moksha (religion). The ethical dilemma in the Gita relates to the first two. Thus Dharma as what is right, righteousness; and Dharmas as duty, here as war; thus right vs might and Dharma encapsulates both senses. At least as I understand it. Aesthetically, this combination of meanings reminds me of the Sublime which combines the Beautiful/Good with the Terrible/Majesty. Is this the best way to understand Dharma in this first couplet in the context of the Gita as a whole? In the preface to his translation of the Gita, Swami Nikhilananda says "There are many who regard the story behind the Gita not as historical fact but as allegory. To them Arjuna represents the individual soul, and Sri Krishna the Supreme Soul dwelling in every heart. Arjuna's chariot is the body. The blind King Dhirtarashtra is the mind under the spell of ignorance, and his hundred sons are man's numerous evil tendencies. The battle, a perennial one, is ever going on between the power of good and the power of evil. The warrior who listens to the advice of the Lord speaking from within will triumph in this battle and attain the Highest Good." He further states in the introduction regarding the first couplet: "What he [Arjuna] saw chilled his bones. There on the battlefield were assembled his sons, nephews, elders, teachers, relatives, and intimate friends. To regain the kingdom of the Pandavas, he must wade through their blood. He was no coward, but the immensity of the situation confused his mind. He was caught on the two horns of a dilemma. One the one hand was the call of duty: the chastisement of the wicked, the vindication of truth, law, and order--in short, all that belonged to his kshatriya [king/warrior caste] honour. On the other was commiseration for his friends and relatives, whose destruction was unavoidable in the impending Armageddon. Was he to give the sign for the commencement of this carnage, or should he renounce the field, retire to the forest, and lead the peaceful life of a hermit?Unable to resolve the dilemma, he turned to the Divine Krishna and implored his counsel." In your translation, Land of Dharma is a loose translation of the first verse. Most translations refer to the plain of Kurukshetra where the battle took place. I think your translator is trying to make the point that where the battle is taking place is where dharma will take place. dharma literally means that which holds together. The inmost constitution of a thing, the law of it's inner being, which hastens its growth and without which it ceases to exist. The dharma of a man is not imposed from the outside, but is acquired by him as a result of his actions in past lives. Thus, every man, in a special sense, has his own dharma, which determines his conduct, his righteousness, and his sense of right and wrong. • It was actually my translation: the opening line in Sanskrit is 'dharma-ksetre kuru-ksetre' where ksetre has the sense of a field. I've seen dharma-kstetre translated as 'holy land' or 'field of roghteousness; like the other translators I assumed that it was qualifying kuru-ksetre - the 'field' or the land of the kurus; but is better to keep it as kuru-ksetre - is it actually a place name? In which case I'd translate the first line as 'In the land of Dharma, Kuruksetre...' Sep 3 '14 at 12:31 • I've also see it translated as the 'field of Dharma'; which could refer to either a Cosmological principle of Dharma which is allegorised as the impending battle; as well as qualifying *kuruksetre' as a land of Dharma. Sep 3 '14 at 12:34 • I've never researched the actual historicity of the name. My teachers and readings left me with the impression that it was the actual name of the place. Some very prominent monks have questioned whether the battle actually took place and said that the battle can be taken as an allegory. Taken as an allegory, it makes sense that the battle takes place on the field of dharma........ Sep 4 '14 at 8:31 • I think its worth comparing to 'Eng-land' which was 'land of the Angles'; Sep 4 '14 at 8:39 • actual place - en.wikipedia.org/wiki/Kurukshetra Sep 4 '14 at 10:36 Kurukshetra, the site of the battlefield, was an ancient 'teerth'- pilgrimage spot associated with the common ancestors of the 2 contending parties, who were cousins. As such, it was and is a place where pilgrims perform religious (dharmic) ceremonies so as to overcome bad karma or create good karma. The warriors, deluded by the Lord, had forgotten that they were fighting on a sacred spot. However, this was foreordained because the fallen warriors gained Heaven by fulfilling the Lord's plan. Your Answer
Flexural waves in a periodic beam Sen Yung Lee, Huei Yaw Ke, Ming Jang Kao Research output: Contribution to journalArticlepeer-review 8 Citations (Scopus) The flexural wave propagation in the periodic beam can be interpreted as the superposition of two pairs of waves propagating in opposite directions. One of them forms an attenuated standing wave. The dispersion spectrum of the other pair of waves shows the band structure, consisting of stopping and passing bands. For the symmetry structure, the dispersion equation at the end points of Brillouin zone is uncoupled into two equations. Each of them corresponds to a standing wave which is either symmetric or antisymmetric about the midplane of the layers. Original languageEnglish Pages (from-to)779-783 Number of pages5 JournalJournal of Applied Mechanics, Transactions ASME Issue number3 Publication statusPublished - 1990 Sep All Science Journal Classification (ASJC) codes • Condensed Matter Physics • Mechanics of Materials • Mechanical Engineering Dive into the research topics of 'Flexural waves in a periodic beam'. Together they form a unique fingerprint. Cite this
Who gave Portugal a direct route to Asia? How did Portugal find a route to Asia? Who was the Portuguese who opened a direct ocean route from Europe to South Asia? Why did Portugal and Spain Explore Asia? The Portuguese also established trading ports in India and, after the conquest of Malacca, in the Spice Islands. … Like the Portuguese, Columbus’s goal had been to reach Asia to tap into the lucrative spice trade. Columbus instead reached a “New World,” and the Spanish found themselves exploring vast new lands. FASCINATINGLY:  You asked: Why did the Portuguese come to Nigeria? Why was Portugal successful in Asia? What was the significance of finding a sea route to Asia? What was the significance of finding a sea route to Asia? It allowed Europeans to bypass merchants who monopolized trade. Who first made a route across Asia to China? The original Silk Route was established during the Han Dynasty by Zhang Quian, a Chinese official and diplomat. During a diplomatic mission, Quian was captured and detained for 13 years on his first expedition before escaping and pursuing other routes from China to Central Asia. Who discovered a sea route to America and when? Explorer Christopher Columbus (1451–1506) is known for his 1492 ‘discovery’ of the New World of the Americas on board his ship Santa Maria. All about Portugal
JavaScript Interview questions Total available count: 22 Subject - JavaScript Frameworks Subsubject - JavaScript What are JavaScript Cookies? Cookies are the small test files stored in a computer and it gets created when the user visits the websites to store information that they need. Example could be User Name details and shopping cart information from the previous visits. Next 5 interview question(s) What is the use of Void(0)? What are all the looping structures in JavaScript? What are all the types of Pop up boxes available in JavaScript? What is an undefined value in JavaScript? What do mean by NULL in JavaScript?
You conduct a Critical Analysis when you reflect on, analyze and evaluate a work; it is a piece of writing that is subjective while also providing substantive analysis.  For this assignment, view the TED Talk that is attached and addresses the issues of social justice and systemic racism.  Think thoroughly, critically, and deeply about the talk; there is no correct interpretation or response. Feel free to write about what most interested you. focus on one or two points and go into depth.  The Critical Analysis is a formal writing assignment. It will be used to assess  Writing Objective Nine: frame arguments for a general academic audience with the purpose of improving, deepening, or clarifying an understanding of the issue at hand.  It must be word-processed and double-spaced using 12 point font. It should be three pages in length. Please use ( for APA citation criteria and style guidance. Be sure to include, the name of the TED Talk speaker, the Title of the Talk and the URL of the talk. Cinema Modeoff Social Justice Belongs In Our Schools | Sydney Chaffee | TEDxBeaconStreet
Columbus Day On October 12, 1492, Christopher Columbus arrived in the Americas; and while many no longer consider that an accomplishment worth celebrating, we still believe the achievement is should be noted and are still against revisionary history. Thus we wish you a Happy Columbus Day! From Wikipedia: “Celebration of Christopher Columbus’s voyage in the early United States is recorded from as early as 1792. The Tammany Society in New York City (for whom it became an annual tradition) and the Massachusetts Historical Society in Boston celebrated the 300th anniversary of Columbus’ landing in the New World. President Benjamin Harrison called upon the people of the United States to celebrate Columbus’s landing in the New World on the 400th anniversary of the event. During the anniversary in 1892, teachers, preachers, poets and politicians used rituals to teach ideals of patriotism. These rituals took themes such as citizenship boundaries, the importance of loyalty to the nation, and the celebration of social progress. Many Italian-Americans observe Columbus Day as a celebration of their heritage, and the first such celebration was held in New York City on October 12, 1866. The day was first enshrined as a legal holiday in the United States through the lobbying of Angelo Noce, a first generation Italian, in Denver. The first statewide holiday was proclaimed by Colorado governor Jesse F. McDonald in 1905, and it was made a statutory holiday in 1907. In April 1934, as a result of lobbying by the Knights of Columbus and New York City Italian leader Generoso Pope, Congress and President Franklin Delano Roosevelt proclaimed October 12 be a federal holiday under the name Columbus Day. Since 1971 (Oct. 11), the holiday has been attributed to the second Monday in October, coincidentally exactly the same day as Thanksgiving in neighboring Canada since 1957. It is generally observed nowadays by banks, the bond market, the U.S. Postal Service, other federal agencies, most state government offices, many businesses, and most school districts. Some businesses and some stock exchanges remain open, and some states and municipalities abstain from observing the holiday. The traditional date of the holiday also adjoins the anniversary of the United States Navy (founded October 13, 1775), and thus both occasions are customarily observed by the Navy and the Marine Corps with either a 72- or 96-hour liberty period.” Leave a Reply
Tuesday, March 12, 2019 The road not taken Just got back from a train trip from our home in Wisconsin to California and back. We took the route that goes through the Sierra Nevada mountains, and then on in to the bay area. Sometimes we were next to the interstate, and sometimes, we were off on our own. Had a bit of trouble getting through the deep snow, ended up stopping in Reno, bussing the rest of the way. Got me to thinking about the condition of the rail system, and what it could have been. Its genesis could be said to have started with Dwight Eisenhower in 1919. He was part of a cross country Army convoy, to assess military mobility and status of the existing roads. It was a disaster, and the roads at the time were pretty bad, making quite an impression on him. So, when he later was president during the cold war, the perceived need to easily evacuate cities and mobilize military forces prompted the creation of the Interstate Highway system. Signed in 1956, it took 35 years and almost $500,000,000,000 to build. ( that's with a B) It created a lot of jobs and spurred economic growth, but what if he had championed another solution? What if he had decided that the better choice was to upgrade the rail system, and overlay that on the nation's terrain instead of highways? After all, a lot of the right of ways were already secured. It might have gone like this: - a network of rails similar in arrangement to the interstate. - upgraded rails, with a couple more tracks on each route, with beefed up bridges and rail-bed capacity. -intermodal hubs to enable quick offload to trucking for the final miles to destinations. -modified curves and bed stability to allow speeds up to 100MPH, maybe more. And here would be the positive side effects if this option had been taken. -more energy efficient freight hauling with large energy and money savings resulting. -cheaper highway system, with much less semi truck traffic to tear it up, and lower load capacities, with cheaper construction and maintenance costs. - a better infrastructure to piggy back passenger train travel, making for fewer car trips needed. - probably less air travel, both for freight and for passenger travel. - traffic in between towns would revitalize small towns, most of which now are bypassed by interstates. A couple shots of our trip through the Sierras ( sorry for poor quality, overcast and through a train window) Hard to tell scale, but these cuts through the drifts were done with giant snow blowers, and the cut is higher than my head in most places, and about ten feet in a few places. 1. Hi Steve, Yeah, the rail system here is a former shadow of itself too and plenty of it iwas dismantled in the late 1950's to 1960's. We still have good country rail links and the trains are reasonably fast 130kmh / 80mh which is fast enough, but you can see from the train where lines once headed off in different directions to towns that have no public transport other than buses. Mate, that snow is something else. I saw an article that a train was stranded in Washington state due to the snow, and the passengers were evacuated. I hope you weren't part of that story? We have the other side of the problem with the trains and when the temperature is past about 95'F, the trains are slowed to 80kmh / 50mh which adds some serious time to the journey in to the city which is normally slightly under an hour from the local station. Did you have a sleeper cabin for such a huge journey across the country? 2. Hi Chris; No we were not on the stranded train. They were actually out in between stops, so getting to them was a bit tricky. Amtrak knew ahead of time our track was blocked, so dumped us onto busses at the last stop before the snow. We tried the cheaper option once, where you sit in a chair ( it reclines a bit, but still...) for two days and two nights, but it was a tough go. As we age, we REALLY appreciate that we can afford the sleeper car option.
The Costs and Benefits of Nuclear Regulation • The average nuclear power plant must comply with a regulatory burden of at least $8.6 million annually. • Currently, construction of a new plant begins after waiting for nearly a decade for regulatory approval. • While there are good reasons for nuclear security rules, nuclear energy is being placed at a distinct disadvantage compared to other fuel sources. • Although the total listed costs from Nuclear Regulatory Commission (NRC) rules imposed on the industry since 2006 are just $444 million, regulations from other agencies, fees, security costs, and the industry’s unfavorable treatment under the Clean Power Plan make competition in today’s energy market a struggle. The Costs Nuclear Regulation at a Glance (costs per plant) Paperwork Costs $4.2 million Security Costs (wages only) $4.4 million $22 million As with many independent agencies, there is much the public doesn’t know about the costs and benefits of new rules. As mentioned, Regulatory costs imposed on nuclear power plants by the NRC since 2006 have totaled $444 million. Since nuclear power generation is justifiably a heavily regulated industry, that is not a shocking figure. However, these plants are also regulated by several other agencies. The two largest NRC rules cover “Fitness for Duty” and post 9/11 security standards. The Fitness for Duty measure costs $481 million and is aimed at combating worker fatigue and improving drug and alcohol testing at facilities. The second largest rule, perhaps not surprisingly, covered 9/11 security requirements. The 2009 regulation estimated that an average nuclear site incurred $1.7 million in initial costs, with roughly $600,000 in annual recurring burdens. The total costs of the rule were $154 million, with $38 million in annual costs for the entire industry. In addition, other agencies have issued power plant regulations that directly affect the nuclear industry. For example, the Environmental Protection Agency (EPA) has issued a rule for cooling water intake structures, at $7.3 billion in total costs on the energy production sector, in addition to a major rule covering “Effluent Limitations Guidelines and Standards” ($471 million in costs). The measures will affect virtually every power plant near a body of water including nuclear facilities. According to the Energy Information Administration (EIA), there are only 61 nuclear power plants in the nation that house 100 total reactors, displayed on the following map. US Reactors Currently, NRC displays a paperwork cost of $2.2 million from its 10.5 million paperwork hours. However, this that only amounts to about 20 cents an hour for those performing the paperwork. As AAF has previously found, a thorough examination of NRC’s paperwork slate uncovers more than $257 million in unpublished costs, or 116 times the reported figure. This results in a per-facility recordkeeping cost of $4.2 million. Simply dividing the hours by the number of nuclear power plants yields an astounding 173,459 hours per facility. Assuming 2,000 hours a year per employee, that’s the equivalent of 86 full-time equivalent (FTE) employees per plant. Naturally, every facility likely does not employ 86 workers to focus exclusively on regulatory compliance. Given the federal government’s total imposition (10.5 billion hours), 10.5 million hours might seem pedestrian. The overall numbers aren’t large, but given the number of affected facilities, the relative burden on nuclear power plants is notable. For comparison, of the roughly 1,544 power plants in the U.S., only about four percent are nuclear-powered, yet they produce around 20 percent of the nation’s electricity. What are the main drivers of nuclear plant regulation, at least in terms of paperwork? According to the Office of Information and Regulatory Affairs (OIRA), a prime culprit is written guidance to the states on ensuring that, “the radiation control program … remains adequate and compatible with [existing federal law].” From just 58 state and local respondents, this seemingly pedestrian requirement will generate 285,143 hours on local governments. Strangely, the listed costs are $0, but the supporting statement notes the burdens exceed $78 million or more than $1 million locality. Another notable requirement surrounds “Reactor Site Criteria,” which “establishes approval requirements for proposed sites for the purpose of constructing and operating stationary power.” At 167,000 hours from just two respondents, the 83,000-hour burden per entity essentially represents the years of planning and development that first must take place before NRC and other regulators license a site to produce power. For example, NRC and OIRA estimate “non-seismic siting criteria” will take 22,000 hours (roughly 11 FTEs) and “geologic and seismic siting criteria” will consume 51,000 hours of time (25 FTEs). This assumes 2.3 applications annually, yielding 167,000 hours and more than $45 million in costs. In other words, just an approval for the site of a reactor can cost close to $20 million per entity. This is not to say $20 million isn’t an appropriate price to establish safety standards for a new plant. Given the lengthy review times by NRC however, $20 million can be a fraction of the total investment required to get approval for a new power plant. During the last five years, NRC has taken twice the amount of time to review license renewal and uprate applications (increasing the output of  a plant). Likewise, “Early Site Permits” now take about six years, up from an already prohibitive three to four years. Combined licenses now take about eight years for NRC to process, up from four a few years ago. These delays obviously cost money and heighten uncertainty in an industry trying to compete with other energy sources. Finally, the third most burdensome collection according to OIRA, involves a request for information after the Fukushima nuclear disaster in Japan. The survey, requesting data on seismic and flooding hazards, was intended to determine if more regulation would be needed in the future. Once again, the listed costs are $0, but the supplemental data reveals annualized costs of $29 million and $87 million in total costs on the industry. For example, the seismic risk reassessment will cost $55 million and an assessment of flooding hazards will impose $14.7 million in burdens. This routine collection of information, imposed on one industry, nevertheless has significant effects on each site. Paperwork is just one aspect of the regulatory costs the nuclear industry must navigate annually. Unlike other power generation sources, there is a premium placed on security and this premium comes at a price. Some estimates place the number of security personnel at nuclear sites at 9,000 for just 61 plants. That incredible figure equals roughly 140 guards per facility. Generally, power plants must be able to deter “a well-trained and dedicated paramilitary force, armed with automatic weapons and explosives and intent on forcing its way into the plant to commit radiological sabotage.” This is an important, but expensive, safety apparatus all plants must maintain. According to the Bureau of Labor Statistics (BLS), there are 5,190 security workers directly employed by the nuclear industry, with the balance of the 9,000 estimate likely consisting of contract staff. For the 5,190 employees, 640 are supervisors, with an annual wage of $69,360; the remaining staff earn $50,070 a year. In compensation costs alone, the nuclear industry pays $272.2 million for security or $4.4 million per facility. This figure excludes non-wage benefits and other overhead associated with staffing roughly 9,000 security personnel. In addition to the paperwork burden ($4.2 million plus $4.4 million), there are at least $8.6 million in costs per plant, exclusive of fees, employee benefits, overhead, capital, and other regulatory burdens. Beyond the costs of nuclear regulation, from the security staff to the capital and paperwork burdens, there are generally legitimate reasons for these federal rules, such as the value of having nuclear power plants safe from the threat of major earthquakes, flooding, or terrorist attacks. Generally, federal agencies have difficulty monetizing or even quantifying these benefits. As an independent agency, NRC rarely conducts comprehensive benefit-cost analysis. However, agencies sometimes use a “break-even analysis” when benefits are difficult to monetize. In other words, a break-even analysis asks, “What would the benefits need to be to justify the costs.” There are two exemplars for examining the benefits of nuclear regulation: the Three-Mile Island accident and the destruction of the Fukushima power plant. For example, estimates of the total economic loss from the Fukushima disaster are upwards of $500 billion, from abandoned cities and towns more than 310 square-miles around the reactor to the 159,000 people displaced from their homes. In addition, 56 percent of all the fish caught off of the coast of Japan were contaminated. For the Three-Mile Island incident, there are estimates that the clean-up alone cost nearly $1 billion, although there were no direct fatalities from the accident. Finally, there are the occupational safety benefits. Generally, the nuclear industry has one of the highest safety records in the nation. There are roughly just 0.03 accidents per 200,000 workers, based on the latest data. No one regulation can eliminate the risk of a $500 billion meltdown or avoid $1 billion in clean-up costs. Yet regulators often point to the ability to lower the possible risk of these accidents occurring or how rule after rule can cumulatively contribute to a safer workplace and secure facilities. The costs of nuclear regulation are certainly significant, but regulators will note the benefits of an avoided disaster are likely much higher. The Fees In addition to the direct and indirect regulatory costs are the fees operators pay to the NRC. Coal and natural gas facilities do not fund EPA’s budget; taxpayers do. However, nuclear power plants are responsible for roughly $885 million in annual fees to the NRC and others, or about $14 million per facility. The remaining ten percent of NRC’s budget is provided by the U.S. Treasury. Combined with regulatory costs, the total cost per facility eclipses $22 million. There is some debate on the amount of “overhead” at NRC compared to other agencies. For example, its peer agencies spend about 20 to 32 percent on overhead costs, compared to 37 percent at NRC. Congress responded to this inequity and the FY 2016 budget limited overhead to 34 percent. This was effective, but the FY 2017 Budget once again requested increased overhead, making it one of the leading agencies to spend money outside of its statutory objective. Clean Power Plan For the future of the nuclear industry, there are few regulations as important as the Clean Power Plan (CPP). It does encourage states to switch to low carbon energy sources, but the industry is hardly more competitive because of the CPP. As former Secretary of Energy under President Obama, Steven Chu, noted, “Even though the Clean Power Plan says we need nuclear and maintains the same ratio, they give no credit for it.” Essentially, the CPP allows credits for new nuclear facilities or expensive uprates at existing facilities, but there are no additional credits to the current fleet. However, plants under construction do count toward compliance once they are in operation. The industry pointed out the retiring nuclear plants will likely be replaced by newer efficient natural gas plants, increasing greenhouse gas emissions. There are roughly 10-15 plants in danger of shutting down during the next five to ten years, according to Marvin Fertel of the Nuclear Energy Institute. He noted, “If we were to lose all those plants, and assuming they were replaced with the most high-efficiency combined cycle gas plants, it would wipe out approximately one-quarter of the gains achieved by the Clean Power Plan [CPP], if it was implemented.” Given the costs of relicensing and the treatment under the CPP, it is likely the current fleet could continue to experience retirements. The NRC must take some steps to expedite the process of application approval. Beyond the sheer capital and paperwork costs associated with nuclear regulation, time equals money. In some instances, it can take eight years to review and approve licenses. For all the talk about delays in promulgating new regulation, delayed regulatory approvals are equally as troubling. During the last decade, fees have increased, as have review times. For other agencies, notably the Federal Communications Commission, Congress has mentioned the idea of “shot clocks” for regulatory approval. There are plenty of incentives for Congress, policymakers, and NRC to work together on flexible timelines for application review. Trimming review times and some regulatory costs could help to achieve greater cost competitiveness for the nuclear industry. As mentioned above, NRC spends a considerably higher portion of its budget on overhead than other peer independent agencies. Despite some attempts from Congress to control these costs, NRC once again requested higher funding, overall and for overhead specifically. In the future, Congress could consider a permanent cap on NRC’s overhead budget. This need not be a firm and fixed amount initially; it could be phased in gradually to ensure taxpayers aren’t paying for the agency’s extraneous overhead costs. Regulation for the nuclear industry is inherently unique and it should never be deregulated in the same manner as other industries. However, there are incremental and meaningful steps policymakers and regulators can take to alleviate a regulatory burden of at least $8.6 million per plant, exclusive of fees and other major capital costs. Ensuring a balanced regulatory approach that can expedite licenses and continue to protect the safety of nuclear facilities is critical to the future of the industry and low-carbon energy options.
What does "Bonferroni Correction" mean? Definition of Bonferroni Correction in the context of A/B testing (online controlled experiments). What is Bonferroni Correction? The Bonferroni Correction is one of the earliest procedures for controlling the Family-Wise Error Rate (FWER) which is the error rate across a set of tightly related significance tests. The goal of the correction is to maintain the overall type I error rate which is computed under the null hypothesis that all nulls tested in the significance tests are false. The correction provides a conservative bound on alpham. Bonferroni derived the calculation that the overall α of performing m significance tests is equal to 1 - (1 - αper test)m which is the probability that one of them will result in a statistically significant outcome. The simple Bonferroni correction would suggest performing each test at level α/m to maintain the Family-Wise Error Rate (FWER) fixed at α, but this is a conservative adjustment when the comparisons are not independent. The Bonferroni correction can be applied when there is more than one primary KPI in an A/B test and finding any of them to be statistically significant would result in deciding against the control. Still, it is a bit conservative in the presence of positive dependence so the Sidak Correction is usually slightly more powerful and thus preferred. While the Bonferroni correction can also be applied to a multivariate test (A/B/n test) it is not the best choice as it takes no account of the dependency present between the tests due to the fact that they are all against a common control. In such cases the Dunnett's correction provides a significantly more powerful method that also controls FWER as defined above. Articles on Bonferroni Correction Purchase Statistical Methods in Online A/B Testing Glossary Index by Letter
Chasteau, Guillaume (1635-83; French), after Poussin, Nicolas (1594-1665; French) Le jeune Pyrrhus sauvée [Pyrrhus hidden from the enemies of his father] 1676 Engraving & etching Gift of George Collins Levey 1879 National Gallery of Victoria (p.183.38-1) = Levey gift, cat.35 Poussin’s painting, one of several acquired by Louis XIV from the Duc de Richelieu in 1665, was formerly in Louis XIV’s Cabinet at Versailles. Dated 1634, it may have been painted originally for Pope Urban VIII’s chancellor Gian Maria Ruspoli. The subject, also known under various French titles including Pyrrhus à la mamelle, and Le jeune Pyrrhus sauvée, is from Plutarch’s life of Pyrrhus (c.319-272 BCE). It refers to the episode when the 2-year-old Pyrrhus and his family went into hiding after his father Aeacides was removed from the throne of the Greek state of Epirus in 317 BCE. Later, now himself king of Epirus (297-272 BCE), Pyrrhus became the most powerful military opponent of Roman ascendancy in southern Italy. The term “Pyrrhic victory” refers to the huge losses he incurred in defeating Rome at Asculum (now Ascoli Piceno) in 279 BCE; four years later he retreated from Italy. Not listed in NGV 1895 or 1905  See (not reproduced; as by an unknown engraver). Cf. Suite et Arrangement (1727), p.2; Duplessis Cabinet du roi (1869), p.7 (noting payments to Chasteau in 1676-77); (IFF 17 Chasteau, 16). For Poussin’s painting, see Louvre cat.IV (1986), p.144, Inv.7292 and For a well-referenced account of the historical background, see
Skip to main content 5G is not the Enemy Thence, radio signals, television pictures, and long-distance communication boomed. In 1895, a German physicist was experimenting with electricity and stumbled upon another part of the spectrum. He found, that these new rays (he called them X for unknown) were capable of penetrating several objects including the human body, and with the photography (which uses light) of his time, pictures could be made from the unknown rays when it strikes an object. Today, the importance of x-rays in medical imaging to doctors cannot be overstated. Of those seven-spectrums listed, all the frequencies up until ultraviolet are considered non-ionizing. In other words, they are safe. They don’t cause adverse health reactions from interacting with them. 5G is safe The radiofrequency (RF) which includes radio and microwave radiation is the technology 5G is built on and not Uv, Xray, or Gamma rays. Therefore any claims of 5G and causality with the coronavirus are untrue. The World Health Organization (WHO) has already debunked such claims 5G is part of the non-ionizing spectrum.  It is abundantly safe at the frequency it emits. A substantial part of the world’s economy is hinged on the technology of electromagnetic radiation harnessed to drive various applications. The worldwide web, autonomous vehicles, weather stations, radar, instant communication, and many more fields coopt the wonders of both ionizing and non-ionizing radiation to make life easier. Our phone signals work now as they did from the time of Marconi and co; take advantage of radio waves that are all around us. We are safe embracing 5G since the technology play on the non-lethal radio/MW network. Fear and loathing of this technology must be discouraged. Popular posts from this blog President Trump and the Environment Primer on Climate change, Global warming and other related matters Covid 19; Disease Spread and care for the Earth It is yet another Earth day commemoration. But this time for a lot of communities around the world, the events are being marked sombrely.  Nearly all of earth's human citizens, over 7 billion of us are hunkered in waiting for the worst of this deadly invisible virus to pass. Lives have been lost, the global economy decimated as the disease now officially a pandemic continues to take no prisoners. At a time such as this, once the crisis is over we need to put aside our old ways of doing things. It has brought us immense benefits but also great harm. Our airs are polluted, watershed poisoned, some of the natural resources depleted to extinction. Unsustainable politico-economic system and population explosion being the major culprits. None is advocating communism but certainly, unregulated capitalism is equally as bad. Some  studies   have shown that deforestation pushes the spread of vectors. While epidemiologists are still working their way to understanding the novel vir
Daylight in Buildings Recycling daylight Fernanda Tapia, Ámbar Cisternas, Belén Arellano Amaya Glaria, Francisco Ibarra Universidad Técnica Federico Santa María Recycling daylight Project Description Proposal focused on slums and populations of high density deprived of sunlight and quality of life, in this case our project is located in Dharavi, a suburb located towards the north of Bombay in India, contemplating the third most dense, poor and contrasting slum in the world. Bombay's population has almost doubled since 1991 to over 20 million people, and it is estimated that over half of the city's population lives in slums or on the streets. There are approximately 400,000 inhabitants per square kilometre, where only 24 per cent of the population has access to safe water and more than half the population lives on 6 per cent of the available land. An inevitable densification of the city compromises the quality of life, well-being and health of the people. Dharavi, which occupies the most valuable and coveted land in Mumbai, is its productive heart. Its narrow streets hide more than 15,000 one-room factories, which produce remarkably sophisticated goods for shopping malls and brands in the US and Europe. In addition to the ceramics and textile industries in Dharavi, there is a growing recycling industry that processes recyclable waste from other parts of Mumbai. In this labyrinthine neighbourhood, plastics from all types of packaging are shredded and discoloured and made into reusable materials. The project consists of a zenithal opening linked to a light duct made of bottles filled with water mainly for the diffusion of sunlight and perimeter elements to direct it according to people's needs. With this project we seek to increase the quality of life and health of the inhabitants by bringing natural light into the homes in a simple and economical way. Do it yourself!
Self-direction is an approach to life and learning that involves connection with and listening to the self, and that voice within, combined with a sense of personal empowerment to explore that insight. It places the responsibility for learning and education with the learner them-self, rather than an external figure of authority such as a teacher. Self-direction is an approach that seeks to enable a person to be in greatest alignment with their own sense of purpose and drives.  Democratic Education Democratic education seeks to make democratic practice an embedded part of a culture/community. At the Cabin we practice democratic principles through our opening and closing meetings and group decision making processes, through our interest in learning all sides and voices within our community, and work towards reaching consensus based solutions to problems when that is required. Everyone in the community matters and everyone has a voice.  Consent-Based Education (CBE) CBE enables children to say yes or no to what they participate in, and also to be able to reflect and change their minds. Consent Based Education can only exist in environments that are trust and accountability based as opposed to fear-based, where there is no coercion, reward or punishment system in place, and where choices can be made as freely as possible within a community context. At the Cabin we endeavour to provide children with the information that they need/ask for in order to be able to make informed choices. CBE places in high regard the spiritual, emotional, intellectual, and bodily agency and autonomy of all people, whatever their age or stage, and acknowledges the personal boundaries that accompany that.  Ed(ucation) Positivity Ed Positivity combines consent culture with the deconstruction of subject silos, and addresses biases that presume that there is some information/knowledge/activity that is inherently superior or suitable for children as opposed to other information/knowledge/activity. An Ed Positive approach welcomes questioning, curiosity and interdisciplinary thinking and doing. It embraces exploration and critical thinking, and is open minded to the many different motivations, needs and manifestations of an individuals path to seeking knoweldge, solving problems and learning in general. Ed Positivity respects all learners’ unique, personal and often private journeys in understanding the world around them and their role in it.  Children’s Rights The UK signed the UN Convention on the Rights of the Child on 19 April 1990, ratified it on 16 December 1991, and it came into force on 15 January 1992. Everyone has a duty to uphold the rights in the convention, and at the Cabin we take our responsibility as ‘duty bearers’ seriously. The UNCRC influences our policies and practice, and we endeavour through our language, behaviour and mindset to create a rights respecting environment and culture. Everyone is entitled to know about children’s rights, and we work to share rights based information with each other, the children and families that are part of the Cabin community.
Skip to content Related Articles Related Articles Save Article Improve Article Save Article Like Article Tensorflow.js tf.constraints.unitNorm() Function • Last Updated : 21 Jul, 2021 The tf.constraints.unitNorm() function us used to create a unitNorm() constraint. It is inherited from constraint class. Constraints are used as attributes for creating tf.layers.Layer. unitNorm constraint constrains every hidden unit which are instance of this weight to have unit norm. • args: It specifies the object containing configurations. 1. axis: It specifies the axis along which to calculate norm. Return value: It returns tf.constraints.Constraint. Example 1: // Importing the tensorflow.Js library import * as tf from "@tensorflow/tfjs" // Use unitNorm() function const constraint = tf.constraints.unitNorm({axis :1}) // Print "defaultAxis": 0, "axis": 1 Example 2: In this example we will create a dense layer using unitNorm constraint. // Import tensorflow.js import * as tf from "@tensorflow/tfjs" // Create a new dense layer using unitNorm constraint const denseLayer = tf.layers.dense({     units: 4,     kernelInitializer: 'heNormal',     kernelConstraint: 'unitNorm',     biasConstraint: 'unitNorm',     useBias: true // Create input tensor const input = tf.ones([2, 2]); // Apply dense layer to input tensor const output = denseLayer.apply(input); // Print the output [[0.3154395, 0.3988628, 1.3295887, -0.0849797], [0.3154395, 0.3988628, 1.3295887, -0.0849797]] My Personal Notes arrow_drop_up Recommended Articles Page :
Micronewtons to Newtons Conversion Enter the force in micronewtons below to get the value converted to newtons. Results in Newtons: Loading content. 1 μN = 1.0E-6 N How to Convert Micronewtons to Newtons To convert a micronewton measurement to a newton measurement, divide the force by the conversion ratio. Since one newton is equal to 1,000,000 micronewtons, you can use this simple formula to convert: newtons = micronewtons ÷ 1,000,000 The force in newtons is equal to the micronewtons divided by 1,000,000. For example, here's how to convert 5,000,000 micronewtons to newtons using the formula above. 5,000,000 μN = (5,000,000 ÷ 1,000,000) = 5 N Micronewtons and newtons are both units used to measure force. Keep reading to learn more about each unit of measure. One micronewton is equal to 1/1,000,000 of a newton, which is equal to the force needed to move one kilogram of mass at a rate of one meter per second squared. The micronewton is a multiple of the newton, which is the SI derived unit for force. In the metric system, "micro" is the prefix for 10-6. Micronewtons can be abbreviated as μN; for example, 1 micronewton can be written as 1 μN. The newton is a unit to for measuring force equal to the force needed to move one kilogram of mass at a rate of one meter per second squared.[1] The newton is the SI derived unit for force in the metric system. Newtons can be abbreviated as N; for example, 1 newton can be written as 1 N. Newtons can be expressed using the formula: 1 N = 1 kgms2 Micronewton to Newton Conversion Table Micronewton measurements converted to newtons Micronewtons Newtons 1 μN 0.000001 N 2 μN 0.000002 N 3 μN 0.000003 N 4 μN 0.000004 N 5 μN 0.000005 N 6 μN 0.000006 N 7 μN 0.000007 N 8 μN 0.000008 N 9 μN 0.000009 N 10 μN 0.00001 N 100 μN 0.0001 N 1,000 μN 0.001 N 10,000 μN 0.01 N 100,000 μN 0.1 N 1,000,000 μN 1 N 1. Z. J. Jabbour and S. L. Yaniv, The Kilogram and Measurements of Mass and Force, Journal of Research of the National Institute of Standards and Technology, https://www.nist.gov/system/files/documents/calibrations/j61jab.pdf
Why It’s Important To Talk To Your Baby Every parent wants to give their child a jump start on life. Perhaps that is why educational tools and devices for babies and children are a big business. But, did you know that one way to make your baby smarter doesn’t cost you anything? Believe it or not, the key to brain development is as simple as talking with your baby. “Research has shown that talking with children from an early age helps to build the brain architecture they will need later in life,” said Kris Arizmendi, coordinator of the Talk With Your Baby (TWYB) program that offers free classes in South Bend, Ind. Kris shared how the simple act of talking to a baby can promote a child’s social, emotional and cognitive development. Why is it important to talk to your baby? Kris: In the first three years of life, a child’s brain will triple in size and will make millions of the connections necessary for talking, reading, writing and almost every other aspect of development. Talking with you child improves his cognitive development and literacy later in life, as well as increases his ability to form healthy relationships and develop social skills. Parents and caregivers are a baby’s first and best teacher in matters of building trust, dealing with emotional and physical needs and interacting with others in positive ways. It has been shown that it is the human interaction that matters and works best—they can’t learn from television or tapes! What sort of advantages does a baby who is spoken to a lot have over one who doesn’t hear much conversation? Kris: In one of the most telling studies to date, researchers followed parents and their young children from a wide variety of families and documented the frequency and substance of the words parents exchanged with their children. What they found is that children from more talkative families will have heard 30 million more words by the time they are 5 years old. That is 30 million more opportunities to build vocabulary, develop early literacy and learn important emotional and social cues. These same children from the talkative families did better on tests of cognitive development and reading readiness in the third grade. How early should a parent start speaking to their baby? Kris: Right from birth! The first three years of life are a “sensitive” period in babies’ brain development. During this time, their brains are like little sponges that soak up everything around them. The more you talk, the more they learn. What are a couple of easy ways parents can speak with their babies? Kris: There are millions of opportunities to talk with your baby throughout the day. Give your baby a play-by-play as you do things and use as many descriptive words as you can. “Time to throw the wet, cold laundry into the dryer!” “Look! Now the clothes are fluffy and warm!” Repeat your words, so that the baby can learn them. For example: “Do you want a bottle? Look here’s the bottle! Is that a good bottle?” The best things you can do are read books, tell stories and sing songs. One of the things TWYB stresses and loves to help parents with is getting that home library started by providing all participants with eight or more books throughout the classes. Make reading a daily habit with your child, even as a baby. If she is familiar with books from the very beginning, reading will become an everyday joy instead of a struggle. What do you say to someone who feels strange about speaking to their baby? Kris: Just because your baby cannot respond to you with words and sentences, doesn’t mean he can’t understand and respond in other ways. It’s not silly to talk with your baby because he is taking in every word you say and adding every interaction to their rapidly developing brain. Speaking and interacting with your child every chance you get isn’t strange—it’s the best thing you can do for your baby’s reading, cognitive and social development. Who can attend the TWYB classes? Kris: TWYB has multiple neighborhood classes that are open to anyone in the community—moms, dads, grandparents, caregivers, childcare providers…everyone is welcome! The classes are also offered at numerous local agencies to the clientele of those agencies. For more information on the TWYB classes and to read tips, go to: talkwithyourbaby.org or www.facebook.com/talkwithyourbaby.
