instruction stringlengths 75 2.08M | output stringlengths 7 2.47k |
|---|---|
<|fim▁begin|> Front Page: Radiation Oncology | RTOG Trials | Randomized Trials Non-Hodgkin lymphoma: Main Page | Randomized Overview: Overview | Follicular | Diffuse large B-cell | MALT | Nodal marginal zone | Mantle cell | CLL/SLL | Lymphoblastic | Burkitt | NK/T cell | Anaplastic large cell | Primary CNS Lymphoma Treatment: Aggressive | Specific sites | Radioimmunotherapy Chronic Lymphocytic Leukemia and Small Lymphocytic Lymphoma (CLL/SLL) Contents 1 Overview 2 Staging 3 Classification 4 Richter's transformation 5 Radiation Therapy 6 Reviews Overview CLL is the most common leukemia among adults in Western world It is characterized by accumulation of mature B-cells CLL molecular phenotype: CD5+, CD23+, surface Ig weak, CD79b weak/absent, FMC7 neg. Diagnosis: lymphocytosis (often >5 x 10^9 / L, but not an absolute cutoff) Risk factors are male sex, advanced age, white race, and family history of CLL or lymphoproliferative disorders Cause and pathogenesis are largely unknown Peripheral blood of some healthy adults shows circulating B-cell clones with surface phenotypes similar to CLL Monocloncal B-cell lymphomatosis (MBL) indicates presence of such B-cells in blood at <5000 per cubic millimeter Prevalence of MBL may be 3-5% in general population over 50 years of age It appears that these circulating B-cell clones may be present in blood of for years prior to development of CLL, and that the light chain re-arrangement is the same Thus, it may be reasonable to consider MBL a precursor state to CLL, in a similar fashion as MGUS is a precursor state to multiple myeloma CLL and SLL are histologically and immunophenotypically identical By definition, CLL has more marked peripheral blood involvement CLL: absolute lymphocyte count >=5 x109/L SLL: absolute lymphocyte count <5 x109/L Clinical course varies widely, but frequently characterized by indolent behavior Treatment commonly deferred while patients asymptomatic No consensus on best treatment, but nucleoside analogues and Rituxan have led to improved outcomes Staging Rai Staging Rai Stage Criteria Survival (yr) 0 lymphocytosis only. no other abnormality > 13 I lymphocytosis and lymph node enlargement. no other abnormality 8 II lymphocytosis and spleen or liver enlargement (w/ or w/o lymph node enlargement). no <|fim▁hole|> lymphocytosis and anemia (Hgb < 11 g/dL); w/ or w/o spleen / liver / lymph node enlargement. no platelet abnormality 2 IV lymphocytosis and thrombocytopenia (plts < 100,000 /µL) 1 Binet Staging Binet Stage Criteria Survival (yr) A <3 lymph node areas; no anemia or thrombocytopenia 12 B 3 or more lymph node areas; no anemia or thrombocytopenia 5 C Anemia (Hgb < 11) or thrombocytopenia (< 100,000 /µL) 2 Classification MD Anderson; 2007 (1985-2005) PMID 17925562 -- "Assessment of chronic lymphocytic leukemia and small lymphocytic lymphoma by absolute lymphocyte counts in 2,126 patients: 20 years of experience at the University of Texas M.D. Anderson Cancer Center." (Tsimberidou AM, J Clin Oncol. 2007 Oct 10;25(29):4648-56.) Retrospective. 2126 consecutive CLL/SLL patients Outcome: rates of response, OS, and FFS not different among different groups Predictive factors: deletion of 17p or 6q, age >60, b2-microglobulin >2, albumin <3.5, creatinine >1.6 Conclusion: Patients with CLL or SLL can be treated similarly Richter's transformation Named for Maurice N. Richter who described it in 1928 Development of high grade NHL (typically diffuse large B-cell lymphoma) in the setting of CLL May be triggered by viral infections (e.g. EBV) or by genetic defects acquired by the malignant clone Occurs in ~4% of CLL patients Response rates to chemotherapy are low, up to ~40%; median OS is ~8 months 1993 PMID 7693038, 1993 — "Common clonal origin of chronic lymphocytic leukemia and high-grade lymphoma of Richter's syndrome." Cherepakhin V et al. Blood. 1993 Nov 15;82(10):3141-7. 1975 PMID 1096589, 1975 — "Richter's syndrome. A terminal complication of chronic lymphocytic leukemia with distinct clinicopathologic features." Long JC et al. Am J Clin Pathol. 1975 Jun;63(6):786-95. Original description; 1928 PMID 19969796, 1928 — "Generalized reticular cell sarcoma of lymph nodes associated with lymphatic leukemia." Richter MN et al. Am J Pathol. 1928; 4:285. Radiation Therapy Please see spleen irradiation Reviews 2006 PMID 16983131 -- "Narrative review: initial management of newly diagnosed, early-stage chronic lymphocytic leukemia." (Shanafelt TD, Ann Intern Med. 2006 Sep 19;145(6):435-47.) 2006 PMID 16901035 -- "Chronic lymphocytic leukemia: diagnosis and treatment." (Yee KW, Mayo Clin Proc. 2006 Aug;81(8):1105-29.) <|fim▁end|> | other abnormality 5 III |
<|fim▁begin|> Karrigell is an open Source Python web framework written in Python The Python 2 version is the stable release. A version for Python 3.2 and above was released in February 2011 How-tos Explains "how to" build web applications. This section only applies to the Python3 version Pronounce "Karrigell" Install Write the "Hello world" script Build a simple HTML page Write an interactive application in a single script Use the POST method Upload files Redirect to a URL Insert dynamic values in a template Insert an image, a stylesheet, a Javascript in a document Manage encodings Set, read and erase cookies Import a module Tutorial This <|fim▁hole|> build a simple web based application : the example is a CD collection. The home page will show the list of records, with a counter of visits and a "login" link. People who successfully log in will be able to add / edit / remove records The first step is to install Karrigell. Download the latest version, unzip it in a folder, open a console window and in this folder run python Karrigell.py. This will start the built-in web server on port 80 Home page Managing The Database Snippets Counter Test Mysql Set Content-type header External links Group Karrigell for Python A review on devshed <|fim▁end|> | tutorial explains how to |
<|fim▁begin|> Contents 1 The Concept 2 The System 3 The Data 4 LMI : Exterior Conic Sector Lemma 5 Conclusion: 6 Implementation 7 Related LMIs 8 References The Concept The conic sector theorem is a powerful input-output stability analysis tool, providing a fine balance between generality and simplicity of system characterisations that is conducive to practical stability analysis and robust controller synthesis. The System Consider a square, contiuous-time linear time-invariant (LTI) system, G : L 2 e → L 2 e {\displaystyle {\mathcal {G}}:{\mathcal {L}}_{2e}\rightarrow {\mathcal {L}}_{2e}} , with minimal state-space relization (A, B, C, D), where E , A ∈ R n × n , B ∈ R n × m , C ∈ R p × n , {\displaystyle {\mathcal {E,A}}\in {\mathcal {R}}^{n\times n},{\mathcal {B}}\in {\mathcal {R}}^{n\times m},{\mathcal {C}}\in {\mathcal {R}}^{p\times n},} and D ∈ R p × m {\displaystyle {\mathcal {D}}\in {\mathcal {R}}^{p\times m}} . x ˙ ( t ) = A x ( t ) + B u ( t ) , y ( t ) = C x ( t ) + D u ( t ) {\displaystyle {\begin{aligned}{\dot {x}}(t)&=Ax(t)+Bu(t),\\y(t)&=Cx(t)+Du(t)\\\end{aligned}}} The Data The matrices The matrices A , B , C {\displaystyle A,B,C} and D {\displaystyle D} LMI : Exterior Conic Sector Lemma The system G {\displaystyle {\mathcal {G}}} is in the exterior cone of radius r centered at c (i.e. G ∈ {\displaystyle {\mathcal {G}}\in } exconer(c)), where r ∈ R > 0 {\displaystyle r\in {\mathcal {R}}_{>0}} and ∈ R {\displaystyle \in {\mathcal {R}}} , under either of the following equivalent necessary and sufficient conditions. 1. There exists P ∈ S n {\displaystyle \in {\mathcal {S}}^{n}} , where P ≥ 0 {\displaystyle \geq 0} , such that [ P A + A T P − C <|fim▁hole|> T ( D − C I ) ( P B − C T ( D − C I ) ) T r 2 I − ( D − c I ) T ( D − c I ) ] ≤ 0. {\displaystyle {\begin{bmatrix}PA+A^{T}P-C^{T}C&PB-C^{T}(D-CI)\\(PB-C^{T}(D-CI))^{T}&r^{2}I-(D-cI)^{T}(D-cI)\end{bmatrix}}\leq 0.} 2. There exists P ∈ S n {\displaystyle \in {\mathcal {S}}^{n}} , where P ≥ 0 {\displaystyle \geq 0} , such that [ P A + A T P − C T C P B − C T ( D − C I ) 0 ( P B − C T ( D − C I ) ) T − ( D − c I ) T ( D − c I ) r I 0 ( r I ) T − I ] ≤ 0. {\displaystyle {\begin{bmatrix}PA+A^{T}P-C^{T}C&PB-C^{T}(D-CI)&0\\(PB-C^{T}(D-CI))^{T}&-(D-cI)^{T}(D-cI)&rI\\0&(rI)^{T}&-I\end{bmatrix}}\leq 0.} Proof, Applying the Schur complement lemma to the r 2 I {\displaystyle r^{2}I} terms in (1) gives (2). Conclusion: If there exist a positive definite P {\displaystyle P} matrix satisfying above LMIs then the system G {\displaystyle {\mathcal {G}}} is in the exterior cone of radius r centered at c. Implementation Code for implementation of this LMI using MATLAB. https://github.com/VJanand25/LMI Related LMIs KYP Lemma State Space Stability References 1. J. C. Willems, “Dissipative dynamical systems - part I: General theory,” Archive Rational Mechanics and Analysis, vol. 45, no. 5, pp. 321–351, 1972. 2. D. J. Hill and P. J. Moylan, “The stability of nonlinear dissipative systems,” IEEE Transac- tions on Automatic Control, vol. 21, no. 5, pp. 708–711, 1976. 3. LMI Properties and Applications in Systems, Stability, and Control Theory, by Ryan James Caverly1 and James Richard Forbes2 4. Bridgeman, Leila Jasmine, and James Richard Forbes. "The exterior conic sector lemma." International Journal of Control 88.11 (2015): 2250-2263. <|fim▁end|> | T C P B − C |
<|fim▁begin|> French Lessons · Vocabulary · Grammar · Appendices · Texts Contents 1 Formation 2 Forms and Usage Summary 3 Simple Present Participle Usage 4 Composed Present Participle 4.1 Formation 4.2 Usage 5 Le gérondif 5.1 Formation 5.2 Usage Formation Replace the -ons ending of a verb conjugated in the first person plural in the present indicative with -ant. There are three verbs with the present participle forming irregularly: avoir, être, and savoir. Grammar(upload audio)Present Participle Formation · Formation De Participe Présent Regular Formation infinitive Nous form of thepresent indicative Stem Ending PresentParticiple parler nous parlons parl ant parlant finir nous finissons finiss finissant attendre nous attendons attend attendant prendre nous prenons pren prenant Irregular Formation avoir ayant être étant savoir sachant Forms and Usage Summary Grammar(upload audio)Present Participle Usage · Utilisation De Participe Présent Form Formation Formation Example Usage Usage Detail Simple Present Participle [present participle] étant - beingdisant - saying causereason expresses the reason why somethinghas occurred Composed Present Participle [étant or ayant] + [past participle] ayant fini - having finishedétant allé(e)(s) - having gone anteriority expresses that one action occurredbefore the action of the main verb Le gérondif en + [present participle] en chantant - while singingen courant - while running simultinaity expresses that one action is occurringat the same time as a second NOTE: The present progressive tense does not exist in French. The present indicative is used instead. To say I am going., you would say Je vais. You would NOT say Je suis allant. Simple Present Participle Usage The present participle is used to express the reason why something has occurred. La table étant trop lourde, ils ne pouvaient pas la soulever. - The table being too heavy, they were not able to lift it. Composed Present Participle Formation To form the composed present participle, conjugate être or avoir in the present participle (étant and ayant) and add <|fim▁hole|> having spoken étant allé(e)(s) - having gone. Note that both avoir and être translate to having in English. This is the same in all composed tenses. The past participle may have an -e or -s added in order to agree with other parts of the sentence. All standard agreement rules that composed tenses follow apply to the composed present participle as well. Usage The composed present participle is used to express that one action occurred before the action of the main verb Ayant fini, je suis parti(e). - Having finished, I left. Je suis parti(e) ayant entendu la fille. - I left having heard the girl. The composed present participle is not used after a preposition. To express a similar idea using a preposition, the past infinitive is used. Je suis parti(e) sans avoir entendu la fille. - I left without having heard the girl. Je suis parti(e) après avoir entendu la fille. - I left after having heard the girl. Le gérondif Formation en + present participle en chantant - (while) singing en courant - (while) running Usage Le gérondif is used to express that one action is occurring at the same time as a second. Ils se sont promenés en chantant. - They walked while singing. Elle est arrivée en courant. - She arrived running. Tenses and moods Concepts : Present participle · Past participle · Gérondif · Infinitive · Past infinitive · Auxiliary verb · Perfect tenses Indicative mood : Simple tenses (Present · Imperfect · Past historic · Future) · Perfect tenses (Present perfect · Pluperfect · Past anterior · Future anterior) · Other tenses (Recent past · Near future) Subjunctive mood : Present · Imperfect · Past · Pluperfect Imperative mood : Present · Past Conditional mood : Present · Past · Second form of the past French : Lessons · Vocabulary · Grammar · Appendices · Texts <|fim▁end|> | the past participle. ayant parlé - |
<|fim▁begin|> ← Properties and Theories of Acids and Bases ·Buffer Systems → ← Properties and Theories of Acids and Bases · General Chemistry · Buffer Systems → Book Cover · Introduction · v • d • e Units: Matter · Atomic Structure · Bonding · Reactions · Solutions · Phases of Matter · Equilibria · Kinetics · Thermodynamics · The Elements Appendices: Periodic Table · Units · Constants · Equations · Reduction Potentials · Elements and their Properties Contents 1 Ionization of Water 2 The pH Scale 2.1 Definition of pH 2.2 pOH 2.3 Calculating pH 3 Titration 4 Practice Questions Ionization of Water Water is a very weak electrolyte. It will dissociate into hydroxide and hydronium ions, although only in a very small amount. Because pure water is completely neutral, it always dissociates in equal amounts of both hydroxide and hydronium. Once acidic or basic substances have been added to pure water, the concentration of the ions will change. Regardless of which acid-base theory is used, acids and bases all have one important thing in common: All acids increase the H+ concentration of water. All bases increase the OH- concentration of water. Furthermore, the concentration of hydrogen ions multiplied by the concentration of hydroxide ions is a constant. This constant is known as the ionization constant of water, or Kw. At room temperature it equals 10-14 mol2/L2. Thus: K w = [ H + ] × [ OH − ] = 1.00 × 10 − 14 m o l 2 / L 2 {\displaystyle K_{w}=[{\hbox{H}}^{+}]\times [{\hbox{OH}}^{-}]=1.00\times 10^{-14}mol^{2}/L^{2}} In a neutral solution, the concentrations of H+ and OH- are both equal to 10-7. Using the above equation, the concentration of one ion can be determined if the concentration of the other ion is known. This equation further demonstrates the relationship between acids and bases: as the acidity (H+) increases, the basicity (OH-) must decrease. The pH Scale To measure the acidity or basicity of a substance, the pH scale is employed. The pH Scale A completely neutral substance has a pH of 7. Acids have a pH below 7 Bases have a pH above 7. pH usually ranges between 0 and <|fim▁hole|> be any value. Battery acid, for example, has a negative pH because it is so acidic. Various pH values. Definition of pH The pH scale is mathematically defined as: p H = − log [ H + ] {\displaystyle pH=-\log {[{\hbox{H}}^{+}]}} Substances that release protons or increase the concentration of hydrogen ions (or hydronium ions) will lower the pH value. pOH There is also a less common scale, the pOH scale. It is defined as: p O H = − log [ OH − ] {\displaystyle pOH=-\log {[{\hbox{OH}}^{-}]}} Substances that absorb protons or increase the concentration of hydroxide ions will lower the pOH value. The sum of pH and pOH is always 14 at room temperature: p H + p O H = 14 {\displaystyle pH+pOH=14} Calculating pH A strong acid or strong base will completely dissociate in water, so the concentration of the acid/base is equal to the concentration of H+ or OH-. If you know the concentration of the acid or base, then you can simply plug that number into the pH or pOH formula. The sum of pH and pOH will always equal 14 at room temperature, so you can interconvert these two values. If you know the H+ concentration and need to know the OH- concentration (or vice versa), use the definition of Kw above. The product of the two ion concentrations will always equal 10-14 at room temperature. Titration Titration is the controlled mixing of a solution with known concentration (the standard solution) to another solution to determine its concentration. One solution is acidic and the other is basic. An indicator is added to the mixture. An indicator must be selected so that it changes color when equal amounts of acid and base have been added. This is known as the equivalence point. This does not necessarily mean that the pH is 7.0. Polyprotic acids have multiple equivalence points. Once the equivalence point has been reached, the unknown concentration can be determined mathematically. Practice Questions 1) 5.00g of NaOH are dissolved to make 1.00L of solution. a What is the concentration of H+? b What is the pH? Answers for Titration and pH <|fim▁end|> | 14, but it can |
<|fim▁begin|> Почта СССР CPA catalogue ← 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 → CPA # 3720-3841 (122 stamps, 65 series) Here complete descriptions of 1969 USSR stamps are given. Здесь приведены полные описания почтовых марок СССР 1969 года. All available images of 1969 USSR stamps are on the Wikimedia Commons: Все имеющиеся изображения почтовых марок СССР 1969 года находятся на Викискладе: Stamps of the Soviet Union, 1969, all stamps You can also see standard images of 1969 USSR stamps on Wikimedia commons: Типовые изображения почтовых марок СССР 1969 года можно также посмотреть на Викискладе: Каталог ЦФА (3001-4000) Attention! The stamps are sorted by CPA (Central Philatelic Agency) catalog numbers, not by dates of their issue! Внимание! Марки отсортированы по номерам каталога ЦФА, а не по дате выпуска! The names of stamps and stamp series are made according to all used 7 catalogues[1][2][3][4][5][6][7]. Названия марок и серий марок составлены по всем используемым 7 каталогам. Names of articles of Wikipedia are whenever possible used in names of stamps and series. В названия марок и серий по возможности использованы названия статей Википедии. Contents 1 Full descriptions / Полные описания 1.1 40 CPA ##3788-3792 (5) State Museum of Oriental Art, Moscow (Founded 1918.10.30) 2 Short descriptions / Краткие описания 2.1 1 1969.01.01 (Belarus) 2.2 2 1969.01.01 (Latvia) 2.3 3 1969.01.22 (1st Team Spaceflight) 2.4 4 1969.01.23 (Saint Petersburg State University) 2.5 5 1969.02.13 (Ivan Klylov) 2.6 6 1969.02.23 (Heroes of World War II) 2.7 7 1969.03.21 (1st Hungarian Soviet Republic) 2.8 8 1969.03.22 (Bashkir ASSR) 2.9 9 1969.04.12 (Cosmonautics Day) 2.10 10 1969.04.18-10.21 (Lenin's Places) 2.11 11 1969.04.25 (VEF) 2.12 12 1969.05.09 (Heroes of World War II) 2.13 13 1969.05.09 (ILO) 2.14 14 1969.05.15 (Figures of the Communist Party and the Soviet State) 2.15 15 1969.05.15 (Suleiman Stalsky) 2.16 16 1969.05.15 (Moscow Botanical Garden) 2.17 17 1969.05.22 (Ukrainian Academy of Sciences) 2.18 18 1969.06.03 (Cinema Festival in Moscow) 2.19 19 1969.06.03 (Ballet Competitions in Moscow) 2.20 20 1969.06.10 (Protozoologists Congress) 2.21 21 1969.06.14 (Estonian Song Festival) 2.22 22 1969.06.20 (Periodic Law) 2.23 23 1969.06.20 (World Peace Movement) 2.24 24 1969.06.20 (Soviet Scientific Inventions) 2.25 25 1969.06.25 (Ivan Kotliarevsky) 2.26 26 1969.06.25 (Ice Hockey) 2.27 27 1969.07.03 (Liberation of Byelorussia from Fascism Occupation) 2.28 28 1969.07.10 (Polish People's Republic) 2.29 29 1969.07.10 (Bulgaria) 2.30 30 1969.07.15 (Mykolaiv) 2.31 31 1969.07.15 (Samarkand) 2.32 32 1969.07.20 (Mihály Munkácsy) 2.33 33 1969.07.20 (Sport) 2.34 34 1969.07.20 (First Cavalry Army) 2.35 35 1969.07.20 (Donetsk) 2.36 36 1969.08.03 (Ilya Repin) 2.37 37 1969.08.09 (Spartakiad) 2.38 38 1969.08.22 (Vladimir Komarov) 2.39 39 1969.09.01 (Hovhannes Tumanyan) 2.40 40 1969.09.03 (Museum of Oriental Art) 2.41 41 1969.09.10 (Mahatma Gandhi) 2.42 42 1969.09.10 (Białowieża Forest) 2.43 43 1969.09.10 (Komitas) 2.44 44 1969.09.20 (Sergey Gritsevets) 2.45 45 1969.09.20 (Partisans of World War II) 2.46 46 1969.09.20 (Heroes of World War II) 2.47 47 1969.09.26 (Ivan Pavlov) 2.48 48 1969.10.03 (East Germany) 2.49 49 1969.10.14 (Liberation of Ukraine from Fascism Occupation) 2.50 50 1969.10.14 (Aleksey Koltsov) 2.51 51 1969.10.21-11.06 (October Revolution) 2.52 52 1969.10.22 (Triple Space Flights) 2.53 53 1969.10.25 (Philatelic Exhibition) 2.54 54 1969.10.29 (Signal Corps) 2.55 55 1969.11.18 (Congress of Kolkhoz Men) 2.56 56 1969.11.20 (Fairy Tales) 2.57 57 1969.11.25-12.26 (Space) 2.58 58 1969.11.30 (USSR-Afghanistan) 2.59 59 1969.11.30 (Definitive Coil Stamp) 2.60 60 1969.12.12 (Aircraft) 2.61 61 1969.12.25-31 (Aviation) 2.62 62 1969.12.25 (New Year) 2.63 63 1969.12.26 (Sport) 2.64 64 1969.12.31 (Liberation of Byelorussia from Fascism Occupation) 2.65 65 1969.12.31 (Ostankino Tower) 3 Sources / Источники Full descriptions / Полные описания C - Commemorative stamp (Коммеморативная марка) Size of images / Размер картинок: size = 0-50 mm → 4·size px size = 50-100 mm → 3·size + 50 px size = 100-150 mm → 2·size + 150 px size = 150-200 mm → size + 300 px size ≥ 200 mm → 500 px 40 CPA ##3788-3792 (5) State Museum of Oriental Art, Moscow (Founded 1918.10.30) Full design (Полное оформление). See also short descriptions (см. также краткие описания) State Museum of Oriental Art, Moscow (Founded 1918.10.30). Designer: Vasili Zavyalov. Type: commemorative. General text: “ГОСУДАРСТВЕННЫЙ МУЗЕЙ ИСКУССТВА НАРОДОВ ВОСТОКА”. National ornaments are on the left side of the stamps Perforation: comb 12:12½. Paper: coated. Print: offset. Size: 30 x 42 mm (25 x 37 mm)[8]. Sheet: 25 (5 x 5). Colour, face value and quantities: see the stamps Государственный музей искусства народов Востока в Москве (основан 30/X 1918). Художник Василий Васильевич Завьялов. Коммеморативные. Общий текст: «ГОСУДАРСТВЕННЫЙ МУЗЕЙ ИСКУССТВА НАРОДОВ ВОСТОКА». Национальные орнаменты на левой стороне марок. 1969.09.03 Numbers: SC 3711-3715; Liapine 3746-3750; Scott 3634-3638; Michel 3661-3665; SG 3723-3727; Yvert 3522-3526. Codes: Scott 1745 (1); Michel dzd-dzh (5), SG 1388 (1) #1969.69-40.1 C30 x 42 mm Turkmenian Drinking Horn. Cult drinking horn rhyton (Turkmenian, 2nd-cent B. C.). Ivory. It is found in case of Nisa's excavation - the large city of the Parthian Empire. Local text: "РИТОН. ТУРКМЕНИЯ II ВЕК ДО Н.Э.". Colour: blue[4] and multicoloured. Face value: 4k. Quantities: 5,000,000 copies. Культовый кубок-рог, Туркмения. Культовый кубок-рог ритон (Туркмения, II век до н. э.). Слоновая кость. Найден при раскопках Нисы - крупного города Парфянского царства. Локальный текст: "РИТОН. ТУРКМЕНИЯ II ВЕК ДО Н.Э.". Синяя и многоцветная. CPA 3788 SC 3711 Liapine 3746 Scott 3634 (A1745) Michel 3661 (dzd) SG 3723 (1388) Yvert 3522 #1969.70-40.2 C30 x 42 mm Persian Simurgh Vessel. Simurgh vessel - giant anthropomorphic bird (Iran, 13th century). Ceramic, glaze. Local text: "СОСУД СИМУРГ. ИРАН XIII ВЕК". Colour: lilac[4] and multicoloured. Face value: 6k. Quantities: 4,500,000 copies. Сосуд Симург, Персия. Симург - сосуд в форме птицы с женским лицом (Иран, XIII век). Керамика, глазурь. Локальный текст: "СОСУД СИМУРГ. ИРАН XIII ВЕК". Сиреневая и многоцветная. CPA 3789 SC 3712 Liapine 3747 Scott 3635 (A1745) Michel 3662 (dze) SG 3724 Yvert 3523 #1969.71-40.3 C30 x 42 mm Head of Goddess Guanyin (Kannon), Korea. Guanyin (Kannon) - goddess of the Good and mercy (Korea, 8th century). Stone. Local text: "КАНЫМ. КОРЕЯ VIII ВЕК". Colour: red [4] and multicoloured. Face value: 12k. Quantities: 4,000,000 copies. Голова богини Гуаньинь (Каным), Корея. Гуаньинь (Каным) - богиня добра и милосердия (Корея, VIII век). Камень. Локальный текст: "КАНЫМ. КОРЕЯ VIII ВЕК". Красная и многоцветная. CPA 3790 SC 3713 Liapine 3748 Scott 3636 (A1745) Michel 3663 (dzf) SG 3725 Yvert 3524 #1969.72-40.4 C30 x 42 mm Bodhisattva Statuette, Tibet. Bodhisattva - goddess of happiness, the Good and mercy (Tibet, 7th century). Bronze. Local text: "БОДИСАТВА. ТИБЕТ VII ВЕК". Colour: blue, violet[4] and multicoloured. Face value: 12k. Quantities: 3,500,000 copies. Статуэтка Бодхисаттвы, Тибет. Бодхисаттва - богиня счастья, добра и милосердия (Тибет, VII век). Бронза. Локальный текст: "БОДИСАТВА. ТИБЕТ VII ВЕК". Синяя, фиолетовая и многоцветная. CPA 3791 SC 3714 Liapine 3749 Scott 3637 (A1745) Michel 3664 (dzg) SG 3726 Yvert 3525 #1969.73-40.5 C30 x 42 mm Ebisu Statuette, Japan. Ebisu - God of happiness and wealth (Japan, 17th century). Ivory. Local text: "ЭБИЗУ. ЯПОНИЯ XVII ВЕК". Colour: pale green[4] and multicoloured. Face value: 20k. Quantities: 3,000,000 copies. Статуэтка Эбису, Япония. Эбису - бог счастья и богатства (Япония, XVII век). Слоновая кость. Локальный текст: "ЭБИЗУ. ЯПОНИЯ XVII ВЕК". Бледнохзеленая и многоцветная. CPA 3792 SC 3715 Liapine 3750 Scott 3638 (A1745) Michel 3665 (dzh) SG 3727 Yvert 3526 Short descriptions / Краткие описания Full design (Полное оформление). C - Commemorative stamp (Коммеморативная марка) Size of images: / Размер картинок: size = 0-50 mm → 2·size px size = 50-150 mm → size + 50 px size ≥ 150 mm → 200 px 1 1969.01.01 (Belarus) 1 50th anniversary of the Byelorussian Soviet Socialist Republic (Belarus) 1. 50-летие Белорусской Советской Социалистической Республики # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.1-1.1 C40 x 28 mm 2k Revolutionaries and Monument Революционеры и памятник 3720 3643 3678 3568 (A1709) 3594 (dwg) 3655 (1351) 3460 #1969.2-1.2 C40 x 28 mm 4k Partisans and Sword Партизаны и меч 3721 3644 3679 3569 (A1709) 3595 (dwh) 3656 3461 #1969.3-1.3 C40 x 28 mm 6k Workers and Orders of Lenin Рабочие и ордена Ленина 3722 3645 3680 3570 (A1709) 3596 (dwi) 3657 3462 2 1969.01.01 (Latvia) 2 50th Anniversary of Soviet Power in Latvia (December, 1918) (Latvia) 2. 50-летие со дня установления Советской власти в Латвии (декабрь 1918) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.4-2.1 C30 x 42 mm 4k Russian and Latvian Shooters Русский и латышский стрелки 3723 3646 3681 3567 (A1708) 3597 (dwk) 3658 (1352) 3463 3 1969.01.22 (1st Team Spaceflight) 3 1st Team Spaceflights of Soyuz 4 and Soyuz 5, 1/16/69. Sheet of 1 (1st Team Spaceflight) 3. Первая в мире экспериментальная космическая станция (Союз-4 и Союз-5). Почтовый блок # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.5-3.1 C94 x 68 mm 50k Vladimir Shatalov, Boris Volynov, Aleksei Yeliseyev and Yevgeny Khrunov Владимир Александрович Шаталов, Борис Валентинович Волынов, Алексей Станиславович Елисеев и Евгений Васильевич Хрунов 3724 Бл 57 (3647) Блок 58 (3682) 3571 (A1710) Block 54 (3596) (dwm (dwl)) MS3659 (1353) Bloc 53 4 1969.01.23 (Saint Petersburg State University) 4 150th Anniversary of Andrei Zhdanov Leningrad University (Saint Petersburg State University) 4. 150-летие Ленинградского государственного университета имени А. А. Жданова # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.6-4.1 C42 x 30 mm 10k University Buildings 3725 3648 3683 3572 (A1711) 3599 (dwn) 3660 (1354) 3464 5 1969.02.13 (Ivan Klylov) 5 Birth Bicent of Ivan Klylov, Fabulist (1769?-1844) (Ivan Klylov) 5. 200-летие со дня рождения баснописца Ивана Андреевича Крылова (1769?