Anticorrosive paint Aug 12, 2021 Anticorrosive paint is a type of paint used on the surface of an object to protect the inside of the object from corrosion. It is a kind of paint commonly used in industrial construction. It is widely used in aviation, shipbuilding, chemical industry, oil pipeline, steel structure, bridge, oil drilling platform and other fields, and is favored by the majority of construction manufacturers. Types, ingredients and characteristics: There are many types of anti-corrosion paints. According to the composition, they can be generally divided into: epoxy anti-corrosion paint, polyurethane anti-corrosion paint, acrylic anti-corrosion paint, inorganic anti-corrosion paint, perchloroethylene anti-corrosion paint, chlorinated rubber anti-corrosion paint, high chlorinated polyethylene anti-corrosion paint; Uses can be divided into: anti-corrosion paint for pipelines, anti-corrosion paint for ships, anti-corrosion paint for metals, anti-corrosion paint for furniture, anti-corrosion paint for automobiles, anti-corrosion paint for rubber; according to the solvent can be divided into: water-based anti-corrosion paint, oil-based anti-corrosion paint; Anti-corrosion paint is a mixture of a variety of water-containing silicate minerals, the main chemical group is Al2O3 and SiO2 two oxides. Al2O3 is mainly derived from clay minerals. In addition to clay minerals, SiO2 also comes from fine-grained quartz. The closer the Al2O3 content and Al2O3/SiO2 ratio to the theoretical value of kaolinite minerals, the higher the purity of this type of clay. It can be used under harsh conditions, and has good durability and weather resistance. It can be used for 10 or 15 years under harsh conditions such as oceans and underground, even in acid, alkali, salt and solvent media, and It can be used for more than 5 years under certain temperature conditions. The more kaolinite in the clay, the better its quality. The higher the refractoriness of the clay, the wider the sintering melting range of the clay. The main impurities in clay are oxides of alkali metals, alkaline earth metals, iron and titanium, and some organic matter. Various oxides have a fluxing effect and will reduce the refractoriness of raw materials. Therefore, the lower the content of impurities in the clay, especially the content of Na2O and K2O, the higher the refractoriness. There are many types of clay minerals, but they usually only consist of 5-6 kinds of minerals. The main mineral is kaolinite. Common impurity minerals include quartz, hydromica, iron-containing minerals, feldspar, rutile and so on. Impurity content and uniformity of distribution affect the fire resistance of clay. The anticorrosive paint will undergo a series of physical and chemical changes during the heating process, such as decomposition, transformation, recrystallization, etc., accompanied by volume shrinkage. These changes have an important impact on the process and properties of clay products. The clay raw materials in my country, whether it is hard clay, soft clay or semi-soft clay, are mainly kaolinite type. Therefore, the heating change of clay is essentially the heating change of kaolinite and the physical and chemical reaction between kaolinite and impurity minerals. Hard clay clinker is the main raw material of clay refractory materials. It is usually obtained by calcination in an inverted flame kiln, a rotary kiln, or a shaft kiln with the hard clay raw material blocks that are directly mined. In addition to the chemical composition, the production of refractory materials requires clay clinker to have high bulk density, low porosity, low water absorption, and full sintering. Therefore, the calcination temperature and holding time have a significant impact on the quality of clay clinker. When the calcination temperature is 1200~1250 degrees Celsius, the clinker volume density and porosity index are the best. When the temperature is greater than 1350 degrees Celsius, the bulk density decreases and the porosity increases, because cristobalite is produced in large quantities at this time, and the volume expands. At the same time, the clinker block is cracked due to the development of the charred gem layer. The main mineral phase of the anticorrosive paint hard clay is mullite. It accounts for 35%~55%, by glass phase and cristobalite. click here to leave a message Leave A Message
Women Baking Pioneers Did it Their Way They faced enormous odds in building businesses during challenging times, but somehow they succeeded. Pioneering women leaders in commercial baking developed iconic brands with robust followings as they founded and grew companies. They overcame major hurdles in their own unique ways. These included identifying nontraditional solutions, teaching themselves about the business world and navigating within male-dominated industry sectors. They achieved all this in eras when women were typically expected to focus on traditional roles such as mother and wife. The latest edition of American Bakers Association’s podcast Bake to the Future spotlights two unique female leaders. They are Dora Schwebel, who co-founded Schwebel Baking Company in the early 1900s, and Margaret Rudkin, who started Pepperidge Farm in the late 1930s. To read the rest of the story, please go to: American Bakers Association
The Web 3 Experiment: A Decentralized Internet “Web3 is a more intelligent version of the internet, built on the principle of decentralization. If you’re not familiar with decentralization, try thinking of it simply as the ability of a group to function without reliance on a central authority. Banks, governments, and businesses are all examples of centralized entities. At the core of decentralization is a push toward individual freedom. Not freedom to, but freedom from. The distinction is important.”––NFTs Are Worth Understanding If you think today’s internet is absolutely perfect with no need of an upgrade, this is what you sound like: Theories are created by rearranging, combining, and adding to existing ideas. That’s what makes crypto and the decentralized web so exciting. It combines culture with technology to create something new. The versions of the internet so far: • Web 0: a time before online • Web 1: users needed to buy their own servers to connect online—while hosting on their own domain • Web 2: visiting hosting platforms like Facebook or Google to distribute our content while using their servers––in exchange for all data involved • Web 3: a peer-to-peer network where you don’t rely on centralized servers to hold your data. All content is addressed and verified on a blockchain for every user to own To summarize the web 3 experiment: today’s internet is reinventing the wheel into something better: Web 2 Problems Two forces that effect how the web 2 model works: 1. The server problem — To upload files on the internet, you need a server. Most folks don’t have a server so we rely on hosting services like TikTok, YouTube, and Twitter to post online content. These platforms are convenient, but it concentrates user content, data, and demand to just a handful of providers. The centralized infrastructure of the internet is problem #1. 2. Host-based addressing model — This relates to how we address content online. If you upload a YouTube video, the URL of that video is tightly bound to YouTube’s platform: You need a seperate account on Facebook to upload the same video there: The lack of interoperability between online platforms is problem #2. Web 3 Solutions With the use of peer-to-peer networks, open-source code, blockchains, hash signatures, and merkle trees––web 2 problems become solvable: 1. Blockchains are large data sets, split into smaller chunks, and distributed across a network of peers. The peers then share the responsibility of maintaining the network through consensus. Blockchains solve the central server issue by letting users collectively validate information. There’s no need for a single platform authorizing every transaction. 2. Merkle trees are used in blockchains to track and verify data integrity. They prove online content by attaching a unique ID (hash) to the media. This creates tiny interpretations from the large data stored in blockchains. Hash signatures are unique to every file. It serves to address any online content from the time it was published. This dramatically improves web 2’s host-based model. Merkle trees solve the coordination problems that come with verifying data. Everything can be traced back to mathematically prove the authenticity of any file connected to the tree: Bitcoin is an example of this. We’ve never before seen a financial system worth billions — without any centralized governance or authority to support it. No one argues the amount of BTC in rotation because it’s proven by merkle trees and immutably displayed on-chain. This will apply to social capital on the web.
Red light therapy (RLT) uses red low-level wavelengths of light to treat a variety of skin problems, from cosmetics issues, like improving the appearance of stretch marks and wrinkles, to treating serious conditions, such as slow-healing wounds and the side effects of chemotherapy. Originally, it was used by scientists to grow plants, where they discovered that it promotes growth and photosynthesis. They then used this to increase the energy inside human cells in the hope of treating muscle atrophy, slow wound healing, and problems with bone density caused by space travel. Today, RLT is used for a wide array of conditions, particularly problematic skin. How does RLT work? A lot of research has been done into RLT, but there’s still a lot to learn about how it works. It’s believed that RLT produces a biochemical effect in cells that results in mitochondria strengthening. Mitochondria are the parts of a cell where energy is created. The molecules that carry this energy in cells is known as ATP. By making mitochondria work more effectively, a cell can make more ATP. Essentially, what this means is that cells will have more energy, which means they can function better to rejuvenate themselves and repair damage. What can RLT be used for? Using RLT is considered an experimental treatment, as research into it is still being conducted, but there is enough evidence to show that is can be used for plenty of conditions. Skin conditions include wound healing, ulcers, psoriasis, preventing cold sores caused by the herpes simplex virus, and improving scar tissue appearance and tightness. Cosmetically, it can also help with the skin’s complexion and build up collagen to help with the appearance of wrinkles. RLT can promote hair growth for androgenic alopecia, and provide pain and inflammation relief for rheumatoid arthritis, osteoarthritis, carpal tunnel syndrome and Achilles tendons. RLT can also be used to prevent oral mucositis and other side effects caused by cancer treatments, as it helps to activate some of the medicines used. Are there any side effects? Laser and pulsed light therapies work by damaging the outer layers of the skin in a controlled way to promote tissue repair. The good thing about RLT is that it doesn’t cause any damage, yet still stimulates the cells to have the same results as other light therapies. Generally, RLT is safe and painless, but some people have experienced burns and blistering. However, most of these have been caused by people falling asleep on RLT beds in salons or using devices with faulty wires or corrosion that shouldn’t have been used in the first place. There’s a risk of RLT causing damage to the eyes, the same as other laser therapies do, so wearing eye protection is essential during treatments. Where to get RLT treatments Where you get RLT treatment will depend on what you want to use it for. For cosmetic treatments, there are plenty of salons, gyms, and spas that have options available, including the use of RLT beds. You can also buy your own devices to use at home, but if you plan to do this, make sure it’s an FDA approved product. These are generally used for treating the signs of aging and improving complexion. For conditions that need targeted and more intense treatment, you should see a dermatologist. It’s likely you’ll need several treatments before any difference is noticeable. For serious medical conditions, like psoriasis, using RLT for pain relief and cancer-related treatments, you should discuss the options with your doctor. Currently, RLT isn’t covered by insurance companies as its effectiveness is still questionable, but some providers will cover its use for cancer patients. Despite still being considered an experimental treatment, there’s plenty of research to prove the effectiveness of RLT. You should always speak to a dermatologist or doctor before self-treating, particularly for more serious conditions, but RLT does offer promising results.
A paradox is a seemingly absurd or impossible concept, proposition, or A paradox is a seemingly absurd or impossible concept, proposition, or theory that is often difficult to understand or explain, sometimes apparently self-contradictory, and yet ultimately correct or true. et al. Front Pharmacol 3:141, 2012; Eisenberg et al. Nat Med 22(12):1428C1438, 2016)?: the so-called, French Paradox. Doubtless, the truth is not a duality and epistemological bias probably generates apparently self-contradictory 607742-69-8 manufacture conclusions. Perhaps nowhere in biology are there so many apparently contradictory views, and even experimental results, affecting human physiology and pathology as in the fields of free radicals and oxidative stress, antioxidants, foods and drinks, and dietary recommendations; this is particularly true when issues such as disease-susceptibility or avoidance, healthspan, lifespan, and ageing are involved. Consider, for example, the apparently paradoxical observation that treatment with low doses of a material that is harmful at high concentrations may actually induce transient adaptations that protect against a subsequent contact with exactly the same (or equivalent) toxin. This particular paradox is now mechanistically explained as Adaptive Homeostasis (Davies Mol Asp Med 49:1C7, 2016; Pomatto et al. 2017a; Lomeli et al. Clin Sci (Lond) 131(21):2573C2599, 2017; Pomatto and Davies 2017); the non-damaging process by which an apparent toxicant can trigger biological transmission transduction pathways to increase manifestation of protective genes, by mechanisms that are completely different from those by which the same agent induces toxicity at high concentrations. With this review, we explore the influences and effects of paradoxes such as the Oxygen Paradox and the French Paradox within the etiology, progression, and outcomes of many of the major human age-related diseases, as 607742-69-8 manufacture well as the fundamental biological trend of ageing itself. and appear to engage in related regulatory interactions as with vertebrates (Sykiotis and Bohmann 2008). The Nrf2 pathway works well in young flies, where it induces proteasome manifestation and improved oxidative stress resistance. This important mechanism of adaptive homeostasis is definitely seriously abrogated in old age. Interestingly, inducible activation of Nrf2 in transgenic flies upregulated basal proteasome manifestation and activity, individually of age and conferred resistance to proteotoxic stress. Continuous Nrf2 overexpression, however, reduced longevity indicating that excessive activation of the Rabbit Polyclonal to MLTK proteostasis pathways can be detrimental (Fig. ?(Fig.2)2) 607742-69-8 manufacture (Tsakiri et al. 2013b). Open in a separate windows Fig. 2 Adaptive homeostasis and nrf2 dependent stress responses decrease with age. During cellular homeostasis in young organisms and cells, nuclear element (erythroid-derived 2)-like 2 (Nrf2), the expert stress-responsive transcriptional activator, is definitely retained in the cytosol bound to the Keap1-Cul3 complex, which contains a ubiquitin E3 ligase. In the absence of stress in young cells (top left panel) Nrf2 is definitely polyubiquitinylated, tagging it for degradation with the ATP-dependent 26S Proteasome, and stopping Nrf2 translocation in to the nucleus. Concurrently, because the Nrf2 proteins undergoes speedy turnover, the gene is continually transcribed and translated, and de novo Nrf2 will Keap1-Cul3 complexes, allowing cells to truly have a continuous way to obtain Nrf2. At exactly the same time, cells preserve sizeable private pools of both 20S and 26S types of the Proteasome for (different types of) proteins clearance. During intervals of oxidative tension in youthful cells (best right -panel), Nrf2 is normally released in the Keap1-Cul3 complicated and phosphorylated, and translocated in to the nucleus. Once within the nucleus, Nrf2 binds towards the antioxidant response component (ARE), also known as the electrophile response component (EpRE), resulting in the transcriptional upregulation of tension responsive enzymes, like the 20S Proteasome. With age group, however (bottom level left -panel), the capability to mitigate harm declines, leading to an overall upsurge in baseline irritation (symbolized with the red background). Furthermore, the pool of obtainable Proteasomes (both 20S and 26S) is normally diminished, as a particular percentage become inactive after binding to indigestible proteins aggregates. The shortcoming to eliminate all cellular harm promotes the deposition of proteins aggregates, thus additional diminishing the obtainable pool of Proteasome. During intervals of acute tension in aged cells (indicated with the darker red background in underneath right -panel), cellular restrictions from the stress-response program become noticeable, as binding of Nrf2 to ARE/EpRE sequences diminishes. Reduced binding performance of Nrf2 to ARE/EpRE sequences could be because of Nrf2 competitors such as for example c-Myc and Bach1. The web result is considerably decreased capability to rapidly upregulate focus on stress-responsive genes, further marketing proteins aggregation, reduced proteostasis, and inadequate adaptive homeostasis Another mobile. Leave a Reply
Aide-de-camp explained An aide-de-camp (; French expression meaning literally "helper in the [military] camp"[1]) is a personal assistant or secretary to a person of high rank, usually a senior military, police or government officer, or to a member of a royal family or a head of state. An aide-de-camp may participate at ceremonial functions, and the first aide-de-camp is typically the foremost personal aide. This is not to be confused with an adjutant, who is the senior administrator of a military unit. The badge of office for an aide-de-camp is usually the aiguillette, a braided cord in gold or other colours, worn on the shoulder of a uniform. Whether it is worn on the left or the right shoulder is dictated by protocol. In some countries, aide-de-camp is considered to be a title of honour, which confers the post-nominal letters ADC, A.D.C.[1] or A de C. In Argentina, three officers (one from each armed service, of the rank of lieutenant colonel or its equivalent), are appointed as aide-de-camp to the president of the republic and three others to the minister of defense, these six being the only ones to be called edecán, which is one Spanish translation for aide-de-camp (edecán is a phonetic imitation of the French term; ayudante de campo is a word-for-word translation). A controversy was raised in 2006, when president Néstor Kirchner decided to promote his army aide-de-camp, Lieutenant Colonel Graham to colonel, one year ahead of his class. Upon taking office, former president Cristina Kirchner decided to have, for the first time, female officers as her aides-de-camp. In each of the armed forces, the chief of staff and other senior officers have their own adjutants, normally of the rank of major or lieutenant colonel, or its equivalent. At unit level, the unit S1 (personnel officer) doubles as the unit commander's adjutant, although in recent times in many units this practice has been left only for ceremonial purposes, while for everyday duties a senior NCO performs the adjutant's activities. An aiguillette is worn on the right shoulder by aides-de-camp and adjutants as a symbol of their position, the colour of the aiguillette depending on the rank of the person they are serving (there are golden, tan, silver and red aiguillettes, as well as an olive-green one for combat uniform). In Belgium the title of honorary aide-de-camp to the king can be granted by the royal court for services rendered. Notable people include Major General Baron Édouard Empain, Count Charles John d'Oultremont, and Lieutenant General Baron Albert du Roy de Blicquy. Commonwealth of Nations countries In the Commonwealth, aides-de-camp are mostly appointed from military or auxiliary services. They are entitled to use the letters ADC or A de C after their names. The emblem of the office is the aiguillette worn on their uniform. Australian Defence Force officers serve as aides-de-camp to specific senior appointments, such as the queen, governor-general, state governors, chief of the Defence Force, and other specified Army, Navy and Air Force command appointments. Honorary aides-de-camp to the governor-general or state governors are entitled to the post-nominal ADC during their appointment. Officers of and above the ranks of rear admiral, major general, and air vice marshal in specifically designated command appointments are entitled to an aide-de-camp with the army rank of captain (or equivalent). Within the navy, an aide-de-camp is called a "flag lieutenant" (as senior naval officers are "flag officers"). In 1973, the governor of Bermuda, Sir Richard Sharples, and his aide-de-camp, Captain Hugh Sayers, were murdered on the grounds of Government House. Aides-de-camp in Canada are appointed to the queen and some members of the royal family, the governor general, lieutenant governors, and to certain other appointments (e.g., Minister of National Defence, flag and general officers, Canadian heads of mission, foreign heads of state visiting Canada). In addition to the military officers appointed as full-time aides-de-camp to the governor general, several other flag/general and senior officers are appointed ex officio as honorary aides-de-camp to the governor general or members of the royal family including: Most aides-de-camp wear a gold-pattern aiguillette when acting in their official capacity; however, members of St. John Ambulance Canada wear silver aiguillettes consistent with their other accoutrements as aide-de-camp or as a symbol of ceremonial representation such as a member of the honour guard or a position of command on parade. All aides-de-camp also wear the cypher or badge of the principal to whom they are appointed. Honorary appointees to the queen (royal cypher) or the prince of Wales, wear the appropriate cypher on their uniform epaulette and are entitled to use the post-nominal letters ADC for the duration of their appointment. Aides-de-camp to the governor general wear the governor general's badge (crest of the arms of Canada) and aides-de-camp to a lieutenant governor wear the lieutenant governor's badge (the shield of the province surmounted by a crown). They are appointed from officers of the Canadian Forces. Aides-de-camp to lieutenant governors are appointed from officers of the Canadian Forces, Royal Canadian Mounted Police and, depending on the province, aides may also be appointed from other uniformed organizations such as municipal or provincial police and emergency services. In certain instances, civilians may be appointed. Non-uniformed civilians do not wear the aiguillette, but do wear their lieutenant governor's badge as a symbol of their appointment. On 29 November 1973, Governor General Roland Michener concluded his initiative to permit aides-de-camp to the governor general and lieutenant governors to use the post-nominal letters A de C for the duration of their appointment. Aides-de-camp to royal and vice-regal personages wear the aiguillette on the right shoulder. Aides-de-camp to all others wear their aiguillette on the left shoulder. In India, officers of the rank of major general and equivalent and above in the sister services who are in command of divisions or of peacetime commands have aides-de-camp who usually belong to their general's parent regiment/battalion. There have been instances where the sons have served a tenure of aide-de-camp to their fathers. In India, aide-de-camp is a title of honour, and current as well as former aides-de-camp are conferred the post-nominal letters ADC. The service chiefs (chief of the Army/Navy/Air Staff) usually have three aides-de-camp and the president of India has five aides-de-camp (three from the Army and one each from the Navy and the Air Force). There is also one honorary aide-de-camp from the Territorial Army. The president may at his or her pleasure appoint any distinguished officer from the armed forces including the service chiefs as honorary aide-de-camp. The governors of the states have two aides-de-camp, one each from the Indian Armed Forces and the Indian and state police services except for the state of Jammu and Kashmir where both the aides-de-camp to the governor are appointed from the Indian Army. An aide-de-camp or adikung as it known locally in Malaysia is appointed by the federal government or the state government from officers of the Royal Malaysian Police or from the Malaysian Armed Forces officers comprising the Royal Malaysian Army, Royal Malaysian Air Force or from Royal Malaysian Navy. There were also non-military or police officers who were appointed as aide-de-camp. New Zealand As in other Commonwealth countries where the queen is head of state, personnel from the New Zealand Defence Force serve as aides-de-camp to royal and vice-regal personages. The governor-general of New Zealand has two full-time aides-de-camp of the rank of army captain, lieutenant RNZN or RNZAF flight lieutenant. Additional and honorary aides-de-camp to the governor-general are of the rank of lieutenant colonel or equivalent. Aiguilettes are of the standard palace  1 type and worn on the right shoulder. Equivalent appointments also serve the minister of Defence, the chief of Defence Force and service chiefs. These are usually known as military assistants (MA) personal staff officers (PSOs) or, in the case of the RNZN, flag lieutenant (flags), and wear service-specific  2 aigullettes with coloured flecks (dark blue for navy, red for army and light blue for air force) on the left shoulder. In Pakistan the president, prime minister and governors have their own aides-de-camp. The aide-de-camp can be from any one of the three Armed Forces and typically are of the rank of captain (army), lieutenant (navy) or flight lieutenant (air force). The aide-de-camp to Justice Khan Habibullah Khan, while he was chief minister and leader of the house of West Pakistan, was his son, a senior bureaucrat, Captain Akhtar Munir Marwat and Captain Gohar Ayub Khan was to his father, President Field Marshal Ayub Khan. The chairman of the Joint Chiefs of Staff Committee and all the three service chiefs are authorised to have an aide-de-camp. In Pakistan, officers of the rank of major general and equivalent and above in the sister services who are in command of divisions or of peacetime commands have aides-de-camp who usually belong to their general's parent regiment/battalion. Papua New Guinea As in other commonwealth realms where the queen is head of state, the governor-general of Papua New Guinea has two full-time aides-de-camp. One is from the Papua New Guinea Defence Force and one from the Royal Papua New Guinea Constabulary of the ranks of PNGDF captain and RPNGC superintendent. In Singapore, the president appoints aides-de-camp from the Singapore Armed Forces (SAF), the Singapore Police Force (SPF) and the Singapore Civil Defence Force (SCDF). Selected SAF officers typically hold the rank of major or military expert 5, selected SCDF officers hold the rank of major, and selected SPF officers typically hold the rank of assistant superintendent of police. Both male and female officers may serve as aides-de-camp. Their duties include assisting in liaison for important guests on behalf of the president and taking care of visiting foreign dignitaries. Sri Lanka In Sri Lanka, the president has an aide-de-camp and an extra aide-de-camp from the three armed services. All general, flag and air officers are entitled to an aide-de-camp, usually selected from their parent regiment or unit. In the navy, an aide-de-camp is called a flag lieutenant. Junior officers (of the rank of major and below) of the armed services who have completed three years of service can be appointed for (extra-regimental) special appointments as an aide-de-camp or extra aide-de-camp for a maximum of three years. Following such appointment, reappointment is not possible until an laps of two years. Medical officers of the rank of lieutenant colonel and above can be appointed as honorary physician to the president or honorary surgeon to the president. The tradition dates back to the office of governor of Ceylon. The governor's staff included an aide-de-camp as a permanent appointment drawing pay from the civil list, usually held by a retired junior officer from a British Army regiment. In addition the governor's staff included the head mudaliyar who served as the native aide-de-camp to the governor on a permanent and honorary (non-paid) basis; as well as several extra aide-de-camp appointed from regiments of the Ceylon Defense Force and later from the Ceylon Royal Naval Volunteer Reserve. With the formation of the office of the Governor-General of Ceylon the practice continued with Ceylon Army officers replacing the British Army officers. At present an officer of the rank of brigadier serves as aide-de-camp to the president, while an officer of the rank of colonel or equivalent serves as aide-de-camp to the defence secretary.[2] In 1992, two Sri Lankan ADCs were killed in active service, and in 2006 an ADC was severely wounded: The president of Tanzania has an aide-de-camp from the Tanzania People's Defence Force, with the rank of kanali (colonel). United Kingdom Historic usage An aide-de-camp (ADC) was defined in 1875 as "a confidential officer attached to the 'personal' or private staff of a general".[3] In the field of battle, he functioned as "the bearer of his chief's written or verbal orders, and when employed as the general's mouthpiece must be implicitly obeyed". In garrison or quarters, however, his duties were more of a social character: "he superintends the general's household, writes and answers invitations, &c." Historically, the appointment pertained only to the Army (in the Navy a flag lieutenant performed equivalent duties: "communicating the admiral's orders to the various ships either personally or by signal").[4] According to a British military dictionary dating from 1816, an ADC usually held rank equal to, or more senior than, an army captain. "Generals, being field marshals have four [aides-de-camp], lieutenant generals two, [and] major generals one". The sovereign, as head of the army, was entitled to appoint "an indefinite number of aides-de-camp". Under Queen Victoria, appointments were made (from both the regular Army and the Royal Marines) in recognition of distinguished war service; the appointment at that time carried with it promotion to the rank of full colonel. Additional, honorary appointments were made from among the officers of the Militia. Notwithstanding the role's army origins, Queen Victoria also appointed a number of "naval aides-de-camp" in "compliment to the sister service". Colonial governors, governors-general and the lord lieutenant of Ireland[1] also appointed aides-de-camp, who had a functional role akin to that of equerries in the Royal Household (in which aides-de-camp have a primarily honorific role). A distinctive and elaborate full dress uniform used to be worn by army aides-de-camp, but its use was largely discontinued after World War I. Present day In the British Army and the RAF, a junior officer may be appointed to serve as aide-de-camp to a senior officer; the equivalent appointment in the Royal Navy is flag lieutenant. Certain of the monarch's representatives, including lord-lieutenants of counties, may appoint their own aides-de-camp.[5] The Royal Household In addition, a fixed number of senior officers may be appointed as aides-de-camp to the queen (or king), an appointment which entitles the holder to the post-nominal letters "ADC". Most of these are serving army, navy, and air force officers, usually of colonel or brigadier rank or equivalent. They are seldom called upon individually to perform specific duties; collectively, they walked in procession at every coronation and state funeral of a monarch in the 20th century.[6] In 1991 the aides-de-camp to the queen numbered sixty: There are also, in addition, specific aide-de-camp appointments held by certain very senior officers, including: These are collectively known as the principal aides-de-camp: the first two are individual naval appointments; then, in the present reign, there have usually been up to three aides-de-camp general ("ADC(Gen)") appointed from the senior ranks of the British Army (one of whom is usually the chief of the General Staff); and up to two air aides-de-camp, from among the senior ranks of the RAF (one of whom is usually the chief of the Air Staff).[7] Principal aides-de-camp, representing the three services, take part along with other members of the Royal Household in the State Processions at State Openings of Parliament, at coronations and at state funerals; and they are occasionally called upon individually to represent the queen at memorial services and on other occasions. Uniform accoutrements Aides-de-camp, along with equerries, military assistants, military attachés and certain other officers, are distinguished by the addition of aiguillettes to their dress uniforms; these differ in size, colour and position of wear, depending on the appointment. In addition, aides-de-camp to the sovereign wear the monarch's royal cypher on their shoulder straps or shoulder boards in various orders of dress. In the cases of personal aide-de-camp to the queen and the principal aides-de-camp, the officers concerned continue to wear the royal cypher after relinquishing the appointment; and if he or she has held the appointment under more than one sovereign then the cypher of each is worn.[8] [9] Otherwise, an officer would cease to wear the accoutrements after his or her appointment as aide-de-camp is relinquished (with the exception that former aides-de-camp to the sovereign appointed before 1988 may also continue to wear the royal cypher). The president, as commander-in-chief of the French armed forces, is served by aides-de-camp. In general, there are three, including one who traditionally serves in the French Army, and all of whom are at the rank of lieutenant colonel. In essence, their mission is to transport the briefcase permitting the use of nuclear weapons. They can also provide general assistance to the president: For instance, at times aides-de-camp are seen placing the president's speech on his lectern when he arrives, or holding up notes during award ceremonies to remind him of the official words to be pronounced when handing over medals. When the president travels, an aide-de-camp often rides in the front passenger seat of the presidential car. He is one of the people who are physically closest to the president. Hong Kong The Hong Kong Police Force, the Fire Services Department, the Customs and Excise Department, the Immigration Department, the Government Flying Service, the Civil Aid Service, the Hong Kong Auxiliary Police Force, the Auxiliary Medical Service, the St. John Ambulance Brigade, and the Correctional Services Department each sends an aide-de-camp to the territory's chief executive, which replaced the governor in 1997. On the last day of British rule in Hong Kong on 30 June 1997, the police aide-de-camp to Governor Chris Patten, presented Patten with the flag at Government House. He then gave the Vice Regal Salute before proceeding, with the Pattens, to leave Government House for the last time. Imperial Russia In the 18th-century, under Catherine the Great of Russia, favourites of the Empress were frequently appointed as her aides-de-camp. In Indonesia, an aide-de-camp (Ajudan Presiden or "President's Adjutant") to the president and vice president of Indonesia is provided by officers from the Indonesian National Armed Forces, with the rank of colonel, and/or the Indonesian National Police, with the rank of Police Grand Commissioner. They are tasked with providing staff support and daily administrative services to the president and vice president as well as to their spouses, either in their official capacities or for personal affairs.[10] [11] They are recognized by their golden aiguillettes. Other VIPs in Indonesia, such as ministers and other important government officials, are also provided ADCs who are usually junior-ranking officers, such as lieutenants in the military, or police inspectors from the police, who are generally newly graduated from the military and/or police academies. ADCs for regional officials, such as governors and Mayors/Regents, are provided ADCs from new graduates of the Institute of Domestic Governance (IPDN). The president of Ireland, as supreme commander of the Irish Defence Forces, is served by aides-de-camp who assist with day-to-day presidential duties, accompany the president on official public engagements in Ireland and on state visits abroad, and represent the president at funerals and on state occasions. There is an ADC on duty 24/7 at Áras an Uachtaráin.[12] See main article: Aide-de-camp to the Emperor of Japan. From 1896 until the end of World War II, the emperors of Japan had army and naval aides-de-camp. The president, as commander-in-chief of the Portuguese armed forces, is served by three aides-de-camp, one from the Portuguese Army, one from the Portuguese Navy and one from the Portuguese Air Force. These aides-de-camp integrate the Presidential Military Household.[13] [14] Portuguese aides-de-camp never stay for more than one presidential term, i.e. five years, after which the return to their respective branches. In the absence of any regulations on the exact functions pertaining aides-de-camp in Portugal, those who President Jorge Sampaio in the performance of his official duties, prepared a document with the "description of the position of aides-de-camp to the President of the Republic", which has become a reference to those beginning their functions and also as a reference for the Presidencies of the Republic in countries with friendly diplomatic relations with Portugal. Portuguese aides-de-camp will perform the following duties when serving the Portuguese President:[15] 1. Accompany the President on his journeys, ceremonies and other acts 2. Receiving the entities that have audiences with the President 3. Collaborate in ceremonies awarding decorations to national and foreign bodies and institutions; 4. Accompany the President of the Republic in all military ceremonies 5. Collaborate, whenever necessary, in the preparation of the President of the Republic's journeys both within Portugal and abroad 6. Perform the functions of aide-de-camp with the foreign Heads of State on state visits to the national territory; 7. Accompany the reception of new ambassadors, resident and non-resident, in the ceremony of presentation of credentials 8. Accompany the First Lady on official occasions 9. Collaborate, whenever necessary, with the Military Advisory in works, studies or opinions 10. Perform other tasks expressly determined by the President of the Republic. The Royal Thai Aide-De-Camp Department is a royal service agency under the Royal Security Command. It is responsible for organizing royal appearances and maintaining the safety of the Thai royal family. Royal Thai aides-de-camp are also appointed to senior officers of the Thai Army, Navy, and Air Force. King Chulalongkorn initiated the Royal Guard in 1870, during his visit to Singapore and Indonesia. He had Lieutenant General Prince Suksvasti serve as his aide, and Prince Suksvasti is considered the first Thai aide-de-camp.[16] United States Military officers are assigned as aides to the secretary of the Army, secretary of Defense, vice president, and president of the United States. For government officials with more than one aide, the senior-ranking aide usually coordinates the activities of the other aides as well as personal attendants such as drivers or orderlies. The president has six military aides, one from each of the armed services. The president's aides from the Army, Marine Corps, Air Force and Space Force are majors or lieutenant colonels, and the aides from the Navy and Coast Guard are lieutenant commanders or commanders. One of their major roles is to hold the presidential emergency satchel. In addition to the six permanent aides-de-camp, there are some 40–45 military social aides holding more junior ranks from lieutenant to major. Their appointment is temporary and part-time, serving for perhaps two to four afternoons a month as required, for social purposes such as gatherings hosted at the White House. Within the United States Army, aides-de-camp are specifically appointed to general-grade officers (NATO Code OF-6 through OF-10). The usual tour of duty for aides is up to two years. Although Congress has authorized general officers to be assigned up to three officer aides, their number and rank being contingent upon the general's grade, Army regulations have traditionally limited each general to a single officer aide. Some generals are also authorized to have enlisted aides on their staff. A general, based on his or her grade, may choose for an aide-de-camp any commissioned officer up to the following maximum rank: Brigadier general first lieutenant Major general Lieutenant general lieutenant colonel Chief of staff, U.S. Army lieutenant colonel, and four authorized enlisted aides General of the army lieutenant colonel, and three authorized enlisted aides Lieutenant colonels and colonels in command of units (battalions and brigades, respectively) do not have aides. Occasionally, the unit's adjutant (S1) will assist the commanding officer as an aide, but this is uncommon. A general of the army does not retire and remains an officer of the United States Army for life,[17] and is entitled to an aide. U.S. Army aides-de-camp wear a special device in place of the branch-of-service insignia (e.g., infantry, artillery, quartermaster) that they would otherwise wear on the lapels of their service uniform. The rank of the general officer being served is indicated on the device worn by the aide-de-camp, as illustrated below. Although the chief of staff of the Army and the chairman of the Joint Chiefs of Staff are O-10 positions, their aides-de-camp wear devices specific to those offices, rather than the normal four-star aide device. Also, an aide-de-camp wears a special aiguillette on the shoulder of his or her dress uniform. In the United States Navy, the aide-de-camp to an admiral is also known as a "flag aide" (command ashore) or "flag lieutenant" (command afloat). The highest honor of the U.S. state of Tennessee is "Colonel Aide de Camp". These colonels serve as the personal aides-de-camp to the governor of Tennessee, and their appointments are recorded by the Secretary of State of Tennessee with those who have been commissioned into the State Guard and Tennessee National Guard.[18] See also Further reading Notes and References 1. Aide-de-Camp . 1 . 435. 2. Web site: High-level Sri Lankan Defence delegation attends International Military Technical Forum "ARMY-2019", meets top Russian Defence officials . . 25 May 2021. 3. Book: Encyclopaedia Britannica . 1875 . Adam and Charles Black . Edinburgh . 425 . 9th. 4. Book: American Revisions and Additions to the Encyclopaedia Britannica . 1893 . The Werner Company . Chicago. 5. Army Dress Regulations 2017, Part 10. 6. [London Gazette] 7. Book: Allison . Ronald . Riddell . Sarah . The Royal Encyclopedia . 1991 . Macmillan Press . London . 0-333-53810-2 . 7. 8. Naval Dress Regulations, 2018. 9. Uniform, dress and appearance regulations for the RAF, 2004. 10. Regulation of the Minister of the State Secretariat of The Republic Of Indonesia Number 12 Year 2016 Concerning Instructions for the Implementation of the Administration of The President/Vice President and spouses 11. Web site: Pemeriksaan Psikologi Calon ADC Presiden RI Beserta Ibu, dan Calon ADC Wakil Presiden RI Beserta Ibu . Indonesian National Armed Forces . 2014 . Indonesian. 28 August 2021. 12. Web site: What/Who is an ADC? . President of Ireland . 3 June 2020. 13. Web site: Leal. Tenente-general José Manuel Santos Faria. A Casa Militar da Presidência da República. 8 June 2021 . Revista Militar. en. 14. Web site: Portuguesa. Presidência da República. Serviços de Apoio. 8 June 2021 . pt. 15. Web site: Ajudante de campo da Marinha evita queda de Marcelo. 8 June 2021 . pt-pt. 16. News: สำรวจโครงสร้าง "ราชการในพระองค์" ก่อนปรับโครงสร้างใหม่ . Structure of His Majesty's Civil Service Before Prospective Changes . 20 April 2017 . BBC . th . 17 October 2019. 17. Grant Harward (2018) William Beaumont Army Medical Center 18. Web site: Mathis appointed Colonel Aide de Camp . Staff . The Newport Plain Talk . 27 February 2020 . 16 April 2020.
Dynamic Balancing Dynamic balancing decreases vibration levels, prevents bearing damage and increases lifecycles of rotating equipment. Balancing can be done in-situ or in house. More Information... Explain Dynamic Balancing A rotating system of mass is in dynamic balance when the rotation does not produce any resultant centrifugal force or couple. The system rotates without requiring the application of any external force or couple, other than that required to support its weight. If a system is initially unbalanced, to avoid the stress upon the bearings caused by the centrifugal couple, counterbalancing weights must be added. This is commonly done, for example: in the case of an automobile tire, where the imbalance is due to imperfections of manufacture that make the tire composition inhomogeneous Why Bother Balancing When an unbalanced system is rotating, periodic linear and/or torsional forces are generated which are perpendicular to the axis of rotation. The periodic nature of these forces is commonly experienced as vibration. These off-axis vibration forces may exceed the design limits of individual machine elements, reducing the service life of these parts. For instance, a bearing may be subjected to perpendicular torsion forces that would not occur in a nominally balanced system, or the instantaneous linear forces may exceed the limits of the bearing. Such excessive forces will cause failure in bearings in short time periods. Shafts with unbalanced masses can be bent by the forces and experience fatigue failure. Under conditions where rotating speed is very high even though the mass is low, as in gas turbines or jet engines, or under conditions where rotating speed is low but the mass is high, as in ship propellers, balance of the rotating system should be highly considered, because it may generate large vibrations and cause failure of the whole system. Videos & Media... Dynamic Balancing Our Products... Dynamic Balancing Product Group : Dynamic Balancing • Two or Three Planes • Balancing Grade within G1.0 • Reduce Vibration • Increase Running Speed
Online games are video games that can be played online or on personal computers or personal digital assistants (PDAs). Online games are very popular for all ages, from elementary school children to adults. An online game is usually a purely online video game that either largely or partially is played via the Internet or some other computer network. These games may involve real-life gambling, trading, or work-related challenges. Online games are usually very competitive and many of them can be downloaded for free. There are four different kinds of online games: multiplayer games, text-based games, visual designs, and flash games. Multiplayer online games are those in which two or more people can interact with each other through an Internet connection. These are often based on a theme and the interaction can be both public and private. The word “Multiplayer” in the title refers to the fact that the game can actually be played between two or more computers. Some of the most popular multiplayer games are EverQuest, DayZ, EverQuest II, and DayZ: Boiled Leather Part II. Click here for more information about Text-based games are games that give the player text commands that must be followed while playing the game. These are often basic commands such as “Go Home” or” Kill X enemy.” They are designed to be easy to learn and are often very addictive. Many of these text-based online games can also have other players involved in local or global battles. Some popular text-based online games include Abalone and the classic Lemonade Tycoon. Visual designs and game-based instruction is used to teach students about concepts and strategies through an interactive medium. Many online games to refer to games that are played over some type of computer network, most often the internet. These types of online games often require the use of a microphone, an internet browser and a fairly high resolution monitor. Most of the time, these games can be played with a friend or a single player, either locally or online. Many of the college classroom computer labs now host game-based instruction and discussion groups. Most online games to refer to video games that are played over the internet and require a relatively high resolution monitor. These video games may require a broadband internet connection and are played on gaming consoles, personal computers that are connected to the internet. Most college classrooms now host game-based instruction and discussion groups. In the past, video game instruction was provided by local colleges and universities. Today, it is often provided at online degree and certification programs offered by schools all over the world. Most online computer games are multiplayer games, meaning that they are played by a large number of players at the same time. However, it should be noted that there are some games that allow a player to control more than one character at a time. These characters are typically referred to as avatars. An avatar is able to make changes in appearance and even in statistics without making a real personal contact with other players. You may also like Leave a Reply
Router Installation and Configuration Manual/Glossary From ImageStream Router Documentation Jump to: navigation, search Asymmetric Digital Subscriber Line (ADSL) - form of DSL, a data communications technology that enables faster data transmission over copper telephone lines than a conventional voiceband modem can provide. This is accomplished by utilizing frequencies that are not used by a voice telephone call. A splitter or micro filters allow a single telephone connection to be used for both ADSL service and voice calls at the same time. However, this technology is not perferred if the distances exceed 5km (approx. 3 miles). Asymmetric Digital Subscriber Line (ADSL2+) - ADSL2+ is capable of doubling the frequency band of typical ADSL connections from 1.1 MHz to 2.2 MHz. This doubles the downstream data rates of the previous ADSL2 standard of up to 12 Mbit/s, but like the previous standards will degrade from its peak bitrate after a certain distance. Asynchronous Transfer Mode (ATM) - cell relay, packet switching network and data link layer protocol which encodes data traffic into small (53 bytes; 48 bytes of data and 5 bytes of header information) fixed-sized cells. ATM provides data link layer services that run over SONET (Synchronous Optical Networking) Layer 1 links. This differs from other technologies based on packet-switched networks (such as the Internet Protocol or Ethernet), in which variable sized packets (sometimes known as frames) are used. ATM is a connection-oriented technology, in which a logical connection is established between the two endpoints before the actual data exchange begins. Basic Input/Output System (BIOS) - The BIOS software is built into the equipment, and is the first code run by a unit when powered on ('boot firmware'). The primary function of the BIOS is to load and start an operating system. When the unit starts up, the first job for the BIOS is to initialize and identify system devices such as the video display card, keyboard and mouse, hard disk, CD/DVD drive and other hardware. The BIOS then locates software held on a peripheral device (designated as a 'boot device'), such as a hard disk or a CD, and loads and executes that software, giving it control of the PC Border Gateway Protocol (BGP) - the core routing protocol of the Internet. It works by maintaining a table of IP networks or 'prefixes' which designate network reachability among autonomous systems (AS). BGP makes routing decisions based on path, network policies and/or rulesets. Crypto IP Encapsulation (CIPE) - CIPE is a VPN implementation developed primarily for Linux. CIPE uses encrypted IP packets that are encapsulated, or "wrapped", in datagram (UDP) packets. Packets are given destination header information and are encrypted using the default CIPE encryption mechanism, then transferred over IP as UDP packets via its own virtual device (cipcbx) over a carrier network (such as the Internet) to an intended remote node. CSU/DSU - For digital lines, a channel service unit (CSU) and a data service unit (DSU) are required. The two are often combined into a single piece of equipment, called the CSU/DSU. The CSU provides termination for the digital signal and ensures connection integrity through error correction and line monitoring. The DSU converts the T-carrier line frames into frames the LAN can interpret and vice versa. It also connects T-carrier lines with terminating equipment. Data Link Connection Identifier (DLCI) - a channel number which is attached to frame relay data frames to tell the network how to route the data. A 10-bit field that defines the destination address of a packet. The address is local on a link-by-link basis. Differentiated Services(DIFFServ) - a computer networking architecture that specifies a simple, scalable and coarse-grained mechanism for classifying, managing network traffic and providing quality of service (QoS) guarantees on modern IP networks. Digital Signal 3 (DS3) - is a digital signal level 3 T-carrier. It may also be referred to as a T3 line. Dynamic Host Configuration Protocol (DHCP) - a set of rules used by communications devices such as a computer, router or network adapter to allow the device to requestand obtain an IP address from a server which has a list of addresses available for assignment. E1 - E1 circuits are very common in most telephone exchanges and are used to connect to medium and large companies, to remote exchanges and in many cases between exchanges. E3 lines are used between exchanges, operators and/or countries, and have a transmission speed of 34.368 Mbit/s. Firewall - a hardware or software device which is configured to permit, deny, or proxy data through a computer network which has different levels of trust. Standard security practices dictate a "default-deny" firewall ruleset, in which the only network connections which are allowed are the ones that have been explicitly allowed. Frame Relay - consists of an efficient data transmission technique used to send digital information quickly and cheaply in a relay of frames to one or many destinations from one or many end-points. Network providers commonly implement frame relay for voice and data as an encapsulation technique, used between local area networks (LANs) over a wide area network (WAN). Each end-user gets a private line (or leased line) to a frame-relay node. The frame-relay network handles the transmission over a frequently-changing path transparent to all end-users. Fully Qualified Domain Name (FQDN) - consists of a host and domain name, including top-level domain. For example, is a fully qualified domain name. www is the host, ImageStream is the second-level domain, is the top level domain. High-Level Data Link Control (HDLC) - is now the basis for the framing mechanism used with the Point-to-Point Protocol on synchronous lines, as used by many servers to connect to a wide area network, most commonly the Internet. A mildly different version is also used as the control channel for E-carrier (E1) and SONET multichannel telephone lines. ip address - An IP address (Internet Protocol address) is a unique address that certain electronic devices use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard (IP)-in simpler terms, a computer address. IP addresses are managed and created by the Internet Assigned Numbers Authority (IANA). The IANA generally allocates super-blocks to Regional Internet Registries, who in turn allocate smaller blocks to Internet service providers and enterprises. Integrated Services Digital Network (ISDN) - is a circuit-switched telephone network system, designed to allow digital transmission of voice and data over ordinary telephone copper wires, resulting in better quality and higher speeds than that which is available with the PSTN system. More broadly, ISDN is a set of protocols for establishing and breaking circuit switched connections, and for advanced call features for the user. iptables - iptables are a standard part of all modern Linux distributions from which the system administrator creates the rules for the packet filtering and NAT modules. IP Tunnel - is the process of embedding one IP packet inside of another, for the purpose of simulating a physical connection between two remote networks across an intermediate network. IP tunnels are often used in conjunction with IPSec protocol to create a VPN between two or more remote networks across a "hostile" network such as the Internet. International Telephone and Telegraph Consultative Committee (CCITT) - coordinates standards for telecommunications on behalf of the International Telecommunication Union (ITU) and is based in Geneva, Switzerland. Local Area Network (LAN) - a computer network covering a small geographic area, like a home, office, or group of buildings. The defining characteristics of LANs, in contrast to Wide area networks (WANs), include their much higher data transfer rates, smaller geographic range, and lack of a need for leased telecommunication lines. Local Management Interface (LMI) - a signaling standard used between routers and frame relay switches. Communication takes place between a router and the first frame relay switch it's connected to. Information about keepalives, global addressing, IP Multicast and the status of virtual circuits is commonly exchanged using LMI. Multilink PPP (MLPPP) - Multilink PPP can connect multiple links between two systems as needed to provide extra bandwidth. Remotely accessing resources through PPP Multilink allows for the increase in overall throughput by combining the bandwidth of two or more physical communication links such as analog modems, ISDN, and other analog/digital links. Network Address Translation (NAT) - also known as Network Masquerading, Native Address Translation or IP Masquerading) involves re-writing the source and/or destination addresses of IP packets as they pass through a Router or firewall. Most systems using NAT do so in order to enable multiple hosts on a private network to access the Internet using a single public IP address (or gateway). Many network administrators find NAT a convenient technique and use it widely. Nonetheless, NAT can introduce complications in communication between hosts and may impact performance. Open Shortest Path First (OSPF) - protocol is a hierarchical interior gateway protocol (IGP) for routing in Internet Protocol, using a link-state in the individual areas that make up the hierarchy to determine the "best path" routes. Open Systems Interconnection Basic Reference Model (OSI reference model) - a layered, abstract description for communications and computer network protocol design, developed as part of Open Systems Interconnection (OSI) initiative. It is also called the OSI seven layer model. The layers, described below, are, from top to bottom, Application, Presentation, Session, Transport, Network, Data Link and Physical. Point-to-Point Protocol (PPP) - is commonly used to establish a direct connection between two nodes. It can connect computers using serial cable, phone line, trunk line, cellular telephone, specialized radio links, or fiber optic links. Most Internet service providers use PPP for customers' dial-up access to the Internet. Two common encapsulated forms of PPP are used in a similar role with Digital Subscriber Line (DSL) Internet service. These are: • Point-to-Point Protocol over Ethernet (PPPoE), and • Point-to-Point Protocol over ATM (PPPoA) QoS - is a feature of routers and switches which prioritizes traffic so that more "important" traffic can pass first. The result is a performance improvement for critical network traffic. QoS equipment is useful with VoIP phones or in LANs with high volumes of local traffic. QUAGGA - is a free software routing suite, providing implementations of OSPF (v2 & v3), RIP (v1, v2 & v3) and BGP (v4) for Unix platforms, particularly FreeBSD, GNU/Linux, Solaris and NetBSD. Quagga is a fork of the GNU Zebra project (inactive since 2003) which was developed by Kunihiro Ishiguro. Remote Authentication Dial In User Service (Radius) - is an authentication, authorization and accounting (AAA) protocol for applications such as network access or IP mobility. Request for Comments (RFC) - dDocuments that contain the protocols, standards, and information that define the Internet. These standards are gathered and published by the Internet Engineering Task force, a consensus-building body made up of institutions and corporations involved with online communications, they are preceded by RFC and followed by a number. RFC archives can be found Internet Network information Center (InterNIC) Routing Information Protocol (RIP) - one of the most commonly used interior gateway protocol (IGP) routing protocols on internal networks, which help routers dynamically adapt to changes of network connections by communicating information about which networks each router can reach and how far away those networks are. safety extra-low voltage (SELV) circuits - The use of extra-low voltage (ELV) in an electrical circuit is one of several means to provide protection against electrical shock. Avoid hooking these circuits to telephone-network voltage (TNV) circuits as these are not compatable and can result in damage to your equipment. Secured Sockets Layer (SSL) - are cryptographic protocols that provide secure communications on the Internet for such things as web browsing, e-mail, Internet faxing, instant messaging and other data transfers. Service Profile identifier (SPID) - is a number issued by ISDN service providers in North America that identifies the services and features of an ISDN circuit. Service providers typically assign each B channel a unique SPID. A SPID is derived from the telephone number assigned to the circuit, and in the U.S. it typically follows a generic, 14-digit format. Simple Network Protocol (SNMP) - a part of the internet protocol suite as defined by the Internet Engineering Task Force (IETF). SNMP is used by network management systems to monitor network-attached devices for conditions that warrant administrative attention. It consists of a set of standards for network management, including an Application Layer protocol, a database schema, and a set of data objects. Synchronous Data Link Control (SDLC) - is a computer communications protocol. It is the layer 2 protocol for IBM's Systems Network Architecture (SNA). SDLC supports multipoint links as well as error correction. It also runs under the assumption that an SNA header is present after the SDLC header. It was the basis for the HDLC and ADCCP protocols, which added features such as the balanced response mode telnet - A terminal emulation program for TCP/IP networks such as the Internet. The Telnet program runs on your computer and connects your PC to a server on the network. This enables you to control the server and communicate with other servers on the network. Terminal Access Controller Access-Control System Plus (TACACS+) - protocol which provides access control for routers, network access servers and other networked computing devices via one or more centralized servers. TACACS+ provides separate authentication, authorization and accounting services. T1 - is the generic designator for any of several digitally multiplexed telecommunications carrier systems originally developed by Bell Labs and used in North America, Japan, and Korea. The basic unit of the T-carrier system is the DS0, which has a transmission rate of 64 kbit/s, and is commonly used for one voice circuit. Vitual Channel Identifier (VCI) - a unique identifier which indicates a particular virtual circuit on a network. It is a 16-bit field in the header of an ATM cell. The VCI, together with the VPI (Virtual Path Identifier) is used to identify the next destination of a cell as it passes through a series of ATM switches on its way to its destination. Virtual LAN (VLAN) - a method of creating independent logical networks within a physical network. Several VLANs can co-exist within such a network. This helps reduce the broadcast domain and aids in network administration by separating logical segments of a LAN (like company departments) that should not exchange data usinga LAN (they still can exchange data by routing). Virtual Path Identifier (VPI) - refers to an 8-bit (user to network packets) or a 12-bit (network-network packets) field within the header of an Asynchronous Transfer Mode packet. The VPI, together with the VCI (Virtual Channel Identifier) is used to identify the next destination of a cell as it passes through a series of ATM switches on its way to its destination. VPI is useful to reduce the switching table for some Virtual Circuits which have common paths. Virtual Router Redundancy Protocol (VRRP) - The Virtual Router Redundancy Protocol is designed to eliminate the single point of failure associated with statically routed networks by providing routing redundancy for specific IP addresses utilizing multiple LAN paths through alternate routers. Voice Over Internet Protocal (VoIP) - refers to communications services — voice, fax, SMS, and/or voice-messaging applications — that are transported via the Internet, rather than the public switched telephone network (PSTN). ide Area Network (WAN) - used to connect LANs and other types of networks together, so that users and computers in one location can communicate with users and computers in other locations. Modem - is a simple file transfer protocol. XMODEM became extremely popular in the early bulletin board system (BBS) market, largely because it was so simple to implement. It was also fairly inefficient, and as modem speeds increased this problem led to the development of a number of modified versions of XMODEM to improve performance or address other problems with the protocol. Modem - originally YMODEM was essentially the same as XMODEM except that it sent the file's name, size, and timestamp in a regular XMODEM block before actually transferring the file. Sending the file size solved XMODEM's problem of superfluous padding at the end of the file. Modem - is a sophisticated file transfer protocol developed to improve file transfers. In addition to dramatically improved performance compared to older protocols, ZMODEM also offers restartable transfers, auto-start by the sender, an expanded 32-bit CRC, and control character quoting, allowing it to be used on networks that might "eat" control characters. Personal tools Router software releases
Medical Degree Program in China - Nautical Medicine 1. Introduction Nautical Medicine studies various medical problems under the condition of navigation, an edge subject of medical science and navigation technology, and it is the concrete application of medical science under the condition of navigation. The knowledge and technology of all these disciplines can be transplanted to the civil field, if combined with civil conditions. Therefore, modern nautical medicine includes military and civil, surface and underwater medical problems that occur in the course of navigation. 2. Main Contents Nautical medicine studies physiological and psychological reactions, pathological changes, disease occurrence, epidemic regularity, diagnosis, prevention and treatment of marine workers under various surface and underwater environmental conditions, to make marine workers adapt to the environment in the navigation process to keep healthy, enhance physical fitness, improve work efficiency, successfully complete the mission and provide medical technical support for the seafaring. Therefore, marine medicine, from the focus of its tasks, belongs to the category of preventive medicine. 3. Range Ship sanitation, focusing on role and influence of various environmental factors - high temperature, high humidity, noise, vibration, lighting, harmful gas and toxic substances in the microwave, radiation, shock wave on the body of the rules, and it is to study the formulation of health protection measures. Ship epidemic prevention, focusing on the epidemic regularity of infectious diseases in the dock, the ship, the crew, and the factors influencing and disinfection, insecticide, rodenticide, wash cancellation technique, and develop a variety of management measures to infectious disease epidemic prevention. Medical care for seafarers, focusing on research and navigational conditions related to psychological status and idiopathic disease, the pathogenesis of diseases, common diseases, (such as nausea, gastrointestinal function element chaotic, lumbocrural pain, skin disorders), clinical manifestations and diagnostic methods and preventive measures suitable for performing the task under sailing conditions, at the same time, study and formulate the medical selection, physical examination standard, health examination, individual and collective health, nutrition, health, cooking health, hygiene supervision of food and drinking water, health maintenance, clothing hygiene, sewage disposal, emergency rations water reserves, values on duty, safe operation, lifestyle and other regulations on the crew. From human - machine - environment system and efficiency perspective, put forward various hygiene design requirements or standards, to improve the living and working environment, improve work efficiency, to better achieve the health care purpose. This requires the marine medical department, the ship and equipment design and construction departments to combine closely. 2021 Admission is opening ! Anhui Medical University Wenzhou Medical University Read more...... Contact us
Kidney stones are quite common and can be associated with severe pain, nausea and vomiting. It is estimated that 11% of men and 7% of women will experience a symptomatic kidney stone episode at some point in their lives. Prior to an episode,  stones are often ‘silent’ and not associated with any symptoms whatsoever. However, stones of any size can cause severe problems such as pain, nausea and fever or chills when they obstruct urine flow from the kidney. Large stones may cause a variety of other problems including chronic infections, visible blood in the urine and even long term damage to the kidney. The providers at AAUrology have vast experience in diagnosing, treating and kidney stone prevention. Fortunately, most stones can be treated with minimally invasive alternatives. At AAUrology, we have surgeons with special training in kidney stone treatment who can provide optimal care to get you ‘stone free’ and a follow-up care program designed to keep you that way. What Are They? manwith back painKidney stones are crystals that form in the urinary tract. Usually found in the kidney itself, stones can also form in the bladder as well. About 70% of the time, they are formed from a substance called calcium oxalate. They can also be made from uric acid, calcium phosphate, or cystine. The stones vary in shape and size. Some are round, and others are long and jagged. Even very small kidney stones that measure 2mm in size can cause patients a tremendous amount of pain that leads to a visit to the Emergency Room. How do I know if I have a kidney stone? man with kidney painKidney stones have been called the “great mimicker” due to their ability to manifest pain and symptoms in a variety of ways. Commonly they can cause an intense pain in the flank, between the edge of the rib cage and the spine. Many female patients have described the pain as worse than childbirth. They can be accompanied by nausea, vomiting, or blood in the urine. However, they can also lead to lower abdominal pain, urinary frequency, bladder pain, penile pain, testicular pain, etc. The gold standard in evaluation of the presence of a kidney stone is through a non-contrast helical CT scan. They can also show up on ultrasounds or plain X-rays. Why do I make kidney stones? The biggest risk factor for making kidney stones is dehydration. Many Americans do not drink enough water throughout the day and this can lead to crystals forming in the urinary tract that ultimately leads to a stone. There are also genetic factors, and in fact up to 50% of patients who present with stones, have a family history of this. Other risk factors include medications, dietary supplements, and also eating habits that may put a patient at increased risk of forming stones. At AAUrology, after the initial treatment of the stone, we can perform a thorough metabolic workup to analyze each of the factors listed above and create a comprehensive plan to reduce your risk factors. What treatment options are there? Treatment is highly personalized, dependent on the individual stone size, shape, location, and also the patient’s symptoms. For patients with smaller stones who are not in intense pain and not experience symptoms of active infection, medical treatment of kidney stones may be a reasonable first option.  For more urgent situations, or for patients with larger stones, we will discuss the many minimally invasive surgical treatment options available to provide definitive treatment. Kidney stone surgeries Extracorporeal shockwave lithotripsy (ESWL) This procedure utilizes shockwaves delivered from the outside of the body to fragment the stones in the kidney or ureter tube. The stone is pulverized into small sand or powder like granules, allowing for easier passage through the urinary tract. This is a low risk procedure and also the least invasive option available. Your provider will discuss if ESWL is an effective treatment option for your kidney stone. Ureteroscopy with laser lithotripsy This is an excellent option for stones that are blocking the tube between the kidney and the bladder (ureter). A small scope is passed into the urethra without the need for any incisions. This procedure is highly effective as the stone is visualized directly and then broken up with a tiny laser fiber. Residual fragments may be extracted at the time or allowed to traverse passively with urine flow. After ureteroscopy, a ureteral stent may remain inside the body to promote healing and must be removed, usually several days to weeks later. Ureteral stent removal usually does NOT require anesthesia. Percutaneous nephrolithotomy or Tubeless PCNL Percutaneous nephrolithotomy, or PCNL, is a minimally invasive surgery for large or multiple kidney stones. Large kidney stones have the potential of causing pain, bleeding, infections, and if left untreated, can lead to eventual deterioration in kidney function. PCNL is designed to be the most effective way to clear a large stone burden. Typical indications include: • Larger kidney stones • A stone obstructing more than 1 calyx in the kidney (known as a staghorn calculi) • Other procedures such as shockwave lithotripsy (ESWL) and ureteroscopy have failed How can we help you?
The welfare state refers to a concept of a state that focuses on ensuring that a broad range of social rights is provided for all citizens by acting on the social mechanisms and consequences of the market economy. In such a state government plays a vital role in balancing social inequalities by providing or subsidizing social benefits and services. This activity is called social policy. Individual countries are characterized by different welfare state models, goals, values, and groups of beneficiaries. Such a state usually supports a recovery from the difficult situation of the population, which is not, itself, able to take care of their basic needs. No posts
B K Jahangir In Bangladesh, we are thinking about justice, particularly in the sphere of ethnicity or within the scope of culture. We are generally hostile about minority rights or the idea of multiculturalism or careless about ethnic diversity in Bangladesh. We, the liberals, are habituated to think about liberalism in relation to individual rights, nationalism (Bengali nationalism), and/ or minority rights (mainly Hindu rights). The partition of India, the rise and fall of Pakistan, the rise of Bangladesh: all of these geopolitical factors have intensively and deeply influenced the idea of minority rights of the liberals of these three countries. How would one draw a line between national minorities and ethnic groups? History has a clear role in the constitution of these groups. From these roles, the existence of an ethnic group or a national minority becomes evident. This division depends on which historical moment one draws the line of an ethnic group or a national minority. In the context of Bangladesh, the difference of Chakma community as an ethnic group or the Hindu people as a community is born from history. Different experimentations of the liberal democracy of India, Pakistan and Bangladesh have generated a varied experience of the state among us. These experiences have created an awareness of different rights among different groups of people. The struggle for independence of India, Pakistan and Bangladesh has helped the different ethnic groups and minority groups to walk through the historical experience of colonialism. As a result of colonization, the majority (i.e. the Muslims) and the minority (i.e. the Hindus) have gained citizenship rights. But the ethnic groups (the hill people and the forest people) have been excluded from citizenship. Muslim and Hindus grew out of the experience of colonialism but also remained under the national culture of colonial power (i.e. the British, Indian, Pakistani and Bangladesh period). Justice is being thought out excluding the ethnic groups. The basis of this is liberal multiculturalism: These are practised in the laws, constitutions and parliamentary debates of the liberal democracies of India or Pakistan or Bangladesh. But there remained some problems. In the constitution of the state, who do we refer as the people of the state? Perhaps we are talking of the majority of the Muslim community of the state or the minority (i.e. Hindu community) of the state. Then what happens is, the ethnic groups become excluded from the people who constitute the state. This excluded group, historically, is not the national minority or the indigenous. The ethnic groups are the inhabitants of this land from the British colonial period, or the Indian independent period or the Pakistani independent period or from before the independence of Bangladesh. But they are not being considered as the people of the state’s formation. On the one hand, they are excluded from history; on the other hand, they are excluded from the state formation. They are excluded from the historic territory, as well as political territory. They have a different type of rights over land, and the forest, their social system is different. Ethnic people do not get the benefit which is enjoyed by the majority or the minority people of the state. In their case, the historically induced injustice upon them is not met out. Are they then rootless? The historical responsibility which emanated out from colonization is not applicable to them. Their framework of indigenous rights, on the one hand, is not accepted by the country’s constitution; on the other hand, the UN promulgated Indigenous rights discourse is conflictual with the state’s existing laws. Their idea of land, ecology, and legal pluralism and its necessary relations comes through the idea of indigenous. Since the idea of indigenous is not acknowledged in the constitution, in many cases ethnic people are exploited: Dr Dipu Moni’s statement about majority vs minority vs ethnic people is, on the one hand, misleading, on the other hand, this is indicative of the universally existing class struggle within the state formation. It appears to me that the multicultural political project is being constituted against the welfare state. On the one hand, there is no place for different ethnic groups within the multicultural political project; on the other hand, there is no place for them within the welfare state’s agenda. When the state is spread over the international border, and ethnic groups living under international borders, how long these hapless ethnic groups, devoid of rights to land, language, and autonomy, will survive within this suffocating regime of politics? B. K. Jahangir is a senior social scientist based in Dhaka, Bangladesh. A widely travelled person, B. K. Jahangir has taught in various universities, including Dhaka, Jahangirnagar, Sussex, Syracuse, Konstanz and Ecole Des Hautes Etudes En Science Sociale. Translation: Mahmudul Sumon is a professor of anthropology, Jahangirnagar University [Publication history: This short piece was first published in the Daily Janakantha in Dhaka 2011. It was published in Bengali and was later translation by Mahmudul Sumon. The translated English version was first published in The Journal of Social Studies No. 139. The current version available here at Anthropology Journal is a slightly modified version of the earlier published work (July, 2016).] Print Friendly, PDF & Email Leave A Comment
A hot water system, or storage hot water heater, is a domestic hot water heating appliance that uses a water storage tank to optimize heating capability and deliver instant hot water upon demand. A traditional storage water heater uses various fuels, such as natural gas, propane, gasoline, and electricity, to heat the water stored within the tank. An alternative, however, is to utilize an on-site, closed-in tankless water heater. This type of system has no moving parts, relies on a magnetic field for energy, and allows instant access to heated water. The two primary components in this hot water system are the storage tank and the heating unit. One of the most essential characteristics of this type of system is that the storage tank holds the hot water until it is needed. The heat generated within the tank can then be used for several purposes, such as showering, washing machine tasks, cooking, and even emergency drinking water. The temperature is typically very consistent, depending on the manufacturer, although it may fluctuate based on the weather. hot-water-systems-in-adelaideThere are many advantages associated with this type of hot water system in Hot Water Systems in Adelaide. One of the most obvious benefits is the savings associated with using less conventional heating systems. When there is less hot water needed, energy costs are reduced, resulting in reduced operational and maintenance expenses. Additionally, these types of systems are more environmentally friendly because there are no heat traps, tankless heat exchangers, or other types of additional heating units required. Many people are wary of new technologies because they do not believe they will be used to their advantage. However, there are several distinct advantages to using tankless gas continuous flow instant hot water systems. For example, if a home uses these types of systems, it is possible to take showers without the need for an additional showerhead. In addition, homeowners can take showers while still being in their homes. This takes a great deal of hassle out of the process of taking showers, especially in homes with small children. The most obvious benefit of using tankless gas continuous flow hot water systems is energy efficiency. Energy efficiency has become very important in homes, as utility bills have continually gotten higher. A tankless hot water system in Hot Water Systems in Adelaide provides an energy-efficient way to heat water in a home. This is because no hot water system draws power from the house to function; therefore, saving money on the energy bill is obtained instead. Another benefit of these hot water systems is the reduced level of maintenance required. As was stated earlier, electric storage systems use hot water heat pumps to move the water between the storage tank and the compressor. This process is not only more expensive than the conventional method, but it also requires a much larger storage tank. A traditional tankless hot water system allows for the storage of the water and its transportation, which greatly reduces the amount of maintenance required on the part of the homeowner.
This Is What Actually Happens to Your Body When You Cry We all need a good cry every now and then. Whether you've just received some upsetting news or can't help but well up at a sad scene in your favourite rom-com (Marley & Me, anyone?), crying has actually been shown to have some helpful health benefits for humans. A little known fact is that our bodies can produce three types of tears—basal (to keep your eyes moist), reflex (to flush out irritants like wind and smoke) and psychic (in response to emotional distress). Other than feeling like you've had a grand piano-sized weight lifted from your chest, we've done some research into what is actually happening inside your body when you cry. Helps you sleep Crying can be a full-body workout sometimes, especially when you're in a state where you're no longer in charge of the tears coming from your body. Your shoulders are probably bouncing up and down and your cheeks might even get sore when you're in full blubber mode. As well as that, your heart rate naturally rises when you're crying because of your body's in-built fight or flight response to what caused the crying in the first place. Because of that, once you wipe away the tears and calm down, you might find it much easier to drift off to sleep because you've tired yourself out in the process. Releases toxins  If you find yourself bawling your eyes out because of a particularly stressful situation in your life, your tears will actually contain a number of stress hormones and other chemicals, research suggests. Scientists who have studied the effects of crying on the body believe that by letting yourself cry when faced with stress can reduce these hormone levels in the body and in turn, lower your overall stress levels.  Relieves pain Oxytocin, or the 'love hormone' promotes feelings of bonding and wellbeing in our bodies and brains. Psychology researchers from various universities have proven that when we shed emotional tears, oxytocin as well as the feel-good hormones, endorphins are released at the same time. This explains why after a cathartic bout of crying you actually feel better because your tears act as a natural pain healer.  Calms you down Self-soothing is the act of regulating your own emotions when faced with difficult or upsetting circumstances and be tricky for us humans to get a grip on sometimes. This study found that crying is one of the best ways to self-soothe when times are tough. To get technical for a moment, crying stimulates the parasympathetic nervous system which helps to calm you down and regroup.  It turns out that holding our tears back, in stressful, sad or painful situations isn't as healthy as letting it all out. Crying is a totally normal part of our human existence, and by letting your body respond automatically with tears, you'll feel better in more ways than one.  If you are concerned about your health, wellbeing or sleep, your first port of call should be your GP, who will advise a correct treatment plan.  Enjoyed this? This is the scientific reason why a lack of sleep makes you crave junk food. Rust Stripe 100% Flax Linen Fitted Sheet You're eligible for a free candle! No Thank You Your Order 0 (incl. GST) 20.00 or 4 interest-free installments as low as by Take 10% Off Your Order Enter your Sister Club Membership below to unlock your exclusive discount. Thanks - You're In! Shop Now
Cancer Prevention: Should I Get Genetic Testing to Understand my Risk? Submitted by Megan Barkhurst, NP on October 11, 2021 View Blogs by Topic Subscribe Here! Maybe you have a family history. Maybe you're curious about your risk.  Predictive genetic testing for cancer can be a great tool for a specific subset of the population. Most people do not need genetic testing, but it is often recommended when hereditary cancers run in a family.  a geneticist testing for cancer According to the American Cancer Society (ACS), roughly 5-10% of people diagnosed with cancer acquired it from their genetics, meaning it was passed down either from their maternal- or paternal-side or both. This is caused by a mutation in the DNA sequence that predisposes someone to cancer. This predisposition does not mean you will get cancer, but it does mean you are at a higher risk for developing certain types of hereditary cancers.  While cancer can come from the environment, personal factors and/or genetics, you should consider genetic testing if*: • You have multiple relatives on one side of the family with breast, ovarian, prostate, pancreatic, endometrial, gastric, melanoma or colon cancer • There is a known genetic mutation or syndrome on either side of the family such as BRCA, BRCA2 or Lynch Syndrome • You or a family member has been diagnosed with more than one type of cancer • One or more family members have been diagnosed or passed away from cancer before the age of 50 • A family member has been diagnosed with a rare type of cancer (example: breast cancer in a man) • You are of an ethnicity with well-known cancer links (example: Ashkenazi Jewish individuals) • A physical finding is linked to an inherited cancer (example: many colon polyps) To get genetic testing, you will be required to provide information about your personal medical history and age, as well as a three-generation family pedigree. The specimen for genetic testing can be obtained through saliva or blood. One option is not better than the other, but RNA testing can be performed with a required blood sample. This specific type of sequencing gives clinicians the ability to provide more information about cancer prevention to patients with a mutation. Insurance often does not cover testing.​ If you suspect you are a fit for predictive genetic testing, you may consider reaching out to a genetic counselor, gynecologist or oncologist. He or she can work with you to decide if testing is right for you.  *Source: The American Cancer Society Megan Barkhurst is a Nurse Practitioner at Chesapeake Regional’s Priority Toyota Cancer Center. She partners closely with various oncology specialists to provide outpatient palliative care to the region’s oncology patients. After receiving her Master of Science degree from the University of Tampa, in Tampa, Fla. she chose to follow her life’s passion into the field of palliative care. She works closely with cancer patients and their family members to assist patients with symptom management, goal guidance and transition of care.
With so many moving parts inside and outside of your vehicle, you could be forgiven for forgetting about some of them along the way. Additionally, without an understanding of their function, you could even underestimate their importance. Out of sight, out of mind. This is often the case with a timing belt. This component has a simple and maintenance-free design and, on the surface, doesn’t seem to do a whole lot. However, a broken timing belt is bad news for your four-wheeled friend. Furthermore, a worn-out timing belt will have a negative impact on your vehicle’s performance, fuel consumption, and, ultimately, its lifespan. With that in mind, we’ve put together this complete guide to the often forgotten timing belt. This will include what it actually is, how to know when it needs replacing, and the cost and process of getting it replaced. What is a timing belt? A timing belt - otherwise known as a cambelt - has the task of ensuring both the crankshaft and camshaft rotation are working together harmoniously. If both of these are in sync, your vehicle’s pistons and valves will operate correctly. This is extremely important for keeping your car’s internal combustion engine (ICE) working well. To explain why, let’s look at the steps of the combustion process inside a typical gas engine. • Step 1: Intake valves inside the cylinders of an engine open up and allow a mixture of fuel and air into the combustion chamber. • Step 2: Then, the valve closes, and the piston moves up the cylinder to compress fuel and air. • Step 3: A spark plug ignites the mixture and the combustion chamber pushes the piston down again. • Step 4: The exhaust valve opens up, allowing the waste gases to be pushed from the cylinder and the piston returns to the top of its stroke. Now that we know the process, where does the timing belt come in? The crankshaft ensures that the pistons move in a rotational manner. Whereas, the camshaft ensures the valves are able to open and close properly. To ensure the combustion process is successful, these have to be in sync. This is what your car’s timing belt facilitates. Is a serpentine belt the same as a timing belt? A timing belt is not the same thing as a serpentine belt. When you pop the hood of your car, the belt you see is your serpentine belt. On the other hand, you don’t actually see your timing belt. This is because it’s located inside your engine. The serpentine belt’s primary function is to keep the engine’s accessories running smoothly and efficiently. It connects the crankshaft on the outside of the engine to several other parts, including: • The alternator • Power steering pump • Air conditioning compressor • The water pump PRO TIP: Another way to tell the difference between timing belts and serpentine belts is their appearance. Serpentine belts are smooth, whereas timing belts have teeth. Have a read of our blog on serpentine belt replacement to learn more. Do all cars have timing belts? Not all cars are fitted with timing belts. Some car manufacturers have now started to favor a timing chain rather than a belt. The benefit of a timing chain is that it has greater longevity than a belt. A timing belt will last you between 60,000 to 100,000 miles, whereas a timing chain is good for around 80,000 to 120,000 miles. Also, as it’s not made from rubber, the timing chain is not affected by temperature change. On the flip side, it’s heavier than a belt and, therefore, increases fuel consumption. Moreover, as its made of metal links, it needs to be constantly lubricated using engine oil. This means that you’ll have to check and replace your engine oil more frequently when carrying out routine car maintenance with a timing chain. Most BMWs and Mercedes and all Cadillacs are just some of the car models that now use a timing chain. How long does a timing belt last? As mentioned before, there is a range in the number of miles you can drive before you need a new timing belt.   A newer car mobile can usually go up to 100,000 miles before the timing belt needs replacing. However, older vehicles may need it replaced at 60,000 miles. That being said, these numbers change if your water pump goes bad. This is because the belt usually has to be removed to replace your car’s water pump. When to change a timing belt? This next one is tricky. Besides using the mile range mentioned above, there are no clear-cut signs that your timing belt needs replacing. Timing belts don’t gradually decline. In fact, when they fail, it’s very sudden. If a failure occurs, your engine will either immediately grind to a halt or lose significant power. A problem with a timing chain is easier to identify. If it’s becoming loose, it may make a lot of noise and, if it breaks, you’ll usually hear a large crack. However, not all is lost! There are some preventative measures you can take. Firstly, you should consult your vehicle manufacturer guidelines. This will tell you how often you should change your car’s timing belt. Furthermore, you can also speak to a certified mobile mechanic. Here at FixMyCar, one of our mechanics can take a look at the condition of your timing belt and let you know if a replacement is needed - all from the comfort of your own driveway. Get a quote today! How much to replace a timing belt? The price of a timing belt replacement is largely dependent on the labor hours required to carry out the replacement and varies from car model to car model. For example, for cars with a small engine, the labor is lower because the engine is smaller. However, for an SUV or a track, the engine is larger so it will take longer to disassemble and incur higher labor costs. So, while a timing belt itself is around $50, the average cost for replacement is between $250 to $450. Now, if you’ve looked at that figure and thought, “Forget that I’m going to replace it myself.” We’d strongly advise against it. Unless you have a lot of auto repair experience, a timing belt replacement is not something to simply tick off your car maintenance checklist. It should be handled by a professional. A mobile mechanic needs to gain entry to the timing cover of the engine by removing various engine accessories - and then putting them all back together again. In addition, as mentioned earlier, a cambelt replacement also usually requires a water pump replacement, too. There are just too many things that can go wrong. So, even if you’re a gambler, this is not worth the risk. Bottom line There you have it! We hope this guide has given you a better understanding of the ins and outs of this often forgotten - yet essential - component of your car’s engine: the timing belt. Ensuring you carry out a timing belt or chain replacement within the time range suggested by your car manufacturer is a must. Otherwise, you run the risk of a more serious problem down the line or putting yourself and your passengers in danger. If you’re nearing the milestone where you need a replacement, get a quote for a mobile timing belt replacement today.