-1844) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.7-5.1 C30 x 42 mm 4k Ivan Klylov 3726 3649 3684 3573 (A1712) 3600 (dwo) 3661 (1355) 3465 6 1969.02.23 (Heroes of World War II) 6 Heroes of World War II (Heroes of World War II) Continuation of the series (CPA 2401-2402, 2547, 2591, 2663-2664, 2826-2827, 2828, 3002-3003, 3004-3005, 3148-3149, 3324-3326, 3462-3463, 3490, 3509, 3595-3597, 3727-3728, 3746, 3802, 3855-3856, 3976-3977) (33 stamps) 6. Герои Великой Отечественной войны. Продолжение серии # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.8-6.1 C30 x 42 mm 4k World War II Hero First Lieutenant of the Guard Aleksandr Kosmodemyansky 3727 3650 3685 3575 (A1713) 3602 (dwr) 3663 3467 #1969.9-6.2 C30 x 42 mm 4k World War II Hero Political Commissar Nikolay Filchenkov 3728 3651 3686 3574 (A1713) 3601 (dwp) 3662 (1356) 3466 7 1969.03.21 (1st Hungarian Soviet Republic) 7 50th Anniversary of 1st Hungarian Soviet Republic (1919.03.21) (1st Hungarian Soviet Republic) 7. 50-летие провозглашения 1-й Венгерской Советской Республики (21/III 1919) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.10-7.1 C37 x 37 mm 6k The Whell Turns Round Again 3729 3652 3687 3576 (A1714) 3603 (dws) 3664 (1357) 3468 8 1969.03.22 (Bashkir ASSR) 8 50th Anniversary of the Bashkir Autonomous Soviet Socialist Republic (1919.03.23) (Bashkir ASSR) 8. 50-летие Башкирской Автономной Советской Социалистической Республики (23/III 1919) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.11-8.1 C52 x 37 mm 4k Oil Refinery and Salawat Yulayev Monument 3730 3653 3688 3577 (A1715) 3604 (dwt) 3665 (1358) 3469 9 1969.04.12 (Cosmonautics Day) 9 National Cosmonautics Day (Cosmonautics Day) 9. День космонавтики # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.12-9.1 C52 x 37 mm 10k Sergei Korolev 3731 3654 3689 3578 (A1716) 3606 (dwv) 3668 3478 #1969.13-9.2 C37 x 52 mm 10k Vostok on Launching Pad 3732 3655 3690 3580 (A1717) 3605 (dwu) 3666 (1359) 3480 #1969.14-9.3 C52 x 37 mm 10k Zond 5 3733 3656 3691 3579 (A1716) 3607 (dww) 3667 3479 #1969.15-9.4 C90 x 65 mm 80k Soyuz 3 3734 Бл 58 (3657) Блок 59 (3692) 3581 (A1716) Block 55 (3608) (dwy(dwx)) MS3669 Bloc 54 10 1969.04.18-10.21 (Lenin's Places) 10 Places in the USSR Connected with Lenin (Lenin's Places) 10. Памятные ленинские места в СССР # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.16-10.1 C1969.06.1240 x 28 mm 4k Lenin House, Ulyanovsk 3735 3658 3702 3591 (A1718) 3632 (dxy) 3678 3477B #1969.17-10.2 C1969.10.2140 x 28 mm 4k Lenin Museum, Ulyanovsk 3736 3659 3701 3590 (A1718) 3681 (dzz) 3679 3477A #1969.18-10.3 C1969.04.1840 x 28 mm 4k Lenin University, Kazan 3737 3660 3693 3582 (A1718) 3609 (dwz) 3670 (1360) 3472 #1969.19-10.4 C1969.04.1840 x 28 mm 4k Lenin Museum, Samara 3738 3661 3694 3583 (A1718a) 3610 (dxa) 3671 3475 #1969.20-10.5 C1969.04.1840 x 28 mm 4k Lenin Museum, Shushenskoye 3739 3662 3694 3585 (A1718c) 3611 (dxb) 3673 3477 #1969.21-10.6 C1969.04.1840 x 28 mm 4k Lenin Museum, Pskov 3740 3663 3695 3584 (A1718b) 3612 (dxc) 3672 3474 #1969.22-10.7 C1969.04.1840 x 28 mm 4k Hay Hut, Razliv 3741 3664 3696 3586 (A1718) 3613 (dxd) 3674 3476 #1969.23-10.8 C1969.04.1840 x 28 mm 4k Smolny Institute, Saint Petersburg 3742 3665 3697 3588 (A1718d) 3614 (dxe) 3676 3471 #1969.24-10.9 C1969.04.1840 x 28 mm 4k Lenin’s Office in Kremlin, Moscow 3743 3666 3698 3589 (A1718) 3615 (dxf) 3677 3470 #1969.25-10.10 C1969.04.1840 x 28 mm 4k Lenin Museum, Gorki Leninskiye 3744 3667 3699 3587 (A1718) 3616 (dxg) 3675 3473 11 1969.04.25 (VEF) 11 50th Anniversary of VEF Electrical Works, Riga (VEF) 11. 50-летие Рижского завода ВЭФ # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.26-11.1 C42 x 30 mm 10k Telephone, Radio Set and Trademark 3745 3668 3703 3592 (A1719) 3617 (dxh) 3680 (1361) 3481 12 1969.05.09 (Heroes of World War II) 12 Heroes of World War II. Czech Officer Otakar Jaroš (Heroes of World War II) Continuation of the series[5][9] (CPA 2401-2402, 2547, 2591, 2663-2664, 2826-2827, 2828, 3002-3003, 3004-3005, 3148-3149, 3324-3326, 3462-3463, 3490, 3509, 3595-3597, 3727-3728, 3746, 3802, 3855-3856, 3976-3977) (33 stamps) 12. Герои Великой Отечественной войны. Чешский офицер Отакар Ярош. Продолжение серии # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.27-12.1 C30 x 42 mm 4k World War II First Foreign Hero Otakar Jaroš 3746 3669 3704 3575A (A1713) 3618 (dxi) 3682 (1363) 3483 13 1969.05.09 (ILO) 13 50th Anniversary of the International Labor Organization (ILO) (ILO) 13. 50-летие Международной организации труда (МОТ) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.28-13.1 C52 x 52 mm 6k ILO Emblem and Globe 3747 3670 3705 3593 (A1720) 3619 (dxk) 3681 (1362) 3482 14 1969.05.15 (Figures of the Communist Party and the Soviet State) 14 Figures of the Communist Party and the Soviet State (Figures of the Communist Party and the Soviet State) 14. Деятели Коммунистической партии и Советского государства. Продолжение серии # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.29-14.1 C26 x 37 mm 4k Stanislav Kosior 3748 3671 3706 3516C (A1688) 3626 (dxs) 3684 3486 #1969.30-14.2 C26 x 37 mm 4k Pavlo Dybenko 3749 3672 3707 3516B (A1688) 3625 (dxr) 3683 (1364) 3485 15 1969.05.15 (Suleiman Stalsky) 15 Birth Centenary of Suleiman Stalsky (1869-1937), Lezgin poet-ashik from Daghestan (Suleiman Stalsky) 15. 100-летие со дня рождения лезгинского народного поэта-ашуга Дагестана Сулеймана Стальского (1869-1937) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.31-15.1 C42 x 30 mm 4k Suleyman Stalsky 3750 3673 3708 3595 (A1721) 3627 (dxt) 3685 (1365) 3484 16 1969.05.15 (Moscow Botanical Garden) 16 Moscow Botanical Garden of Academy of Sciences (Moscow Botanical Garden) 16. Главный ботанический сад имени Н. В. Цицина РАН в Москве # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.32-16.1 C37 x 37 mm 2k Rose Clear Glade 3751 3674 3709 3596 (A1722) 3620 (dxl) 3686 (1366) 3487 #1969.33-16.2 C37 x 37 mm 4k Lily Slender 3752 3675 3710 3597 (A1722) 3621 (dxm) 3687 3488 #1969.34-16.3 C37 x 37 mm 10k Cattleya hybrid (orchid) 3753 3676 3711 3598 (A1722) 3622 (dxn) 3688 3489 #1969.35-16.4 C37 x 37 mm 12k Dahlia Leaves Fall 3754 3677 3712 3599 (A1722) 3623 (dxo) 3689 3490 #1969.36-16.5 C37 x 37 mm 14k Gladiolus Ural Girl 3755 3678 3713 3600 (A1722) 3624 (dxp) 3690 3491 17 1969.05.22 (Ukrainian Academy of Sciences) 17 50th Anniversary of Academy of Sciences of the UkrSSR, Kiev (Ukrainian Academy of Sciences) 17. 50-летие Академии наук Украинской ССР, Киев # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.37-17.1 C42 x 30 mm 4k Scientific Centre 3756 3679 3714 3601 (A1723) 3628 (dxu) 3691 (1367) 3492 18 1969.06.03 (Cinema Festival in Moscow) 18 6th Moscow International Film Festival (07-22.07) (Cinema Festival in Moscow) 18. VI Московский международный кинофестиваль (7-22/VII) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.38-18.1 C37 x 52 mm 6k Film, Camera and Medal 3757 3680 3715 3602 (A1724) 3629 (dxv) 3692 (1368) 3493 19 1969.06.03 (Ballet Competitions in Moscow) 19 1st International Ballet Competitions in Moscow (11-23.06) (Ballet Competitions in Moscow) 19. I Международный конкурс артистов балета в Москве (11-23/VI) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.39-19.1 C37 x 52 mm 6k Ballet Dancers 3758 3681 3716 3603 (A1725) 3630 (dxw) 3693 3494 20 1969.06.10 (Protozoologists Congress) 20 3rd International Protozoologists Congress in Leningrad (02-10.07) (Protozoologists Congress) 20. III Международный конгресс протозоологов в Ленинграде (2-10/VII) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.40-20.1 C28 x 40 mm 6k Radiolaria and It Division 3759 3682 3717 3605 (A1726) 3631 (dxx) 3694 (1369) 3495 21 1969.06.14 (Estonian Song Festival) 21 Centenary of Estonian Song Festival (Estonian Song Festival) 21. 100-летие эстонского праздника песни # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.41-21.1 C30 x 42 mm 4k Estonian Singer and Festival Emblem 3760 3683 3718 3606 (A1727) 3633 (dxz) 3695 (1370) 3496 22 1969.06.20 (Periodic Law) 22 Centenary of the Periodic Law (Classification of Chemacel Elements), Formulated by Dmitri Mendeleev (1834-1907) (Periodic Law) 22. 100-летие Периодического закона химических элементов Дмитрия Ивановича Менделеева (1834-1907) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.42-22.1 C52 x 37 mm 6k Mendeleev and Formula 3761 3684 3719 3607 (A1728) 3634 (dya) 3696 (1371) 3501 #1969.43-22.2 C76 x 103 mm 30k Mendeleev and Periodic Law 3762 Бл 59 (3685) Блок 60 (3720) 3608 (A1728) Block 56 (3635) (dyc(dyb)) MS3697 (1371) Bloc 55 23 1969.06.20 (World Peace Movement) 23 20th anniversary of the World Peace Movement (World Peace Movement) 23. 20-летие Всемирного движения за мир # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.44-23.1 C40 x 28 mm 10k Peace Banner and World Landmarks 3763 3686 3721 3609 (A1729) 3636 (dyd) 3698 (1372) 3497 24 1969.06.20 (Soviet Scientific Inventions) 24 20th anniversary of Soviet Scientific Inventions (Decree from 30.06.1919) (Soviet Scientific Inventions) 24. 50-летие советского изобретательства (декрет от 30/VI 1919) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.45-24.1 C28 x 40 mm 4k Rocket on Laser Beam, and Moon 3764 3687 3722 3610 (A1730) 3637 (dye) 3699 (1373) 3500 25 1969.06.25 (Ivan Kotliarevsky) 25 Birth Bicentenary of Ivan Kotliarevsky, Ukrainian Writer (1769-1838) (Ivan Kotliarevsky) 25. 200-летие со дня рождения украинского писателя Ивана Петровича Котляревского (1769-1838) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.46-25.1 C42 x 30 mm 4k Ivan Kotliarevsky 3765 3688 3723 3611 (A1731) 3638 (dyf) 3700 (1374) 3498 26 1969.06.25 (Ice Hockey) 26 Soviet Victory in the Ice Hockey World Championships, Stockholm, Sweden, 1969 (Ice Hockey) 26. Советские хоккеисты - чемпионы мира и Европы # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.47-26.1 C40 x 28 mm 6k 2835 Overprinted Стокгольм. 1969 3766 (2835) 3689 (2739) 3724 (2774) 3612 (2717) (A1306) 3639 (2732) 3701 (2828) (1375) 3499 (2645) 27 1969.07.03 (Liberation of Byelorussia from Fascism Occupation) 27 25th Anniversary of the Liberation of Byelorussia from Fascism Occupation (1944, July) (Liberation of Byelorussia from Fascism Occupation) 27. 25-летие освобождения Белоруссии от фашистской оккупации (июль 1944) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert <|fim▁hole|> 4k Minsk Mound of Glory and Minsk Offensive Map 3767 3690 3725 3613 (A1732) 3640 (dyg) 3702 (1376) 3502 28 1969.07.10 (Polish People's Republic) 28 25th Anniversary of the Polish People's Republic (1944, July) (Polish People's Republic) 28. 25-летие Польской Народной Республики (июль 1944) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.49-28.1 C32,5 x 32,5 mm 6k Polish Map, Flag and Arms 3768 3691 3726 3614 (A1733) 3642 (dyi) 3704 3504 29 1969.07.10 (Bulgaria) 29 25th Anniversary of the Socialist Revolution in Bulgaria (1944, September) (Bulgaria) 29. 25-летие социалистической революции в Болгарии (сентябрь 1944) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.50-29.1 C32,5 x 32,5 mm 6k Hands holding torch, flags of Bulgaria, USSR, Bulgarian arms 3769 3692 3727 3615 (A1733) 3641 (dyh) 3703 (1377) 3503 30 1969.07.15 (Mykolaiv) 30 25th Anniversary of the Liberation of Mykolaiv from the Germans (Mykolaiv) 30. 25-летие освобождения Николаева от фашистской окупации # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.51-30.1 C42 x 30 mm 4k Liberation Monument to 68 Heroes 3770 3693 3728 3616 (A1734) 3643 (dyk) 3707 (1379) 3507 31 1969.07.15 (Samarkand) 31 2500th Anniversary of Samarkand (Samarkand) 31. 2500-летие Самарканда # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.52-31.1 C37 x 52 mm 4k Registan Square 3771 3694 3729 3617 (A1735) 3644 (dyl) 3705 (1378) 3505 #1969.53-31.2 C37 x 52 mm 6k Intourist Hotel 3772 3695 3730 3618 (A1735) 3645 (dym) 3706 3508 32 1969.07.20 (Mihály Munkácsy) 32 125th Birth Anniversary of Mihály Munkácsy (1844-1900), Hungarian painter (Mihály Munkácsy) 32. 125-летие со дня рождения венгерского художника Михая Мункачи (1844-1900) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.54-32.1 C28 x 40 mm 6k Munkascy and “Woman Churning Butter” 3773 3696 3731 3621 (A1737) 3648 (dyp) 3710 (1381) 3510 33 1969.07.20 (Sport) 33 International Sporting Events (Sport) 33. Международные спортивные соревнования # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.55-33.1 C28 x 40 mm 4k Volleyball 3774 3697 3732 3619 (A1736) 3646 (dyn) 3708 (1380) 3508 #1969.56-33.2 C28 x 40 mm 6k Canoe Sprint 3775 3698 3733 3620 (A1736) 3647 (dyo) 3709 3509 #1969.55H-33.1H C ?k Shooting Sport --- --- H82 --- --- --- --- #1969.56H-33.2H C ?k Canoe Sprint and New Text --- --- H83 --- --- --- --- 34 1969.07.20 (First Cavalry Army) 34 50th Anniversary of First Cavalry Army (19.11.1919) (First Cavalry Army) 34. 50-летие Первой конной армии (19/XI 1919) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.57-34.1 C52 x 37 mm 4k Tachanka (Grekov) 3776 3699 3734 3623 (A1739) 3650 (dys) 3712 (1383) 3512 35 1969.07.20 (Donetsk) 35 Centenary of Donetsk (the Donetsk coal basin) (Donetsk) 35. 100-летие Донецка (Донецкий угольный бассейн) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.58-35.1 C28 x 40 mm 4k Miners' Statue, Donetsk 3777 3700 3735 3622 (A1738) 3649 (dyr) 3711 (1382) 3511 36 1969.08.03 (Ilya Repin) 36 125th Birth Anniversary of Ilya Repin, Painter (1844-1930) (Ilya Repin) 36. 