This two-part Be Unlimited lesson is about stopping violence before it escalates to the point of no return. Anyone who’s ever played a video game knows that when a life ends in the virtual world it can start again with the press of a button.  The same is not true for human lives.   In real life there is no reset button.  Some actions have lasting consequences that cannot be resolved.   Violence can be life-changing.  It can also be life-ending.  Both targets and aggressors can find themselves in either situation. If you think violence settles problems, consider the following outcomes.  As a result of violence, some young people have had their faces permanently scarred.  Others have been confined to wheelchairs.  As a result of violence, some young people lose years of their lives in detention centers or prisons.  Others have their lives cut short altogether. Death is the worst possible outcome because it is final. Sadly, there are many young people who have lost their lives to violence.  Too many. The reasons why do not matter in the end.  Nobody cares what the retaliation was about or who started it.  What matters most when a young person dies through violence is the loss of their potential, the loss of their future, the loss of everything they were to be, do and achieve.  Be Unlimited is taking a stand against violence by offering alternatives to it. Violence can be avoided as easily as any other choice in life.  Remember, you are the one who gets to decide.  So why choose something as destructive as violence?  If you are faced with the pressure of retaliating with violence for something that was done to you or someone you know, there are other options.  Think before you act.  And think for yourself.  Do not allow the choices of others to lead you down the wrong path. You may also need to learn better ways to express what you are feeling.  We have all felt anger.  We have all been hurt.  But anger and hurt do not have to lead to an act of violence. These two feelings combined can build up inside of us if we do not find a healthy way to release them. Talk to an adult you trust.  Reach out to a family member, school principal, teacher or guidance counselor.  Don’t worry about getting into trouble.  Adults will be proud of you for wanting to avoid violence and will want to help you because of this. Do not see yourself as being weak for seeking help.  Choosing not to handle a situation with violence is a sign of strength.  If you do not recognize this now, you will some day.  Be the end of violence in your school or community.  Be the end of violence in your life.  Let violence end with you. Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
Corinth, a city of Greece, celebrated in antiquity for its vices, situated on the rocky isthmus of Corinth (3 2/3 miles wide, and 262 feet high), which connects the Peloponnesus with the mainland. It lay under the northern declivity of the mountain (1886 feet high), on which stood its citadel (Acrocorinthus); and its position, midway between the Aegean and Adriatic, was exceptionally advantageous for trade. Founded, according to tradition, about 1350 b.c., Corinth at its zenith is said to have had 300,000 inhabitants, but was utterly destroyed by the Romans in 146 B.c. Exactly a century afterwards it was rebuilt by Julius Ceesar; in 1459 it was captured by the Turks. After being delivered from them in 1822, it slowly increased till 1858, when it was utterly destroyed by an earthquake. The town has since been rebuilt in a more convenient position, 3 miles to the north-east. Pop. 4000. A mile and a half ENE. of New Corinth, on the Gulf of Lepanto (anciently Gulf of Corinth), is the western mouth of the Corinth Ship Canal (1882-93) through the isthmus, 4 miles long. Two new towns have been laid out at its east and west mouths, the eastern named Isthmia, the western Posidonia. Corinth, a town of Mississippi, 93 miles E. by S. of Memphis. Here the Confederates were defeated, October 3-4, 1862. Pop. 3275.
A different way to visualize rhythm In standard notation, rhythm is indicated on a musical bar line. But there are other ways to visualize rhythm that can be more intuitive. In this TED Talk, John Varney describes the ‘wheel method’ of tracing rhythm and uses it to take us on a musical journey around the world. What do you think? Is the "wheel method" something that you can apply in your music classroom?
Pipe organ From Citizendium Jump to: navigation, search This article is developing and not approved. Main Article Related Articles  [?] Bibliography  [?] External Links  [?] Citable Version  [?] The pipe organ is a wind instrument played from a console with one or more keyboards. Though by no means standard, the modern church organ console usually consists of two manual keyboards and a pedalboard for the feet. The organ, unlike the piano, gives the player the opportunity to change the timbre of the sound through the use and combination of various different ranks of pipes. Due to its association with religious service and a lack of a presence on the public stage, the organ's popularity as a field of study and as a performance instrument has declined sharply since the second World War. Some popular songs in the post-WWII era make use of electronic organs - essentially synthesizers - but the organ's use in the popular mind has been relegated to the church. The pipe organ in Western Europe first came into existence in the latter half of the first millennium. The early organ was only capable of producing a single note at a time to accompany the singing of chant, and had to be pumped by the player in order to generate sound. Interestingly, the early organs, based on information from tapestries of the time, had a different scale (ratio of width to length) for each pipe, resulting in a different timbre for each note; ranks of pipes on more modern instruments all have the same scale, and thus generate a unified sound. Rather than keys, these proto-organs had drawn sliders which the player pulled out to create sound, aligning holes in the sliders with the base of the pipe and allowing wind to pass through from the bellows. The keyboard was the first major and universal modification made to the instrument. The keyboard was both easier to operate and somewhat more versatile than sliders, allowing for greater dexterity from the player and the sounding of more than one note at a time. Early keyboards began appearing sometime around the twelfth century. Also at roughly this time, the pipework became more complex, involving several ranks of pipes in the instrument. Each note would sound all the pipes in its rank (a "Blockwerk"). Organ builders then started putting multiple instruments together to give the organist a way to vary dynamics or sound. With more for the organist to do, or simply requiring more air than a single person could produce, several organs had bellows meant for someone (or several people) other than the organist to operate. The next great invention followed on the heels of the keyboard: the "stop," the means by which certain ranks of pipes could be used and others left inactive. In its simplest form, the stop is a slider with holes in it; when in the "off" position, those holes do not line up with the pipes, which doesn't allow air through. The pedalboard, the most obvious distinction between the organ and other keyboard instruments appeared next. In their original incarnation, the pedals didn't activate a separate organ, as distinct manuals did; instead, they duplicated the effect of the lowest range of one of the manuals. This was referred to as a "pull-down" system, as playing the pedal pulled down the notes of the manual keyboard. Later, pedalboards incorporated their own stops. As the organ's mechanism became more complex in the nineteenth century, more new devices were added to the instrument. Common modifications include: • divisions of pipes that were "enclosed" in a separate box, with shutters (operated by the organist) to change the volume level and timbre of the stops; • mechanical means of changing the active stops at the touch of a button or lever; • a device for gradually adding or removing stops in a prescribed order The organ remained essentially unchanged until the advent of steam power and, later, the harnessing of electricity, which allowed fully mechanical actions to be replaced with other means. This also meant that the organist didn't need to employ people to work the bellows. Still more recently, wholly electronic organs have been created, some of which are capable of rivalling pipe organs. Organ music differs substantially from that of other keyboard instruments for a few reasons. First, until the advent of enclosed divisions and the register crescendo, the organ had no way of changing volume in a graduated manner, an advantage which the pianoforte holds over all other keyboard instruments. Secondly, the organ, due to the nature of its sound-producing mechanism, can sustain a tone indefinitely, a fact of which many composers of organ music made (and continue to make) great use. Third, the organ doesn't take well to rapid flourishes of many notes, requiring a certain amount of time to sound properly. Fourth, because of the nature of the sound, organs are more suited to linear and contrapuntal textures than more homophonic or monodic ideas. As a result, organ music tends to be more grandiose, more drawn out, and more contrapuntal than piano music, with less overt virtuosity. The standard repertoire for organists also extends to greater reaches of history and to more generally unknown composers than most other instruments. Standard concert music for the organ reaches back into the sixteenth century, and focusses strongly on many lesser-known composers of the late nineteenth century. While many composers of organ music wrote for other instruments as well, they tend to be most strongly identified with the organ - Johann Sebastian Bach being the most notable exception.
Vitamin D and hair loss Vitamin D (also known as calciferol) is a fat soluble vitamin produced endogenously in the skin from ultraviolet rays from the sun, it is also present in certain foods.  Vitamin D obtained from food and exposure to the sun just undergo a series of changes (hydroxylations) in the body for it to become active.  The first change occurs in the liver, here vitamin D is converted to 25-hydroxyvitamin D (also known as calcidiol).  The second change occurs in the kidneys, at this point vitamin D is converted into the physiologically active 1,25-dihydroxyvitamin D (also known as calcitrol). Vitamin D promotes the absorption of calcium in the gut and maintains bone health.  Without vitamin D bones can become misshapen and lead to a condition known as rickets. Vitamin D is also involved in cell growth, the reduction of inflammation, glucose metabolism and immune function.  Vitamin D levels are generally tightly regulated and deficiency will only occur when the need for vitamin D is outweighed by intake. Vitamin D is associated with hair loss at levels below 75 mol/L (30 ng/mL). nmol/L ng/mL Less than 30 Less than 12 Vitamin D deficient. 30-50 12-20 Considered to be inadequate for overall health. 50-75 20-30 Considered to be adequate for bone health and overall health. 75-125 30-50 Optimal levels for healthy hair growth. more than 125 more than 50 Linked to potential adverse health effects, particularly at levels that exceed 150 nmol/L / 60 ng/mL. At the start of a normal hair growth cycle, stem cells migrate from the hair follicle bulge and are stimulated to grow and differentiate in the germinal matrix forming the seven inner layers of the hair fibre.  Differentiation is a process by which multipotent stem cells change and grow into a more specialised cell type through a succession of alterations in cell morphology, metabolic activity and responsiveness to signals. Vitamin D mediates the differentiation of epidermal cells and a lack of vitamin D leads to decreased interfollicular cell differentiation [1].  Cells that are not able to develop as normal, are not able to become part of the hair fibre matrix and lie dormant in the epidermal layer of the skin. Whilst the exact mechanisms that control the stem cell response to low levels of vitamin D are unclear, low levels of vitamin D are linked to non-scarring alopecia, alopecia areata and androgenic alopecia in women. 1. Food– Few foods contain vitamin D naturally, the flesh of fatty fish such as tuna, salmon, trout and mackerel are the best sources in the diet.  Other dietary sources of vitamin D are cheese and egg yolks.  Mushrooms can provide a small amount of vitamin D2.  The vitamin D content of animal tissue is affected by the animal’s diet, mushrooms can be treated with UV light to increase the content of vitamin D2.  Some cereals are fortified with vitamin D and can provide around 10% of the estimated required daily value. 2. Sun exposure – UVB radiation with an approximate wavelength of 290-320nm can penetrate exposed skin and convert 7-dehydrocholesterol in the skin to provitamin D3, this can then be converted into vitamin D3.  The season, cloud cover and melanin content of the skin affect vitamin D synthesis.  The factors that affect vitamin D synthesis in an individual make it difficult to estimate a definitive amount if sun exposure required for adequate vitamin D synthesis.  Experts estimate as little as 5-30 minutes of sun exposure to the face, arms, legs and hands, between the hours of 10 am and 4 pm at least twice a week, should be enough for adequate vitamin D synthesis. 3. Vitamin D supplements – Supplements containing vitamin D3 are shown to increase serum levels of 25-hydroxyvitamin D more effectively than vitamin D2. 1. Xie, Z., Komuves, L., Yu, Q.C., Elalieh, H., Ng, D.C., Leary, C., Chang, S., Crumrine, D., Bikle, D.D., Yoshizawa, T. and Kato, S., 2002. Lack of the vitamin D receptor is associated with reduced epidermal differentiation and hair follicle growth. Journal of investigative dermatology, 118(1), pp.11-16.
Researchers search for an effective treatment against the coronavirus in France. | Jeff Pachoud/Getty Images Researchers used AI to mine through existing medical information to find drugs that they say might be helpful for tackling the novel coronavirus. Open Sourced logo To battle the novel coronavirus that’s been linked to Wuhan, China, researchers are using artificial intelligence to discover potential treatments, including already-approved drugs and completely new compounds. At the same time, the pneumonia-like illness has only gotten worse. As of Friday morning, the 2019-nCoV coronavirus had taken the lives of more than 600 people and infected more than 30,000, with cases documented in at least 25 countries. Researchers at the British artificial intelligence startup Benevolent AI say they used the tech to search for existing approved drugs that might be helpful in limiting the virus’s infection. Another set of scientists affiliated with Deargen, a drug discovery company based in South Korea, say that they used deep learning to find various available antiviral drugs that could be investigated as a potential treatment (that research has not yet been peer-reviewed). Meanwhile, a Maryland-based biotech company, Insilico, said it used AI to come up with new molecules that could serve as potential medications, and it will now synthesize and test 100 of the compounds, according to Fortune. Here’s how Benevolent described its work: The company’s researchers wanted to find an already-approved drug that could block the infection process. So they sent their AI looking for drugs, based on chemical properties that they knew the coronavirus to have, through a repository of an enormous amount of medical data, including scientific literature. The system churned out a number of options, which were then whittled down to identify an already-approved drug called Baricitinib, which is typically used to treat moderate and severe rheumatoid arthritis. Now the researchers suggest it could be trialed as a potential treatment. Ivan Griffin, Benevolent’s co-founder, told Recode that while the company hasn’t applied for the right to test the drug in China, it has reached out to manufacturers that already produce the drug. It’s unclear how long it might take before a properly tested drug reaches patients. Griffin emphasizes that his company’s research was conducted in a time frame that would have been “impossible to replicate” without Benevolent’s curated and wide variety of datasets and artificial intelligence. Still, that AI identified this drug is no guarantee that it’ll actually work. Benevolent also cautions that its research should not be taken as medical advice, and that its work should only be taken “in good faith and to assist in the global response.” Baricitinib is by no means the only treatment scientists have suggested, and researchers in China have applied to test at least 10 medications as a potential treatments, according to the Wall Street Journal, though none has yet been approved. Keep in mind that misinterpretations of the science about coronaviruses have exacerbated misinformation related to the novel Wuhan strain. (You can read more here about coronavirus-related misinformation.) The application of AI to the fight against the novel coronavirus comes as the role of the technology in health care expands. In fact, AI already helped epidemiologists flag early reports of the Wuhan coronavirus, as Recode reported last week. Ultimately, the hope is that the technology could make delivering health care more efficient. But the use of artificial intelligence in health care also creates new challenges, like algorithmic bias, and raises new questions for drug regulators. Still, pharmaceutical giants are hoping that investment in the tech will give them a leg up in the lucrative drug discovery market. Benevolent is already working with Novartis and AstraZeneca. Identifying a potential new treatment can be a long and expensive process that AI, they hope, can expedite. Some have pointed out that there’s no guarantee that the “discoveries” AI makes will be particularly new. As Derek Lowe, a researcher at Novartis who writes about drug discovery, argued to Chemical & Engineering News, Benevolent’s findings were “more a testimony to good literature searching and curation.” But in an email to Recode, Griffin emphasizes that AI still provides an important advantage: The technology can “help our scientists uncover relationships between diseases and symptoms, drugs and their effect, the patients who might respond to treatment.” The technology, he argues, allows us to gain insights that, due to “the overwhelming volume of biomedical information,” we otherwise would miss. And when facing a life-threatening outbreak like the one we’re seeing with the novel coronavirus, it’s possible that just saving scientists some time could potentially make a world of difference. Open Sourced is made possible by the Omidyar Network. All Open Sourced content is editorially independent and produced by our journalists. Author: Rebecca Heilweil Read More Leave a Reply Your email address will not be published.
15 Matching Annotations 1. Oct 2018 1. Pedagogical Knowledge Deep knowledge about a subject 2. Email does not afford synchronous communication in the way that a phone call, a face-to-face conversation, or instant messaging does. Nor does email afford the conveyance of subtleties of tone, intent, or mood possible with face-to-face communication In a similar way texting does not allow people to convey tone, so there are often misinterpretations 3. are not even considered to be technologies Students don't always realize what kind of technology they have because it is almost second nature 4. specificity (a pencil is for writing, while a microscope is for viewing small objects); stability (pencils, pendulums, and chalkboards have not changed a great deal over time); and transparency of function (the inner workings of the pencil or the pendulum are simple and directly related to their function) (Simon, 1969) Specificity, Stability, and Transparency of Function 5. effective teaching depends on flexible access to rich, well-organized and integrated knowledge from different domains Teachers must always be flexible and able to adapt to any situation that may arise in the classroom 2. Sep 2018 1. Evaluate Comparing and evaluating information Making sure what you have found is reliable by comparing to other sources 2. Synthesize Integrating separate and unique information from multiple online sources. Taking what you know and applying 3. Navigate Understanding the basic structure of the web Being able to use the web 4. Using and revising keywords to make web searches to find information more efficiently. Discover information on a given topic spread across a website. Detecting information in a website using the internal search engine. Evaluating questions and search keywords while considering the purpose of search and obtained results. Finding real-time or time-sensitive information using a range of search techniques. These are all important parts of how to find the info you need. Keywords, multiple sources, how to search, finding new and current information. 1. exposure to violent video games increases aggressive thoughts, angry feelings, physiologic arousal, hostile appraisals, and aggressive behavior and decreases prosocial behavior It can teach them to become violent 2. violent video games can also have negative effects on players. violent video games can lead students to become desensitized to violence 3. Video games in particular have increased in popularity, with some teenagers reporting that they play ≥40 hours per week video games have become more prevalent over the years, with an increased growth in violent video games 1. Eating while viewing is one important way that screen media exposure increases children’s energy intake. I know that im always hungry when im watching TV 2. Over the 7 months of the trial, children in the school that received the screen-time reduction curriculum significantly reduced their television viewing, video game use, and number of meals eaten in front of the television This is a reason to reduce technology use in schools. 3. Aug 2018 1. Digital Storytelling (also affectionately known as ds106) is an open, online course that I’ve been teaching at UMW since Spring 2010
Current Site Select Region to customize your experience: Toggle Menu Current Site Select Region to customize your experience: Contact us Call us at Download Manuals, Datasheets, Software and more: Power Supply Measurement and Analysis with 3-PWR Power Supply Measurement and Analysis with 3-PWR This application note describes common switch-mode power supply measurements using a Tektronix 3 Series MDO Oscilloscope. With the optional power measurement and analysis software, these oscilloscopes provide automated power measurements for fast analysis and simplified setup and deskew of probes for maximum accuracy. Power Supply Measurement and Analysis with 3-PWR Application Note Input Filter Switching Device Rectifier & Filter Power Quality Switching Loss Harmonics Analysis Safe Operating Area Total Harmonic Distortion di/dt, dv/dt Control Circuit Modulation Anaylsis Figure 1. SMPS Components that are Characterized with Power Analysis Software. Power supplies can be found in many different electronic devices, from children’s toys to computers and office equipment to industrial equipment. They are used to convert electrical power from one form to another for proper device operation. Common examples are AC-to-DC converters which change AC voltages into regulated DC voltages or DC-to-DC converters which convert battery power into required voltage levels. Power supplies range from traditional linear supplies to high efficiency switch-mode power supplies (SMPS) designed for complex, dynamic operating environments. The load on a device can change dramatically from one instant to the next, and even a commodity switch-mode power supply must be able to withstand sudden peak loads that far exceed average operating levels. Engineers designing power supplies or the systems that use them need to understand their power supply’s behavior under conditions ranging from quiescent to worst-case. Historically, characterizing the behavior of a power supply meant taking static current and voltage measurements with a digital multimeter and performing painstaking calculations on a calculator or computer. Today, most engineers turn to the oscilloscope as their preferred power measurement tool. This application note will describe common switch-mode power supply measurements, shown in Figure 1, using a Tektronix 3 Series MDO oscilloscope. With the optional power measurement and analysis software, these oscilloscopes provide automated power measurements for fast analysis and simplified setup and deskew of probes for maximum accuracy. Preparing for Power Supply Ideally, a power supply would operate exactly as designed and modeled. In reality, components are imperfect; loads vary; line power may be distorted; environmental changes alter performance. Power supply design is further complicated by demands to increase performance, improve efficiency, reduce size and cut cost. Given these design challenges, the measurement system must be setup correctly to accurately capture waveforms for analysis and troubleshooting. Important items to consider are: Oscilloscope Acquisition Modes Eliminating Skew Between Voltage and Current Probes Eliminating Probe Offset Current Probe Degauss Bandwidth Limiting Filters  Power Supply Measurement and Analysis with 3-PWR Sample Mode Figure 2. Sample Mode. 1 2 3 4 Figure 3. Average Mode. 1 2 3 4 Figure 4. Hi Res Mode. Average Mode Hi-Res Mode 1 2 3 4 1 2 3 4 Oscilloscope Acquisition Modes The oscilloscope’s acquisition modes control how electrical signals are sampled, processed, and displayed. The resulting waveform points are digital values that are stored in memory and displayed to construct the waveform. Most oscilloscopes support different acquisition modes, and the acquisition mode chosen may affect the accuracy of power measurements. It’s important to understand how acquisition modes function and the affect they will have on the waveform and ensuing power measurements. Every oscilloscope offers Sample Mode, which is the simplest acquisition mode. As depicted in Figure 2, the oscilloscope creates a waveform point by saving one sample point during each waveform interval (waveform intervals are shown as 1, 2, 3, and 4 in the figure). Sample mode is suggested for measurements on non-repetitive signals that are acquired over multiple acquisitions such as ripple and noise analysis. Another acquisition mode offered by most oscilloscope manufacturers is Average Mode. In Average Mode, the oscilloscope saves one sample point during each waveform interval as in sample mode. However, in Average Mode, corresponding waveform points from consecutive acquisitions are then averaged together to produce the final displayed waveform as depicted in Figure 3. Average Mode reduces noise, but requires a repetitive signal. Average Mode is especially useful when performing harmonics analysis or power quality analysis measurements such as true power, reactive power and apparent power. Tektronix also offers Hi Res Mode. In this mode, multiple consecutive samples taken within one waveform interval are averaged together to produce one waveform point from a single acquisition as shown in Figure 4. The result is a decrease in bandwidth and therefore noise, and an improvement in vertical resolution for low-speed signals. Hi Res is especially useful for conducting modulation analysis when powering up a supply and acquiring data in a single acquisition. Hi Res may improve the accuracy of measurements such as switching loss, which are based on mathematically calculated values like instantaneous power.  Application Note Figure 5. Default Timing Skew between Voltage and Current Probes. Figure 6. Nominal Correction of Timing Skew between Voltage and Current Probes. Eliminating Skew between Voltage and Current Probes To make power measurements with a digital oscilloscope, it is necessary to measure voltage across and current through the device under test. This task requires two separate probes: a voltage probe (often a high voltage differential probe) and a current probe. Each voltage and current probe has its own characteristic propagation delay and the edges produced in these waveforms more than likely will not be automatically aligned. The difference in the delays between the current probe and the voltage probe, known as skew, causes inaccurate amplitude and timing measurements. It is important to understand the impact of the probe’s propagation delay on maximum peak power and area measurements as power is the product of voltage and current. If the voltage and current signals are not perfectly aligned, results will be incorrect. The 3 Series MDO offers a “Deskew” feature to remove the skew between the probes. From any channel menu, the "Multichannel" button brings up the deskew menu. Nominal delay values for many Tektronix probes are stored in the instrument. TekVPI probes will be recognized and the nominal delay values will be populated automatically. The voltage and current waveforms in Figure 5 have approximately 8 ns of skew and the propagation delay for each probe is shown in the information box. The TDP0500 (Tektronix differential voltage probe) has a nominal propagation delay of 6.5 ns whereas the TCP0030A (Tektronix current probe) has a nominal propagation delay of 14.5 ns. The difference in propagation delays is 8 ns. Correcting for the skew between the probes is as simple as tapping on "OK, Deskew" in the deskew menu as shown in Figure 6. Choosing this option adjusts the probes’ “Actual Deskew” values to the “Recommended Deskew” values. The “Recommended Deskew” value is based upon the probe’s nominal propagation delay which is stored in the probe’s internal memory, assuming the probe is TekVPI® enabled or generally supports automated probe deskew.  Power Supply Measurement and Analysis with 3-PWR Figure 7. Tektronix Deskew Pulse Generator and Deskew Fixture. Figure 8. Tektronix TCP0030 AC/DC Current Probe with Degauss/AutoZero. Setting the propagation delays to their nominal values will come very close to deskewing them correctly, but still may not precisely align the waveforms. In order to precisely align the waveforms for greatest measurement accuracy, the TEK-DPG (Deskew Pulse Generator) and deskew fixture are required. The TEK-DPG provides a source signal to the Power Measurement Deskew Fixture (Tektronix part number 067-1686-XX) as shown in Figure 7. With the probes connected to the deskew fixture, the “Actual Deskew” may be manually dialed-in to change the deskew value to precisely align the waveforms. Eliminating Probe Offset Differential probes tend to have a slight voltage offset. This offset can affect accuracy and must be removed before proceeding with measurements. Most differential voltage probes have built-in DC offset adjustment controls, which makes offset removal a relatively simple procedure. Current probes may also need to be adjusted before making measurements. Current probe offset adjustments are made by nulling the DC balance to a mean value of 0 amperes or as close as possible. TekVPI-enabled probes, such as the TCP0030A AC/DC current probe, have an automatic Degauss/AutoZero procedure built in that’s as simple as pressing a button on the probe compensation box.  Application Note Figure 9. Bandwidth Limiting Filters Available on a 3 Series MDO Oscilloscope with a TDP0500 Attached. A current probe should also include an easy to use degaussing feature. Degauss removes any residual DC flux in the core of the transformer, which may be caused by a large amount of input current. This residual flux results in an output offset error that should be removed to increase the accuracy of the measurements being made. Tektronix TekVPI current probes offer a Degauss warning indicator that alerts the user to perform a degauss operation. Since current probes may have significant drift over time which affects measurement accuracy, a degauss warning indicator is a useful feature. Bandwidth Limiting Filters Limiting the oscilloscope’s bandwidth removes noise or unwanted high frequency content from the displayed waveform, resulting in a cleaner signal. The 3 Series offers built-in bandwidth limiting filters, as shown in Figure 9. In some cases, the probe may also be equipped with bandwidth limiting filters. The user should be careful when using these filters, as high frequency content contained in nth order harmonics may be removed from the measurement. For example, if measuring a 1 MHz signal, and evaluating out to the 40th harmonic, at least 40 MHz of system bandwidth is required. Setting the bandwidth limiting filter to 20 MHz, which is an available option in the example shown in Figure 10, would eliminate the frequency content required for this measurement. Power Supply Measurements Once the measurement system is properly set up, the task of performing power measurements can begin. The common power measurements can be divided into three categories: input analysis, switching device analysis and output analysis. Input Analysis Real-world electrical power lines never supply ideal sine waves, and there is always some distortion and impurity on the line. A switching power supply presents a non-linear load to the source. Because of this, the voltage and current waveforms are not identical. Current is drawn for some portion of the input cycle, causing the generation of harmonics on the input current waveform. Key measurements for analyzing the input of the power supply are: Harmonics Power Quality  Power Supply Measurement and Analysis with 3-PWR Figure 10. Harmonics Analysis. Figure 11. Power Quality Measurements. Switching power supplies tend to generate predominantly odd-order harmonics, which can find their way back into the power grid. The effect is cumulative, and as more and more switching supplies are connected to the grid (for example, as an office adds more desktop computers), the total percentage of harmonic distortion returned to the grid can rise. Since this distortion causes heat buildup in the cabling and transformers of the power grid, it’s necessary to minimize harmonics. Regulatory standards such as IEC61000-3-2 are in place to oversee power quality from a particular non-linear load. Determining the effects of these distortions is an important part of power engineering, and the benefits of using an oscilloscope rather than a multimeter are significant. The measurement system must be able to capture harmonic components up to the 50th harmonic of the fundamental. Power line frequency is usually 50 Hz or 60 Hz; though for some military and avionics applications, the line frequency may be 400 Hz. It should also be noted that signal aberrations may contain spectral components with even higher frequency components. With the high sampling rate of modern oscilloscopes, fast-changing events may be captured with great detail (resolution). In contrast, conventional power meters can overlook signal details due to their relatively slow response time. Performing harmonics analysis is as easy as taking an ordinary waveform measurement. Since the signal in this case is a repeating periodic waveform, it’s a simple matter to trigger and display it. At least five cycles should be displayed to ensure good frequency resolution, and the vertical scale should be set such that the signal occupies as many vertical divisions on the display as possible for best measurement accuracy. Figure 10 shows the result of a harmonic analysis on a power supply’s load current. Users may choose to view the results as a table or a graph and can select whether to view “All, Odd, or Even” harmonics. Harmonics data may be saved as a CSV file to a USB storage device. Total Harmonics Distortion (THD) values relative to the fundamental and RMS value are also displayed. These measurements are useful in analyzing compliance to standards such as IEC61000-3-2 and MIL- STD-1399 that are included in the power application software. Power Quality Power quality does not depend on the electricity producer alone. It also depends on the power supply and the end-user’s load. The power quality characteristics at the power supply define the “health” of the power supply and determine the effects of distortions caused by non-linear loads. As shown in Figure 11, the power application software provides a results table with the following automatic measurements: VRMS and IRMS, Voltage and Current Crest Factors, True Power, Reactive Power, Apparent Power, and Power Factor.  Application Note Figure 12. Switching Loss Measurements on an IGBT. Switching Device Analysis The prevailing DC power supply architecture in most modern systems is the SMPS because of its ability to efficiently handle changing input voltages and loads. The SMPS minimizes the use of lossy components such as resistors and linear-mode transistors, and emphasizes components that are (ideally) lossless. SMPS devices also include a control section containing elements such as pulse-width- modulated regulators, pulse-rate-modulated regulators, and feedback loops. SMPS technology rests on power semiconductor switching devices such as Metal Oxide Semiconductor Field Effect Transistors (MOSFET) and Insulated Gate Bipolar Transistors (IGBT). These devices offer fast switching times and are able to withstand erratic voltage spikes. Additionally, transistors dissipate very little power in either the On or Off states, achieving high efficiency with low heat dissipation. For the most part, the switching device determines the overall performance of an SMPS. Key measurements for switching devices include: Switching Loss Safe Operating Area Slew Rate Switching Loss Transistor switch circuits typically dissipate the most energy during transitions because circuit parasitics prevent the devices from switching instantaneously. The energy lost in a switching device, such as MOSFET or IGBT as it transitions from an OFF to ON state is defined as Turn-on loss. Similarly, Turn-off loss is the energy lost when the switching device transitions from an ON to OFF state. Transistor circuits lose energy during switching due to dissipative elements in the parasitic capacitance and inductance and charge stored in the diode. A proper analysis of these losses is essential to characterize the supply and gauge its efficiency. The switching loss measurements as shown in Figure 12 are made on complete cycles within the selected region of the acquisition (by default, the entire waveform) and the statistics of those measurements are accumulated across the acquisition, but not between acquisitions. A major challenge in measuring Turn-on and Turn-off losses is that the losses occur over very short time periods, while the losses during the remainder of the switching cycle are minimal. This requires that the timing between the voltage and current waveforms is very precise, that measurement system offsets are minimized, and that the measurement’s dynamic range is adequate to accurately measure the On and Off voltages and currents. As discussed earlier, the probe offsets must be nulled out, the current probe must be degaussed to remove any residual DC flux in the probe, and the skew between channels must be minimized.  Power Supply Measurement and Analysis with 3-PWR Figure 13. SOA Mask Testing. Figure 14. Slew Rate Measurements. The other major challenge is the high dynamic range required for accurate switching loss measurements. The voltage across the switching device changes dramatically between the On and Off states, making it difficult to accurately measure both states in a single acquisition. There are three ways to determine the correct values with the 3 Series: Measure the voltage drop across the switching device during conduction. Because this voltage is typically very small compared with the voltage across the switching device when it is not conducting, it is generally not possible to accurately measure both voltages at the same vertical setting on the oscilloscope. Provide the RDS(on) value (best model for MOSFETs) based on the device data sheet. This value is the expected on-resistance between the drain and source of the device when it is conducting. Provide the VCE(sat) value (best model for BJTs and IGBTs) based on the device data sheet. This is the expected saturation voltage from the collector to the emitter of the device when it is saturated. Safe Operating Area (SOA) The Safe Operating Area (SOA) of a transistor defines the conditions over which the device can operate without damage; specifically how much current can run through the transistor at a given voltage. Exceeding these limits may cause the transistor to fail. The SOA is a graphical test technique which accounts for limitations of the switching device such as maximum voltage, maximum current, and maximum power, and assures that the switching device is operating within specified limits. The switching device manufacturer’s data sheet summarizes certain constraints on the switching device. The object is to ensure that the switching device will tolerate the operational boundaries that the power supply must deal with in its end- user environment. SOA test variables may include various load scenarios, operating temperature variations, high and low line input voltages, and more. As depicted in Figure 13, a user- definable mask is created to ensure that the switching device adheres to defined tolerances in regard to voltage, current, and power. Mask violations are reported as failures in the power application. Slew Rate To verify that the switching device is operating at maximum efficiency, the slew rate of the voltage and current signals is measured to verify that the circuit is operating within specifications. As shown in Figure 14, the oscilloscope is used to determine the slew rate of the switching signals by using measurement cursors, simplifying gate drive characterization and switch dv/dt or di/dt calculations.  Application Note Figure 15. Modulation Analysis on an IGBT’s Gate Drive During Power-up. Output Analysis Ideally, the output of a DC power supply should not have any switching harmonics or other non-ideal noise components. Realistically, that is not possible. Output analysis measurements are essential to determine the effects of variations in input voltage or load on the output voltage. These measurements include: Modulation Analysis Ripple Modulation Analysis The digital phosphor acquisition technology of the 3 Series offers unique advantages when troubleshooting designs, especially when identifying excessive modulation effects in a switching power supply. These oscilloscopes have greater than 270,000 wfm/s maximum waveform capture rate, which is many times higher than that of a typical digital storage oscilloscope (DSO). This provides two advantages when investigating modulation effects. First, the oscilloscope is active more of the time, and less time is spent processing waveforms for display. Thus the oscilloscope has significantly more chances to capture the modulation. Second, the digital phosphor display makes it easier to see the modulated waveforms in real time. The display intensifies the areas where the signal trace crosses most frequently, much like an analog scope. The modulation is dimmer than the main waveform that repeats continuously, making it easier to see. Measuring modulation effects with a Tektronix oscilloscope is also easy. Figure 15 shows the pulse width modulated signal controlling the output of a current mode control loop on a power supply. Modulation is important in a feedback system to control the loop. However, too much modulation can cause the loop to become unstable. The red waveform is a math waveform, showing the trend in cycle-to-cycle pulse width measurements made on an IGBT gate drive signal as the power supply’s oscillator starts up. Since the math waveform represents pulse width measurement values (with units of time), variations in pulse widths may be measured using cursors. The math values represent the trends in the selected modulation measurement across the acquired waveform. In this case, it represents the response of the oscillator’s control loop during startup. This modulation analysis could also be used to measure the response of the power supply’s control loop to a change in input voltage (“line regulation”) or a change in load (“load regulation”).  Figure 16. Ripple Measurements. Ripple is the AC voltage that is superimposed onto the DC output of a power supply. It is expressed as a percentage of the normal output voltage or as peak-to-peak volts. Linear power supplies usually see a ripple that is close to twice the line frequency (~120 Hz), whereas switching power supplies may see a switching ripple in the hundreds of kHz. Power Supply Measurement and Analysis with 3-PWR The power supply is integral to virtually every type of line- powered and battery-operated electronic product, and the switch-mode power supply (SMPS) has become the dominant architecture in many applications. A single switch-mode power supply’s performance — or its failure — can affect the fate of a large, costly system. To ensure the reliability, stability, performance, and compliance of an emerging SMPS design, the design engineer must perform many complex power measurements. The Tektronix 3 Series MDO oscilloscopes with a power analysis application module dramatically simplifies the analysis of power supplies. Automated power measurements such as harmonics, power quality, switching loss, safe operating area, slew rate, modulation and ripple ensure fast analysis while simplified setup and deskew of probes provides maximum accuracy. Interactive Probe Selector Tool Need help finding the right probe for your application? The online Tektronix Probe Selector Tool will guide you through a few easy questions to match your need to the right probe. Visit us anytime, anywhere at:   Rev. 02.2018 Find more valuable resources at TEK.COM Copyright © Tektronix. All rights reserved. Tektronix products are covered by U.S. and foreign patents, issued and pending. Information in this publication supersedes that in all previously published material. Specification and price change privileges reserved. TEKTRONIX and TEK are registered trademarks of Tektronix, Inc. All other trade names referenced are the service marks, trademarks or registered trademarks of their respective companies. 05/19 EA 48W-61574-0
Tech history 101 Know your history – IDEs are a developer’s best friend JAXenter Editorial Team social coding women in tech © Shutterstock / Inspiring (modified) As our tech history series winds down, we want to take a moment and spend a little time with a topic near and dear to our hearts: IDEs. How did IDEs become so popular and why have they stayed a thing for over thirty years? Open your textbooks to chapter 10 and we’ll find out! Caesar may have been warned about the Ides, but computer science has long relied on IDEs, or integrated development environments. This integral part of computing has been around since our old friend Anders Hejlsberg came up with TurboPascal in 1983. But, why did this tool catch on with developers? And how come nothing else has replaced it in over thirty years?  Open your books to chapter 10 and we’ll explore more about the wonderful world of IDEs. The dark ages of programming IDEs are a developer’s best friend. After all, without an IDE, we need to do everything by hand. And we mean everything. Some of us are a bit too young to remember the early days of programming, but we’ve heard horror stories about punch cards and completely text-based computer programming. Back in the 1980s, computer programmers had to compose all of their code in a text editor, save it, run it in a separate compiler, see if it worked, write down the errors on paper by hand, and go back to the drawing board in the text editor. (The drawing board being metaphorical, of course.) They had to do this again and again and again, until they finally got a program to work. Philippe Kahn and Anders Hejlsberg had the idea to integrate all the tools between the traditional edit/compile/line cycle, improving productivity. Turbo Pascal shipped initially with a floppy disk containing a custom text editor, a compiler, and all the functionality that was needed to produce executable programs. Additionally, it famously came with zero copy protections. Do you remember how much you could put on a floppy disk? I sure do – 1.44 MB. That was it. Source: Giphy. However, it was still intrinsically limited by the size of your computer’s memory. Remember, back in those days, you’d be lucky to have a computer with 16-bit hardware. Obviously, things changed as computer memory improved and personal computers could actually perform functions like “have a screen and mouse” in the early 1990s. Suddenly, GUIs were a reality, thanks to Windows. An IDE for every need With more memory, you could do more things. This was a quantum leap forward – coding was no longer just an issue of text, but a visual problem that could be solved. Programming could be thought of in graphical terms. The explosion of IDEs can more or less be laid at the feet of the great-granddaddy of most modern IDEs: Visual Basic. Visual Basic arrived in 1991 with the mother of all inventions: drag and drop. It also set off something of an IDE arms race. It was followed by Delphi, a Pascal-based IDE where programmers could design and code as well as test and debug in one program. Delphi was also notable for introducing the concept of building apps from pre-fabricated objects. IDEs helped lower the bar to entry to programming with their relatively easy-to-use setup. Programming became more accessible, taking care of the heavy lifting. Programmers could use existing components to make their code better, improving their overall level. Sure, some people wrote some truly hideous code. But, more importantly, the code ran. You didn’t have to be good. You just had to cobble something together. Source: Giphy. Visual Studio arrived in 1997, one of the first language-agnostic IDEs on the market. However, there was also a great deal of language-specific IDEs, including IBM’s Visual Age for Java, which later turned into our old open source friend Eclipse. This was the genesis for the whole tool ecosystem, which is an integral part of modern day developing. IDEs of today A playground and workstation for developers, today’s IDEs are “a convenient means to browse and manipulate a system’s source code or to obtain helpful documentation on APIs”. There’s nothing but options and alternatives out there for whatever a developer could need. Taking a look at the Top 20 IDEs for November 2018, it’s surprising how many familiar names are on there. More than a few of these programs have been around for some time; Vim in particular has been trucking along for over 26 years. Microsoft’s Visual Basic continues to dominate the field, closely followed by the open source Eclipse Foundation and Google’s Android Studio in a distant third. After that, however, is a long tail of smaller and smaller IDEs. (We’ve covered some of these IDEs before in our Top 5 series, focusing mostly by language over popularity or usage.) Modern developers rely on IDEs more than ever: in the desktop, on the web, and in the cloud. The entire application life-cycle can be kept under one roof, from initialization to the CI/CD pipeline. They’ve come a long way from floppy disks, that’s for sure! Miss a week of class? We’ve got your make-up work right here. Check out other chapters in our Know Your History series! Inline Feedbacks View all comments
Smallwikipedialogo.png This page uses content from Wikipedia. The original article was at United States Air Force. The list of authors can be seen in the page history. As with JROTC Wiki, the text of Wikipedia is available under the GNU Free Documentation License and the Creative Commons Licensed. The United States Air Force (USAF) is the aerial warfare branch of the United States armed forces and one of the seven Uniformed services of the United States|uniformed services of the U.S.. Previously part of the United States Army, the USAF was formed as a separate branch of the military on September 18, 1947.[1] It is the last branch of the United States military to be formed. The USAF is the largest and most technologically advanced air force in the world, with about 6013 manned aircraft in service (4,282 USAF; 1,321 Air National Guard; and 410 Air Force Reserve); approximately 160 Unmanned Combat Air Vehicles, 2161 Cruise missile|Air-Launched Cruise Missiles, and 580 Intercontinental Ballistic Missiles;[2] and as of September 30, 2006, had 334,200 personnel on active duty, 120,369 in the Air Force Reserve Command|Selected and Individual Ready Reserves, and 107,000 in the Air National Guard. An additional 10,675 personnel were in the Standby Reserve, and the Air Force employed 168,558 civilian personnel.[2] The USAF is currently planning a massive Reduction-in-Force (RIF). Because of budget constraints, the USAF will reduce the service's current size by 40,000 full time equivalent positions by 2011, with approximately half to be eliminated in FY 2007. Approximately 35,000 active duty positions (ADPs), or one year's cycle of enlistments and retirements, will be eliminated over 5 years.[3] The current size of the active-duty force is roughly 70% of that of the USAF at the end of the first Gulf War in 1991.[4] Not all of the United States' military combat aircraft are operated by the USAF. The United States Army operates its own helicopters, mostly for support of ground combatants; it as well maintains a small fleet of fixed wing aircraft (mostly Unmanned Aerial Vehicles). The United States Navy|Navy is responsible for the aircraft operating on its aircraft carriers and Naval air stations, and the United States Marine Corps|Marine Corps operates its own combat and transport aircraft. The United States Coast Guard|Coast Guard also maintains transport and search-and-rescue aircraft (SARA), which may be used in a combat and law enforcement role. All branches of the U.S. military operate helicopters. The Department of the Air Force is headed by the civilian United States Secretary of the Air Force|Secretary of the Air Force who heads administrative affairs. The Department of the Air Force is a division of the United States Department of Defense which is headed by the United States Secretary of Defense. The highest ranking military officer in the department is the Chief of Staff of the United States Air Force|Chief of Staff of the Air Force. 1. According to the National Security Act of 1947 (61 Stat. 502) which created the Air Force: In general the United States Air Force shall include aviation forces both combat and service not otherwise assigned. It shall be organized, trained, and equipped primarily for prompt and sustained offensive and defensive air operations. The Air Force shall be responsible for the preparation of the air forces necessary for the effective prosecution of war except as otherwise assigned and, in accordance with integrated joint mobilization plans, for the expansion of the peacetime components of the Air Force to meet the needs of war. 2. §8062 of Title 10 US Code (10 USC 8062) defines the purpose of the Air Force as: • to preserve the peace and security, and provide for the defense, of the United States, the Territories, Commonwealths, and possessions, and any areas occupied by the United States; • to support national policy; • to implement national objectives; • to overcome any nations responsible for aggressive acts that imperil the peace and security of the United States. 3. The stated mission of the USAF today is to "deliver sovereign options for the defense of the United States of America and its global interests — to fly and fight in Air, Space, and Cyberspace".[5] Administrative organization[] Main article: Air Force JROTC Chain of Command Force structure[] The permanent establishment of the USAF, as of 30 September 2006,[6] consisted of: • Active duty forces: • 57 flying wings, 8 space wings, and 55 non-flying wings • 9 flying groups, 8 non-flying groups • 134 flying squadrons, 43 space squadrons • Air Force Reserve • 35 flying wings, 1 space wing • 4 flying groups • 67 flying squadrons, 6 space squadrons • Air National Guard • 87 flying wings • 101 flying squadrons, 4 space squadrons The United States Air Force and its Air Reserve Components field a total of 302 flying squadrons.[7] Operational organization[] The above organizational structure is responsible for the peacetime Organization, Equipping, and Training of aerospace units for operational missions. When required to support operational missions, the National Command Authority directs a Change in Operational Control (CHOP) of these units from their peacetime alignment to a Regional Unified Combatant Command|Combatant Commander (CCDR). In the case of AFSPC, AFSOC, PACAF, and USAFE units, forces are normally employed in-place under their existing CCDR. Likewise, AMC forces operating in support roles retain their componency to USTRANSCOM unless chopped to a Regional CCDR. Aerospace Expeditionary Task Force[] CHOPPED units are referred to as "forces". The top-level structure of these forces is the Air and Space Expeditionary Task Force (AETF). The AETF is the Air Force presentation of forces to a CCDR for the employment of Air Power. Each CCDR is supported by a standing Component Numbered Air Force (C-NAF) to provide planning and execution of aerospace forces in support of CCDR requirements. Each C-NAF consists of a Commander, Air Force Forces (COMAFFOR) and AFFOR/A-staff, and an Air Operations Center (AOC). As needed to support multiple Joint Force Commanders (JFC) in the COCOM's Area of Responsibility (AOR), the C-NAF may deploy Air Component Coordinate Elements (ACCE) to liaise with the JFC. If the Air Force possesses the most strategic air assets in a JFC's area of operations, the COMAFFOR will also serve as the Joint Forces Air Component Commander (JFACC). Commander, Air Force Forces[] The Commander, Air Force Forces (COMAFFOR) is the senior Air Force officer responsible for the employment of Air Power in support of JFC objectives. The COMAFFOR has a special staff and an A-Staff to ensure assigned or attached forces are properly organized, equipped, and trained to support the operational mission. Air Operations Center[] The Air Operations Center (AOC) is the JFACC's Command and Control (Military)|Command and Control (C²) center. This center is responsible for planning and executing air power missions in support of JFC objectives. Air Expeditionary Wings/Groups/Squadrons[] The AETF generates air power to support COCOM objectives from Air Expeditionary Wings (AEW) or Air Expeditionary Groups (AEG). These units are responsible for receiving combat forces from Air Force MAJCOMs, preparing these forces for operational missions, launching and recovering these forces, and eventually returning forces to the MAJCOMs. Theater Air Control Systems control employment of forces during these missions. United States Air Force personnel wear uniforms which are distinct from those of the other branches of the United States Armed Forces. The current uniform is an olive drab/black/brown and tan combination called the Battle Dress Uniform (BDU). Members deployed to an AOR wear a variation of the BDU, tan and brown in color, called the Desert Camouflage Uniform (DCU). A new uniform called the Airman Battle Uniform (ABU) is currently being distributed to some bases, and in a memo from HQ AFPC at Randolph AFB dated September 2007, will be distributed to basic trainees in their clothing issue starting October 2007. The ABU is already authorized for wear, and is scheduled to completely replace the BDU and DCU by November 2011. Awards and badges[] In addition to basic uniform clothing, Badges of the United States Air Force|various badges are used by the USAF to indicate a job assignment or qualification-level for a given assignment. Badges can also be used as merit-based or service-based Awards and decorations of the United States Air Force|awards. Over time, Obsolete badges of the United States military|various badges have been discontinued and are no longer distributed. Grade Structure and Insignias[] Main article: rank The standard USAF uniform is also decorated with an insignia to designate rank. USAF rank is divided between Enlisted rank|enlisted airmen, non-commissioned officers, and commissioned officers, and ranges from "airman basic" to the commissioned rank of general. Promotions are granted based on a combination of test scores, years of experience, and selection board approval. Promotions among enlisted men and non-commissioned officers rankings are generally designated by increasing numbers of insignia chevrons. Commissioned officer rank is designated by bars, oak leaves, a silver eagle, and anywhere from one to five (only in war-time) stars. For cadet rank at the U.S. Air Force Academy, see United States Air Force Academy Cadet Insignia. The United States Air Force does not have an official motto, but there are numerous unofficial slogans such as "Nothing Comes Close" and [[Uno Ab Alto. For many years, the U.S. Air Force used "Aim High" as its recruiting motto; more recently, they have used "Cross Into the Blue", "We've been waiting for you" and "Do Something Amazing", and the newest one, "Above All". [2]. In an ironic note, "Above All" is one translation of a slogan used by the Nazi regime. In German it is "Uber Alles." [8] Each wing, group, or squadron usually has its own motto(s). Information and logos can usually be found on the wing, group, or squadron websites.[9] [[Airman's Creed|The Airman's Creed is a statement introduced in the spring of 2007 to summarize the culture of the Air Force. Notes and References[] 1. 80 P.L. 235, 61 Stat. 495 (1947); Air Force Link, (2006)Factsheets: The U.S. Air Force. Retrieved April 7, 2006. 2. 2.0 2.1 "2007 USAF Almanac: USAF Personnel Strength". AIR FORCE Magazine. Retrieved on 4 May, 2007. 3. Air Force Print News, (2006). "Force shaping necessary for AF budgetary management". Retrieved June 8, 2006. 4. "2006 USAF Almanac: USAF Personnel Strength". AIR FORCE Magazine. Retrieved on 20 Jan, 2007. 1991 510,000; 2006 352,000 5. Air Force Link, (2005). Air Force releases new mission statement. Retrieved December 8, 2005. 6. "2007 USAF Almanac: Major Commands". AIR FORCE Magazine. Retrieved on 9 Feb, 2008. 7. "2007 USAF Almanac: USAF Squadrons By Mission Type". AIR FORCE Magazine. Retrieved on 9 Feb, 2008. 8. yourdictionary.com (2007).[1]. Retrieved 13 March 2007. 9. Military-quotes.com (2006). US Air Force Mottos. Retrieved 4 June 2006. References to U.S. Army predecessors of today's U.S. Air Force are cited under their respective articles. See also[] Further reading[] External links[]
4.1 - Background In this lesson, we learn how to check the appropriateness of a simple linear regression model. Recall that the four conditions ("LINE") that comprise the simple linear regression model are: • Linear Function: The mean of the response, \(\mbox{E}(Y_i)\), at each value of the predictor, \(x_i\), is a Linear function of the \(x_i\). • Independent: The errors, \( \epsilon_{i}\), are Independent. • Normally Distributed: The errors, \( \epsilon_{i}\), at each value of the predictor, \(x_i\), are Normally distributed. • Equal variances: The errors, \( \epsilon_{i}\), at each value of the predictor, \(x_i\), have Equal variances (denoted \(\sigma^{2}\)). An equivalent way to think of the first (linearity) condition is that the mean of the error, \(\mbox{E}(\epsilon_i)\), at each value of the predictor, \(x_i\), is zero. An alternative way to describe all four assumptions is that the errors, \(\epsilon_i\), are independent normal random variables with mean zero and constant variance, \(\sigma^2\). The four conditions of the model pretty much tell us what can go wrong with our model, namely: • The population regression function is not linear. That is, the response \(Y_{i}\) is not a function of linear trend (\( \beta_{0}\) + \( \beta_{1}\) \(x_i\) ) plus some error \(\epsilon_i\) . • The error terms are not independent. • The error terms are not normally distributed. • The error terms do not have equal variance. In this lesson, we learn ways to detect the above four situations, as well as learn how to identify the following two problems: • The model fits all but one or a few unusual observations. That is, are there any "outliers"? • An important predictor variable has been left out of the model. That is, could we do better by adding a second or third predictor into the model, and instead use a multiple regression model to answer our research questions? Before jumping in, let's make sure it's clear why we have to evaluate any regression model that we formulate and subsequently estimate. In short, it's because: • All of the estimates, intervals, and hypothesis tests arising in a regression analysis have been developed assuming that the model is correct. That is, all the formulas depend on the model being correct! • If the model is incorrect, then the formulas and methods we use are at risk of being incorrect. The good news is that some of the model conditions are more forgiving than others. So, we really need to learn when we should worry the most and when it's okay to be more carefree about model violations. Here's a pretty good summary of the situation: • All tests and intervals are very sensitive to even minor departures from independence. • All tests and intervals are sensitive to moderate departures from equal variance. • The hypothesis tests and confidence intervals for \( \beta_{0}\) and \( \beta_{1}\) are fairly "robust" (that is, forgiving) against departures from normality. • Prediction intervals are quite sensitive to departures from normality. The important thing to remember is that the severity of the consequences is always related to the severity of the violation. And, how much you should worry about a model violation depends on how you plan to use your regression model. For example, if all you want to do with your model is test for a relationship between x and y, i.e. test that the slope \( \beta_{1}\) is 0, you should be okay even if it appears that the normality condition is violated. On the other hand, if you want to use your model to predict a future response \(y_{\text{new}}\) , then you are likely to get inaccurate results if the error terms are not normally distributed. In short, you'll need to learn how to worry just the right amount. Worry when you should, and don't ever worry when you shouldn't! And when you are worried, there are remedies available, which we'll learn more about later in the course. For example, one thing to try is transforming either the response variable, predictor variable, or both - there is an example of this in Section 4.8 and we'll see more examples in Lesson 9. This is definitely a lesson in which you are exposed to the idea that data analysis is an art (subjective decisions!) based on science (objective tools!). We might, therefore, call data analysis "an artful science!" Let's get to it! The basic idea of residual analysis Recall that not all of the data points in a sample will fall right on the least squares regression line. The vertical distance between any one data point \(y_i\) and its estimated value \(\hat{y}_i\) is its observed "residual": \(e_i = y_i-\hat{y}_i\) Each observed residual can be thought of as an estimate of the actual unknown "true error" term: \(\epsilon_i = Y_i-E(Y_i)\) Let's look at an illustration of the distinction between a residual \(e_{i}\) and an unknown true error term \( \epsilon_{i}\). The solid line on the plot describes the true (unknown) linear relationship in the population. Most often, we can't know this line. However, if we could, the true error would be the distance from the data point to the solid line. On the other hand, the dashed line on the plot represents the estimated linear relationship for a random sample. The residual error is the distance from the data point to the dashed line. Click on the icon to zoom in and see the two types of errors. The observed residuals should reflect the properties assumed for the unknown true error terms. The basic idea of residual analysis, therefore, is to investigate the observed residuals to see if they behave “properly.” That is, we analyze the residuals to see if they support the assumptions of linearity, independence, normality, and equal variances.
About Charlotte Mew Charlotte Mew was surrounded by mental ill health and death from a young age. Three brothers died while she was still a child and two other siblings were committed to mental institutions. She vowed never to marry, fearful of the mental ill health any children she had might develop. Mew was not a prolific writer but began intermittently publishing poetry and short fiction in magazines. She achieved some recognition after her narrative poem ‘The Farmer’s Bride’ appeared in a journal in 1912, and she began to be invited to readings and gatherings in influential literary circles in London. Her first collection of poetry sold slowly, but a revised edition published in England and America attracted interest and praise. In 1923 literary friends used their influence to secure Mew a small government pension, but she became increasingly isolated and delusional. She entered a nursing home in 1928 but committed suicide by drinking disinfectant. Poems by Charlotte Mew Read by Jo Shapcott Fame - Charlotte Mew - Read by Jo Shapcott Books by Charlotte Mew
Spider & thread veins Small veins can be unsightly and embarrassing. Fortunately, there is a simple, effective answer. Spider veins are a group of dilated veins that appear close to the surface of the skin and look like spider webs or tree branches. They are usually red, blue or purple. Although they can develop anywhere, they are most common on the legs and face. Spider veins are smaller than varicose veins, but they are sometimes located together. The most obvious sign of spider veins is their web-like appearance on the skin. A number of factors increase your risk of developing this condition, including: ageing, heredity (family history of the condition), a history of blood clots, taking oral birth control pills, hormonal changes during puberty or menopause, or hormone replacement therapy, pregnancy, standing or sitting for long periods of time, wearing a girdle or clothing that is too tight, obesity, constipation, sun exposure (in light-skinned people). See below Renew’s treatment choices to address spider and thread veins.
Honey Pacific Northwest Bees 4 Little-Known Honey Facts & How To Help PNW Bees Posted on by Amanda Li. This entry was posted in Eating Well and tagged . Bookmark the permalink. Farmers markets are opening, flowers are blooming, and bees are busy at work. You know how delicious the final product is, but did you know these four facts about our bee friends and the delicious honey they whip up? 1. Like table sugar, honey is mainly composed of the glucose and fructose. But, honey actually contains about 6 more calories per teaspoon compared to sugar (1 tsp honey = 21.3 calories; 1 tsp sugar = 15 calories). Additionally, honey is broken down into further byproducts such as methylglyoxal, giving honey its antioxidant, antibacterial, and analgesic properties. It is for that reason people have used honey for years in wound care and pain management for sore throat and other complications. As they say: “a spoon full of sugar helps the medicine go down!” 1. Many of us are familiar with clover honey, the kind that comes in the bear container at the grocery store, but did you know that honey comes in another 299+ varieties such as buckwheat, tupelo, acacia, chestnut, and orange blossom? Like a fine wine, honey’s flavor, color, and nutritional profile can differ tremendously depending on the varietal of flower from which the bees collect nectar and pollen. Depending on where hives are located, bees may only collect honey from a single type of flower (monofloral honey) or they may feast on multiple types of flowers (polyfloral honey). Even the flavor of monofloral honeys can differ year-to-year and hive-to-hive. 1. Unlike dairy foods, there are no rules or industry standard for the terms “pasteurized”, “natural” or “raw”; these are terms that honey producers can use at their discretion. While dairy is pasteurized to kill harmful organisms, honey is heated to delay the crystallization process. Honey is a natural preservative because harmful organisms cannot survive in it. The single common exception are botulism spores. This, however, is only a concern for infants under the age of one as the pH of their digestive system promotes blooming of the botulism spores into botulinum toxin. For this reason, all types of honey (pasteurized or not!) should be avoided in infants under the age of one. 1. We depend tremendously on bees not just to produce honey, but also to help maintain diversity and affordability in our food supply. These tiny insects are responsible for pollinating about 130 different fruit and vegetable crops. Imagine having 130 less types of fruits and vegetables to choose from in the grocery store or farmers market! We truly wouldn’t have much left on our plate to eat if it wasn’t for these busy creatures and the beekeepers who care for them. We turned to Dr. Chris Takahashi, a UW grad and recreational beekeeper, to learn how we can help.1299 How did you become interested in beekeeping? ​I became interested in bees before I became interested in beekeeping. Bee colonies have amazing emergent behaviors from relatively simple individual behaviors (many of which are amazing in their own right). So much so that I really wanted to see them for myself. What can you tell us about the bee population in the Pacific Northwest? ​PNW bees are in a way fairly lucky. While we don’t get as early a spring as California or other southern latitude states, we also don’t have to worry about harsh winters as you would in the Midwest or northeast. Unfortunately, annual loss rates are still close to the national average (about 40% last year). What should consumers know about organic honey/beekeeping practices? ​As far as I’ve been able to tell, there are no USDA organic guidelines for honey, so it comes down to how the seller wants to market their honey. Assuming your producer’s intentions are pure, bees can forage in up to a four-mile radius. That means you have to check the surrounding 32,000 acres to be confident that your bee has only “organic” forage. What qualities or characteristics would you look for in purchasing honey at the store now that you’re an experienced beekeeper?  ​Consumers tend to like a very clear, golden colored honey, so that’s what ends up in the grocery store. As a result, honey is typically filtered, heated, and comes from a single plant (usually clover). This results in a very consistent homogeneous product but it’s not that interesting of a food. Your best bet is to find a local farmers market and talk to the person selling it. They’ll be able to tell you where it came from and what flowers were blooming when the honey was collected. Flavor can vary with honey and you should try many varieties to find out what you like. Honey should also be slightly cloudy, which is an indication that the pollen hasn’t been filtered out. Any advice for people interested in beekeeping? ​Learn as much as you can before you get bees and continue to learn afterwards. You don’t need one, but having a mentor helps a lot too. Bees aren’t high maintenance pets, but you do have to check in on them from time to time and make adjustments as necessary. Ignoring a bee hive is a good way for them to die or swarm, which hurts productivity and will probably annoy your neighbors. Any advice for people not interested in beekeeping, but still wanting to help preserve the bee population? It’s actually more important to provide a bee-friendly habitat than keep bees themselves, as most honeybee genetic diversity is in feral colonies. Planting bee-friendly flowers (Puget Sound bees has a good local guide), especially those that bloom outside of when blackberry (our major flow) normally blooms is a great help. It’s also important to avoid using chemical pesticides on or near plants that bees forage on. You should also be careful about where you buy your plants. Many plants and seeds come pre-soaked in pesticide. Thanks to Dr. Takahashi for this in-depth information! Let’s all help keep our Pacific Northwest bees buzzing. Amanda SullivanAmanda Sullivan is a registered dietitian and certified nutrition support clinician who works in the Radiation Oncology clinic at the University of Washington Medical Center. Outside of work she enjoys rock climbing, gardening, cooking, playing board games, and spending time with her dog, Hula. This post was originally published in the RD Blog. You can visit the RD Blog and see its archives if you have a UW Medicine ID.
UD#41 Chromatic Wrap-up: Applying the CHROMATIC SCALE Posted on UD #41 CHROMATIC Wrap-up: Applying the CHROMATIC SCALE Ukulele in the Dark with Guido Heistek Use the chromatic scale to: I ended off my last news letter with a list of uses for the chromatic scale. Here is a little expansion on each point and answers to the questions associated with each point. (Please check out last week’s newsletter if you haven’t read it: https://ukuleleinthedark.com/ud-40-chromatic-walk-in-the-park/) 1. Movable chord shapes  Question: How many frets up the neck do I need to move a C chord for it to become an F chord? Thus far we have looked at using the ROOT NOTE POSITION in the chord shape to tell us how to name chords up the neck.We can also use our knowledge of the CHROMATIC SCALE to find and name chords up the neck. OUR GOAL: To move an open C chord up the neck so that it becomes an F chord. How many frets do we need to move it? The answer is in the CHROMATIC SCALE. First let’s go through the chromatic scale from C to F: This tells me I need to move the shape 5 frets up the neck. Here’s another way of looking at it: If we move the C chord shape up the neck one fret at a time we eventually get to an F chord. Here is a C chord: If we move it up one fret we get a C# chord: Move it up one more fret and you get a D chord: If we continue this way and move the shape up the neck one fret at a time, we eventually get to an F chord: D#, E, and finally F! Move a C chord up the neck 5 frets and it becomes an F chord! (Note: THE NUMBER 5 in this diagram is telling use to bar at the 5th fret) Here is the whole process in tab. Hope this makes sense! TRY THIS ONE: How many frets up the neck do you need to move an open A chord in order for it to become a D chord? Answer at the bottom of the page. 2. Scales Question: What are the notes in an E major scale? We began our walking exploration of the CHROMATIC SCALE last newsletter by walking the C major scale. You may have noticed the notes laid out in a certain pattern: This pattern can also be seen when we play a major scale up one string. Take the C major scale which we learned to play up one string in UD #37: C  D  E  F  G  A   B   C The pattern goes like this: Two frets C to D Two frets D to E One fret E to F Two frets F to G Two frets G to A Two frets A to B One fret B to C In terms of the chromatic scale 2 FRETS equals a WHOLE STEP and 1 FRET equals a HALF STEP. So you can see the pattern is the same! All major scales follow this same pattern in the spacing of the notes! All you need to do to create a major scale is to start on a note and follow the pattern. Let me show you have that works: Here is the chromatic scale C to C. Our goal is to create an E major scale, so we start on an E note. Oh Oh, if we start on the E note we’ll run out of space. So, here is the chromatic scale in a circle so you can never run out of space: (Note that the diagram above also shows you your options in terms of naming a note with a sharp or flat. The note between C and D can be called C# or Db.) If we start on an E note and go up a whole step we get an F# note. a whole step up from F# is G#. Up a half step to A. Up a whole step to B. Whole step to C#. Whole step to D#. Half step brings us back to E And so we have the notes in an E major scale: How do I know whether to use # or b to name the notes in a scale? In scales we don’t want to repeat the same letter and we also don’t want to skip a letter. So for E major we don’t want to go E, Gb, G#.  We say  E, F#, G#… So that he letters follow in logical sequence. Let’s do another scale: F major! We start on F. Whole step to G. Whole step to A. Half step to Bb. Whole step to C. Whole step to D. Whole step to E. Half step to F. The notes in an F major scale are F, G, A, Bb, C, D, E, F. The idea is that if you develop a strong sense for the chromatic scale that you can build scales in your head as you need them. Try it next time you are on a long bus or plane ride! 3. Chords Question: Why is the IV Chord in the key of F a Bb  chord? Why isn’t it a B chord? As we learned in UD #17, the chords in a certain key are built off the notes of the scale. The fourth note in an F major scale is a Bb. So the IV chord is Bb, too. Cool eh? 4. Learning the fretboard of your ukulele. Question: What note is on the 4th fret of the E string? This is very similar to question 2. We just go up the E string and use our knowledge of the chromatic scale to guide us. E is open, first fret is F, second fret is F#, 3rd fret is G, 4th fret is G#. Answer: The 4th fret of the E string is G# (or Ab). So if you know the chromatic scale you can always extrapolate on the notes that you do know on the fretboard. Once you know one of the notes on a string you can figure out what the other ones are. Nifty eh? Hope that makes sense. I will see you next newsletter! Best Guido Visit the Ukulele in the Dark Shop! Please share! P.S. I am regularly adding new lessons to Ukulele in the Dark. Please subscribe to my mailing list below to receive every lesson right when it comes out. Be sure not to miss a thing! * indicates required
The project is located in Senegal, more specifically in the town of Sedhiou. This city is qualified as the green lung of Senegal because of its green spaces and is crossed by the Casamance River which allows exchanges between different peoples. As far as the health system is concerned, there is only one hospital for the whole town, which limits access to health care, particularly for people living in remote areas. However, to treat themselves, the population also has recourse to traditional health care, the use of which is only increasing. It is our intention to propose a hospital centre that will provide a solution to the lack of sanitary facilities in the area. The project is inspired by a medicinal plant called securinega virosa, one of the most important drugs in the Senegalese pharmacopoeia. The shape of the project makes a spatial correlation with this plant by using the leaves as our different buildings interconnected by a stem representing the course and the flowers representing our green spaces and relaxation areas. Water is life and has a natural theurapetic effect on patients. To allow access to health care in remote areas, medical booths have been deployed there and are interconnected to the hospital centre via the internet. In addition, drones are used to supply the medical booths in case of emergency. Due to the forecasting system that foresees a slight overflow of the roofing, rainwater from the roofs and rainwater on the platforms will flow directly into the water body. The waste water will be conveyed to the mini degreasing stations planned for its treatment. It will be evacuated through PVC pipes. The water is filtered by an aggregate of pozzolana or pumice stone. The filtered, non-polluting, grease-free water obtained is then conveyed through a pipe to be sent into the water body. The use of dry toilets in the project avoids the management of black water, which is a major source of pollution. A drilling system communicating with a water tower ensures the supply of drinking water to the hospital. The water will be distributed from the water tower to the various points through the appropriate pipes. The water tower is dimensioned so as to be able to contain drinking water reserves over several days in the event of a breakdown of the system booster, in order to have a margin for repair. The project aims to achieve energy sufficiency by making use of the excess sunlight by installing a photovoltaic farm that has been judiciously sized for the occasion, but the hospital will also be supplied with electricity by the national electricity company. As far as the materials are concerned, the walls, false ceilings, as well as the interior and exterior circulation are made of wood. The structure is made of bamboo with a 15cm section. The foundation is floating and made of PVC drums. The hull is made of ETFE which is a very light material, facilitating the passage of light. The different atriums are covered with a raised satin Plexiglas roof allowing the passage of air. In the event of a health pandemic, the amphitheatre's tiers will be modulated into a patient platform. - MEKEMTA Jodel Bismarc - TAKAM KENMOGNE Sidoine Constant - ZOUNGRANA Fatim Liliane Supervisor: Mr. El Hadji Ousmane DIANE Favorited 7 times Rated 54 times
Railroads are critical to the nation’s food security because they transport the feed for livestock as well as the food we eat. In fact, railroads transport some 1.6 million carloads of food products in a typical year, including approximately: • 420,000 carloads of grain mill products (such as corn syrup, flour, animal feed, pet food, and more) • 240,000 carloads of processed soybeans, mainly soybean meal and soybean oil • 270,000 carloads of beverages and extracts • 150,000 carloads of canned and preserved foods • 80,000 carloads of meat and poultry products • 450,000 carloads of other miscellaneous food products. Perishable Products Refrigeration cars (also known as “reefers”) allow the transportation of perishable food products. Refrigeration technology has continued to evolve and cryogenic refrigeration equipment is now common. For example, railroads have introduced state-of-the-art technologies into refrigerated cars, allowing cold food processors and distribution warehouses the ability to reduce emissions while maintaining efficiency. Non-perishable Goods Railroads also carry non-perishable food items, such as corn syrup, flour, pasta and canned goods. Approximately 258,000 loaves of bread can be made from a single railcar of flour. Each year, railroads carry tens of thousands of carloads of flour that end up in bakeries all across the country. But railroads don’t just carry food products destined for human consumption. Each year, railroads transport several hundred thousand carloads of soybean meal, distiller’s dried grains and other types of animal feed and pet food — they even carry birdseed. The Effect of International Trade Railroads and farmers link America to much of the world — particularly Canada and Mexico. One in every 10 planted acres feeds people of these countries. Much of this impact is due to railroads’ scale of operations; one railcar can haul enough wheat for 258,000 loaves of bread, enough soybeans for 415,000 pounds of tofu or enough barley for 94,000 gallons of beer. The freight rail network is deeply entrenched in a national supply chain created in large part by the North American Fair Trade Agreement (NAFTA). For example, trains move chemicals from Canada to Florida, where they are used to create agricultural fertilizers. Railroads will then move the fertilizers to the U.S. heartland where America’s farmers will use them to grow their crops. Farmers will then send the food products by rail to ports for sale on the global market. A dinner in Mexico is made possible, in part, by the very train cars that started in Canada. Fact Sheets
Skip to main content Alexei Navalny's poisoning: What is Novichok, what are the symptoms and where does it come from? Sorry, this video has expired What is Novichok? What is Novichok?(Girish Sawlani) Share this article German authorities say Russian opposition leader Alexei Navalny was poisoned with Novichok. It's the same nerve agent used to poison a former Russian spy and his daughter in 2018.  Here are five quick questions about Novichok, what it does to the body, and what we know about this latest case. 1. What is Novichok and what are the symptoms? Novichok is a highly toxic nerve agent that slows the heart, paralyses the muscles used for breathing and — if the dose is big enough — can lead to death by asphyxiation. A smaller dose may result in seizures, neuromuscular weakness, liver failure and other damage. More generally, nerve agents are highly toxic chemicals that can either be a gas, aerosol or liquid, which poison the nervous system and disrupt bodily functions. Nerve agents can be inhaled, absorbed through the skin or ingested through poisoned food or drinks and — depending on the purity — can appear clear and colourless, and can either be odourless or have a faint sweet smell. While we don't know the exact chemical structure of Novichok, it is believed to be five to 10 times more lethal than other nerve agents such as Sarin gas or VX. Read more: Nerve agents have been linked to a number of high-profile assassinations. Here's how they can destroy the body within minutes. 2. Where does Novichok come from? All nerve agents are man-made. George Braitberg, an emergency toxicologist and professor of emergency medicine at The University of Melbourne, told the ABC the development of Novichok began in the Soviet union sometime between 1970 and 1990. "It was known to be around in the '90s but the development must have started several years before that," he said. Professor Braitberg said when the The Chemical Weapons Convention came into force in 1997, Soviets believed that if they invented something new that was not categorised under the convention they could not be found in breach of that convention. The first nerve agent, Sarin, was developed in Nazi Germany in the late 1930s as a pesticide, and was followed by VX, developed by the British in the 1950s. 3. What do we know about Alexei Navalny's poisoning? A man in a dark jacket stands in the street. Alexei Navalny has been repeatedly arrested and banned from running in the presidential election.(Reuters: Shamil Zhumatov) On August 20, Mr Navalny fell ill on a flight from Siberia to Moscow and went into a coma. The 44-year-old was then taken to a hospital in the Siberian city of Omsk and was placed on an artificial lung ventilator in the intensive care unit. A few days later he was flown to Germany for treatment, where he was taken by ambulance to Berlin's Charite hospital. German doctors carried out extensive tests but refused to comment on the case while results were pending. Then, overnight, Germany's Government announced that the toxicology tests of blood samples proved "without doubt" Mr Navalny was poisoned with Novichok. 4. Have there been previous cases? Sergei Skripal and Yulia Skripal Sergei and Yulia Skripal were found unconscious on a bench in Salisbury on March 4.(AP: Misha Japaridze (L) Facebook: Yulia Skripal (R) The last time Novichok made headlines was in 2018 when former Russian spy Sergei Skripal and his daughter Yulia Skripal were attacked in the city of Salisbury in the UK. The pair were found unconscious on a park bench on March 4. British authorities said the Novichok was delivered in liquid form and that Russia had been spying on the former double agent for at least five years before his attempted assassination. Russia denied any involvement in the attack. The Skripals eventually recovered from the attack and were taken to a secret location after being discharged from hospital. Their case was not the only instance of Novichok poisoning. Former Russian spy Alexander Litvinenko died in London in 2006 after being poisoned with radioactive tea. From his deathbed in 2006, Alexander Litvinenko accused Vladimir Putin of directly ordering his killing. From his deathbed in 2006, Alexander Litvinenko accused Vladimir Putin of directly ordering his killing.(Reuters) 5. So what happens now? For now, Mr Navalny remains in hospital in Berlin. German Chancellor Angela Merkel says Russia has "difficult questions" to answer about the case (which Germany is now classing as attempted murder). British Prime Minister Boris Johnson echoed Ms Merkel's demands for an explanation, saying the UK would "work with international partners to ensure justice is done". For its part, Russia said it was not briefed about the results of these tests and that it has always denied settling scores with poison. After the Salisbury attack, the UK, Australia and European countries expelled Russian diplomats, but there is no indication what action (if any) leaders plan on taking now.
Nesting Dolls One of the most recognized collectables from Eastern Europe has to be the Russian nesting doll, or more accurately, the Matryoshka. Surprisingly, this toy had its origins in China, 1000 AD where they made nesting boxes. A few hundred years later they moved from boxes to the first nesting dolls. Unlike the Russian version, the smallest of the Chinese dolls held a grain of rice. From China the nesting doll made its way to Japan where the dolls were made in the likeness of the god of happiness and longevity with six other lucky gods inside. In the late 1800’s the wife of a wealthy Russian art patron brought a set of the Japanese dolls back to Moscow. It was here that a Russian artist took an interest in these pieces and went to work creating a set of nesting dolls that would help preserve the history of Russian culture. It was this first Matryoshka that started the craze for nesting dolls after winning the bronze medal at the Paris fair in 1900. They became so popular after this that the dolls were in high demand all over the world and continue to be. The name Matryoshka means “little matron” and is traditionally a symbol of motherhood.The largest of the figures is most commonly a woman and her children nest inside of her. In early societies having a large family was a common and important practice. In addition to large families it was not uncommon to have extended families living together in one dwelling. Throughout history the mother or matron of the home would oversee everything that happened in the household and she was often the force that held a family together. In the same way the biggest piece of the Matryoshka keeps all the smaller pieces organized and together. Each member of the family had their unique roll to play. You will often see this depicted in the different figures of the nesting doll set. Each piece painted with something in their hands, showing what their roll in the home was. These days you will find many styles of Matryoshka. Some with political or sports figures, but my favorites are the more traditional ones and those that tell a story. In our shop we have a variety of different styles of Matryoshka from traditional to story telling styles. 7 views0 comments Recent Posts See All
KOREAN Language Korean language is East Asian language . spoken by about 77 million people. It is a member of the Koreanic language family and is the official and national language of both Koreas: North Korea and South Korea, with different standardized official forms used in each country. It is a recognised minority language in the Yanbian Korean Autonomous Prefecture and Changbai Korean Autonomous County of Jilin province, China. It is also spoken in parts of Sakhalin, Russia, and Central Asia. Delhi school of Foreign Languages providing Korean language training for all Lerner's to all over the world..