125-летие со дня рождения Ильи Ефимовича Репина (1844-1930) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.59-36.1 C52 x 37 mm 4k Barge Haulers on the Volga 3778 3701 3736 3624 (A1740) 3651 (dyt) 3713 3513 #1969.60-36.2 C52 x 37 mm 6k Unexpected 3779 3702 3737 3625 (A1740) 3652 (dyu) 3714 3514 #1969.61-36.3 C37 x 52 mm 10k Ilya Repin, Self-portrait 3780 3703 3738 3626 (A1741) 3653 (dyv) 3715 (1384) 3515 #1969.62-36.4 C52 x 37 mm 12k The Refusal of Confession 3781 3704 3739 3627 (A1740) 3654 (dyw) 3716 3516 #1969.63-36.5 C52 x 37 mm 16k Reply of the Zaporozhian Cossacks 3782 3705 3740 3628 (A1740) 3655 (dyx) 3717 3517 37 1969.08.09 (Spartakiad) 37 9th Summar Soviet Trade Union Spartakiad, Moscow (Spartakiad) 37. IX летняя спартакиада профсоюзов СССР, Москва # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.64-37.1 C30 x 42 mm 4k Running 3783 3706 3741 3629 (A1742) 3656 (dyy) 3718 (1385) 3518 #1969.65-37.2 C30 x 42 mm 10k Gymnastics 3784 3707 3742 3630 (A1742) 3657 (dyz) 3719 3519 70 x 95 mm 20k Running and Spartakiad Emblem 3785 Бл 60 (3708) Блок 61 (3743) 3631 (A1742) Block 57 (3658) (dza(dyy)) MS3720 (1385) Bloc 56 (3518) 38 1969.08.22 (Vladimir Komarov) 38 Birth Centenary of Vladimir Komarov, Russian Botanist and Geographer (1869-1945) (Vladimir Komarov) 38. 100-летие со дня рождения ботаника и географа Владимира Леонтьевича Комарова (1869-1945) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.67-38.1 C26 x 37 mm 4k Vladimir Komarov 3786 3709 3744 3632 (A1743) 3659 (dzb) 3721 (1386) 3520 39 1969.09.01 (Hovhannes Tumanyan) [4][5] 39 Birth Centenary of Hovhannes Tumanyan, Armenian Writer and Public Activist (1869-1923) (Hovhannes Tumanyan) 39. 100-летие со дня рождения армянского поэта и публициста Ованеса Туманяна (1869-1923) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.68-39.1 C42 x 30 mm 10k Hovhannes Tumanyan 3787 3710 3745 3633 (A1744) 3660 (dzc) 3722 (1387) 3521 40 1969.09.03 (Museum of Oriental Art) See also full design (См. также полное оформление) 40 State Museum of Oriental Art, Moscow (Founded in 1918) (Museum of Oriental Art) 40. Государственный музей искусства народов Востока в Москве (основан в 1918) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.69-40.1 C30 x 42 mm 4k Turkmenian Drinking Horn 3788 3711 3746 3634 (A1745) 3661 (dzd) 3723 (1388) 3522 #1969.70-40.2 C30 x 42 mm 6k Persian Simurgh Vessel 3789 3712 3747 3635 (A1745) 3662 (dze) 3724 3523 #1969.71-40.3 C30 x 42 mm 12k Head of Goddess Guanyin, Korea 3790 3713 3748 3636 (A1745) 3663 (dzf) 3725 3524 #1969.72-40.4 C30 x 42 mm 16k Bodhisattva Statuette, Tibet 3791 3714 3749 3637 (A1745) 3664 (dzg) 3726 3525 #1969.73-40.5 C30 x 42 mm 20k Ebisu Statuette, Japan 3792 3715 3750 3638 (A1745) 3665 (dzh) 3727 3526 41 1969.09.10 (Mahatma Gandhi) 41 Birth Centenary of Mohandas Karamchand (Mahatma) Gandhi, Preeminent Leader of Indian Independence Movement (1869-1948) (Mahatma Gandhi) 41. 100-летие со дня рождения одного из руководителей и идеологов движения за независимость Индии Мохандаса Карамчанда (Махатмы) Ганди (1869-1948) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.74-41.1 C30 x 42 mm 6k Mahatma Gandhi 3793 3716 3751 3639 (A1746) 3666 (dzi) 3728 (1389) 3527 42 1969.09.10 (Białowieża Forest) 42 Biosphere Reserve Białowieża Forest (Białowieża Forest) 42. Биосферный заповедник Беловежская пуща # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.75-42.1 C40 x 28 mm 4k Black Stork 3794 3717 3752 3640 (A1747) 3667 (dzk) 3729 (1390) 3528 #1969.76-42.2 C40 x 28 mm 6k Red Deer 3795 3718 3753 3641 (A1747) 3668 (dzl) 3730 3529 #1969.77-42.3 C80 x 28 mm 10k European Bisons 3796 3719 3754 3642 (A1747) 3669 (dzm) 3731 3530 #1969.78-42.4 C40 x 28 mm 12k Lynx 3797 3720 3755 3643 (A1747) 3670 (dzn) 3732 3531 #1969.79-42.5 C40 x 28 mm 16k Wild Boar 3798 3721 3756 3644 (A1747) 3671 (dzo) 3733 3532 43 1969.09.10 (Komitas) 43 Birth Centenary of Komitas, Armenian Composer (Soghomon Soghomonian, 1869-1935) (Komitas) 43. 100-летие со дня рождения армянского композитора Комитаса (Согомон Геворки Согомонян, 1869-1935) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.80-43.1 C42 x 30 mm 6k Komitas and Rural Scene 3799 3722 3757 3645 (A1748) 3672 (dzp) 3734 (1391) 3533 44 1969.09.20 (Sergey Gritsevets) 44 60th Birth Anniversary of Fighter Pilot Major Sergey Gritsevets, Twice Recipient of the Honorary Title of Hero of the Soviet Union (1909-1939) (Sergey Gritsevets) 44. 60-летие со дня рождения дважды Героя Советского Союза майора летчика-истребителя Сергея Ивановича Грицевца (1909-1939) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.81-44.1 C42 x 30 mm 4k Sergey Gritsevets and Fighter Planes 3800 3723 3758 3647 (A1749) 3673 (dzr) 3735 (1392) 3535 45 1969.09.20 (Partisans of World War II) 45 Partisans of Great Patriotic War 1941–1945, Heroes of the Soviet Union (Partisans of World War II) Continuation of the series 45. Партизаны Великой Отечественной войны 1941-1945 гг.— Герои Советского Союза. Продолжение серии # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.82-45.1 C42 x 30 mm 4k Komsomolets and Partisan Girl Lisa Chaikina 3801 3724 3759 3646 (A1749) 3674 (dzs) 3737 3536 46 1969.09.20 (Heroes of World War II) 46 Heroes of World War II (Heroes of World War II) Continuation of the series[9] (CPA 2401-2402, 2547, 2591, 2663-2664, 2826-2827, 2828, 3002-3003, 3004-3005, 3148-3149, 3324-3326, 3462-3463, 3490, 3509, 3595-3597, 3727-3728, 3746, 3802, 3855-3856, 3976-3977) (33 stamps) 46. Герои Великой Отечественной войны. Продолжение серии # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.83-46.1 C40 x 28 mm 4k World War II Heroes Members of Kaunas Underground Committee of Komsomol Alfonsas Ceponis, Juozas Aleksonis and Hubertas Borisa 3802 3725 3760 3648 (A1750) 3675 (dzt) 3736 3534 47 1969.09.26 (Ivan Pavlov) 47 120th Birth Anniversary of Russian Physiologist Academician Ivan Pavlov (1849-1936) (Ivan Pavlov) 47. 120-летие со дня рождения физиолога академика Ивана Петровича Павлова (1849-1936) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.84-47.1 C28 x 40 mm 4k Ivan Pavlov 3803 3726 3761 3649 (A1751) 3676 (dzu) 3738 (1393) 3537 48 1969.10.03 (East Germany) 48 20th Anniversary of East Germany (07.10.1949) (East Germany) 48. 20-летие Германской Демократической Республики (7/X 1949) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.85-48.1 C32.5 x 32.5 mm 6k East German Flag and Arms, TV Tower and Brandenburg Gate 3804 3727 3762 3650 (A1752) 3677 (dzv) 3739 (1394) 3538 49 1969.10.14 (Liberation of Ukraine from Fascism Occupation) 49 25th Anniversary of the Liberation of Ukraine from Fascism Occupation (1944, October) (Liberation of Ukraine from Fascism Occupation) 49. 25-летие освобождения Украины от фашистской оккупации (октябрь 1944) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.86-49.1 C32.5 x 32.5 mm 4k Arms of Ukraine and Memorial 3805 3728 3763 3653 (A1754) 3678 (dzw) 3741 (1396) 3540 50 1969.10.14 (Aleksey Koltsov) 50 160th Birth Anniversary of Russian Poet Aleksey Koltsov (1809-1842) (Aleksey Koltsov) 50. 160-летие со дня рождения поэта Алексея Васильевича Кольцова (1809-1842) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.87-50.1 C30 x 42 mm 4k Aleksey Koltsov 3806 3729 3764 3652 (A1753) 3679 (dzx) 3740 (1395) 3539 51 1969.10.21-11.06 (October Revolution) 51 52nd Anniversary of Great October Socialist Revolution (October Revolution) 51. 52-я годовщина Великой Октябрьской социалистической революции # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.88-51.1 C1969.10.2137 x 37 mm 4k Kremlin, and Red banner, Stars, Hammer and Sickle 3807 3730 3765 3654 (A1755) 3680 (dzy) 3742 (1397) 3541 #1969.89-51.2 C1969.11.06100 x 62 mm 50k Vladimir Lenin and Quotation 3808 Бл 61 (3731) Блок 62 (3766) 3660 (A1759) Block 58 (3687) (eag(eaf)) MS3743 Bloc 57 52 1969.10.22 (Triple Space Flights) 52 Triple Space Flights the Space Ships Soyuz 6 (11-16.10), Soyuz 7 (12-17.10) and Soyuz 8 (13-18.10) (Triple Space Flights) 52. Групповой полет на космических кораблях "Союз-6" (11-16/X), "Союз-7" (12-17/X) и "Союз-8" (13-18/X) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.90-52.1 C42 x 30 mm 10k Georgi Shonin and Valeri Kubasov (Soyuz 6) 3809 3732 3767 3655 (A1756) 3682 (eaa) 3744 (1398) 3542 #1969.91-52.2 C42 x 30 mm 10k Anatoly Filipchenko, Vladislav Volkov and Viktor Gorbatko (Soyuz 7) 3810 3733 3768 3656 (A1756) 3683 (eab) 3745 3543 #1969.92-52.3 C42 x 30 mm 10k Vladimir Shatalov and Aleksei Yeliseyev (Soyuz 8) 3811 3734 3769 3657 (A1756) 3684 (eac) 3746 3544 53 1969.10.25 (Philatelic Exhibition) 53 1st All Union Youth Philatelic Exhibition to Commemorate Lenin's Birth Centenary, Kiev (Philatelic Exhibition) 53. 1-я Всесоюзная юношеская филателистическая выставка в Киеве, посвященная 100-летию со дня рождения Ленина # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.93-53.1 C46 x 46 mm 4k Lenin when a Youth and Emblems 3812 3735 3770 3658 (A1757) 3685 (ead) 3747 (1399) 3545 54 1969.10.29 (Signal Corps) 54 50th Anniversary of Signal Corps of Russian Armed Forces (Signal Corps) 54. 50-летие российских войск связи # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.94-54.1 C28 x 40 mm 4k Corps Emblem on Red Star 3813 3736 3771 3659 (A1758) 3686 (eae) 3748 (1400) 3546 55 1969.11.18 (Congress of Kolkhoz Men) 55 3rd All Union Congress of Kolkhoz Men, Moscow (25-27.11.1969) (Congress of Kolkhoz Men) 55. III Всесоюзный съезд колхозников в Москве (25-27/XI 1969) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.95-55.1 C42 x 30 mm 4k Cover of Rules of the Kolkhoz and Worker and Kolkhoz Woman 3814 3737 3772 3661 (A1760) 3688 (eah) 3749 (1401) 3547 56 1969.11.20 (Fairy Tales) 56 Russian Fairy Tales (Fairy Tales) 56. Русские народные сказки и сказочные мотивы в литературных произведениях # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.96-56.1 C39.5 x 54 mm 4k Vasilisa the Beautiful (Folk Tale) 3815 3738 3773 3662 (A1761) 3689 (eai) 3750 (1402) 3548 #1969.97-56.2 C39.5 x 54 mm 10k Marya Morevna (Folk Tale) 3816 3739 3774 3663 (A1761) 3690 (eak) 3751 3549 #1969.98-56.3 C54 x 39 mm 16k The Tale of the Golden Cockerel (Pushkin) 3817 3740 3775 3664 (A1761) 3691 (eal) 3752 3550 #1969.99-56.4 C39.5 x 54 mm 20k The Feather of Finist the Falcon (Folk Tale) 3818 3741 3776 3665 (A1761) 3692 (eam) 3753 3551 #1969.100-56.5 C39.5 x 54 mm 50k The Tale of Tsar Saltan (Pushkin) 3819 3742 3777 3666 (A1761) 3693 (ean) 3754 3552 57 1969.11.25-12.26 (Space) 57 Space Exploration (Space) 57. Освоение космоса # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.101-57.1 C1969.11.2537 x 52 mm 4k USSR Emblems Dropped on Venus, Radio Telescope and Orbits 3820 3743 3778 3667 (A1762) 3694 (eao) 3755 (1403) 3553 #1969.102-57.2 C1969.11.2537 x 52 mm 6k Space Probe, Space Capsule and Orbits 3821 3744 3779 3668 (A1762) 3695 (eap) 3756 3554 #1969.103-57.3 C1969.12.2637 x 52 mm 10k Colour Photograph of Earth 3822 3745 3780 3682 (A1768) 3709 (ebf) 3757 3567 #1969.104-57.4 C1969.12.26115 x 75 mm 50k + 50k 1 As CPA 3822. 2 Far Side of the Moon 3823 Бл 62 (3746, 3747) Блок 63 (3781-3782) 3683 (3683a, 3683b) (A1768, A1768) Block 60 (3710, 3711) (ebi (ebg, ebh)) MS3758 Bloc 59 58 1969.11.30 (USSR-Afghanistan) 58 50th Anniversary of USSR-Afghanistan Diplomatic Relations (USSR-Afghanistan) 58. 50-летие установления дипломатических отношений между Советским Союзом и Афганистаном # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.105-58.1 C40 x 28 mm 6k Flags of USSR and Afghanistan 3824 3748 3783 3669 (A1763) 3696 (ear) 3759 (1404) 3555 59 1969.11.30 (Definitive Coil Stamp) 59 The Definitive Coil Stamp for Stamp Vending Machine (Definitive Coil Stamp) 59. Стандартная рулонная марка для почтовых автоматов # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.106-59.1 C21.5 x 26 mm 4k Kremlin Red Star and USSR Arms 3825 3749 3784 3670 (A1764) 3697 (eas) 3760 (1405) 3556 60 1969.12.12 (Aircraft) 60 Glory to the Soviet Aircraft Builders! 30 Years of MiG Aircraft[5][6] (Aircraft) 60. Слава советским авиастроителям! 30 лет самолетам МиГ # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.107-60.1 C52 x 37 mm 6k MiG Jet and First MiG Fighter Aircraft. MiG Emblem 3826 3750 3785 3671 (A1765) 3698 (eat) 3761 (1406) 3557 61 1969.12.25-31 (Aviation) 61 Develoment of Soviet Civil Aviation (Aviation) 61. Развитие гражданской авиации в СССР # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.108-61.1 C1969.12.2552 x 37 mm 2k Airplane Tupolev ANT-2, 1924. Icarus 3827 3752 3787 3673 (A1767) 3700 (eav) 3763 (1408) 3559 #1969.109-61.2 C1969.12.2552 x 37 mm 3k Airplane Polikarpov Po-2 (U-2), 1927. Centaur 3828 3753 3788 3674 (A1767) 3701 (eaw) 3764 3560 #1969.110-61.3 C1969.12.2552 x 37 mm 4k Airplane Tupolev ANT-9, 1929. Mercury 3829 3754 3789 3675 (A1767) 3702 (eax) 3765 3561 #1969.111-61.4 C1969.12.2552 x 37 mm 6k Helicopter TsAGI 1-EA, 1930. Aurora 3830 3755 3790 3676 (A1767) 3703 (eay) 3766 3562 #1969.112-61.5 C1969.12.2552 x 37 mm 10k Airplane Tupolev ANT-20 Maxim Gorky, 1934. Atlas 3831 3756 3791 3677 (A1767) 3704 (eaz) 3767 3563 #1969.113-61.6 C1969.12.2552 x 37 mm 12k Airplane Tupolev Tu-104, 1955. Pegasus 3832 3757 3792 3678 (A1767) 3705 (eba) 3768 3564 #1969.114-61.7 C1969.12.31[5]52 x 37 mm 16k Helicopter Mil Mi-10, 1965. Visualization of Constellation Leo 3833 3758 3793 3679 (A1767) 3706 (ebb) 3769 3565 #1969.115-61.8 C1969.12.2552 x 37 mm 20k Turbojet Transcontinental Airliner Ilyushin Il-62, 1962. Visualization of Constellation Sagittarius 3834 3759 3794 3680 (A1767) 3707 (ebc) 3770 3566 #1969.116-61.9 C1969.12.2591 x 66 mm 50k Supersonic Transport Aircraft Tupolev Tu-144, 1968. Signs of the Zodiac 3835 Бл 63 (3760) Блок 64 (3795) 3681 (A1767) Block 59 (3708) (ebe(ebd)) MS3771 Bloc 58 62 1969.12.25 (New Year) 62 Happy New Year 1970, Birth Centenary of Vladimir Lenin (New Year) 62. С Новым годом 1970 - годом столетия со дня рождения Владимира Ильича Ленина! # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.117-62.1 C37 x 37 mm 4k Lenin on Red Flag 3836 3751 3786 3672 (A1766) 3699 (eau) 3762 (1407) 3558 63 1969.12.26 (Sport) 63 Technical Sports (Sport) 63. Технические виды спорта # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.118-63.1 C52 x 37 mm 3k Model Aircraft 3837 3761 3796 3684 (A1769) 3712 (ebk) 3772 (1409) 3568 #1969.119-63.2 C52 x 37 mm 4k Speed Boat Racing 3838 3762 3797 3685 (A1769) 3713 (ebl) 3773 3569 #1969.120-63.3 C52 x 37 mm 6k Parachuting 3839 3763 3798 3686 (A1769) 3714 (ebm) 3774 3570 64 1969.12.31 (Liberation of Byelorussia from Fascism Occupation) 64 25th Anniversary of the Liberation of Romania from Fascism Occupation (1944, July) (Liberation of Byelorussia from Fascism Occupation) 64. 25-летие освобождения Румынии от фашистской оккупации (август 1944) # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.121-64.1 C32.5 x 32.5 mm 6k Romanian Arms and Soviet War Memorial in Bucharest 3840 3764 3799 3687 (A1770) 3615 (ebn) 3775 (1410) 3571 65 1969.12.31 (Ostankino Tower) 65 Ostankino Television and Radio Tower, Moscow (Ostankino Tower) 65. Останкинская радиотелевизионная башня, Москва # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1969.122-65.1 C32.5 x 65 mm 10k Ostankino Tower 3841 3765 3800 3688 (A1771) 3616 (ebo) 3776 (1411) 3572 Sources / Источники ↑ Stamps of USSR. 1918-1980. 2 volums. Editor M. I. Spivak. / Каталог почтовых марок СССР. 1918-1980. В 2 томах. Ред. М. И. Спивак. М.: ЦФА "Союзпечать" Минсвязи СССР, 1983. ↑ Zagorsky, Valeriy. "Standard Collection". / Валерий Загорский. Стандарт-коллекция. http://standard-collection.ru/ru/catalogs/elektronnye-versii.html. Retrieved 2015-01-05. ↑ Liapine, Viktor. Catalog of stamps of Russia (1856-1991). 2008. / Ляпин Виктор. Каталог почтовых марок России (1856-1991). М.: Издатель И. В. Балабанов, 2008. ↑ a b c d e f g Scott Standard Postage Stamp Catalogue. 2009. Volume 5 P-SL. Amos Press Inc., 2009. / Каталог Скотт за 2009 год. Том 5 P-SL. ↑ a b c d e Michel. Europa-Katalog. Band 7. 2009/2010. Osteuropa. Schwaneberger Verlag GMBH, 2009. / Каталог Михель за 2009/2010 год. 7-я книга из 7 книг Европы. Представлена восточная Европа. ↑ a b Stanley Gibbons. Simplified Catalogue. Stamps of the World. 2006. Volume 4. Countries N-R. 71st Edition. Stanley Gibbons Ltd., 2005. / Стэнли Гиббонс. Упрощенный каталог. Марки мира. 2006. Том 4. Страны Н-Р. 71-я редакция. Stanley Gibbons Ltd., 2005. ↑ Yvert et Tellier. 1980. Tome 2. Timbres d'Europe. / Каталог "Ивер и Телье". 1980. Том 2. Почтовые марки Европы. ↑ Natural research. / Натуральное изучение. ↑ a b V. U. Soloviov. Stamps of Russia and USSR / Почтовые марки России и СССР. Специализированный каталог. Том 5. СССР 1961-1991. Под ред. В. Ю. Соловьева. 2009/10. М.: ИздАТ, 2009. Почта СССР CPA catalogue ← 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 → <|fim▁end|> | #1969.48-27.1 C37 x 52 mm |
<|fim▁begin|> Contents 1 Abecedary (a list of definitions of historical terminology) 2 Bibliography & References 3 Further reading 3.1 Books 3.2 Magazines 3.3 Websites This is a Resource Book of Local History techniques and terminology aimed at helping local history researchers who are studying historical documents which contain many archaic terms, local names for plants and animals, dialect words (Scots, English, Welsh, Cornish, American, etc.), unusual first names, specialist farming terms, legal terms, obscure or rarely used (archaic) words, etc. which are often absent from standard factual sources or are only defined briefly, in outline and often not in context. This abecedary is designed to be used as a resource for all local history linked researches and as a steadily accumulating bank of information on each topic. Editors are invited to add new words, but to do more than just give definitions, e.g. cite examples, sites for, historical links, trivia, etc. Researching local history Abecedary (a list of definitions of historical terminology) Many sources use technical or archaic terms and fail to define them or provide a glossary. The following lists of words and terms are intended to provide clarity of meaning for the majority of researchers. Main page: A Researcher's Guide to Local History Terminology/Abecedary Bibliography & References Aiton, William (1811). General View of the Agriculture of the County of Ayr. Pub. Glasgow. P.61. Anderson, William & Hicks, Clive (1990). Green Man. The Archetype of our Oneness with the Earth. Compass Books. ISBN 0-9517038-1-1. Buxbaum, Tim (1987). Scottish Doocots. Pub. Shire No.190. ISBN 0-85263-848-5 Evans, Tony & Green, Candida Lycett Green (1982). English Cottages. Pub. London. Ferguson, Robert (2005). A Miller's Tale. The Life and Times of Dalgarven Mill. ISBN 0-9550935-0-3 Foster, A.M. (1988). Bee Boles and Bee Hives. Shire Publications. ISBN 0-85263-903-1 Gauldie, Enid (1981). The Scottish Miller 1700 - 1900. Pub. John Donald. ISBN 0-85976-067-7 Gillespie, James H. <|fim▁hole|> Parochial History. Glasgow : John Wylie & Co. McKean, Charles (2001). The Scottish Chateau. Sutton Publishing. ISBN 0-7509-2323-7 More, Daphne (1976). The Bee Book. David & Charles. ISBN 0-7153-7268-8 Peters, J.E.C. (2003). Discovering Traditional Farm Buildings. Shire Books. ISBN 0-85263-556-7 Quiney, Anthony. (1995). The Traditional Buildings of England. Thames & Hudson. ISBN 0-500-27661-7 Rodger, Donald, Stokes, John & Ogilve, James (2006). Heritage Trees of Scotland. The Tree Council. ISBN 0-904853-03-9 Service, John (Editor) (1887). The Life & Recollections of Doctor Duguid of Kilwinning. Pub. Young J. Pentland. Further reading Books Dymond, David. Researching and Writing History: a practical guide for local historians (British Association for Local History, 1999) Fowler, Simon. Starting out in local history (Countryside Books, 2001) Friar, Stephen. The Local History Companion (Thrupp: Sutton, 2001) Hey, David. Oxford Companion to Local and Family History (Oxford: Oxford University Press, 1992) Sinclair, Cecil. Tracing Scottish Local History. Scottish Record Office.(HMSO, Edinburgh 1996) Tiller, Kate. English Local History: an introduction (Thrupp: Alan Sutton 1992) Trubshaw, Bob. How to write and publish local history (Heart of Albion Press, 1999) Winterbotham, Diana and Crosby, Alan. The Local Studies Library: a handbook for local historians (British Association for Local History, 1998) Magazines Economic History Review Agricultural History Review Urban History Past and Present Midland History Northern History Southern History Journal of Regional and Local Studies Local Population Studies Local Historian Websites Scottish Archive Network Old Ordnance Survey Maps FlashEarth satellite imagery Google Scholar Agricultural History Review Economic History Review Victoria County History The RCAHMS Canmore site The Maps section of the National Library of Scotland Official website of the Society of Antiquaries of Scotland Wikipedia Main page British Association for Local History The 1901 census for England and Wales Local History on Line - including many links Dictionary of the Scots Language An article on Petrosomatoglyphs Researching the Life & Times of Robert Burns <|fim▁end|> | (1939). Dundonald. A Contribution to |
<|fim▁begin|> This Wikibooks page is a fact sheet and analysis on the article "Habitual physical activity in children and adolescents with cystic fibrosis" about how exercise is related to the disease Cystic Fibrosis. Contents 1 Background of this research 2 Where is the research from ? 3 What kind of research was this? 4 What did the research involve? 4.1 Pulmonary Function testing 4.2 Pros / Cons of this test 5 What were the basic results? 6 What conclusion can we take from this research ? 7 Practical Advice 8 Further information/ Resources 8.1 Cystic Fibrosis Australia 8.2 Cystic Fibrosis's National Ambassador Nathan Charles 9 References Background of this research The research was about the effects of taking part in exercise constantly or making it a habit in the population of children and teens that are severing from the genetic condition cystic Fibrosis. What is Cystic Fibrosis It is a genetic condition, affecting lungs and digestion. Unfortunately, there is no cure. The condition Cystic Fibrosis (CF) is mostly inherited in the white population with 1 in every 3300 live births being diagnosed with the condition.[1] Where is the research from ? This research was based in the American Children’s hospital Pittsburgh in the CF centre. Volunteers for this research included siblings, friends and hospital employee’s children who did not have the condition. Two authors of this research work within the department as paediatrics and others have conducted research regarding children with CF. This included David Michael Orenstein who has many publications on CF. These authors have also conducted other research on children with CF with methods of exercise that can help combat the condition.[2] What kind of research was this? This was a meta-analysis form of research; even though this kind of research is time consuming the results are valid and reliable. Other studies that have been done have very similar results, regarding the effects of physical activity and the benefits it has on children and adolescents with CF. For an example, a study that was conducted in Austria compared the effects of physical activity versus chest physiotherapy which is popular within the CF community.[3] Two of the authors, David Michael and Patricia from the research article have conducted a study of “The prognostic value of exercise testing in patients with CF”.[2] Also, the Journal of Paediatric Pulmonology had similar conclusions that through exercise there is an improvement in oxygen consumption and physical self-efficiency and appearance in patients. As well as, lots of positive changes in living conditions of the patients.[4] Even though the research method used in these three studies differ, they all have very similar conclusions that exercise is beneficial for children with CF. What did the research involve? 60 people in total 7–17 years of age[5] 30 Patients with cystic fibrosis (18 male, 12 female)[5] 30 people in the control not affected (17 male, 13 female )[5] The participants completed a Questionnaire about their activity levels. Children 12 years and older completed it with no help or little assistant. Children 12 years and under did it with a parent or guardian. When getting tested the children did 2 types of tests, a Pulmonary Function test, and an Exercise Test. The level of aerobic fitness was tested by the participant completing a progressive exercise test on a stationary electronic bike (cycle ergometer) using the Godfrey protocol. Oxygen uptake was measured using a cart that you breathed into and then It analysed the breath content. This was recorded during the last 15 seconds of each stage exercise Pulmonary Function testing Pulmonary function was tested before exercising. Children who have CF had limited experience in doing <|fim▁hole|> not have regular exposure to the test due to the condition. A spirometry was used to measure pulmonary lung function capacity. The aim of the test is to measure how much and how quickly an individual is able to move air out of their lungs” ([6] this is done by breathing into a mouth piece connected to a device that records the air and it called a spirometer. Pros / Cons of this test This study was very good for testing but there were disadvantages on the younger population in the study due to being short as they were unable to reach the pedals. Another limitation of the study is that focus was only on the effects of aerobic training and did not take into account the benefit of anaerobic or resistance training can have on an individual. Also, the Australian Cystic Fibrosis Council suggest that core strength is also an important component of helping with the clearance of mucus for patients[1] What were the basic results? The survival rate of living with Cystic Fibrosis is affected by the engagement of regulary physical Activity The oxygen consumption improves with exercise. Exercise helps with the removal of mucus Children with Cystic Fibrosis participate in less vigorous physical exercise and activities when compared with children not affected by CF What conclusion can we take from this research ? In conclusion, this research demonstrates that exercise does have benefit's for children living with CF as it increases the survival rate and increase life expectancy. I believe one thing that is important when trying to help treat children with CF is to treat them normally and allowing them to engage in the activity as their peers are doing, within reason. Practical Advice Before trying to treat CF with exercise consult Doctors about the type of exercise and don’t push yourself too hard. Build up the intensity. Further information/ Resources Cystic Fibrosis Australia Cystic Fibrosis Australia even suggests that exercise is an important component of treating cystic fibrosis as it help with clearing the airways and building core strength.[1] Web Page: http://www.cysticfibrosis.org.au Cystic Fibrosis's National Ambassador Nathan Charles Cystic Fibrosis's National Ambassador Nathan Charles an elite rugby union player playing a contact sport while living with the condition cystic fibrosis. Shows that it is possible to stay fit and achieve great success with cystic fibrosis.[7] Nathan Charles Web page http://nathancharles.com.au Playing Elite Rugby with CF: http://nathancharles.com.au/nutri-grain-unstoppable/ References ↑ a b c Cystic Fibrosis [Internet]. Cysticfibrosis.org.au. 2016 [cited 24 September 2016]. Available from: http://www.cysticfibrosis.org.au/all/learn/ ↑ a b Nixon P, Orenstein D, Kelsey S, Doershuk C. The prognostic value of exercise testing in patients with cystic fibrosis [Internet]. Saskatoon Public Library. 2010 [cited 15 September 2016]. Available from: http://saskatoonlibrary.ca/eds/item?dbid=edsgea&an=edsgcl.13305971 ↑ M. Orenstein D, A. Nixon P, A. Washburn , F. Kelsey S. Measuring Physical Activity in Children with Cystic Fibrosis: Comparison of Four Methods: Paediatric Exercise Science: Vol 5, No 2. Paediatric Exercise Science [Internet]. 2016 [cited 13 September 2016];5(2):125-133. Available from: http://journals.humankinetics.com/doi/pdf/10.1123/pes.5.2.125 ↑ Gulmans V, de Meer K, Brackel H, Faber J, Berger R, Helders P. Outpatient exercise training in children with cystic fibrosis: Physiological effects, perceived competence, and acceptability. Pediatric Pulmonology [Internet]. 1999 [cited 15 September 2016];28(1):39-46. Available from: http://onlinelibrary.wiley.com/doi/10.1002/(SICI)1099-0496(199907)28:1%3C39::AID-PPUL7%3E3.0.CO;2-8/abstract ↑ a b c NIXON P, ORENSTEIN D, KELSEY S. Habitual physical activity in children and adolescents with CF. Medicine and Science in Sports and Exercise [Internet]. 2001 [cited 2 September 2016];33(1):30-35. Available from: http://zh9bf5sp6t.scholar.serialssolutions.com/?sid=google&auinit=PA&aulast=Nixon&atitle=Habitual+physical+activity+in+children+and+adolescents+with+cystic+fibrosis.&id=pmid:1119410 ↑ Lung Function Tests [Internet]. WebMD. 2016 [cited 14 September 2016]. Available from: http://www.webmd.com/lung/lung-function-tests ↑ Charles N. NATIONAL AMBASSADOR FOR CYSTIC FIBROSIS AUSTRALIA [Internet]. Nathan Charles. 2015 [cited 25 September 2016]. Available from: http://nathancharles.com.au/bio/ <|fim▁end|> | these tests as they did |