Definition of Investment Trusts Investment Trust or ‘Investment Trust Company’ is a term you may see when researching investment opportunities or collective investment vehicles. But what does Investment Trust mean? And what are the characteristics of an Investment Trust? The definition of an investment trust An investment trust is a collective investment which pools the money of many investors, spreading it across a diversified portfolio of individual assets. It is a type of ‘fund’. However, not all funds are investment trusts. Other distinct legal forms include: Legal form The name ‘investment trust’ refers to the legal structure that the asset manager uses to create and manage the investments. However, in this particular case, the name is very misleading. While investment trusts did initially operate as common law trusts, ambiguity over this status led them to become public limited companies instead. Therefore it’s more useful to picture an investment trust as a listed business. This is why most investment trusts carry the ‘plc’ suffix after their name. For example; Edinburgh Investment Trust Plc. Most will be quoted companies, i.e. listed on a regulated stock exchange. Characteristics of an investment trust Investment trusts are permitted to borrow funds to allow them to make larger investments. As I explain in my investors guide to spread betting, leverage can increase the risk of an investment. This makes many leveraged investment trusts inappropriate for investors with cautious or moderate risk appetites. If an investment trust is quoted, then investors can buy shares at any time during trading hours through a stockbroker of your choice. This is an advantage over OEICs and Unit Trusts which usually only trade at a single point each day. Gains made by the trust from buying or selling shares are generally exempt from tax. However, the trust will pay a 30% corporation tax rate on its interest or foreign income before it can pay dividends to investors. Investment trusts are closed-ended, which means that the number of shares in issue is fixed, and does not automatically grow or shrink when investors buy shares in the trust. The drawbacks of being close-ended Investment trusts operate like any traditional quoted company and have a fixed number of shares. Cash enters the fund when the shares are originally issued. At that time, the manager purchases assets, and then the gates are closed. Any future investors don’t trade directly with the company, they buy and sell shares with other market participants. If an investor wants to buy £500m shares in an investment trust, they would need to pay whatever price on the market to incentivise shareholders to sell to them. This means that if too much money begins to chase too small an investment trust, the prices of shares begin to increase – despite no change in the value underlying assets in the fund. Likewise, when investors flee an investment trust, they are sometimes prepared to sell for less than the underlying value of assets per share, which depresses the value of an investment trust share below the underlying value of its assets. When an investment trust trades at a price higher than its underlying net asset value (NAV) this is called ‘trading at a premium’. This effectively makes any investment poorer value, as an investor is forced to overpay for the holding. The premium or discount on an investment trust can change, which adds an additional layer of price volatility ontop of the underlying movements in the trust’s holdings. How to buy shares in an investment trust You can acquire shares in an investment trust in the same way you would purchase any shares. Therefore if you have one of the best stocks & shares ISAs, you should be able to search for the investment trust using its name or ticker symbol, and place a buy order at the next available market price. Leave a Reply
Here follows the eight part with a list and some explanation concerning characters in Norwegian folklegends. The characters comes in alphabetic order according to their Norwegian name. Lindorm (serpent) This is a big serpent. It guarded treasure and was able to take people down into the deep of water to eat them. One way to get rid of it was by running 7 times around a campfire with the serpent following you and then lure it into the fire. Lussi was there to make sure that Christmas was done on time. She came three days before Christmas and visited all the houses. She is said to have led a procession of all kinds of strange animals. Last in the procession came a lame hen. If you were working while she was there, she would punish you. One of the punishments was could be that one of your hands would fall off. Lyktemannen (”latern man”) Lyktemannen is only mentioned in a folk legend from the region Rogaland in Norway. It is actually not described as a man (despite the ”man” name), but a child that looked like a glowing fire with a big hat made of bark.
What Level Is B1 English? What Level Is B1 English? What Level Is B1 English? English level B1 is the third level of English in the Common European Framework of Reference (CEFR), a definition of different language levels written by the Council of Europe. In everyday speech, this level would be called “intermediate”, and indeed, that is the official level descriptor in the CEFR. Is B1 fluent? There is a level test in all the languages to know what is your level in this language, there are A1,A2,B1,B2,C1,C2, A1 is a beginner level or basic level, A2 is a higher beginner level, B1 is to be something fluent/semi-fluent in this languages, B2 is a fluent level and it is used with teachers in schools as I think, What is B1 level English in UK? Level B1 corresponds to independent users of the language, i.e. those who have the necessary fluency to communicate without effort with native speakers. What is B2 English level? Level B2: upper independent English level Level B2 corresponds to a more advanced, more independent level than previous levels. A B2 user can communicate easily and spontaneously in a clear and detailed manner. What Level Is B1 English? – Related Questions Is B1 level good? A B1 level of English would be sufficient for interactions with English speakers on familiar topics. According to the official CEFR guidelines, someone at the B1 level in English: Can understand the main points of clear standard input on familiar matters regularly encountered in work, school, leisure, etc. Are native speakers C2? In everyday speech, this level might be called “bilingual”, as in “I am bilingual in English and French.” A well-educated native English speaker is technically at a C2 level. Relatively few English learners reach this level because their professional or academic goals do not require it. How much does B1 exam cost? The B1 test booking fee costs £215 per attempt. Who is exempt from B1 English test? Exemption due to age If you are aged 60-64, you will normally be exempt if the time needed to meet the B1 standard will mean that you will then be aged 65 or over. In order to evidence your age, you must provide evidence that shows this. What is a B1 qualification? A B1 Preliminary qualification shows that you have mastered the basics of English and now have practical language skills for everyday use. This exam is the logical step in your language learning journey between A2 Key and B2 First. Is B2 level fluent? Level B2: Basic Fluency Reaching B2 is generally considered by most people as having basic fluency. You’ll have a working vocabulary of around 4000 words. Is C1 better than B2? B2 is still mostly textbook language – you have some access to native expressions but you still deal with pre-set phrases and usually need to be explained new things. C1 moves towards much more instinctive language – where you just know that something is right and you have a feel for the language. Which is better B1 or B2? Generally speaking, a B1 visa is for business-related projects, while a B2 visa is for tourism and pleasure-travel. The government can also issue a B1/B2 visa to business travelers who plan to travel within the US for tourist activities during their stay in the United States. Is Intermediate better than advanced? ” If you aren’t experienced or knowledgeable but you are fast, you are an Intermediate. ” If you aren’t fast, but you’ve been in the sport for a while and are knowledgeable about the sport, you are an Intermediate. However, if you are both experienced AND fast, it’s time to face facts: You are Advanced. Is B1 German enough? The German government thinks B1 to be enough to get along well enough with the Germans in case you are looking for citizenship status. They say understanding 2,700 words is enough. Download the official list of required vocab for German level B1 here. Are native speakers C1 or C2? Most native speakers do not speak their language at a C2 level. The reason for this is that a language proficiency test measures the speaker’s ability to use the language in it’s standard, correct form. Is Native better than C2? Nope. “Native” means you were raised since childhood in an English-speaking environment. C2 is a rather fuzzy benchmark that tries to measure what you can or can’t do with your language skills. Is C2 the highest level of English? C2 Proficiency, formerly known as Cambridge English: Proficiency (CPE), is one of our Cambridge English Qualifications. It is our highest-level qualification – proof that you are a highly competent speaker of English. A C2 Proficiency qualification shows the world that you have mastered English to an exceptional level. What is the passing marks for B1 test? B1 Preliminary – Level B1 If you achieve a scale score of 140–159 (Pass, Pass with Merit) in your exam, you will receive the Preliminary English Test certificate at Level B1. How long B1 test is valid? Some recognised test qualifications only last for 2 years. You can still use a B1 level qualification that you took more than 2 years ago in 2 situations. Can I do B1 test online? If you want to know your current level of English, we recommend that you take a B1 English test online as part of your preparation process. At ABA English, we have the ideal test for each level, which you can take for free, online, and which will only take a few minutes. How do I choose a B1 English topic? When choosing your topic, you should choose a subject that you know a lot about and can talk about with the examiner for up to 5 minutes such as: a hobby, holiday, your family, your job, your home country. Frank Slide - Outdoor Blog Enable registration in settings - general
Advantages and Disadvantages of Stamped Concrete | Problems with Stamped Concrete Advantages and Disadvantages of Stamped Concrete | Problems with Stamped Concrete Advantages and Disadvantages of Stamped Concrete What is Stamped Concrete? Stamped concrete is a concrete that involves process of applying concrete to a prepared surface in patterns that are stamped. Stamping can enhance the appearance of both utilitarian and decorative concrete surfaces; however stamped concrete is not just an aesthetic enhancement. In many cases, this process provides structural advantages over other forms of construction because it can be constructed in place without the need for formwork and supports. The process of creating decorative concrete dates back many years, with methods that range from simple stencils and molds to free-form earth stamping. Stamped Concrete Vs Pavers The most common use of stamped concrete today is on flooring and driveways. Within the commercial flooring market, this is an especially popular application because it can be very cost effective to install over a base or subfloor without the need for additional labor in finishing. Asphalt driveways and other low traffic floors and surfaces generally use a floating process with a thin layer of concrete or “overlay”. A floating floor is constructed by pouring concrete over the existing surface without using forms. This creates a seamless appearance and is one of the most widely used applications for stamped concrete. Stamped concrete can also be used for slab-on-grade applications with structural reinforcing poured into the voids between the stamping prior to the application of additional concrete. Advantages and Disadvantages of Stamped Concrete These are advantages and disadvantages of Stamped Concrete; Advantages of Stamped Concrete 1. Unique texture and variation– Stamped concrete provides a unique texture to the surface; it is not just a flat ground-covering material like poured concrete, but truly a one of a kind finished concrete surface. 2. Can be constructed in place without footing forms- The need for footing forms is eliminated and slabs are produced that are structurally strong, waterproof, and durable. 3. Waterproofing– Concrete floors can be waterproofed by applying an approved sealant immediately after the concrete has been stamped in place. 4. Free-form design– No limit on the shape or design of the concrete surface. 5. Budget Friendly– In many cases, this process is able to be made more cost effective than other pavers flooring options due to its ability to be constructed in place without forms, labor included. 6. Durability– Concrete floors are extremely durable and long lasting. These floors can withstand a great deal of abuse such as walking on them barefoot and they will not crack or deteriorate with water damage or freezing temperatures 7. Design– Design options are truly endless with this product. The use of different stamps, different colored concrete, and the addition of texture to enhance the surface make this an extremely creative option. Disadvantages of Stamped Concrete 1. Installation process- Because concrete is laid into place rather than poured onto a surface, pouring in a thin layer over existing flooring or over subfloors requires a very steady hand and expertise in mixing proper cement ratios and pouring to avoid air voids in the surface. 2. Cost– This is not a cost effective or affordable option if you need the entire floor covered, however it can be cost effective for small projects such as driveways and walkways. Due to the labor-intensive nature of constructing a stamped concrete floor, it usually costs more to install than other types of floors 1. Durability– Concrete is durable, but not indestructible. Excessive use of acidic chemicals and water damage can cause concrete to deteriorate, although proper sealant application and care can prolong this process. 2. Installation– Waterproofing is an absolute must for concrete floors and driveways that receive a substantial amount of traffic in order to avoid slick or damaged surfaces. Stamping concrete can also produce an inconsistent appearance if it is not done carefully. 3. Scarring– Stamped concrete is not indestructible and can be damaged by heavy equipment, improper maintenance, or abuse. 4. Sealing- Sealing is an absolute must if you plan on having a concrete floor or driveway. As with any surface, dirt, debris, and other contaminants will make their way to the bottom of your footwear. This material must be cleaned from the surface regularly through sweeping and vacuuming to maintain a clean area to walk on and prevent damage to the stamped concrete surface. 1. DIY– The installation process requires expertise in mixing, pouring, and finishing concrete in order to avoid air voids that would compromise the structural integrity of the floor. 2. Solid Base- A floor constructed without formwork must be constructed over a solid base, which can be an extra cost. The process also adds time to construction because it is necessary to stamp each surface separately and wait for the concrete to cure before proceeding with the next piece. 3. Lacks the Visual and Tactile Characteristics- Another disadvantage of Stamped concrete is that it lacks the visual and tactile characteristics of a traditional poured slab. It also requires additional finishes, such as a seal coat to protect it from oils and dirt, or an overlay to improve its appearance. Even with the disadvantages of stamped concrete, this is still a very popular choice for low traffic areas because installation does not require specialized forms, ductwork, or tools. It is also an especially good choice in areas that are hostile to concrete construction such as on sloped terrain and in cold temperatures. Problems with Stamped Concrete Concrete stamped driveways have become a popular choice among homeowners in many areas of the United States (especially in suburban areas), but the truth is that there are several problems with stamped concrete.  Here are some top stamped concrete problems; 1. Chipping and cracking- A common issue with stamped concrete lies with the chipping and cracking of the surface. When working on concrete, it is important to work with a quality wet mix to avoid any unwanted problems with the surface as there is a significant difference in the working properties of wet and dry concrete. A great way to avoid a chipped, cracking surface is to work with the right person for the job. The best way to do this is by checking with your local contractor for the best contractors in town. 2. Concrete Sliding/Settling- Another common concern is the sliding of the concrete over time, which is caused by moisture associated with the concrete. To prevent this, it is recommended to avoid stamping into wet and humid areas, instead allowing it to dry out completely before placing down the concrete. 3. Stamped concrete can be slippery- A common concern with stamped concrete is the risk of concrete getting slippery over time. To prevent this, it is recommended to work with paving subcontractors who are willing to take precautions such as applying anti slip surface treatments to the steps and walkways. 4. Stamped concrete can stain your wood- When painting your wooden furniture, you may be surprised after cleaning and scrubbing at an inconspicuous spot to find that there is a bit of a mark from the concrete or ground underneath. One way to prevent this is to apply a pressure treated wood sealant that will form a barrier for the wood, preventing stains from the concrete in the future. 5. Stamped concrete can be expensive- One of the biggest concerns with stamped concrete is the overall expense of having it done. It is recommended to use what you have and put in blue stone or cobblestone around your house with plants and flowers rather than using stamped concrete. Blue stone and cobblestone is a beautiful end product with natural variations and is much less expensive than having a stamped concrete driveway. 6. Stamped concrete is difficult to repair- Because it is poured in one large slab of concrete, it can be difficult to do repairs and touch ups. This may require replacing the whole slab, which is something that you may not want to do for a driveway. 7. Stamped concrete can result in uneven surfaces- Another problem that people have with stamped concrete is that it can result in an uneven surface where different sections of the concrete settle differently. To avoid this, it is recommended to have a professional contractor who knows how to lay down stamped concrete over a large area. 8. Stamped concrete can be too hot- Have you ever stepped onto a fully sunlit pavement or driveway and burned your feet? This is because the pavement or driveway can get too hot due to the excessive heat absorption from the sun. This is a common problem with stamped concrete because of its smooth surface. One way to help prevent this from happening is to put down some sort of surface treatment that will reduce the amount of heat absorption. 9. Stamped concrete can be too cold- Have you ever stepped onto a patch of stamped concrete and had it look so icy that it feels like you’re walking on ice? This is because the surface temperature of the concrete is much colder than usual during winter. It is recommended to install and/or lay down a protective covering or heating system underneath your driveway or pavement. 10. Stamped concrete is relatively new- Did you know that stamped concrete is actually fairly new in the world of paving? It was only discovered in the 1900s, which means that many people don’t know how to deal with it. One problem with stamped concrete is that most people don’t know how to lay it down properly and may hire someone who doesn’t have enough experience. To avoid this, it is recommended to do your research and find a contractor who will be able to put down your driveway in a professional manner. 11. Choosing the right coloring can be a challenge- It may be a bit daunting to choose a color for your driveway that is worn down by the elements. However, since most stamped concrete is fairly new and people often don’t know how to lay it down properly, it can be difficult to choose a color that will look good and hold up to the elements. One way to avoid this is to find a contractor in your area who is good at knowing how to lay down stamped concrete professionally. 12. Stamped concrete may not be the best solution for all surfaces- Did you know that stamped concrete is only ideal to use on flat surfaces like walkways and driveways? It is important to know that stamped concrete isn’t ideal for other types of surfaces, so it’s important to do your research beforehand. Related Post: Related Posts
Oral and Dental Diseases Dental Care • There are a few points to pay attention to when you’re buying your toothbrush and toothpaste, depending on your health condition and age.  • Neglecting brushing your teeth can lead to plaque accumulation.  • You must brush your teeth at least twice a day for 2 minutes.  • You should see your dentist regularly, preferably every 6 months.  • Children enjoy using electric toothbrushes. This can encourage them to brush their teeth.  Brushing your teeth daily with a toothbrush and toothpaste is the best way to maintain oral and dental hygiene and prevent cavities and resulting diseases. Moreover, looking after your toothbrush gives you a healthy and clean mouth.  Dental health is a key element in maintaining a child's health and preventing diseases. It plays an important role in improving the overall health, as most children between the ages of 5 and 9 suffer from tooth decay, which is a top cause for hospitalization and school absenteeism. The importance of brushing your teeth:  • Prevents accumulation of plaque (a thin sticky layer formed on the surface of the teeth from food residues. It contains bacteria that cause gum disease and tooth decay). • Prevents gingivitis • Saves energy and effort spent on treating dental problems.  • Gives you a fresh breath as a result of keeping away bacteria that cause bad breath.  • Reduces teeth discoloration.  Consequences of neglecting cleaning your teeth: Neglecting to clean your teeth with a brush and a toothpaste leads to the accumulation of plaque on the surface of your teeth. This can cause bacteria to breed, which would, in turn, cause tooth decay and gum gingivitis. Bacteria produce acids that attack the teeth and lead to their breakage and the occurrence of cavities. Choosing your toothbrush: The size and shape of your toothbrush should be suitable for your mouth. Moving the brush all over your teeth should feel easy. It should also have soft nylon bristles so as not to scratch the gums and teeth. Choosing toothpaste: All types of toothpaste share the same basic ingredients. However, additional ingredients may differ from toothpaste to another. Some may be more beneficial than others, so it's important to consider the following when buying a toothpaste: • Should contain fluoride (a substance that greatly helps prevent tooth decay). • Some toothpastes are used for special cases (e.g. whitening, sensitivity, etc.), and it is advised to consult your dentist before you use them. Children's toothpaste: • Under the age of 3: You should start taking care of your child's teeth once they start eating. Use a fluoride toothpaste and an amount as small as a rice grain. • Age 3-6: Use no more than a pea-sized amount for children of this age.  Changing your toothbrush: It is recommended to change your toothbrush every 3 or 4 months, or when its bristles seem frayed. This will ensure it cleans your teeth effectively and does not damage your gum tissues. The duration of brushing your teeth: You must brush your teeth at least twice a day for 2 minutes. Do not brush immediately after eating citrus fruits to preserve the enamel layer. When to see a doctor? You should see your dentist every 6 months. How often you see your dentist depends on your needs. Some people see their dentists every 3 months to 2 years.  Tips to maintain your toothbrush:  • Avoid sharing your toothbrush with others because this can cause transmit bacteria and increase chances of infections, especially in people with lower immunity.  • Wash your toothbrush thoroughly when you're done using it.  • Place the brush vertically after cleaning it to speed up its drying. If you’re placing it near other brushes keep its head away from them to avoid the transfer of bacteria. • Do not unnecessarily cover your toothbrush (e.g. Place it inside a bag) and do not keep it in closed areas because humidity is a breeding ground for bacteria.  • Do not sterilize toothbrushes by placing them inside a dishwasher or a microwave to avoid damaging them.  There are no studies to prove that soaking toothbrushes in mouthwashes or toothbrush sanitizers has additional benefits or harms to oral health. Tips for immunocompromised patients: Immunocompromised patients must stay away from all infection sources. It is essential for them to ask their dentists about the type of mouthwashes or toothbrushes that suit them best.  The steps of brushing your teeth: Brushing teeth can vary based on the condition and age of each individual. Your dentist can explain the most convenient brushing method. In general, it is recommended to use a toothbrush as follows: • Place the brush on the teeth at a 45-degree angle, so that the bristles of the brush touch the tip of the gums and teeth. • Gently brush every 2 or 3 teeth together in a back-and-forth movement from the gums towards the end of the tooth, and so on.  • Brush your back teeth (molars) by also placing the brush at a 45-degree angle. Move it back and forth in a circular motion on all internal surfaces. • Clean the inner side of your teeth using the brush head, moving the brush vertically across the teeth.  • Clean the tips of the teeth, then brush your tongue using a designated brush or your regular toothbrush. Electric toothbrush:  An electric toothbrush helps maintain the health of gums and teeth. Many consider it an easier alternative for a manual brush. With an electric toothbrush, all you have to do is pass it on the surface of the teeth while it performs the cleaning process. Children and toothbrushes:  Most children enjoy using electric toothbrushes, which encourages them to take care of their teeth. Even though electric toothbrushes can be expensive, their advantages make them worth it. How to use an electric toothbrush? 1. Make sure your toothbrush is charged. In most cases, electric toothbrushes come with a light indicator to let you know when they need to be charged.  2. Put the toothpaste on the brush head, and hold it at a 45-degree angle like you do a manual brush. 3. It is unnecessary to press too hard on the toothbrush. It applies enough pressure for you. Some types even have sensors that alert you when the pressure is excessive. 4. Starting with the outer surface of the teeth, slowly move the brush from tooth to tooth, keeping the brush on each tooth for a few seconds before moving on to the other. 5. Gently brush the gums.  6. Make sure your toothbrush reaches all teeth.  The duration of brushing your teeth with an electric toothbrush:  Brush your teeth for at least 2 minutes.  Electric toothbrush timer: Some electric toothbrushes have timers. The timer can keep the brush running for 2 minutes before automatically stopping.  Clinical Education General Department For inquiries, contact us by this e-mail. Last Update : 09 June 2021 08:27 AM Reading times :
Magic Milk Experiment: Easy Science Project for Kids Magic milk is an easy science project your kid can do with very little preparation. It’s a STEM project you can always do on a rainy day or as a boredom buster. Magic Milk Color Last week we came back home after being out for two weeks visiting family. Hungry after a long flight, we opened the fridge only to be met with empty shelves and … expired milk! Yuck! The first thing we did was head to lunch and the grocery store. But mommy’s brain was already churning out ideas of what to do with the expired milk. Throwing it out would be such a waste, but there was no way I was volunteering to drink it. Ah, the magic milk science experiment! We had done it once in the past when the kids were younger (under two years old), but at the time, they just wanted to mix the colors as fast as possible until the milk turned black. Now that they are older, it’s time to redo this fun experiment and explore the science behind it! How to the Color Explosion Magic Milk Experiment 1. Pour a thin layer of milk in the pan until the milk covers the bottom. 2. Add drops of food coloring to the milk. It’s okay if some of them start to mix. If that’s the case, you can talk to your kids about color mixing and how two colors combine to form a new color. Magic Milk Food Coloring Dots 3. Dip the cotton swab in dish soap and put it in the milk. If you don’t have cotton swabs around the house, you can add a drop of dish soap into the milk directly. I recommend the cotton swab just because you can control where you want the dish soap to go better. Magic Milk Dip Cotton Swab in Milk Watch the colors run wild! 4. Once the colors start to slow down, you can repeat #3 and watch the colors explode again. The explosion will slow down and stop eventually. Magic Milk Color Explosion How Does the Magic Milk Experiment Work? We drink milk every day. But have you ever stopped to think about what exactly is in milk? What is the science behind the magic milk science experiment? Milk is composed of water, proteins, fats, vitamins, and minerals. The proteins and fats are susceptible to changes in the milk. What happens when you add detergent to milk? When you add the dish soap, the soap molecules race around to find the fat molecules in the milk. The fat molecules bend, twist, and roll in all directions as the soap molecules try to attach to them. The fat and soap molecules bump into the food coloring molecules, causing the busts of color. Does the Type of Milk Matter? Yes! The higher fat content in the milk, the more fat molecules there are for the dish soap molecules to join up with. You can repeat the experiment using skim, 1%, 2%, and whole milk and see which one produces the best color eruption. You can also repeat the experiment with water to see if the colors will still swirl around as they did in milk. Final Thoughts on the Magic Milk Science Activity If you enjoyed this science experiment, you would love the Snowstorm in a Jar! It’s another fun activity where the kids get to cause an explosion, this time of paint in water and oil! Or give this Exploding Snowman Science Experiment a try. Your kids will be squealing with laughter as they anticipate the bag to explode! Magic milk is an easy science project your kid can do with very little preparation. It’s a STEM project you can always do on a rainy day or as a boredom buster. #parenting #kids #activities #crafts #STEM 2 thoughts on “Magic Milk Experiment: Easy Science Project for Kids” Leave a Comment Scroll to Top
· Naturefund project detail Lower mountain stream close to nature Mittelgebirgsbach Foto: Dr. H. Fried Lower mountain streams are mostly undeveloped and not straight. They twist and turn their way through the landscape. From their mouths to their source the flow speed of streams and rivers gets slower and slower. Detail: Beaver project near Oberzell Unspoilt, cool and always in motion Small lower mountain streams often still flow very fast. As a result they have a characteristic water surface structure with many stones and gravel, very little sand and practically no muddy areas. The water is very clear, usually cool and has a very high oxygen content. Spineless organisms can be found in great abundance, such as water scavenger beetles, stoneflies, caddisfly larvae and black flies. The typical vertebrates living in lower mountain streams are fish such as brown trouts and bullheads or fire salamander larvae. Only a few meanders, but still dynamic The valleys in low mountain ranges are mostly narrow, and ascend quite sharply on both the right and left of the river bank. For this reason their little streams very rarely develop pronounced meanders like large lowland rivers. However, the small streams of low mountain ranges have their own very unique dynamic. Mainly their riverbeds are subject to continuous change. After heavy rain or melting snow, rubble and gravel is moved from one place on the riverbed to another. Therefore, pronounced vegetation is rarely found in these small streams. Join us and help us to buy more land for nature! To our current projectMore about the wet fallow More about the beaver Natur schützen Unterstützen Sie Naturefund und schützen Sie Natur. Naturefund e. V. Karl-Glässing-Straße 5 65183 Wiesbaden +49 611 504 581 011 Jetzt spenden Registriert beim Registergericht Wiesbaden, VR 3739 Umsatzsteuer-Identifikationsnummer: DE 293241718 Freistellungsbescheid: Als gemeinnützige Körperschaft unter der Steuernummer 43/250/76281. Ihre Spende an Naturefund kann steuerlich abgesetzt werden.
Mosquito Net Distribution Programs Even the simplest of diseases can have dire consequences for the poor and the impoverished. Mosquito borne diseases are perfect examples for this. While maintaining simple and basic health protocols can safeguard us from deadly diseases like Dengue, the poor and vulnerable more than often fail to afford the necessary means to abide by those protocols. Thus, in our commitment to public health, we aim to distribute mosquito nets among the poor and vulnerable. Since, proper maintenance of household premises is essential to combat the spread of dengue, we will also conduct awareness programs to inform the public of household safety standards. Thus, we aim not only to protect the poor from mosquito diseases, we will cleanse communities of mosquito habitats.
Question: Brown Bear Brown Bear What Do You See In Baby Sign Language? Is Brown Bear Brown Bear A banned book? How do you introduce brown bear to brown bear? Brown Bear Patterns Introduce the story by taking a quick class poll. Ask: “Who knows this book?” It’s likely that many children not only will be familiar with it but will rank it among their favorites. While browsing the book with children, invite them to share what they see. Why was Brown Bear banned? Memorial Library, the Bill Martin Jr. Scholarship, and who sponsors the Bill Martin Jr. Pat Hardy made the motion to ban Brown Bear, Brown Bear, citing that Bill Martin’s work for adults contains “very strong critiques of capitalism and the American system.” Why was the Giving Tree banned? The Giving Tree was banned from a public library in Colorado in 1988 because it was interpreted as being sexist. Some readers believe that the young boy continually takes from the female tree, without ever giving anything in return. You might be interested:  Readers ask: How Long Does It Take An Alaskan Brown Bear To Dig A Den? Why is brown bear a good book? The repetitive structure makes it a perfect read-aloud with very young children, who delight in guessing what animal comes next. First published in 1967, this book is beloved for its brightly colored art by Eric Carle and simple, rhyming text by Bill Martin Jr. What is the purpose of Brown Bear Brown Bear What Do You See? What is the setting for Brown Bear Brown Bear What Do You See? Brown Bear, Brown Bear is a unique book. The setting is actually in a classroom. Is he bear she bear banned? The beloved children’s novel turned classic animated series is also getting a lot of flack for its depiction of a wholesome and functional family. Berenstain Bears cancelled for being trasnphobic. Who wrote brown bear? Bill Martin, Jr. Leave a Reply
Skip to content Is Katla, one of Iceland’s biggest volcanoes, about to erupt? The Forces of Nature: Visiting a Live Volcano Is Katla about to erupt? Mt. Katla, one of Icelands largest, most active volcanoes, has been making some noise lately. More than 250 earthquakes were measured in the volcanic system. Of those, 6 separate quakes measured above 3 on the Richter scale. The aviation security code of Katla has been raised from green to yellow, roads were closed in the area over the weekend and all organized tours there were cancelled. However she has kept quiet for the last couple of days, the roads have been opened again and there is no immediate danger. How big is Katla, exactly? Pretty darn big. It is 1.512 m (4.961 ft) tall, and has a much greater volume than, for instance, Eyjafjallajökull, which famously stopped air traffic in Europe for weeks in 2010. katla seismic activity 2016 The dots are earthquakes and the stars are earthquakes over 3 richter.Screenshot of seismic measurements during the height of activity from Is Katla about to erupt? The black lines are the calderas. Katla, under Mýrdalsjökull, could eat Eyjafjallajökull in one bite.Image source: How active is Katla? Katla is one of the most active volcanoes in Iceland. She erupts on average every 50-100 years; in all 20 times since the 9th century, when Iceland was first settled by people. There haven’t been any large eruptions since 1918  which some people interpret to mean that she’s overdue for an eruption. Volcanos, however, don’t run on a timer, and there are many factors at play. Katla, much like Eyjafjallajökull, is completely covered by a glacier. This means that when there’s a big eruption, the lava and ice makes for a pretty violent show. But if the eruption isn’t very big, it might not even breach the surface of the glacier. For instance, we’re pretty sure there were minor, pressure-relieving volcanic events in 1955, 1999 and 2011, but there’s no way to be sure since the whole thing is covered by ice. And what exactly would happen if Katla were to erupt? It’s hard to say exactly. It could be a devastating volcanic eruption, a small one that’s just enough to cause some floods, or it could be nothing at all. Historically Katla has had eruptions measuring between 4-6 on the Volcanic Explosivity Index (VEI). Eyjafjallajökull 2010, for comparison, was a 4. The scale is logarithmic so a 6 would be 100 times bigger. Or it could be 100% less. The 1918 eruption extended the southern coast by 5 km (3 mi), but the ‘55, ’99 and ’11 eruptions were so small we’re not even sure they happened. So it could go either way. Then there’s the issue of ash. Iceland has a volcanic eruption roughly every 5 years, and yet Eyjafjallajökull in 2010 was the first time we’ve stopped all the air traffic in Europe. It’s also worth noting that Eyjafjallajökull was a fairly minor eruption. Still, keep in mind, this was due to a very specific set of circumstances such as the composition of the lava, thickness of the ice cover, and direction of the wind. When Katla erupts, the same thing could happen, but it probably wouldn’t. Is Katla about to erupt? Pictured: not that big a deal, really. Bárðarbunga Eruption! Pictured: "not news," apparently. We’ve even had two much bigger eruptions in the years since 2010, (Grímsvötn in 2011 and Bárðarbunga 2014) but you probably never heard about them because air traffic wasn’t affected. Should I cancel my trip to Iceland because of Katla? The short answer is “No, you shouldn’t”. It’s really too early to tell if anything might happen. Cancelling a dream trip to a wonderful place like Iceland is a very drastic thing to do, and we really don’t know that anything is going to happen. Even if she erupts, it could be barely noticeable. And even if it was a robust eruption, Iceland is a pretty large island (bigger than Scotland) so it would have to be pretty cataclysmic to threaten places like Reykjavik or Akureyri. That being said, of course you should monitor the situation and perhaps check with your travel agent if your’re insured for “acts of God” such as volcanic eruptions. And you should definitely check with locals before camping or hiking anywhere in the area. So should I BOOK a trip to Iceland to see Katla erupt? Again, no. I won’t promise that Katla won’t erupt, but booking a ticket solely for the purpose of seeing Katla erupt is extremely optimistic. Of course, booking a trip to Iceland is always a great idea and there are plenty of geothermal areas that are interesting to visit even if there isn’t a volcanic eruption going on, but Katla isn’t an attraction you can rely on. So tell me really, is Katla going to erupt? The only safe answer to this question is that it probably will at some point. The evidence, again, is mixed. From September 28 to October 1 there was a huge spike in earthquake activity in the region, glacial rivers grew and contained traces of volcanic gases, but since then it has been quiet. This happened last in 2011 but no eruption followed (or, if it did, it was a tiny one that didn’t even break the ice). The fact that it’s been unusually long since the last eruption could mean that she’s due for a big one, or it could mean that she’s slowing down or dying altogether. A dormant volcano is classified as one that has not erupted for 10.000 years, and so it would be a while before it was re-classified, even if she did decide to never erupt again. So don’t freak out yet, but don’t rule it out, either. 2011 Katla activity Seismic activity in Katla throughout the yearsImage: Gunn­ar B. Guðmunds­son/Veður­stofa Íslands Explore our site for more information about Icelandic volcanoes. For even more information, we recommend a visit to the Volcano House on Tryggvatata 11, Reykjavik. Related Posts
Skip to main content FRISCO APPT | 972-210-2100 Williams Eye Care - Frisco 2601 Preston Road, Suite 2124 Frisco, TX 75034 FAIRVIEW APPT | 972-218-0042  Williams Eye Care - Fairview 120 Town Place Fairview, TX 75069 Home » Eye Care Services In Fairview & Frisco » Your Eye Health » Eye Exams » Why are Eye Exams Important? Why are Eye Exams Important? Who should get their eyes examined? Eye examinations are an important part of health maintenance for everyone. Adults should have their eyes tested to keep their prescriptions current and to check for early signs of eye disease. For children, eye exams can play an important role in normal development. What is the eye doctor checking for? • Amblyopia: This occurs when the eyes are misaligned or when one eye has a much different prescription than the other. The brain will "shut off" the image from the turned or blurry eye. If left untreated, amblyopia can stunt the visual development of the affected eye, resulting in permanent vision impairment. Amblyopia is often treated by patching the stronger eye for periods of time. • Strabismus: Strabismus is defined as crossed or turned eyes. Your eye doctor will check your eyes' alignment to be sure that they are working together. Strabismus causes problems with depth perception and can lead to amblyopia. • Other Diseases: Your eye doctor can detect early signs of some systemic conditions and diseases by looking at your eye's blood vessels, retina and so forth. They may be able to tell you if you are developing high blood pressure, high cholesterol or other problems.For example, diabetes can cause small blood vessel leaks or bleeding in the eye, as well as swelling of the macula (the most sensitive part of the retina), which can lead to vision loss. It's estimated that one-third of Americans who have diabetes don't know it; your eye doctor may detect the disease before your primary care physician does, especially if you're overdue for a physical. What's the difference between a vision screening and a complete eye exam? Vision screenings are general eye tests that are meant to help identify people who are at risk for vision problems. Screenings include brief vision tests performed by a school nurse, pediatrician or volunteers. The eye test you take when you get your driver's license renewed is another example of a vision screening. A comprehensive eye examination is performed by an eye doctor and will involve careful testing of all aspects of your vision. Based upon the results of your exam, your doctor will then recommend a treatment plan for your individual needs. Remember, only an eye doctor can provide a comprehensive eye exam. Most family physicians and pediatricians are not fully trained to do this, and studies have shown that they can miss important vision problems that require treatment. For more information on eye exams, visit All About Vision®.