<|fim▁begin|> Return to Main Page Introduction: This page contains the following information about being a freelance instructional designer. Many of these areas are ever-changing due to the technology, current trends and the market demands. Thus, they will be updated regularly by any of the authors participating in the writing of this book. Please contribute to any of the headings provided within this page by clicking EDIT in the upper right of this page. Definition The official definition is the following: Working for different companies at different times rather than being permanently employed by one company All freelance instructional designers know that the job responsibilities are endless. They not only included securing new clients on a daily basis, but there are the other areas also such as: completing projects for each deadline your web site requires updating, revisions and cutting edge technology implemented your social media campaigns require daily releases professional development of your skills invoices, business finances and record keeping IRS or state quarterly tax reporting (Please feel free to add more to this area.) Skills Needed Each day bring new demands for more skills that people just associate with an instructional designer. There are times when the job description for an instructional designer is customized and created by the person posting the position. Thus, it is difficult at times to clearly define the skills needed since the job description or career field is being rewritten by everyone. The most important skills needed are the following: training within the learning theories such as ADDIE, cognitive theories and the science of e-learning software experience with the current e-learning tools of the trade which change each year computer science is becoming a 'must have' for this field since ID's are now being asked to manage LMS systems, code HTML/CSS/Javascript and also rewrite the coding within e-learning applications for customization (Please feel free to add more to this area.) Training Scanning the current job posting most companies are requiring a master's degree within this field along with 5–10 years experience. Which triggers the discussion about 'how to get the experience' when all <|fim▁hole|> 5–10 years experience. The back door to this career is a course production specialist which is a support person who assists the instructional designer with the development of content, inserting exams in the LMS and other minor tasks. Most course production specialists are moved up to an ID 1 position within a year or two. Thus, that will get you the experience you need. (Please feel free to add more to this area.) Certifications Some large professional organizations are offering certifications through their training and testing centers. Research is needed to determine if the monetary investment will provide you with freelance contracts or if a full master's degree is the current requirements. (Please feel free to add more to this area.) The Legal Aspect An entire book can be written about the legal aspect of freelancing in the 'design' industry with some freelance contracts stipulating that you must have 1,500,000.00 insurance. READ THE CONTRACT CAREFULLY! Some companies put the full responsibility for the 'return on invested instructional dollars' on the freelance ID who must revise the content without pay until the company gets their expected return on their invested training. (Please feel free to add more to this area.) Your Web Site The web site for your contracting business needs to follow the standard marketing recommendations as found within any business. The web site must catch the visitor within the first 10 seconds of the page loading. Your initial page must demonstrate your mastery of technology, learning theories and innovations. It is the first impression you'll make on a future employer. (Please feel free to add more to this area.) Your Portfolio The newest trend within this field is a professional portfolio demonstrating each of the leading e-learning software tools used to develop a full training within finance, health education and HR issues. This can be very expensive since some of the software packages sell for 1,000-2,000 each. The demo trial versions have restrictions and contain a popup window explaining this is a demo/trial version which is very unprofessional. (Please feel free to add more to this area.) <|fim▁end|> | of the jobs ask for |
<|fim▁begin|> While the human sensory system offers us stunning ways of perceiving our movement and environment, the sensory systems of insects and spiders are not any less fascinating. To give just a few examples, spiders have up to eight eyes, and some see almost as sharply as humans; bees "feel the rhythm" when other bees dance in the bee-hive, and learn from this the location of food sources; mosquitoes hunt their victims by smell. In addition, studies in insects have many fewer ethical or methodological limitations than studies in mammals. And especially in flies, with molecular genetic tools any gene can be targeted (e.g. knocked out or overexpressed), and the system is much more manageable than in humans. Contents 1 The insect olfactory system 1.1 The nature of smell 1.2 Overview 1.3 Odorant reception in ORN 1.4 Odor information processing 1.5 Odor perception and behavioral significance 1.6 References The insect olfactory system This sensory systems book is mostly about human sensory systems and there is a chapter about the olfactory system, so why do we need a chapter on the insect olfactory system? The fruit fly (drosophila melanogaster), which we will focus on here, is a very important model animal in biology and a lot of research on sensory systems is done in the fruit fly. The visual as well as the olfactory system are studied intensively and there are less ethical or methodological limitations. With molecular genetic tools, any gene in a fly can be targeted (e.g. knocked out or overexpressed) and the system is much more manageable than in humans. While the olfactory system functions quite different from the human’s, it is possible to find common principles. Furthermore, the insect olfactory system inspires engineering in robotics, medicine and many other areas. The nature of smell Different antenna types. To understand the specifics of odor sensing one has to be aware that smell is quite different from other stimuli. It differs from light and sound by the fact that it is not carried by waves but by diffusion, air flows and turbulences. Furthermore, while light and sound only have the two perceptually relevant characteristics of frequency composition and amplitude, smell has a variety of discrete odorants and even more possible mixtures in different concentrations. Overview Drosophila melanogaster antenna under a light microscope. The olfactory sensilla can be seen (like hairs on the antenna). The antenna is fixated with a glass capillary and on the top right a recording electrode can be seen. The diameter of the antenna is about 90 µm. Simplified schematic of a basiconic sensillum, like it can be found for example in the fruit fly. In insects (but also in most vertebrates) the sensory system is of importance for orientation and food foraging but has also social (nest mate recognition e.g. in ants) and sexual (mating partner search and selection by pheromones) significance. The main path of the odor information begins at the olfactory sensilla (insect’s sensory organs that contain the sensory neurons) that can in most insects be found on the antennae and look like small hairs in the fly (see Figure). There exists a huge variety of antenna types (that are not only used for olfaction) and many different sensillum types. To understand the general principle the example of drosophila melanogaster basiconic sensilla should suffice. The odorant molecules go through slits or pores of the cuticle into the aqueous sensillum lymph, where some types of odorant molecules are bound to odorant binding proteins and carried towards the dendrites of the olfactory receptor neurons (ORN), others diffuse in the lymph towards the dendrites. On the membrane of the dendrites there are odorant receptors (OR) that bind the odorant molecules and are responsible for the conversion of the signal into a membrane current. This current propagates through the dendrite to the cell body where (at the axon hill), an action potential is generated. The action potential travels in the ORN axon to the antennal lobe (which is analog to the olfactory bulb in vertebrates), where ORN make synapses to local interneurons and projection neurons. The antennal lobe is organized in so called glomeruli. It is not fully understood how they are involved in pattern recognition, but the glomerular activation pattern can provide information about the odors presented to the fly. Projection neurons project into the lateral horn (where probably innate odor responses are processed) and to the Kenyon cells in the mushroom bodies. The mushroom bodies are a neuropil in the insect brain and have their name from the similarity to mushrooms. There, odors are associated with other sensory modalities and behavior which is why the mushroom bodies are an important model system to study learning and memory. Odorant reception in ORN response profile of selected drosophila odorant receptors to two odors. Data source: DoOR Database [1] An insect’s olfactory sensillum contains one or more olfactory receptor neurons that transform the odor information into an electrical signal (action potential). Most ORNs contain only one receptor type, but each receptor type reacts to many odors (see Figure). However there are some receptors that are more specific as their detected odors have either an important role in the insect’s behavior or are chemically unique. An example for a more specific receptor is the receptor for CO2. Other odorants activate it only weakly and it directly triggers an avoidance response in the fly [1]. Specificity of ORs is due to different affinity of odorants to the receptor. The higher the affinity the more receptors are occupied when an odor is applied and the stronger the current response. However, ORNs do not react linearly on stimulation. It can be assumed that most of them <|fim▁hole|> which increases their dynamic range. The logarithmic relation does not apply to stimuli below the respective detection threshold and in saturation. Most ORN show a phasic-tonic on-response, i.e. they react with a strong increase in firing rate when a stimulus is presented and then show rate adaptation if the stimulus persists. Odorant receptors are membrane proteins that elicit an ionic current through the membrane, when an odorant molecule binds to them. There are two ways how this is accomplished in the olfactory system: Metabotropic and ionotropic receptors. In mammals olfactory receptors are known to be metabotropic g-protein coupled receptors that release a g-protein into the cell that activates an ion channel via a short intracellular signal cascade . In contrast most olfactory receptors in insects are ionotropic receptors that are ion channels which open when an odorant molecule binds. Saving time on the signal cascade, ionotropic receptors are much faster than metabotropic receptors [2]. Odor information processing The odor that reaches the antenna contains different parts of information: On the one hand the odor identity, i.e. which odor or mixture it is, on the other hand the quantity of the components. Furthermore, the timing of the stimulus contains information. If two odors start for example at the same time, it is probable, that they belong to the same object. It has been shown, that insects indeed use the odorant timing information not only to detect the direction of an odor source but also to distinguish and track odor objects [3][4][5]. The processing mechanism that enables this behavior is not clear, but it is amazing that already stimulus onset delays in the range of a few milliseconds can be useful. There are recent results that suggest that the speed and the temporal resolution of the insect’s olfactory system are remarkable and much higher than expected. By means of calcium imaging, a method that visualizes cytoplasmic calcium by a fluorescent marker and therefore activity in neurons, it is possible to create a functional atlas of the antennal lobe. Basically all ORNs of one receptor neuron type, containing one OR, project into one glomerulus. So the (in the fruit fly about 54) glomeruli each unite the response of one receptor type and form a spatial pattern. However it has been shown that also the temporal dynamics of the glomeruli response is used to encode information [6]. The odor information is therefore encoded in the olfactory system by spatiotemporal firing patterns [7]. So far it has not been possible to disentangle and understand the odor code in a way that is comparable to the knowledge of the visual and the auditory system. This might be due to the peculiarities of smell discussed above. There is no easily mappable topographic organization of neurons as the odor space is multidimensional and not continuous. Glomerular activity patterns are linked in the mushroom bodies to behavior. Most insects show a high amount of plasticity there and e.g. bees are able to associate odors with a food reward after only a few presentations. Odor Information in the mushroom bodies is said to be represented by a sparse code, which means that only few kenyon cells respond with only few spikes. In contrast the above described code in the antennal lobe and in the ORNs it is a combinatorial code. Odor perception and behavioral significance For insects the olfactory system is of great behavioral significance. For example, as we all have probably experienced first-hand, mosquitos can track their victims by smell. Ants follow pheromone traces to food sources, but are also able to identify their nestmates by a colony specific hydrocarbon profile (and are therefore able to eliminate foes and thieves when they enter their territory). And many moths use sex pheromones to find mating partners. Usually odors in nature are not pure chemical substances but mixtures. However, those mixtures are perceived as a unit and are very often directly linked to a behavior. The neuronal response in the antennal lobe of a mixture cannot always be predicted by the response to the components [8]. It should therefore not be taken for granted that the olfactory system works like an e-nose that is designed to analyze the components of the presented odor. Furthermore, compared to vision, where the information has to be processed deeply until the relevance of the content becomes obvious, the olfactory system is more strongly and directly linked to behavior (and at least in higher animals emotions). These connections are sometimes innate, but often also learned and idiosyncratic. References ↑ Suh GS, Ben-Tabou de Leon S, Tanimoto H, Fiala A, Benzer S, Anderson DJ: Light activation of an innate olfactory avoidance response in Drosophila. Curr Biol 2007, 17:905-908. ↑ Silbering AF, Benton R (2010) Ionotropic and metabotropic mechanisms in chemoreception: 'chance or design'? EMBO reports 11:173-179. ↑ Baker TC, Fadamiro HY, Cosse AA (1998) Moth uses fine tuning for odour resolution. Nature 393:530-530. ↑ Justus KA, Schofield SW, Murlis J, Carde RT (2002) Flight behaviour of Cadra cautella males in rapidly pulsed pheromone plumes. Physiological Entomology 27:58-66. ↑ Szyszka P, Stierle JS, Biergans S, Galizia CG (2012) The Speed of Smell: Odor-Object Segregation within Milliseconds. PloS one 7:e36096. ↑ DasGupta S, Waddell S (2008) Learned Odor Discrimination in Drosophila without Combinatorial Odor Maps in the Antennal Lobe. Current biology : CB 18:1668-1674. ↑ Brown, S. L., Joseph, J., & Stopfer, M. (2005). Encoding a temporally structured stimulus with a temporally structured neural representation. Nature neuroscience, 8(11), 1568-1576. ↑ Silbering, A. F., & Galizia, C. G. (2007). Processing of odor mixtures in the Drosophila antennal lobe reveals both global inhibition and glomerulus-specific interactions. The Journal of Neuroscience, 27(44), 11966-11977. Sensory Systems/Insects <|fim▁end|> | respond logarithmic within their working range |
<|fim▁begin|> Detailed Objective Weight: 1 Description: Candidates should be able to configure non-IDE devices such as SCSI, SATA, USB drives using the special BIOS as well as the necessary Linux tools. Key knowledge area(s): Differentiate between the various types of non-IDE devices. Manipulate BIOS to detect used and available SCSI IDs. Set the correct hardware ID for different devices, especially the boot device. Configure BIOS settings to control the boot sequence when both non-IDE and IDE devices are present . The following <|fim▁hole|> used files, terms and utilities: SCSI ID /proc/scsi/ scsi_info SCSI The SCSI BIOS can be accessed at boot time with some special key sequences (Ctrl+A for most Adaptec host bus adapters, Ctrl+G, Ctrl+M, or other keys for other vendors) and allow you to set up some parameters. Bootable SCSI and more. In order to get SCSI information, use scsi_info or hdparm. Examples: scsi_info /dev/sda hdparm -grv /dev/sda obs: Tested with hdparm v6.1 (debian sarge kernel 2.6.8-3 arch 386) Exercises Exercises results <|fim▁end|> | is a partial list of the |
<|fim▁begin|> Contents 1 Biographical Information 1.1 Early Years 1.2 Schooling 1.3 Writing 1.4 "A Passion for Reading Aloud"1 2 Books of Interest 3 References Biographical Information Early Years Mem Fox was born Merrion Patridge on March 5, 1946 in Melbourne, Australia. When she was six months old she moved with her missionary parents to what is now Zimbabwe. Even though most of her growing up years were spent on a mission in Africa she did not feel deprived. In fact, she described it as "idyllic".1The home she grew up in was filled with classic books. She also very much enjoyed the freedom she had roaming around her African home running barefoot and riding wild donkeys. At age 13 she and some of her girlfriends decided to change their names. She has been Mem ever since. Schooling Mem’s first years of school were spent in Africa. When she first began she was the only white student in her class.2 From this she learned that the color of a person’s skin does not make them better or worse than anyone else. This is something Mem still feels very strongly about.3 In 1965, at the age of 19, Mem moved to England to attend drama school. It was while there she met Malcolm Fox whom she married in 1969. In her thirties, after she and Malcolm had moved to Australia, Mem attended Flinders University in Adelaide where she studied children’s literature. She later became an associate professor there and spent 24 years teaching teachers. Writing Mem has always enjoyed writing. Her first “book” was written at the age of 10 while living in Africa. This book was six pages stapled together and was on the topic of soil erosion. She also has always liked writing and receiving letters, they are little stories in themselves. To this day she still likes to send a handwritten letter. In her thirties Mem began studying children’s literature at Flinders University. During this time she had an assignment to write a children’s story. The story she wrote, Hush the Invisible Mouse, would become her first published book, Possum Magic, which is the best-selling children’s book ever in Australia.2 During her time in drama school in England, Mem had the opportunity to learn by heart many of the great English playwrights. Mem credits this with giving her the best training for becoming a writer of pictures books. She says it gave her an internal sense of literary rhyme which children find so appealing in books.1 "A Passion for Reading Aloud"1 From her time as a professor watching her students teach reading Mem noticed that those children who had been read to while young were better able to pick up on reading skills at school. Because of this, since her retirement from teaching in 1996, Mem dedicates much of her time to traveling the world "stalking" parents and "begging" them to read aloud to their children. Books of Interest Whoever You Are (1997): Mem’s life experiences growing up in Africa, living in England, and traveling much of her life have given her the opportunity to associate with people from many cultures. This book <|fim▁hole|> our similarities that should matter most, not our differences. Whoever You Are can provide a great springboard for discussing the qualities that make us unique (skin color, language, home) and the things that we have in common (hurts, smiles, laughing).4 The Magic Hat (2002): “One fine day, from out of town, and without any warning at all, there appeared a magic hat.” So begins this story of a wizard’s magic hat. Mem’s use of literary rhyme makes this a delightful read aloud. Mem herself is a great advocate of the things children learn as they are read aloud to. Readers will practice their rhyming skills as they try to predict which animal will be next!5 Wilfrid Gordon McDonald Partridge (1984): This is Mem’s second published book. The main character, Wilfrid Gordon McDonald Partridge, is named for her father (yes, all four names!). Nancy Alison Delacourt Cooper is a combination of her mother’s name and her two sisters’ names. Through her characters in this book Mem gives the readers some wonderful descriptions of what a memory is. Wilfrid Gordon’s interpretation of these descriptions leads to a touching conclusion with Miss Nancy.6 Harriet, You’ll Drive Me Wild! (2000): Even though she doesn’t mean to be, Harriet is a pesky child. Things seem to happen “just like that”. Mem perfectly captures moments in a young child’s day and the exasperation a mother can feel. Readers young and old will relate to the messes Harriet makes and sympathize with her mother's efforts to be patient. As in Wilfrid Gordon McDonald Patridge, the end of this story reminds us it is small moments that can be the most meaningful in a relationship. 7 Ten Little Fingers and Ten Little Toes: The beginnings of this book were written on a plane!1 This is a sweet story of how where ever you are in the world babies are born with “ten little fingers and ten little toes”. Just like in her book Whoever You Are, this book voices Mem’s strong belief that we should put aside our differences and look to what we have in common.8 Possum Magic (1983): Travel Australia with Grandma Poss and Hush on their quest to find the food that will make Hush visible again. Readers will be entertained as Hush tries authentic Australian cuisine in search of the forgotten magic. Mem’s beloved story is another example of her mastery of literary rhyme that can be best enjoyed while reading aloud!9 References 1. http://www.readingrockets.org/books/interviews/fox/ Retrieved March 21, 2012. 2. http://www.memfox.net/welcome.html Retrieved March 21, 2012. 3. Fox, M. (1993). Politics and Literature: Chasing the "Isms" from Children's Books. The Reading Teacher , Vol. 46 (No. 8), pp. 654-658 4. Fox, Mem. (1997). Whoever You Are. New York, NY: Scholastic, Inc. 5. Fox, Mem. (2002). The Magic Hat. New York, NY. Harcourt, Inc. 6. Fox, Mem (1984). Wilfrid Gordon McDonald Partridge. New York, NY: Scholastic, Inc. 7. Fox. Mem. (2000). Harriet, You’ll Drive Me Wild! New York, NY: Scholastic, Inc. 8. Fox, Mem. (2008). Ten Little Fingers and Ten Little Toes. New York, NY: Harcourt, Inc. 9. Fox, Mem (1983). Possum Magic. New York, NY: Scholastic, Inc. <|fim▁end|> | reflects her ideas that it is |
<|fim▁begin|> As obvious from the term, this architecture works through a cycle of Sense, Plan and Act processes. By sensing, it means getting the required information from the available sensors and converting it to some usable form. Planning refers to the use of available information from sensing phase to determine the control parameters and sequences required for various components in order to make the robot proceed towards final goal. Finally, act phase is simply the implementation of the processes and sequences underlined by the planning <|fim▁hole|> useful if the sensing process is slow and the environment is quite static. For example, on a low speed processor, image processing may require lots of time to process each frame. Hence, it might not be feasible to process every frame and react to the gathered information in real-time. If we use this technique, the information will be processed at a very low frequency, providing more time for other real-time processes to run while still doing the work of planning and acting towards the goal. <|fim▁end|> | phase. This kind of approach is |
<|fim▁begin|> ←Article 8 Additional Articles of the Constitution of the Republic of China Republic of China (Taiwan)Article 9 Article 10→ Wikipedia has related information at Administrative divisions of the Republic of China This Article deals with the localities. As the Judicial Yuan Interpretation No. 499 would void the 1999 version to revert to the 1997 version, the 2000 version would recite its Article 9 from the 1999 version. Promulgated full amendment on 1997-07-21 (From http://taiwaninfo.nat.gov.tw/fp.asp?xItem=408&CtNode=124 ) Wikisource has original text related to: Additional Articles of the Constitution of the Republic of China (1997) Article 9. The system of self-government in the provinces and counties shall include the following provisions, which shall be established by the enactment of appropriate laws, the restrictions in Article 108, Paragraph 1, Item 1; Article 109; Article 112 through Article 115; and Article 122 of the Constitution notwithstanding: 1. A province shall have a provincial government of nine members, one of whom shall be the provincial governor. All members shall be nominated by the president of the Executive Yuan and appointed by the president of the Republic. 2. A province shall have a provincial advisory council made up of a number of members who shall be nominated by the president of the Executive Yuan and appointed by the president of the Republic. 3. A county shall have a county council, members of which shall be elected by the people of the said county. 4. The legislative powers vested in a county shall be exercised by the county council of the said county. 5. A county shall have a county government headed by a county magistrate who shall be elected by the people of the said county. 6. The relationship between the central government and the provincial and county governments. 