Data breach vs. data leak explained The number of reported data breaches and data leaks are on the rise with national data protection authorities such as the ICO, as organizations struggle to deploy effective data security measures that can protect against both external as well as internal threats. High profile data breach incidents, such as the incident related to the hotel chain Marriott International several years ago, exposed the information of over 330 million customers and resulted in a £18.4 million GDPR fine from the ICO. In the Netherlands, the national health authority (GGD), experienced multiple data leaks with their coronavirus track-and-trace programme. The GGD confirmed the leaks included personal information such as the names, addresses, social security numbers, telephone numbers, and test results for thousands of people. On the surface, there’s no apparent difference between both incidents. However, they are distinctly opposite in nature. In this article, we’ll outline the differences in both scenarios. Additionally, we’ll explain what steps you can take to optimize your data security and improve DLP across your organization. What's a data breach? A data breach could be a phrase that is more commonly used when talking about the exposure of confidential details from an external data source. A data breach is a direct attack on private data by an unauthorized entity. There are numerous examples of data breaches. For instance, hackers that penetrate a computer database, or somebody who coerces you into giving access to data they should not have. In the case of Marriott International, hackers planted malware in Marriott's systems sometime in 2014 but this was not detected until 2018. It led to the deliberate exposure of millions of guests' private data. It is widely believed that this breach could have been detected sooner if the company had regularly practiced standard security audits. What's a data leak? Conversely, a data leak is the unauthorized transmission of information from inside an organization to an external recipient(s). The term is used to describe data that is transferred physically as well as digitally. The majority of data leak incidents happen online, more specifically via email and file transfer exchange. These incidents stem from a variety of causes, often as emails sent to the wrong person due to human error, or sensitive information being disclosed inadvertently in response to a request. Most of the reported data leak incidents are unintentional and non-malicious in nature, and often account for over 80% of reported data leaks in the UK. However, in the case of the GGD data leak incidents and other high profile cases widely-reported by the global media, they are often intended to expose or denigrate an institution or specific individuals. It's important to note that these types of data leaks are relatively uncommon, in comparison with lower profile data leaks that happen every day simply due to human error.  The key distinction of a data leak incident is that it happens from the inside - out. A data breach occurs the other way around, from the outside - in.  The incidents at the GGD were classified as data leaks, as the sensitive information was put at risk due to internal factors. The Marriott International case was classified as a data breach. It was a direct attack from an external entity (hackers) that implanted Remote Access Trojan (RAT) along with MimiKatz, a tool for sniffing out username/password combinations in system memory. Together, these two tools gave the perpetrators control of the administrator account. The actions taken by hackers, along with Marriott International's insufficient data security protocol, created the perfect storm for an online security catastrophe. Hundreds of millions of people had their passport and credit card numbers compromised, which could have disastrous personal impact on the affected individuals.  How to prevent and mitigate data exposure Unfortunately, it’s impossible to entirely prevent the threat of data breaches related to 3rd party services, such as social networking websites, ecommerce websites, and other online services. Cybercriminals are always adapting their methods, and it's incredibly challenging to stay abreast of their tactics. Nevertheless, there are several techniques you can deploy to reduce the potential threat to your company and customers or other contacts. Security measures regarding data breaches must be addressed on an individual level.  At a minimum, standard cybersecurity practices should always be in place when connecting to online networks, such as: • Use a firewall • Document your cybersecurity policies • Mobile device security protocols • Educate all employees regarding data security best practices • Enforce safe password practices • Regularly backup all data • Install anti-malware software • Use multifactor identification On the flip side, data leakage prevention is much simpler. It may come as a surprise, but the primary source of data leaks come down to simple human error caused by staff. Reports from the ICO routinely show that accidental mistakes due to human error represent more than 80% of data leaks in the UK. Meanwhile, errors that occurred during emailing were responsible for over 60% of the data leaks. These numbers prove that the implementation of a company-wide secure email platform is imperative, regardless of the size of the organization. Taking this action alone could address up to 60% of the data leakage threat. There are many players in the secure email industry but most of them focus primarily on encryption. There are other secure email platforms such as Zivver which are additionally designed to prevent human error and help mitigate data leaks. Zivver, for example, provides organizations with the following:  • Real-time monitoring of recipients, email, and attachments • Instant email recall  • Asymmetrical zero-knowledge encryption • 2FA for accessing emails • Outlook and Gmail plugin • Web and mobile applications • Free guest user support • Secure Conversation Starters feature • Corporate guest branding options There is currently no solution that addresses the threat of data loss from both breaches (external) and leaks (internal). However, the implementation of a secure communication platform, combined with standard cybersecurity practices, could significantly diminish the threat of a damaging data leak or breach within an organization. Additionally, if an incident occurs, the simple fact of having established online security protocols would help to mitigate the damage. It also demonstrates to your clients and reporting authorities that your company takes data protection and all that it entails very seriously. In a post GDPR and Data Protection Act (DPA) landscape, companies can no longer afford to be lax on email and file transfer security.  Zivver can help your organization prevent accidental data leaks and comply with data protection regulations such as the GDPR, DPA and CCPA. The service integrates directly with the most popular email clients and can be up and running quickly with minimal training required.  Written by Renato Zamagna Originally published on November 28, 2019 Last update on August 9, 2021
The History Of Great Chesterford Homepage Great Chesterford Index Page Great Chesterford is an ancient village with many  listed buildings situated on the banks of the River Cam, or Granta, on the boundary of Essex and Cambridgeshire. The church, All Saints, dates from the 13th century, and has had many additions over the years. Rumour has it that silver bells which hung in the church tower, were hidden in an underground passageway which ran between the Church, the Old Vicarage (haunted) and the Crown House Hotel to keep them safe from government soldiers. They have never been found, although some traces of the passageway have been uncovered. The land around Great Chesterford has been inhabited for centuries, and there have been many archaeological finds e.g. Bronze Age beakers, Belgic pottery and jewellery, and many Roman artefacts which can be found in both Saffron Walden and Cambridge museums. In the 1st century AD, a Romano-British civil settlement was established near the river, occupying an important site en route between London, Cambridge and Newmarket. They erected many buildings,including a tax office, and a  temple which was excavated to the east of the town near the Belgic cemetery. In the 4th century the Romans built a wall around the town – remains have been found and its exact location is known.  In fact it passed underneath what is now the Crown House Hotel.  After the Romans left, it was presumed that there was continuity of occupation through the Saxon period, probably outside the Roman town. The only actual evidence of Saxon occupation is found in the burial sites. Medieval development was in the centre of the village. The name Chesterford is first mentioned in a document in 1004, and again in 1086 in the Domesday Book. In 1459 the Rector Thomas Hyll endowed a charity for the benefit of needy parishioners. This still exists today.  In 1514 a school was licensed, and in 1540 Gt. Chesterford was described as being a purely agricultural community. By medieval times Great Chesterford was a town of some importance with a weekly market (confirmed later by a charter from Charles I in 1634), and a Fair held on St John the Baptist Day. By 1635 it grew in importance as a staging post for the Newmarket Races, often used by Charles I, who drew quite a crowd of onlookers. Complaints about gambling and noisy revelry at the Crown House (then a coaching inn) and its environs on Easter Sunday by travellers to the races eventually led to a ban on Sunday racing. Newmarket Races adhere to the ban to this day. In 1801 it had a population of 600, and in 1804, the Enclosure Act had a profound effect on villagers due to the division of land. By 1841, the population had grown to 917, despite the terrible infant mortality rate. 1848-1851 saw the building of the short-lived Great Chesterford toNewmarket branch line for the benefit of racegoers coming from London. The main line station in the village today still provides quick and easy access for commuters to London and Cambridge, thus assuring the continued popularity of Gt. Chesterford because of its position as a main thoroughfare – just as in Roman times.
1. Classify Microbes ? 2. Write an account on staining techniques ? 3. Write briefly about differential staining techniques ? 4. What are the isolation techniques used for micro organisms ? Explain in detail ? 1. On the basis of shape bacteria are classified how many major types? A. Four types B. Five types C. Six types D. Eight types 2. A common characteristic of archaebacteria……? A. Structure of cell membrane B. Structure of cell wall C. Has fatty acid synthetase D. Structure of flagellin protein 3. Staining material of gram positive bacterium is …….? A. Fast green B. Haematoxylon C. Crystal violet D. Safranin 4. Gram staining is an example for…….? A. Simple staining B. Differential staining C. Negative staining D. None of these   5. If only one stain is used for staining a specimen…; A. Simple staining B. Negative staining C. Differential staining D. None of these   6. Separation of a single colony is…..; A. Pure-culturing B. Isolation C. Separation D. Both a and b      7. Which of the staining technique helps in demonstrating spore structure in bacteria as well as free spores? A. Acid-fast stain B. Endospore stain C. Capsule stain D. Flagella stain 8. In Gram-staining, iodine is used as a ______________? A. Fixative B. Mordant C. Solublizer D. Stain 9. The term prokaryotes refers to which of the following? A. Very small organisms B. Unicellular organisms that have no nucleus C. Multicellular organisms D. Cells that resemble animal cells more than plant cells 10. Which of the following dye is commonly used for the Negative staining technique? A. Crystal violet B. India ink C. Methylene blue D. Iodine 11. Which of the following method can be used to determine the number of bacteria quantitatively? A. Streak-plate B. Spread-plate C. Pour plate D. Pour-plate and spread plate 12. Loop wire is used in which of the following techniques? A. Pour-plate B. Streak-plate C. Spread-plate D. Roll-tube technique Answers : 1. A. Four 2. C. Has fatty acid synthetase 3. C. Crystal violet 4. B. Differential staining 5. A. Simple staining 6. B. Isolation 7. B. Endospore stain 8. B. Mordant 9. B. Unicellular organisms that have no nucleus 10. B. Indian Ink 11. D. Pour-plate and spread plate 12. B. Streak-plate Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
This post discusses terms relevant to animals that would have been present during Helleno-Uralic contact, due to their proposed loaning. Previously discussed were HFS nákā (the skin of an animal) and (e)pʰolkḗ (a vessel that might have been towed by animals, such as reindeer). apsí– ~ (h)apsí- mesh of a net (HS); net (HMa.);? mesh net (HSMa.?) PS *vuopsë;? Ma. vapš / вапш <? He. apsí- / ἀψίς < háptō / ἅπτω < ? Con.: G hābaz > EPS *ap(a/i)si > PS *vuopsë (Kallio 2009, p. 36) The phonological advantages of a He. > PS (vs. G > PS) loan are: Initial h- could be optional; medial -ps- is explained; and final -i(-) is explained. However, the syllable stress, and absence of final -s, in S are unclear. It is also unclear how both HS apsí– and HS apʰḗ (> PS *āppē) can be phonologically explained as loans into Sami, given their mutual derivation from He. háptō. However, this incongruency might be explained by rapid pace of PS vowel shifts, as discussed by Petri Kallio re: G > S loans (Kallio 2009, p. 37). In this model, HS apsí– would have been loaned earlier than apʰḗ. Re: Ma.: Cf. vapš < vaptáš / вапташ ‘to tangle up’ with He. (h)apsí- < háptō ‘to fasten or bind to’. However, a paradigm is not reconstructed for He. (h)a- >> Ma. va-. magpie (HF) B (cf. Lit. šárka) ?> F harakka ?> He. karakáksa / καρακάξα* < ? Two phonological problems are presented by the proposal of HF karakáksa: The correspondence of F h- = He. k-; and the He. final-syllable -ksa. These are both left unresolved at present: While F h- = He. kʰ- is precedented, the phonological environment that would result in F h- = He. k- is not identified; and the He. final-syllable -ksa is not identified as a morpheme. *LSJ:GM defines He. karakáksa as “κίσσα“, which can refer to either a type of jay (Garrulus glandarius) or magpie (Pica caudata) (LSJ:FEE). He.-language Wikipedia identifies the karakáksa / καρακάξα as the Eurasian magpie. wolf (Ud.), dog (He.) Ud. kion / кион <? He. kǐ́ōn / κύων << PIE *ḱu̯ōn Cf. Ko. köin / кӧин. However, Riho Grünthal writes that “the Udmurt and Komi variants suggest different reconstructive forms”. If Ud. kion was loaned from He. kǐ́ōn, this suggests that loaning was synchronous with other HU kǐ- terms. kórak- ~ korák- crow (HMa.) Ma. korák / корак <<? He. kórak- / κόρᾰξ ~ korák- / κοράκι(ον) <1 PIE *kor- It can be difficult to propose ornithological etymologies due to extra-familial similarities (eg: Fi. kurki ‘crane’ =? Sumerian If HMa. korak- is correct, it is unclear from which He. form loaning into PMa. would have taken place: He. koráki(on) matches Ma. syllable stress; but a HMa. paradigm has not been reconstructed that would explain Ma. loss of He. -i(on). squirrel (FP?); tail (He.) FP? *ora <? He. ourā́ / οὐρά <1 PIE *h₁ors- ‘hindmost’ (cf. He. ὄρρος) The He. term for ‘squirrel’, skíouros / σκίουρος, has been etymologized from skiá / σκιά ‘shadow’ + ourā́: Thus “shadow-tail”. However, this etymology has been disputed. The significance of the squirrel’s tail is implied in HFP? ourā́. dirt, excrement (F); dung, mud (He.) FU *pućka ~ *paćka > F paska ?> He. páskos / πάσκος < ? If FUg. *pućka is the correct form, then Fi. paska shows the greatest phonological affinity with He. páskos. The revision of F -a with He. -os is reminiscent of other F > He. loans, such as HF laĩpʰos and nákos. red (F); hair (FUg.); red, red hair (He.); red hair? (HU) FUg. *puna <? He. purrā́ / πυρρά < ? He. -rr- is unprecedented in HU: So it is unclear what its outcome in a H > U loan might be. If a feminine term, HFUg. purrā́ might have referred to the red squirrel (Fi. punaorava <<<? HU purrā́ ourā́). However, most He. terms for human and animal hair are feminine (cf. θρίξ, κόμη, ἔθειρα, χαίτη): So HFUg. purrā́ could simply be connected to a He. term for hair that hasn’t been reconstructed in HU; or, since ‘hair’ is already implied in He., it could describe a female. butt (HF); tail (Er.,? He.); butt, tail (HFV?) Fi. pylly (SSS),? Er. pulo / пуло <?> He. pýnnos / πύννος < ? The meaning ‘tail’ attributed to He. pýnnos is by equation with πρωκτός. The primary meaning reconstructed is HF ‘butt’. Also compare Ne. pūna ‘behind’ (preposition; Lyublinskaya). síka ~ s̜íka pig (HF ~ HFV) Fi. sika <(<) PF *cika ~ PFV *tika ?> He. síka / σίκα < ? He. síka is from Laconian Doric: the dialect of Sparta. This does not necessarily mean that Spartans were involved in HF(V) contact: Only that the term was only attested in Laconian. The potential effects of assibilation on a loan into He. are unclear: So it is unclear what FV form might have been loaned into He. Assibilation is already a H feature (cf. HFUg. s͔éhō; HF sō̃ma ~ s͔ō̃mə). Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
Fakulta matematiky, fyziky a informatiky Univerzita Komenského v Bratislave Developing Critical Thinking Skills in Physics Classes in Critical Thinking: Theories, Methods and Challenges / Klára Velmovská, Lukáš Bartošovič 11. 04. 2016 13.36 hod. Od: Klára Velmovská Critical thinking, being a general competency, is usable in different professions and areas of human life. In most professions, the crucial ability is to be capable of problem-solving and decision-making. If one needs to make a decision, it is the critical thinking aspect that is most helpful in making the right decision. Nowadays, much more important than to know how to find information is the ability to meaningfully process it. Critical thinking includes higher-order cognitive operations, such as interpretation, analysis, evaluation, inference, explanation and self-regulation. The authors of this book examine the theories, methods and challenges of critical thinking and its applications in the real world. Vydavateľstvo: Nova Science Publishers, New York ISBN:  978-1-63484-349-2 Rok vydania: 2016  Ďalšie informácie
We know Quran is a concise book, not a single word there is without reason. Every single word is decorated and managed like a pearl in necklace, and not a single word wasted but when you see the Surah Rahman a single ayah "Fabe-aiye alae ..." repeated 31 times. What could be the reason of using it again and again? • 1 In surat al-Qamar there's also a four times repetition there are many verses all over the Qur'an that are repeated on the whole or as major parts. In Arabic repetition is a way to emphasize things. – Medi1Saif Aug 29 '18 at 7:13 As said in my comment repetition in Arabic language is a way to emphasize things. On the repeated statement itself Before addressing this with details and quotes from scholars I'd like to point at two ahadith ibn Kathir has mentioned in his tafsir (see for example in qtafsir) in the introduction of the surah: • Jabir [may Allah be pleased with him] said: “The Messenger of Allah came out to his Companions, and recited Surat Ar-Rahman from its beginning to its end for them, and they were silent. So he said: ‘I recited it to the Jinns on the ‘Night of the Jinns,’ and they had a better response to it than you did. Each time I came to Allah’s saying: ‘Which of your Lords favor do you deny.’ They said: “We do not deny any of Your favors our Lord! And Yours is praise.” (Jami' at-Tirmidhi, ibn Kathir said it was also compiled by al-Bazzar) • Abu Ja`far Ibn Jarir recorded that 'Abdullah bin 'Umar said that the Messenger of Allah recited Surat Ar-Rahman, or it was recited before him, and he said, (Why do I hear the Jinn giving a better response to their Lord than you) They said, "Why is that, O Allah's Messenger" He said, (Whenever I recited the statement of Allah the Exalted, (Then which of the blessings of your Lord will you both deny)( The Jinn responded by saying, "None of the favors of our Lord do we deny.'')" Al-Hafiz Al-Bazzar also collected this Hadith. (Source qtafsir) Note that the dual plural used in these verses "فبأي آلاء ربكما تكذبان" is referring to the two species or creation of Allah who are addressed by the words of the Qur'an: humans and Jinn. In surat an-Najm (53:55) when Allah addressed the prophet () -only- the Qur'an used the singular: فَبِأَيِّ آلَاءِ رَبِّكَ تَتَمَارَىٰ On pseudo scientific numerical interpretations You may find some pseudo scientific proofs saying that this is related to the number 7 and creating a relation between the 31 repetitions and some picked verses of the surah as the first verse in which this is quoted is verse 13 and the letters of this verses are each time 18 (13+18=31) and the number which is generated when placing the verse numbers in a raw is a multiple of 7 etc. Note that this applies only for the Kufi count (See also my answer on How many ayaths are there in Al-Quran?) which is used in Kufi qiraa't of the Qur'an such as Hafs 'an 'Assim as they divide the first verse of the surah into two as for the majority (all other counts) the verses: The Most Merciful, Taught the Qur'an (55:1-2) actually is one single ayah (verse) so the scholars have different opinions about the number of verses in this surah between 76-78 verses (al-Qurtobi quoted it is 76 -see here in Arabic- while the Kufi count is 78). On repetitions in the Qur'an generally The main reason of repetitions in the Qur'an is to emphasize a meaning to enforce it and to confirm it. The Qur'an actually includes different types of repetitions: • Words or expressions are repeated often in the same verse. • There are verses that have been repeated fully or partially in different surah's of the Qur'an. • Often only the meaning of a verse is repeated without using the same words. • In surat a-Shu'ara' (26), al-Qamar (54), ar-Rahman (55) and al-Mursalat (77) it is a repetition of one exact verse in the same surah. • There are many full or partial verse "duplicates" one might say. Many stories are re-narrated in many cases from different perspectives. Sheikh al-Buty (may Allah have mercy on him) held some lectures showing the new information and lessons given by each repetition of the story by changing the perspective (The story of Adam () and Iblees and the story of Musa () are some examples here). • ... and more I forgot or I'm not aware of. The scholars said about the repetitions in the Qur'an (Source fatwa islamqa #82856): • Al-Suyooti (may Allaah have mercy on him) said: There are a number of reasons for repetition: This includes confirmation. It is said that if words are repeated the meaning is confirmed. Allaah has indicated the reason why He repeats stories and reminders in the Qur’aan, as He says (interpretation of the meaning): “and have explained therein in detail the warnings, in order that they may fear Allaah, or that it may cause them to have a lesson from it” [Ta-Ha 20:113] It also includes emphasis. It also includes highlighting a point so that the words will be accepted, such as the verse: “And the man who believed said: ‘O my people! Follow me, I will guide you to the way of right conduct [i.e. guide you to Allaah’s religion of Islamic Monotheism with which Moosa (Moses) has been sent]. (39) "O my people! Truly, this life of the world is nothing but a (quick passing) enjoyment” [Ghaafir 40:38]. In the passage the call is repeated for this reason. Another example is if the speech is lengthy and there is the fear that what was said at the beginning may be forgotten, so it is repeated a second time to keep the idea fresh. For example, in the verses: “Then, verily, your Lord __ for those who do evil (commit sins and are disobedient to Allaah) in ignorance and afterward repent and do righteous deeds, verily, your Lord thereafter, (to such) is Oft‑Forgiving, Most Merciful” [al-Nahl 16:119] “Then, verily, your Lord _for those who emigrated after they had been put to trials and thereafter strove hard and fought (for the Cause of Allaah) and were patient, verily, your Lord afterward” [al-Nahl 16:110] “And when there came to them (the Jews), a Book (this Qur’aan) from Allaah confirming what is with them [the Tawraat (Torah) and the Injeel (Gospel)], although aforetime they had invoked Allaah (for coming of Muhammad صلى الله عليه وسلم) in order to gain victory over those who disbelieved, then when there came to them that which they had recognised, they disbelieved in it” [al-Baqarah 2:89] “Think not that those who rejoice in what they have done (or brought about), and love to be praised for what they have not done,— think not you that they are rescued from the torment” [Aal ‘Imraan 3:188] “Verily, I saw (in a dream) eleven stars and the sun and the moon — I saw them” [Yoosuf 12:4] It may also be done for emphasis, as in the verses: “The Inevitable (i.e. the Day of Resurrection)! What is the Inevitable?” [al-Haaqqah 69:1] “Al‑Qaari‘ah (the striking Hour, i.e. the Day of Resurrection). What is the striking (Hour)?” [al-Qaari’ah 101:1] “And those on the Right Hand —how (fortunate) will be those on the Right Hand?” [al-Waaqi’ah 56:27] al-Itqaan fi ‘Uloom al-Qur’aan (3/281, 282). Repetition is more eloquent than merely emphasizing and it is reflective of good style, contrary to what some people think. Al-Itqaan fi ‘Uloom al-Qur’aan (3/280), Mu’sasat al-Nada’ edition. • Shaykh al-Islam Ibn Taymiyah (may Allaah have mercy on him) said: There is no pointless repetition in the Qur’aan, rather there are benefits in every repetition. Majmoo’ al-Fataawa (14/408) Some comments and interpretations of the repeated statement from tafsir books As for our example ibn 'Ashur in his at-Tahrir wa tanwir -see here in Arabic- in the introduction of the surah when quoting the goals and subjects of the surah said: In the following I will translate here and later from Arabic, these are my own translation take it into account ومن بديع أسلوبها افتتاحها الباهر باسمه الرحمان وهي السورة الوحيدة المفتتحة باسم من أسماء الله لم يتقدمه غيره . Part of the exquisite eloquence in this surah is starting it by Allah's name ar-Rahmaan. This surah is the only one that has been started by a name of Allah here no other word was placed before! ومنه التعداد في مقام الامتنان والتعظيم بقوله فبأي آلاء ربكما تكذبان إذ تكرر فيها إحدى وثلاثين مرة وذلك أسلوب عربي جليل كما سنبينه . And among its eloquence is the enumeration of the dignity of the expression of gratitude and glorification by "So which of the favors of your Lord would you deny?" as it was repeated 31 times and this is a great Arabic elegance of style which we will show (later) Imam al-Qurtobi before showing examples of use of repetition from Arabic poetry said about this verse -see here in Arabic: فالتكرير في هذه الآيات للتأكيد والمبالغة في التقرير ، واتخاذ الحجة عليهم بما وقفهم على خلق خلق . The repetition of this verse is to emphasize (confirm) and exaggerate the confirmation and giving the proof on that he had inquired them about creating the Creation: وقال القتبي : إن الله تعالى عدد في هذه السورة نعماءه ، وذكر خلقه آلاءه ، ثم أتبع كل خلة وصفها ونعمة وضعها بهذه وجعلها فاصلة بين كل نعمتين لينبههم على النعم ويقررهم بها Al-Qutaby said: in this surah Allah has enumerated his favours (or bounties) and informed about his creation of these favours and then he added to each manner HE has described and favour he has given this information (verse repetition) as a separator to remind them about the favours and settle them (Jinn and humans) on them (favours). كما تقول لمن تتابع فيه إحسانك وهو يكفره وينكره : ألم تكن فقيرا فأغنيتك ؛ أفتنكر هذا ؟ ! ألم تكن خاملا فعززتك ؛ أفتنكر هذا ؟ ! ألم تكن صرورة فحججت بك ؛ أفتنكر هذا ! ؟ ألم تكن راجلا فحملتك ؛ أفتنكر هذا ؟ ! والتكرير حسن في مثل هذا . As if you said to a person you have done (or treated) well while he/she is denying it: Were you not poor and I made you rich; are you denying this? Have you not been motionless, but I made you stable? Are you denying this? Have you not failed to hajj, but I made you perform it in my company; Are you denying this? Have you not been a pedestrian, but I made you ride; Are you denying this? Repetition in these cases is good! You must log in to answer this question. Not the answer you're looking for? Browse other questions tagged .
Leadership Training the Nelson Mandela Way When you are considering different types of leadership training, and you wonder what leadership qualities to emphasize, remember Mandela. 1. Mandela never lost his dignity. He remained uniquely himself. We all know leaders who throw themselves away like obsequious office hunters. Even though he went to jail for 27 years, he never compromised his principles. He never gave up on others’ superior potential. He never dismissed people as hopeless. He clung to the possibility that one day, even his captors would grow and understand. 2. Mandela surveyed his situation from a fresh perspective. Rather than banging his head against his opponents, he strived for unity and for each individual to feel a member of the whole. 3. Detachment. Those that came to him he accepted, those that did not come, he allowed to go their own way. With this, the people around him could express their opinions openly. He did not have to woo people. By cultivating his own inner strength (something necessary for anyone who is the center of a group) those who were aligned with him came of their own accord. Outwardly, Mandela was powerless. New leaders often feel powerless. Surprisingly, that could be a good thing. Research done at Harvard and Duke found that being “powerful” might reduce your team’s ability to perform. Yes. A study done by Francesca Gino of Harvard and Richard Larrick of Duke, found that teams with a leader who had less power out-performed teams with a dominant leader. Even teams with no formal leader did better. Many people who step up and say YES to a leadership role complain that they don’t have enough power to make an impact. Why not take advantage of that? According to Gino and Larrick, “Feelings of power produce a tendency to devalue the perspectives, opinions, and contributions of others.” The next time you are feeling powerless, remember Nelson Mandela and turn the situation to your advantage with Gino and Larrick’s advice: 1. Improve communication by promoting equal participation. 2. Change the hierarchical structure to engage all members of the team. Mandela knew the power of unity. History remembers him for attempting to bring the black and white races together with the unlikely tool of rugby and the magical moment when white South Africans took a man that they once considered a terrorist into their hearts. A crowd of 65,000 mostly white rugby fans cheered him for wearing a jersey that once was a symbol of oppression. It became even better two hours later, when South Africa beat New Zealand and won the tournament. Leadership training modules will be more successful if you include the leadership training meaning. Why do attendees want to attend? Why do they care? Why do you want them to learn what you are teaching? Mandela knew what he wanted, and more importantly, why. Because he knew why, he was willing to wait. He was able to endure the dangling. He could use the waiting time to make small, persistent, focused efforts. He could use gentle persuasion and, at the same time, be firm and confident. Leadership training modules will be more successful when they include exercises that help people not only learn what to do, but why. The following questions are an example: When I’m at cross-purposes with others, can this gap be closed without compromising my integrity? Or theirs?  Are we actually opponents? Or just two people with individual needs? Is there common ground? Must there be one winner and one loser? Could we become allies and find a solution that permits two winners? Nelson Mandela was a Godsend to his people. His virtues and leadership qualities make him a standard to be followed. – Shar McBee
Basically, a picture may be a visual depiction of things which is placed somewhere ahead of a winter or lens. Development of image may it is in a results of conference of sunshine rays after being reflected or refracted continual with their respective laws.It is to be detailed here that rays not always meet, periodically they only show up to satisfy. This additionally produces images. So, top top idea, that either light ray actually satisfy or simply appear to satisfy, images are classified as real and virtual. You are watching: Difference between real and virtual images 1. Real image ;Real images are the sort of pictures that are developed thanks come convergence the sunshine rays at some degree after gift reflected or refracted native a mirror or lens. Real photos are created at purpose where irradiate rays undergo interaction with one another. Real photos are inverted in nature and may be seen on screen.Suppose things is inserted ahead that concave mirror and lightweight after obtaining reflected from that object strikes surface ar of concave mirror. As soon as multiple irradiate rays to win mirror, climate by complying with laws the reflection, sunshine different rays again gain reflected and meet at some extent ahead that mirror.2. Virtual photo :Virtual pictures are photos that only show up to be developed at an edge behind a mirror. However, really, image isn’t existing there. Unlike crucial images, a have fun is made when reflected or refracted irradiate rays get diverged. Throughout this case, when light from things is allowed to strike mirror and also when light rays get reflected from mirror then it’s prefer that rays are diverging somewhere behind mirror. Basically, no irradiate reaches behind mirror, hence it’s constantly said the rays show up to meet somewhere, due to the fact that it is simply perception that viewer. This is often rationale why virtual images aren’t shown on screen. Pictures developed within case of aircraft mirrors space specifically of online type. An additional noteworthy point up below is the virtual pictures aren’t imaginary. Hence possess identify shape and size and hence are often seen by attention or any instrument.Difference between Real Image and Virtual photo :S.No.Real ImageVirtual Image1Image developed in the front next of the mirror.Image space assumed come be developed at the backside that the mirror.2To develop a real photo the lenses used are the converging type.In development of virtual pictures there is the use of diverging lenses.3Real pictures are formed on the screen.Virtual images appear to get on the lens or the winter itself.4Image created is Actual.Image formed is Imaginary.5Real image are Inverted.Virtual photo are Erect.6Concave mirror and also convex lens.Plane, convex mirror and concave lens.7Real Image can be acquired on the screen.Virtual photo cannot derived on the screen. See more: What Was True About The Rapid Increase Of U.S. Cotton Exports ? 8Real picture is developed by actual conference of rays after refraction.By expanding the refracted rays backward the formation of Virtual photo is done.
You asked: What are the opportunities of digital India? What are the challenges faced by Digital India? There are many roadblocks in the way of its successful implementation like digital illiteracy ,poor infrastructure, low internet speed, lack of coordination among various departments, issue pertaining to taxation etc. These challenges need to be addressed in order to realize the full potential of this programme. Why do we need Digital India? What is the impact of Digital India? Economic Impact Digital India initiative can improve our GDP by around $1 trillion by 2025, says a report of economic analysts. It can also be harmful to play a key role in macro-economic factors like employment generation, labor productivity, business development, and revenue generation. IMPORTANT:  Does India import steel from China? What are the uses of Digital India? What is Digital India? Broadband Highways Universal Access to Mobile Connectivity Public Internet Access Programme e-Governance e-Kranti Information for All What are the 9 pillars of Digital India? Nine pillars of Digital India • Broadband Highways. • Universal Access to Mobile Connectivity. • Public Internet Access Programme. • e-Governance: Reforming Government through Technology. • e-Kranti – Electronic Delivery of Services. • Information for All. • Electronics Manufacturing. • IT for Jobs. What is the logo of Digital India? Titled “Infinity”, the ICEGOV2017 motif is designed intricately with three concentric infinity loops, representing an evolving relationship between India and its citizens, highlighting the countless opportunities created by new and emerging technologies. Is Digital India successful? It has emerged as the second-fastest digital adopter among seventeen major digital economies. … India has already made a big leap in digital adoption, as the collective number of internet users in India exceeds the number of internet users in some of the developed countries. What is the focus of Digital India? The Digital India programme itself promises to transform India into a digitally empowered society by focusing on digital literacy, digital resources, and collaborative digital platforms. This also places emphasis on universal digital literacy and availability of digital resources/services in Indian languages. How Digital India help students? Digital India is a concept to change the education system in India. It is a program that bridges the literacy slippage. This is by delivering education through digital platforms to children and teachers. It gives an opportunity to access learning sources to a global platform. IMPORTANT:  What was the British East India Company and why was it important? What is the social impact of digital India? A digitally empowered India can mend social and economic condition of people through development of non-agricultural economic activities apart from providing access to education, health and financial services. However, it is important to note that ICT alone cannot directly lead to overall development of the nation. What are the pros and cons of digital India? Infrastructure: The Digital India initiative has a vision to provide high speed internet services to its citizens in all gram panchayats. Bank accounts will be given priority at individual level. People will be provided with safe and secure cyber space in the country. 2. What is Digital India in short? Digital India is a flagship programme of the Government of India with a vision to transform India into a digitally empowered society and knowledge economy. E-governance initiatives in India took a broader dimension in the mid 1990s for wider sectoral applications with emphasis on citizen-centric services. 1. Use of “Skill India” Logo will be allowed without any permission for the following categories:- ( i) All establishments, offices and officers of the MSDE, Government of India. Magic India
Inventing a culture of anti-slavery: Pennsylvanian quakers and the Germantown protest of 1688 Brycchan Carey* *Corresponding author for this work 5 Citations (Scopus) In the spring of 1688, in Germantown, a Pennsylvania village that was just five years old, a small group of Dutch and German settlers, Francis Daniel Pastorius, Gerrit Hendricks, Derick op den Graeff and Abraham op den Graeff, put their name to a now celebrated statement of antislavery that has become variously known as the Germantown ‘Protest’, ’Declaration’ or ‘Petition’. The statement, outlining the reasons why the four were ‘against the traffick of men-body’, was read out in their meeting in Germantown, then passed upwards through the colony’s Quaker hierarchy for consideration, before being discussed, noted and dismissed by the Philadelphia Yearly Meeting — the highest Quaker body in Pennsylvania. It was then, according to historical orthodoxy, lost and entirely forgotten until 1844, when it was rediscovered, reprinted and distributed further than its original authors could possibly have imagined. Hailed in 1844 and afterwards as the first formal statement of antislavery thought in territories that would later become the United States (although this is not in fact true), it is nevertheless generally agreed that before 1844 the document had no impact or influence at all on whatever conversations Quakers — or Americans more generally — were having about slavery and the slave trade. Thus, Lery T. Hopkins argues that ‘the Germantown Protest can only be considered a manifestation of internal discussion since there is no evidence that anyone outside of the Monthly and yearly Meetings was aware of it’.1 Original languageEnglish Title of host publicationImagining Transatlantic Slavery EditorsCora Kaplan, John Oldfield Place of PublicationLondon PublisherPalgrave Macmillan Number of pages16 ISBN (Electronic)9780230277106 ISBN (Print)9780230578203, 9781349367658 Publication statusPublished - 2010 Externally publishedYes Dive into the research topics of 'Inventing a culture of anti-slavery: Pennsylvanian quakers and the Germantown protest of 1688'. Together they form a unique fingerprint. Cite this
There are numerous medical systems available in the World however; in this article, we will compare Ayurveda with the conventional Modern Allopathic approach. Modern Medicine Approach: Modern medicine focuses on the physical body, considering each organ as separate from each other. That is why you have more than 100 specialist. E.g. Cardiology, Dermatology, Geriatric, Hematology, Nephrology, Neurology, Urology and many other. A cardiologist will most likely refer you to a gastrologist if you complain about a severe heartburn. I have heard patients saying that my doctor asked to discuss one problem per visit. Modern medicine is evidence based and engage in a lot of trial and error. It is common for a doctor to change your prescription often until they find the one that is going to suppress the symptoms. Most chronic disease patients are on drugs for life. A cure for a chronic disease is a rare phenomenon in modern medicine. Modern medicine seldom considers the diet and lifestyle of the patient. The focus is on the disease and offer an immediate solution until the next episode. In the recent years, modern medicine has started to include the diet and lifestyle along with the prescription. It is hard to find a concept of prevention in modern medicine. A medicine is prescribed when the disease has occurred. Ayurvedic Approach: Ayurveda treats the whole body in a holistic manner. For a trained Ayurvedic practitioner, body, mind and spirit, are connected and treating any condition involves balancing of all three. There is a lot of focus on prevention in Ayurveda. After all, prevention is better than cure. Even though, Ayurveda is based on an ancient concept of remedies with plants and herbs, the modern Ayurveda has adapted many concepts from the modern medicine. Most of the popular remedies are available in the form of Tablets, Capsules and injections. Ayurvedic doctors go through a rigorous program of study that takes six years to complete. After learning modern clinical medicine along with the more traditional Ayurvedic usage of herbs and systems of diagnosis and treatment, graduates receive a Bachelor of Ayurvedic Medicine and Surgery degree or B.A.M.S. In India, B.A.M.S graduates do have the permission to practice modern (allopathic) medicine along with the traditional Ayurvedic medicine. Modern Medicine Advantages: In situations where saving life could be a matter of short time, modern medicine works under the premises of urgency and promptness, combined with accuracy and precision. A broken bone, heart attack, an infected and ruptured appendix, deep wound requiring stitches, severe infection and antibiotics, vaccines and many more are examples where the modern medicine can be quite effective. In traditional medicine, trial and error is primarily the technique. If one remedy does not work, you can try a different one. This could be fatal in some circumstances. Modern Medicine Disadvantages: With this urgency and promptness comes the side effects. The side effects of modern drugs that most do not know about and your doctor will not tell. Statin users have a higher homicidal behavior including death from suicides. According to the studies, there was a strong link between the medication and compulsive behaviors. Some other common side effects of any prescription drugs are often constipation, diarrhea, and gastrointestinal issues, such as nausea. These drugs gets through, absorbed via the digestive system causing pain, drowsiness and skin reactions. Most pharmaceutical drugs (prescription or over the counter) treat the symptoms, as opposed to addressing the core issue. Read the fine print on the labels, ask many questions and make sure you get all the answers. Ayurvedic Medicine Advantages: Ayurveda medicine originated over 5000years ago in India. It is a holistic form of medicine; it sees the treatment of the whole as the key to wellness. Ayurveda operates to prevent illness by understanding the function of the body, the relationship of body and mind and the particular individual nature of the individual treated. Ayurveda promotes self-healing by self-realization, to help the body return to and stay in a natural state of balance. Ayurvedic Medicine Disadvantages: Ayurvedic herbal supplements can be good and effective if used properly. There are many variants of herbal products and supplements and each of them have their different methods of making. The biggest challenge is the widespread abuses made by illicit salespersons and other quack doctors. Even though there are standards and regulations in place, it is extremely difficult to produce consistent products as the ingredients are plant based and the origin of the plant can determine the potency and efficacy of the product. Herbal supplements may take some time to show any results. It may take a few months before one may start noticing any improvement. This type of treatment is more for prevention than cure. It will be unwise to endorse one system over the other. Why cannot we have the best of both worlds? A more holistic approach can achieve miraculous results. Seek modern medicine for quick remedies and herbal treatment for a safer and curing the root cause issues.
'Drummer Hodge' by Thomas Hardy Extract A is a poem entitled ‘Drummer Hodge’ written by Thomas Hardy before the First World War had begun but shortly after the Boer War that took place between 1899 and 1902. The poem is based on a true story about the death of a local boy during the Boer War. The boy is referred to as ‘Drummer Hodge’ in the poem. Extract B is a poem called ‘A Dead Boche’, this time written after the First World War had started, and after the Somme, said to be the bloodiest battle of the entire war. The poet, Robert Graves had fought in the Somme and his poem reflects on his experiences as a soldier in the First World War. His poem is centred on his discovery of a dead German soldier referred to as a ‘Boche’ ‘Drummer Hodge’ describes the thoughts and feelings of the poet on the death of the young boy and his fate thereafter. ‘His homely Northern breast and brain Grow to some southern tree’ Hardy believes that Drummer Hodge will forever be a part of the earth after he dies, showing death to be a release from mortality into an eternal rest. Get quality help now Verified writer Proficient in: Dulce Et Decorum Est 4.7 (657) +84 relevant experts are online Hire writer ‘Drummer Hodge’ describes the events taking place after the boy has died, whereas ‘A Dead Boche’ centres on the event of the discovery of a dead soldier and the writers response to the experience. Graves’ poem is directed to the reader in the opening line where he says ‘To you who’d read my songs of War and only heard of blood and fame, I’ll say (you’ve heard it said before) “War’s Hell!”‘. Get to Know The Price Estimate For Your Paper Number of pages Email Invalid email Check writers' offers You won’t be charged yet! Graves is saying to the reader that war is not as glorious as his songs may have put it to be, and that there is more to war than blood and fame. He goes on to say he has discovered a cure for those who crave blood and death, and that is the sight of a dead German soldier. ‘With clothes and face a sodden green, big bellied, spectacled, crop haired, dribbling black blood from nose and beard’. Graves’ creates a diabolic image of this dead soldier, upon sight of which he apparently lost his appetite for killing the enemy and his ‘lust for blood’ was cured. Graves describes the death if this German soldier with a certain repugnance ‘In a great mess of things unclean, sat a dead Boche; he scowled and stunk’. His style is similar to Wilfred Owen, when he describes the death of a soldier in his poem ‘Dulce Et Decorum Est’. Owen also uses graphic images to convey his feelings to the reader, and describes the physical features of the dying soldier. On the other hand, ‘Drummer Hodge’ uses more refined and poetic imagery ‘His homely Northern breast and brain Grow to some southern tree’. This line of the poem can be translated as meaning that after Drummer Hodge’s body has decayed he will become part of the growing plants, therefore being a part of Nature and Earth forever. In addition, ‘breast’ could be taken to mean his heart, and ‘brain’ could be taken to mean his soul, meaning that his heart and soul are now part of the Earth. It is clear from this that Hardy uses more graceful and positive imagery to describe death to the reader, whereas Graves tends towards the more physical aspect of death, which consequently entails the more shocking details which create a sense of revulsion within the reader. This emotion makes ‘A Dead Boche’ so effective in making people realise that death is not something that can be taken with a light heart. This leads on to the idea that Graves’ poem is presented with a stark realism. One could agree with this statement on the basis that he omits no detail in describing the corpse of the dead soldier. Graves’ poem is phrased in a way that makes it easy for the reader to see the situation from his perspective, which entails the fact that the poem is presented with realism as we are able to visualise very well what is being said, ‘with clothes and face a sodden green’. This is very blunt yet brutal imagery, which is reminiscent of Owen’s style of writing, since it is after the Somme and Graves had had sufficient exposure to the war to become questioning of the British propaganda. ‘Drummer Hodge’ however, mirrors British propaganda in the sense that the poem expresses death in a romanticised and idealistic way. The slogan Dulce Et Decorum Est Pro Patria Mori, meaning that it is sweet and fitting to die for your country, made death into a bearable concept, until the war actually began and people started to lose loved ones. Much of the Pre war propaganda in Britain followed the same pattern of glorifying death and rewarding patriotism. ‘And strange-eyed constellations reign His stars eternally’ can symbolise that Drummer Hodge is in heaven, with God apparently. This is also mirrored in some of the speeches, the St Crispin’s Day Speech for example insinuates that God is on the side of the British so we cannot lose, and if you should die, you will go to heaven and spend eternity with Him. Both the poems feature a rhyme scheme, which is significant as it adds a rhythm to the poem. In the case of ‘Drummer Hodge’, it adds a somewhat jaunty air to the poem; however, with ‘A Dead Boche’ the rhyme scheme creates a false sense of security, luring the reader into the final shock of the poem. It almost adds a feeling of indifference to the poem, as if Graves is talking about an everyday event of his life. This is partially true as Graves would have been experiencing death around him all the time, but for people at home away from the war this would have come as a nasty shock. ‘A Dead Boche’ takes the form of an account, especially in the second stanza where Graves uses much description. This allows the reader to visualise what is being said and be more affected by the message of the poem. ‘Drummer Hodge’ however is more like fictionalised speculation, romanticised in that it deals with death in an idyllic way. Hardy’s poem is like a reassurance to Drummer Hodge’s family that he is now in a better place, much in the same way as priests and vicars were called into the army to give set soldiers’ minds at rest so that they would not fear death so much. To conclude with I would say that the two poems are a prime example of how pieces of writing concerning the same subject can often be so different in style and content presentation, especially those concerning war and death. On the one hand ‘Drummer Hodge’ successfully restores faith in the age old reassurance that death is only a release mechanism to bring us closer to God and that we need not fear it. On the other hand, ‘A Dead Boche’ draws attention to the detail that hearing about death and actually experiencing it are two very different things by saying that death should be feared, as that is its very nature. Cite this page 'Drummer Hodge' by Thomas Hardy. (2020, Jun 02). Retrieved from https://studymoose.com/drummer-hodge-by-thomas-hardy-essay 👋 Hi! I’m your smart assistant Amy! get help with your assignment
(032) 253-6413 | Colon St., Cebu City, 6000 Cebu, Philippines [email protected] Frequently Asked Questions on Data Privacy What is the Data Privacy Act of 2012? Republic Act No. 10173, also known as the Data Privacy Act of 2012, is an act created to protect your personal information in information communications systems in the government and the private sector. What is personal data? Personal data is the collective term used to refer to your personal information, sensitive personal information, and privileged information. What is personal information? Personal information refers to any information that would reasonably identify you as an individual, or when put together with other information, would directly ascertain or make apparent your identity. What is sensitive personal information? Sensitive personal information includes information: a) About your race, ethnic origin, marital status, age, color, affiliations (i.e., religious, philosophical or political), health, education, genetic or sexual life; b) Of any proceeding for any offense committed or allegedly committed, the disposal of such proceedings, or the sentence of any court in such proceedings; c) Issued by government agencies peculiar to you (e.g., social security numbers, health records, licenses or its denials, suspension or revocation, tax returns, etc.); and d) Specifically established to be kept classified by an executive order or act of Congress. What is privileged information? Privileged information refers to all data classified under the Rules of Court and other pertinent laws as “privileged communication”. In particular, they refer to: a) Any communication shared in confidence between husband and wife; b) Any communication or advice between an attorney and a client; c) Any advice or treatment given, or any information acquired by a doctor from a patient; d) Any confession made by a person to a minister or priest, as well as any advice subsequently given to that person; e) Communication made to a public officer in official confidence. Does the difference between personal information and sensitive personal information matter? YES. The Act treats the processing of both kinds of personal information differently. Personal information may be processed in compliance with the requirements of the Act, while the processing of sensitive personal information are, in general, prohibited and is allowed to be processed only under specific cases provided by the Act. Who are data subjects? Data subjects refer to individuals whose personal information is processed. The University’s largest category of data subjects includes its students and employees. What is a personal information controller? Personal information controller (PIC) is any person or organization who controls the processing of personal information. This includes person or organization who instructs or outsources another to do the processing on its behalf. This term excludes a person or organization who does the processing as instructed by another person and organization, or in connection with another’s affairs. What is a personal information processor? Personal information processor (PIP) is any person or organization whom a PIC may instruct or outsource the processing of personal information. What are your rights as a Data Subject of the University? Under the Data Privacy Act of 2012, you are afforded rights regarding the processing your personal data. These include: • Right to be informed that your personal data will be or is being processed; • Right to reasonable access to your personal data being processed by the personal data controller or personal data processor; • Right to dispute the inaccuracy or error in the personal data; • Right to request the suspension, withdrawal, blocking, removal or destruction of personal data; and Why is there a need to protect your personal data? In this digital era, your personal information, when left unprotected, may be prone to threats of commercial or fraud-oriented actors primarily interested in money like identity thieves and personal data marketers. How does the University protect your personal information? The University strives to ensure that your personal data under our custody are protected against any accidental or unlawful destruction, alteration and disclosure as well as against any other unlawful processing. Reasonable and appropriate organizational, physical, and technical security measures are put in place to maintain the availability, integrity, and confidentiality of your personal data. Is there a government agency to administer and implement the provisions of the Act? YES. The National Privacy Commission is an independent body created to carry out the provisions of the Act, and to monitor and ensure the country’s compliance with international data protection standards. Phone    : (032) 255-2434 / (032) 416-8226 Email       : [email protected] Mail        : Data Protection Office, 2nd Floor Inday Pining Building, University of the Visayas, Colon Street, Cebu City If you have concerns, inquiries, complaints, or would like to report a security incident to us, you may download our Contact Form and email us. Or you may use our Data Privacy Contact Form via Google Forms. Download the Contact Form in .docx format here Download the Contact Form in .pdf format here
JOB 32 Elihu's anger was a righteous anger. He was angry that Job justified himself rather than Yahweh, He was angry with Job's friends because they failed to prove these accusations against Job, misinterpreted his situation, yet condemned him. Thus, Elihu corrects Job in justifying himself, and in claiming that he is sinless (Job 33); condemns Job's three friends, elevates Yahweh and emphasizes His greatness. Does Elihu desire that Job be tried to the utmost, even to death, as some interpret this verse? Let us examine the sayings of Job and the sayings of Elihu to determine what the truth is behind this verse. Let me first begin, though, that the book of Job opens with an Adversary alleging that Job lives righteously and fears God only because God protects and prospers him. ' And Yahweh said unto Satan, Hast thou considered my servant Job, that there is none like him in the earth, a perfect and an upright man, one that feareth Elohim, and escheweth evil? Then Satan answered Yahweh, and said, Doth Job fear Elohim for nought? Hast not thou made an hedge about him, and about his house, and about all that he hath on every side? thou hast blessed the work of his hands, and his substance is increased in the land. But put forth thine hand now, and touch all that he hath, and he will curse thee to thy face. (1: 8-11)  (2: 3) He implied that Job served God for something, i.e., some reward. The Adversary's accusation was directed toward both God's justice and Job's righteousness. The Adversary basically asked the question: "Is it love, or is it self-serving that motivates a person to be righteous, to fear God, and to separate from sin." The Adversary wrongly assumed that since God protected and blessed Job, greed was the foundation of Job's righteousness, rather than a personal intimate relationship based on love, trust, and fear of God. Job's three friends, Zophar, Eliphaz and Bildad claimed that God punishes only the wicked, but blesses the good. Their theological belief stated that if something bad happened to someone, it must be because they did something bad, if something good happens, it must be because they did something good. They, thus, tried to get Job to admit that he did something wrong and intensified their pressure on him. Unknowingly, they upheld the Adversary's philosophy! Job also shared this view, that the world is based on reward good and punish evil, but now found inconsistencies in the application of this doctrine. They did not understand that God allowed and arranged suffering for purposes other than retribution. Eventually, they stopped reasoning with Job because Job "was righteous in his own eyes"(Job 32:1), and Elihu enters the picture. Interestingly, Elihu is the only one with the Hebrew name meaning:"My God is He." The name Elijah means: "My God is Yahweh." How similar! While Job's friends claimed Job suffered because he was sinning, Elihu said Job was sinning because he was suffering! Elihu showed that God used suffering to benefit people, to deliver them from staying in their graves (Job 33:17-19,28,30), and that Job humble himself before God (Job 33:27; Job 36:21; Job 37:24)! Elihu argued God is not unjust (Job 34:10-12,21-28); God is neither uncaring (Job 35:15), nor powerless to act on behalf of His people (Job 36 - 37). Elihu presented a totally different perspective on suffering. He showed Job and his friends their quid pro quo premise for suffering was wrong, he showed them that suffering is to bring us closer to God, he showed them that God is sovereign and in control of all our affairs, and showed them God does reward the righteous based only on His love, His mercy, and His grace! Elihu, by bringing the right perspective, clarity, empathy, compassion, and giving concrete help, unlike Job's friends, his speech was a prelude to God's own speech. Elihu was angry with Job because he justified himself and not God, Job accused God of being his enemy and unjust, and Elihu was also angry with Job's friends because they spoke falsely and offered no true and concrete answers (Job 32:2-3). So what did Elihu mean when he said: "My desire is that Job may be tried unto the end"? End is the Greek word netsach, # <5331>, and means:" a goal, i.e. the bright object at a distance traveled towards..." In other words, Elihu was saying that Job be brought to the trial's conclusion to its intended end or goal! Job 34:36 is given in the context of verses 34:31-35,37. Consider the words of James 5:11:  God's purpose in disciplining is not simply punitive, but to save - "To bring back his soul from the pit, to be enlightened with the light of the living" (Job 33:30). Elihu spoke correctly; Job's three friends spoke incorrectly in that God only punishes the wicked. Job's friends are rebuked by God, but not Elihu (Job 42:7-17). Job prays for his friends that they obtain forgiveness, but not for Elihu because he was right. The bulk of Elihu's speech focused on God's justice, ascribing righteousness, graciousness, and majesty to God and for Job to stand still and consider the wondrous works of God. God was not Job's enemy and God was not unjust as Job charged... ' Surely thou hast spoken in mine hearing, and I have heard the voice of thy words, saying, I am clean without transgression, I am innocent; neither is there iniquity in me. Behold, he findeth occasions against me, he counteth me for his enemy, He putteth my feet in the stocks, he marketh all my paths. Behold, in this thou art not just: I will answer thee, that Elohim is greater than man. (Job 33:8-12) and Elihu condemns (Job 35). Does then Elihu's speech fit that of the Adversary of Job 1:6-11? Certainly not! Sis Valerie Mello [in isolation, TN, USA] The satan of ch 1 was bold and unafraid to revile against Job. Elihu here has been timid, deferential and fearing to comment - very contrary to the accusative spirit of the satan. The satan was bold and forthright in condemnation of Job from the outset in the midst of the sons of Deity - therefore they are two different people. A Marvel of Literary Construction. The Bible is a marvel of literary construction. Its own writers did not form and fashion it in its present completed shape. Yet it is not a mere mechanical arrangement of records - a bundle of documents fortuitously combined by the successors or survivors of the original writers. The Old Testament is not the wreckage of Hebrew literature which has happened to escape submersion beneath the waves of a perilous antiquity,‭ ‬and to be washed up on the shores of historical time.‭ The New Testament is not a collection of the relics of Christian writings of the first century of our era,‭ ‬which has had the good fortune not to be destroyed.‭ ‬The Bible is a harmonious system of books,‭ ‬in which each book bears its due relation to the other books,‭ ‬and all the books are compacted together in one symmetric whole.‭ As when each workman in some grand cathedral builds his own particular portion of the edifice,‭ ‬ignorant of the complete design,‭ ‬content simply to do his part in reliance upon the skill of the presiding architect,‭ ‬and all the workmen have died and their posterity have removed the scaffolding,‭ ‬at length the splendid unity of the building stands out harmoniously complete - so each writer of Holy Scripture penned his part,‭ ‬unconscious of its exact adjustment to the whole‭; ‬until when all the writers were dead,‭ ‬the entire volume shone forth in faultless and unsuspected unity. The Christadelphian, March 1896. p96 Bro Growcott - Doth Job Fear God For Nought?
The difference between how smoking and vaping affects your body is astounding. A video has been released demonstrating how the toxic chemicals and tar that are inhaled by an average smoker in just one month compares with those that do not smoke or use an e-cigarette. Public Health England (PHE) shared the footage from an experiment to show the devastating harm that is caused to the body by smoking and how it can be avoided by switching to vaping. Research shows that close to half of smokers either don't realise that vaping has much lower risks to health or wrongly believe that vaping is as harmful as smoking. As reported by Wales Online, at least 500,000 smokers are expected to try to stop smoking and PHE are encouraging those who do to use its Personal Quit Plan to increase their chances. Stay in the know, follow Essex Live You can also join our local Facebook groups here. What were the results? Research estimates that, while not risk-free, vaping is at least 95 per cent less harmful than smoking. Smoking increases the risk of developing more than 50 serious health conditions, including cancer and heart disease, and doubles the risk of dying from a stroke. These are the signs and symptoms of the most common cancers that you should not ignore.
Nature, Nurture and Saving Habits Our upbringing, our social circles during childhood and even our genetics can contribute to our attitudes to money. But just how much of our saving habits today can we attribute to these factors? And are we really in part pre-programmed to our financial paths? savings, genetics and upbringing The 10,000-Foot View: Social learning theory argues that we develop habits such as saving through imitating those around us. Longitudinal studies of identical and non-identical twins seem to suggest that genetics and parenting style play equally significant roles in future saving habits. But despite this partial genetic imprint, individual-specific differences explain the lion’s share of our story. When I was a boy, I was crazy about saving. Entranced by the sight of a growing pot of shiny treasure, I collected coins from whomever I could. As my collection accumulated, I counted, stored and treasured the result of my efforts. Later, when I was 8 years old, something revolutionary happened: I got a bank account. For many years that followed, I would amuse the cashiers at my local bank, jingling with bags of pennies as I arrived to deposit more treasure to my bank account. “Can I have an updated balance please?” I’d ask, just about peering over the counter to make eye contact with the cashier. And so they’d scribble down my latest balance on a piece of paper and I’d head home to carefully write it down in a little book. As I’ve grown up, the methods have become more sophisticated and the numbers have got a little bigger, but my principles haven’t changed much. I still track my money and it still makes me feel good to see my treasure growing. But recently I’ve started to wonder why I was so crazy about saving all those years ago. I was fastidious with my pennies and fascinated by the idea of money. But why? What guides our attitudes to money during childhood? And why do some of those habits endure through to adulthood? Social Learning Theory When it comes to money, our childhoods can be more formative than one might first think. As we observe our parents and other role models, we’re predisposed to imitate and learn from them. Albert Bandura and Richard Walters famously developed a model that encapsulates this idea, known as ‘social learning theory’. In short, the idea is that children adopt new behaviours by reproducing or imitating what they’ve seen as they’re growing up. This process of observation begins very early on in life for money. As we watch our parents and other people buy things, we begin to understand the transactional purpose of money. And as our parents spend their days somewhere else, we start to observe and understand how they earn money. But clearly these typical observations aren’t enough on their own to steer us towards thrift. No, it’s the subtle details we observe that form our early basis for understanding how to manage money, for better or worse: what our parents buy, how they earn, how they save. And the deliberate actions of our parents also make a difference. How would I have revolutionised my approach to saving money at 8 years old if my parents hadn’t opened a children’s savings account on my behalf? How would I have collected all those pennies without friendly family donations and occasional pocket money? The steps our role models take can be hugely influential, not just through the process of observation and imitation, but also through actions that develop our understanding of the value of money. Pocket money is an excellent case in point here. For example, whether allowances are given unconditionally or have to be earned (at least partly) can make a difference in the learning process. The Parenting Effect Back in 2012, two behavioural finance researchers, Henrik Cronqvist and Stephan Siegel, used a detailed database of twins, the Swedish Twin Registry, to analyse the savings behaviour of identical and non-identical twins. With financial and other data from 14,930 twins, their goal was simple: to better understand the significance of nature and nurture in moulding our future savings behaviour. First, they looked at how parenting affects future saving behaviour. Their data analysis showed that parenting explained about 30 percent of variation in savings rates for individuals around age 30. But as age increased, they found that the role of parenting in savings rate variation diminished significantly. In fact, by age 40, their data suggested parenting effects had zero influence whatsoever on savings behaviour. It seems at this point, we well and truly find our own financial way. Interestingly, parenting was found to explain more of the variation in savings behaviour when there were no additional siblings in the family growing up. This supports the idea that parenting effects on savings are smaller when time for parenting and teaching is likely to be scarcer. So it seems parenting has a key role to play in our future savings behaviour, but that role has an expiry as we grow up and develop our own approach to money. The Genetics of Saving Behaviour But parenting isn’t everything when it comes to our future savings behaviour. In fact, there may be another factor at play, determined before we are even born. There is a good reason, of course, why they chose to look at a database of twins. Twins share 100 percent of the same genes if they are identical and 50 percent if they are non-identical. So examining differences in the patterns of saving behaviour between the two groups could provide a glimpse of a genetic role in our personal finances. The results in this respect were remarkable. The identical twins were significantly more similar in their savings behaviour than the non-identical twins. Across their sample, they found that this genetics effect explained a whopping 33 percent of the variation in savings behaviour. And unlike the effects they observed in parenting, this effect did not disappear with age. In other words, the research appears to suggest we are born with a genetic predisposition to a specific savings behaviour. Just as our genes play a role in our appearance and aspects of personality, the research suggests there is something in our complex genetic make-up that influences our future financial actions. The You Effect The twins study demonstrates two hugely important influencers on our future savings behaviour. First, it reaffirms the idea that parenting has a big influence on our savings approach, particularly early on in adulthood. And second, it suggests we all carry a genetically imprinted money mindset, for better or worse. But both of these factors are out of our control. So what about the bit you influence? The important point here is that the researchers explained less than half the variation through parenting and genetic factors. The reality is that our individual-specific experiences have the lion’s share of influence on our destiny. So while studies like this suggest some level of pre-determination, you are the one who is really in control. Our choices, our changes and our destinies are in our own hands. We are not chained to what we’ve learnt and observed during childhood. We are the big influencers when it comes to our financial futures. Get More Insights Straight to Your Inbox Share this post Share on twitter Share on facebook Share on linkedin Share on pinterest Share on email
Diagnostic Testing How Do We Evaluate the Heart? Your child's cardiologist may order a variety of tests to help make an accurate diagnosis. These tests will provide important information about your child's heart formation, blood flow, pumping ability and rhythm. Our dedicated staff works closely with patients to alleviate fears by providing thorough explanations and supporting patients through their entire procedure. The chart below lists common tests and the areas that they measure. Common Tests and Areas They Measure   Structure Blood Flow Function Rhythm Chest X-Rays X   Electrocardiogram X X 2-D and Doppler Echocardiogram X X X Oximetry (Oxygen Saturation) X X X Ambulatory Holter Monitoring X Transient Arrhythmia Monitoring X Exercise Test X   Cardiac Catheterization X X
• Basic information of the Ophthalmologist One of the five senses, the vision, is made possible by the complex structure of our body known as the eye. It is made up of different structures like cornea, lens, retina, etc. that serve different purposes ultimately making vision possible. Problem in any of these structures can lead to various problems in vision or can lead to pain. An ophthalmologist is a specialist who specializes in diagnosing and treating the diseases of the eye. The most common problems that occur are congenital that is present from birth, infections and problems due to advanced age. Cataract is a condition where the lens through which the light passes becomes opaque. This usually occurs in advanced age and is not a medical emergency. But cataract in a child is a medical emergency because it interferes with the development of connections from the eye to the brain. You can try Ophthalmologist online consultation to understand the issue and get guidance for further treatment. Since there are so many structures involved in the process of perception of vision, so many problems occur that involve different structures. The structural changes can be congenital that is present at birth or can be caused due to advanced age. Some problems also occur due to trauma to the eye. Depending on the structure involved and other disease conditions present, different problems that occur in the eye can be classified as follows: Problems in the cornea: The transparent part of the front of the eye, which helps in admitting light inside the eye, is called cornea. A healthy cornea, along with the overlying tear film, is necessary to provide a proper surface and to protect the eye from infection and structural damage to the deeper components of the eye. The cornea’s horizontal diameter is normally 9.5-10 mm at birth and 10-12.5 mm in adulthood. Changes in the shape and size can occur and accordingly classified as: • Microcornea: cornea that is less than 10 mm in horizontal diameter is called microcornea and can be present with other abnormalities. The treatment involves vision correction with the use of spectacles resulting from flat cornea. Other problems like cataract or glaucoma that may be present together with microcornea may require different treatment. • Megalocornea: it is characterized the enlargement of the front of both the eyes with cornea of diameter of 12 mm or greater at birth and 13 mm or greater at 2 years of age. Treatment is usually not necessary except for spectacle correction because the patient cannot see distant objects clearly. • Blepharitis: it is characterized by a close relationship between the microorganisms that live in the eye and meibomian gland (it produces meibum, an oily substance that prevents evaporation of the eye’e tear film) dysfunction leading to lid inflammation, corneal and conjunctival changes and symptoms of ocular discomfort. Usual symptoms of diseases of the cornea: • Severe pain in the eye • Watering  • Sensitivity to light • Blurred vision • Headaches (occasionally) Problems in the conjunctiva: Conjunctiva is a tissue that lines the inside of the eyelids and covers the white part of the eye. Infections of the conjunctiva by bacteria, viruses and fungi can lead to problem called conjunctivitis. It is one infection that usually every individual contracts once in lifetime. The symptoms include redness, itching, burning and problems in opening the eyes in the morning because of heavy discharge. The ophthalmologist diagnoses and accordingly treats. The platform of MediFlam provides some of the best doctors providing online ophthalmology consultation and guiding patients to get the treatment to cure the issues. The treatment may include antibiotic, antiviral or antifungal eye drops or ointment depending on the causative factor. Usual symptoms of diseases of the conjunctiva: • Increased tear production • Redness in the eyes • Foreign body feeling in the eyes • Itching and irritation or burning • Heavy discharge that makes it difficult to open the eyes in the morning Problems in the lens: The lens is a transparent structure evolved to alter the refraction of light entering the eye. In 2002, the World Health Organization estimated that lens pathology (cataract) was the most common cause of blindness worldwide, affecting over 17 million people across the globe. Cataract surgery is the most common surgical procedure performed in the developed world. Lens is avascular (lacks blood vessels) and also lacks nerves and connective tissues. It grows throughout life but the rate decreases as the age increases. When the lens starts becoming opaque interfering in vision leading to blurred vision, it is called cataract and accounts for most of the eye surgeries. This is the most common problem that occurs in the lens.  Cataracts in childhood reduce vision and also interfere with the normal visual development. Cataracts in adults are quite easily manageable when compared to pediatric adults. The problems that come up are those related to the small size of children’s eyes and also because the tissues are softer. Certain modifications and adaptations in surgical technique are required to achieve results similar to those achieved in adults. Book your appointment for online consultation with ophthalmologist and discuss with your doctor about Cataracts related symptoms. Usual symptoms of the diseases affecting the lens: The most usual problem that affects the lens of the eye is cataract. Symptoms of cataract are: • Difficulty in vision at night or dim light • Blurred vision • Seeing ‘halos’ around lights • Sensitivity to light and glare • Double vision • Fading or yellowing of colors Problems in the retina: Retinitis pigmentosa is a genetic disorder and leads to loss of vision. It can cause problems in the vision at night and can also lead to loss of vision in the sides that is peripheral vision. Macula is the centre part of the retina and is critically unique to our visual function. It degenerates at advanced age. The condition is quite common and is called age related macular degeneration. This disease is usually uncommon before 55 years of age and quite common after 75 years of age. The symptoms of this disease include: • Blurred or distorted vision that is wavy vision • Usually there is no pain and it doesn’t change the appearance of eyes • Loss of central vision with appearance darks spots in the centre • Things appearing smaller than normal • Change in the perception of colour • Trouble in recognising faces The other most common problem that affects the retina is caused due to diabetes and is called diabetic retinopathy. Diabetes is a metabolic disorder that affects all the major organs and organ systems of the body. In eyes, it causes problems in the retina leading to condition called retinopathy. The usual symptoms include: • Blurred vision • Floaters in the vision • Loss of central vision • Difficulty in color perception • Black spots in the area of vision • Causes blindness eventually One of the other problems that occurs is called macular holes. This usually happens in persons over 60 years of age. The chief complaint of this disease is painless development of central visual distortion. This sometimes develop acutely. If loss of vision occurs only in one eye, then it is common that the problem goes undetected. There are different stages of macular hole depending on the severity of the disease. The usual symptoms include: • Distorted vision • Reading and other routine tasks become difficult with the affected eye The other common problem that occurs is inflammation of the uvea known as uveitis. Uvea is the pigmented layer of the eye that lies beneath the cornea and sclera (white part of the eye). This condition can develop by the use of contact lenses. The usual symptoms in the affected eye include: • Pain • Redness • Sensitivity to light • Blurred vision • Floaters in the vision The other disease that is quite common and can cause serious complications including loss of vision is glaucoma. The two main types of glaucoma that occur are: 1. Open-angle glaucoma 2. Acute-angle closure glaucoma The symptoms vary according to the type of glaucoma and also its severity. The hallmark symptom is the loss of peripheral vision. To understand it better get in touch with Ophthalmologist online. The other symptoms of the affected eye are: Open-angle glaucoma: • Blind spots like patches in the peripheral vision and sometimes in central vision • Tunnel vision which means that the things are only clear if near to the center of the field of view occur in advanced stages Acute-angle closure glaucoma: • Severe headache and eye pain • Blurred vision • Appearance of halos around lights • Redness • Nausea and vomiting If any of these symptoms occur and doesn’t resolve on its own, one should consult an ophthalmologist at the earliest. • Why choose online doctor consultation? By opting for an online Ophthalmologist consultation, the patients, from the comfort of their homes, can choose from a variety of doctors selected from the best available in India. In this way, the patient can at least get a fair amount of idea related to the problem he/she is having and can visit a nearby doctor if advised by the doctor consulting online or meet the same doctor if that is possible Read more.. Select Your Convenient Date & Time: Finding Best Doctors Frequently asked questions about Eye Specialist,Ophthalmologist What is Ophthalmology? How often and when should I get my eyes checked? By getting your eyes checked on a regular basis, or when you may think you are having troubles with your vision, you can keep your eyes healthy and stay clear of further complications. Many sight-threatening diseases, if detected early, can be cured or treated to prevent, or slow, the progression of any vision loss. What is Lasik? Lasik is a laser eye surgery used to treat nearsightedness, farsightedness and astigmatism. This kind of surgery uses a laser to treat vision problems caused by refractive errors. You have a refractive error when your eye does not refract (bend) light properly. What is the role of an Ophthalmologist? An ophthalmologist is a doctor who specializes in diagnosing and treating the diseases of the eye. The different ophthalmologists then may have expertise in different areas like those treating diseases related to the lens or the cornea or the retina. Depending on the severity and the structure involved, ophthalmologist with the relevant expertise can be consulted. What are the early signs of eye cancer? The most common sign of eye cancer is problems in vision. The vision may either be blurry or there might be flashes or spots in the vision. What are the most common eye surgeries? Cataract surgery is the most common surgery not only in the category of eye surgeries but when compared to all the surgical procedures performed in the world. The other surgeries include retinal detachment surgeries, corneal transplants, LASIK procedure, glaucoma surgery, surgery to correct squint, etc. Can too much sugar affect your eyes? The sugar directly doesn’t affect the eyes but it can lead to diabetes which can cause problems in the retina known as diabetic retinopathy. Too much sugar should always be avoided as it can cause problems in all the major organ systems of the body. What is low vision? Can an optometrist treat pink eye? No. It is the expertise of an ophthalmologist because the underlying condition needs to be first diagnosed. Can too much sugar affect your eyes? How do I know if I have bacterial or viral conjunctivitis? In bacterial infection, the discharge from the eyes is thick and unclear whereas that in viral infection it is much clearer and thinner. Also the lymph node swelling is seen in viral infection which is usually absent in bacterial infection. Which fruit is best for eye vision? Many natural foods and fruits are good for the eyes. These include dark leafy greens, carrots, sweet potatoes, apricots, mangoes, peaches, berries, bell peppers, avocados, soyabeans, etc. What is the most common cause of conjunctivitis? The most common causes are viral and bacterial infections. Get in touch with an ophthalmologist online to detect your infection if any. Is coffee bad for macular degeneration? It is the contrary. Drinking coffee daily along with eating a healthy diet can cut the risk of developing age-related macular degeneration. Is viral conjunctivitis painful? It depends on the cause. Usual viral conjunctivitis is not painful but causes itchiness and burning. Conjunctivitis caused by the herpes virus may cause additional problems leading to pain. Should I consult an ophthalmologist if my baby has excessive watering from the eyes? Watering in the eyes of the baby can be due to some common reasons like a cold or flu or can be due to some medical condition in the eye. It is better to consult an ophthalmologist online so as to rule out any serious disease of the eye. Why does my child’s eyes turn inward? Many conditions are responsible for this to occur but the end result is the loosening of the muscles that control the eyelids. The ophthalmologist can diagnose the cause and treat it accordingly I have itchy and burning eyes that do not produce tears. What should I do? This condition is quite common and maybe due to excessive working in front of the computer screens leading to dry eyes or due to some infection present in the eyes. An ophthalmologist evaluates and treats the infection if present. I am not able to open eyes properly in the morning. What should I do? This can sometimes happen due to infection in the eyes and can also lead to blurry or unclear vision. This sometimes passes on its own but if it persists, medical attention is required. Is it normal to see something floating in the vision? This is quite a common phenomenon and occurs to most people. But one should immediately see a doctor if the number of floaters increase suddenly or the same eye starts experiencing flashes of light or there is darkness in the sides of the vision that is peripheral vision loss. I sometimes feel that I cannot see something passing through the side. Is it normal? No this is not normal and is a result of some underlying disease. Disease like migraine can cause temporary vision loss but diseases like glaucoma, retinitis pigmentosa, scotoma, stroke and diabetic retinopathy can cause permanent vision loss. If you experience peripheral vision loss and your age is more than 50 years, you should immediately consult an ophthalmologist online to prevent further damage. I am having pain in my left eye since more than 2 weeks. What should I do? Pain in the eye can be due to some recent trauma to that area or due to an underlying infection. If the role of trauma is ruled out, an ophthalmologist needs to be consulted immediately. My child’s eyes do not look aligned. What should I do? This is caused due to a condition called strabismus. It might be hereditary or caused by some conditions at birth. It is usually diagnosed and treated by an ophthalmologist by the use of glasses and/or surgery. • Who is an Ophthalmologist? An ophthalmologist is a doctor who specializes in diagnosing and treating the diseases of the eye. The different ophthalmologist then may have expertise in different areas like those treating diseases related to the lens or the cornea or the retina. Depending on the severity and the structure involved, ophthalmologist with the relevant expertise can be consulted. You can choose to take an appointment for online consultation with ophthalmologist to understand and discuss your issues sitting at ease at home. • How often should I visit an Ophthalmologist? There is no fixed rule for seeing an ophthalmologist. If you have got any problems in the eye that is bothering or worrisome or if you face problems in vision, then you should consult the ophthalmologist to get the problem solved. • Can Ophthalmologist cure cataracts? Cataracts cannot be cured but they can be removed surgically and replaced by intraocular lens. This surgery is the most widely performed surgery in the world and is very safe. • Are Ophthalmologist and Optometrist the same? No they are not the same. Ophthalmologists can perform eye surgeries whereas optometrists cannot. Optometrist can help correct vision problems by prescribing spectacles or contact lenses. • Why should an individual consult an Ophthalmologist? An ophthalmologist helps in diagnosing and treating the diseases of the eye. So if any problem occurs in the eye, an ophthalmologist should be consulted so as to treat any underlying problem at the earliest. You can get in touch with an Ophthalmologist online to diagnose your eye diseases and get treated for the same.  • Can Ophthalmologist cure color blindness? Color blindness that is present from birth cannot be treated but it doesn’t affect daily routine activities. Special contact lenses or glasses can help. Acquired form of color blindness can be treated by an ophthalmologist who can diagnose the underlying condition or the drug that caused the problem. • What surgeries can be performed by an Ophthalmologist? Many kind of surgeries affecting the structures inside the eye can be operated by an ophthalmologist. This includes cataract surgery, retinal detachment procedures, LASIK procedure (surgeries that correct vision), corneal transplant, etc. • What causes red eyes? A number of conditions ranging from infections to inflammation of any of the structure inside the eyes can cause red eyes. It is very important to diagnose the cause before jumping to any conclusion. • What is the treatment for Red Eyes? The treatment depends upon the underlying condition causing it. The causes can be varied and it is very important to diagnose the cause before starting any medication. Read more.. Latest from the Medical Industry Sign up for treatment knowledge base Contact Us Mediflam Pvt. Ltd. Customer Care
Cloud in a Jar Weather Experiment Learn how to make cloud in a jar with just a few household supplies and amaze your kids! The science behind cloud formations is an important part of the water cycle. Cloud in a Jar Water In the summer of Arizona, there is no question that when you leave something wet outside, it will be dry in a few hours. Where did all the water go? In this cloud in a jar experiment, we are going to explore how the fluffy white clouds we see in the sky are formed. One important element of this experiment is using a match to create smoke particles in the jar for the water to condense on to.  If you are not comfortable using a match, you can substitute with hairspray. Simply spray a little bit of hairspray into the jar instead of throwing the match into the water. However, I have to say my kids loved the little fire display and it made the experiment all the more exciting! How to Make Cloud in a Jar • Clear jar with lid • Warm water • Ice • Matches 1. Fill the jar about ¼ full of hot water. I recommend not using boiling water, as it would fog up the walls of the jar and make it difficult to see the cloud. 2. If you do see water condense on the walls of the jar, swirl the water around a little to get rid of the condensation. 3. Prepare the lid by turning it upside down and placing some ice on top. Cloud in a Jar Materials 4. Light a match (adult only please!) and hold the fire for a few seconds inside the jar. Careful not to burn your fingers! 5. Drop the match into the jar. 6. QUICKLY place the lid with the ice on the jar. 7. Watch the cloud form inside the jar! Cloud in a Jar Did you manage to get the cloud to form inside your jar? If not, try putting on the lid a little faster so the smoke doesn’t escape. Another possibility is that your water is not hot enough. After a few minutes, you can lift the lid and let your cloud escape. It was so cool watching the cloud slowly float up and dissipate into the air. My kids enjoyed blowing on it or fanning it with their hands. I tried to capture the smoke in a photo but it was difficult to see. Cloud in a Jar Smoke Escape Top We added the blue food coloring just for fun, but it didn’t do anything. I was curious to see if it would affect how well we could see the cloud, but I don’t think there was a visible effect. We repeated this experiment over and over again because the kids wanted me to light the matches. Not the point of the experiment, I know, but hey the kids still learned about cloud formation in the end and had lots of fun! Science Behind the Cloud in a Jar Experiment Water from everywhere, including lakes, rivers, and oceans, evaporates into the atmosphere as part of the water cycle. Meaning, the water turns into water vapor and travels in the air. When the air rises in the atmosphere, there is less pressure and the air cools (demonstrated by the ice in the lid). The air can’t hold as much water as before, and the vapor condenses into small water droplets.  The water droplets condense on dust particles in the air (in our case, the smoke from the match) and form a cloud. Cloud in a Jar Closeup After you make cloud in a jar, it’s time for the cloud to rain! Check out how to make rain in a jar here. Another fun weather science experiment is the tornado in a bottle. Your kids will love making the water vortex and you can use it as a “calm down” toy afterward. Leave a Comment Scroll to Top