7. A province shall execute the orders of the Executive Yuan and supervise matters governed by the counties. The terms of office of the members of the Tenth Taiwan Provincial Assembly and of the first elected governor of Taiwan Province shall end on <|fim▁hole|> for members of the Taiwan Provincial Assembly and for the governor of Taiwan Province shall be suspended following the conclusion of the terms of office of the members of the Tenth Taiwan Provincial Assembly and of the first elected governor of Taiwan Province. Following the suspension of elections for members of the Taiwan Provincial Assembly and for the governor of Taiwan Province, modifications of the functions, operations, and organization of the Taiwan Provincial Government may be specified by law. Promulgated amendments on 1999-09-15 and 2000-04-25 (From http://taiwaninfo.nat.gov.tw/ct.asp?xItem=18030&CtNode=103&htx_TRCategory=&mp=4 ) Wikisource has original text related to: Additional Articles of the Constitution of the Republic of China (2000) Article 9. The system of self- government in the provinces and counties shall include the following provisions, which shall be established by the enactment of appropriate laws, the restrictions in Article 108, Paragraph 1, Item 1; Article 109; Article 112 through Article 115; and Article 122 of the Constitution notwithstanding: 1. A province shall have a provincial government of nine members, one of whom shall be the provincial governor. All members shall be nominated by the president of the Executive Yuan and appointed by the president of the republic. 2. A province shall have a provincial advisory council made up of members nominated by the president of the Executive Yuan and appointed by the president of the republic. 3. A county shall have a county council, members of which shall be elected by the voters of the said county. 4. The legislative powers vested in a county shall be exercised by the county council of the said county. 5. A county shall have a county government headed by a county magistrate who shall be elected by the voters of the said county. 6. The relationship between the central government and the provincial and county governments. 7. A province shall execute the orders of the Executive Yuan and supervise matters governed by the counties. The modifications of the functions, operations and organization of the Taiwan Provincial Government may be specified by law. <|fim▁end|> | December 20, 1998. Elections |
<|fim▁begin|> Listening Multi-Level Contents 1 Memorize and explain 2 of the following listening Bible verses 2 Tell one of the following listening Bible Stories. 3 Learn the following principles of listening 4 Make a craft that relates to listening. 5 Play a listening game. 6 External Resources Memorize and explain 2 of the following listening Bible verses a. James 1:19 Understand this, my dear brothers and sisters: You must all be quick to listen, slow to speak, and slow to get angry. b. Jeremiah 29:11-12 11 For I know the plans I have for you,” says the Lord. “They are plans for good and not for disaster, to give you a future and a hope. 12 In those days when you pray, I will listen. c. Jeremiah 13:15 Listen and pay attention! Do not be arrogant, for the Lord has spoken. d. Proverbs 1:8 My child, listen when your father corrects you. Don’t neglect your mother’s instruction. e. Isaiah 59:1 Listen! The Lord’s arm is not too weak to save you, nor is his ear too deaf to hear you call. Tell one of the following listening Bible Stories. a. Samuel listening – 1 Samuel 3 https://www.youtube.com/watch?v=l7TDvJrjjz0 You may remember that Samuel's mother was a woman named Hannah. She wanted a son more than anything, so she prayed and asked God to give her a son. She promised God that if he would give her a son, she would give him back to the LORD to serve him all the days of his life. God gave Hannah the son she asked for and she kept her promise to God. When the boy was old enough, she took him to the temple and presented him to Eli the priest. So Samuel served in the temple under Eli. One night Samuel was sleeping when he heard someone call his name. He got up and ran to Eli. "Here I am; you called me," he said to Eli. "I didn't call you," Eli answered, "go back to bed." So Samuel went back to bed. Again the LORD called, "Samuel!" Samuel jumped out of bed and and went to Eli. "Here I am; you called me." "I didn't call you, go back to bed," Eli answered a second time. A third time God called Samuel and Samuel got up and went to Eli. "Here I am; you called me," he said. Finally, Eli realized that it was God who was calling Samuel. He told Samuel, "Go and lie down, and if he calls you again, say, 'Speak LORD, for your servant is listening." Samuel went back to bed and sure enough, again he heard the voice of God calling, "Samuel! Samuel!" This time Samuel answered as Eli had told him, "Speak, for your servant is listening." Some people think that God only calls grown-ups. That is why I like the story of Samuel. Samuel was just a young boy when God called him. God knows your name just as he knew the name of Samuel and God still calls boys and girls today saying, "Come, follow me." So, listen for God's call and answer just as Samuel did, "Here I am!" b. Jesus listening – Luke 2:41-49 Every year, Mary, Joseph and Jesus traveled to Jerusalem for a celebration. They went with a big group of friends and family. The party was so much fun. They had lots of good food and told God how much they loved Him. When the party was over, Mary and Joseph and the group traveled back to their home. (March with your feet) After a while, Mary and Joseph realized that Jesus was not anywhere to be found. They asked all their friends and family, but no one had seen Jesus. (Put your hand by your brow like you are searching for Jesus.) Mary and Joseph rushed back to Jerusalem. They looked everywhere for Jesus. (Put your hand across your brow as if you were looking for Jesus; then call Jesus’ name like you were looking for Him) Finally, they found him. Do you know where Jesus was? He was in the temple church, talking to the leaders. They had been there talking together the whole time! The leaders were amazed at what Jesus knew. When Mary found him she said, “Son, why did you do this to us? Your father and I were very worried about you!” Jesus asked, “Why did you have to look for me? You should have known that I would be where my Father’s work is.” But they did not understand what He meant. Jesus went with them to their home in Nazareth and He obeyed them. He listened and did what His parents asked Him to do. Jesus continued to grow up. People liked him and he pleased God too. Learn the following principles of listening Listen to God. Be always ready to listen. “My dear brothers, take note of this: Everyone should be quick to listen, slow to speak and slow to become angry.” James 1:19 Be patient. Listening takes time, but the reward far exceeds the investment. Be obedient. Listen and respond the first time instruction is given. Be kind. Listening is a gift, so be the first one to lead out in listening. Be a listening role model. Be respectful. Listen to others and let them finish their story, before you talk. Be attentive. Pay attention while others are speaking. Teaching Idea: Tin Can Telephone For an example, use two tin cans and a string. A tin can telephone is a type of voice-transmitting device made up of two tin cans attached together on the closed end with a taut string or wire. Practice speaking and listening in a way the reinforces the rules listed OR shows the problems when we don't use those rules? MUCH more fun with tin cans than with a simple traditional discussion! (Yes, tin cans are another type of role play) Make a craft that relates to listening. String Telephone You will need: 2 plastic or paper cups – a tin can works great too String (you can experiment with <|fim▁hole|> the other end of the string telephone:) Instructions: Make a small hole in the bottom of both cups. Thread your string through the cup and tie a knot to keep the string from pulling back through. That’s it! You are all ready to start playing. You take one cup and your friend takes the other. Walk far enough apart to make the string tight. Depending on how long you cut your string will depend on how far you need to stand apart. Also, make sure that the string is not touching anything else. One friend holds the cup to their mouth and talks, while the other friend holds it to their ear and listens. Play a listening game. Follow the Leader 1: Facilitate an old-fashioned game of Simon Says as a way to emphasize the importance of focus and following directions. Try saying, "Simon says touch your toes and then say sit on the floor." If your child follows the second direction without hearing Simon says, they lose. This game reinforces how effective listening relates to following directions. For older children, use a picture that includes geometrical shapes. Give the child a blank piece of paper and then describe the picture and ask them to draw what they hear. Compare the two pictures and discuss how listening to directions played a role in replicating the picture. Follow the Leader 2: Form groups of three. Have one person in each group close his or her eyes. Have the other two take the person at least 20 feet away from their group. Say: You have one minute to get back to your seat with your eyes closed. Your friends in your group will guide you, but listen well. The "blind" people can't be led by the hand; they must follow only their group members' instructions. Play three times to let each group member have a turn being the blind one. Then ask: How easy or difficult was it to listen to your group members' voices? How did other people's instructions affect you? What techniques did you use to listen well? Say: Listen to this story about a little boy who learned to listen well—and heard God's voice. Read aloud 1 Samuel 3:1-11. Ask: Think of the techniques we used in our game to listen well. How can we use some of those same techniques to listen well to God? Telephone Game: Have everyone sit in a circle. The instructor will start a message by whispering it into the ear of the child to his/her left. The message will continue around the circle, from child to child, by whispering the message in the ear of the next child. (Be careful not to whisper loud enough for others to hear.) When the message has gone around the whole circle, have the last child say the message out loud so everyone can hear. Discuss how the message has changed as it moved around the circle. Divide the kids into four groups. Whisper instructions to each group so the other groups don't know what you told them. Tell the first group to sing twinkle twinkle little star as loudly as possible. Tell the second group to shout out their favourite foods. Tell the third group to do jumping jacks and count them as they do them. Tell the last group to use their normal voice level and say "God loves you". On "go", have each group begin. Allow the kids to do this for about 60 seconds. Then call them all together and ask the first three groups if they can identify what each group was doing. They will probably be able to tell you what the first three groups were doing, but will have no idea what the last group was doing. The parallel you want to draw here is that we can't listen when we are talking or being loud or distracted. If we want to know what God wants to tell us then we need to be still and listen. External Resources v • d • e Adventist Adventurer Awards Little Lamb Stars Bible Friends · Community Helper · Finger Play · Healthy Food · Healthy Me · Insects · Music · Special Helper · Stars · Trains And Trucks · Weather · Woody Lamb · Zoo Animals Eager Beaver Chips Alphabet Fun · Animal Homes · Animals · Beginning Biking · Beginning Swimming · Bible Friends · Birds · Crayons And Markers · Fire Safety · Gadgets And Sand · God's World · Helping Mommy · Jesus' Star · Jigsaw Puzzle · Know Your Body · Left And Right · Manners Fun · My Community Friends · Pets · Scavenger Hunt · Shapes And Sizes · Sponge Art · Toys Busy Bee Awards Artist · Bible I · Butterfly · Buttons · Fish · Flowers · Friend of Animals · Friend of Jesus · Fruits of the Spirit · Guide · Health Specialist · Home Helper · Honey · Honeybee · Music Maker · Reading I · Safety Specialist · Spotter · Swimmer I Sunbeam Awards Camper · Collector · Cooking Fun · Country Fun · Courtesy · Feathered Friends · Fitness Fun · Flowers · Friend of Nature · Gardener · Glue Right · Handicraft · Ladybugs · Reading II · Road Safety · Skier · Trees · Whales Builder Awards Astronomer · Bead Craft · Build & Fly · Building Blocks · Cyclist · Disciples · Early Adventist Pioneer · First Aid Helper · Gymnast · Hand Shadows · Homecraft · Lizards · Magnet Fun · Media Critic · Olympics · Pearly Gates · Postcards · Prayer · Reading III · Sewing Fun · Swimmer II · Temperance · Tin Can Fun · Troubadour · Wise Steward Helping Hand Awards Basket Maker · Bible II · Bible Royalty · Caring Friend · Carpenter · Computer Skills · Environmentalist · Geologist · Habitat · Hygiene · My Church · My Picture Book · Outdoor Explorer · Pearly Gates · Prayer Warrior · Rainbow Promise · Reading IV · Reporter · Sign Language · Steps to Jesus <|fim▁end|> | different lengths) A friend to hold |
<|fim▁begin|> Attention: While this is a book or tutorial about mapping and level design in GtkRadiant, which should be similar for all games that use the id tech 3 or id tech 4 engines, there are still differences like what textures or models are available etc. etc. Some games also have custom features which may not work with other games. This book uses GtkRadiant to map for the game Jedi Knight 3: Jedi Academy so if you are following this book, but using a different game, the textures or models in the examples may not be available, which means that you have to use something different. Table of Contents Wikipedia has related information at GtkRadiant Introduction Getting around in GtkRadiant First Room The Floor The Walls The Ceiling & Spawn Points Getting it into the game Brush Manipulating Basic Transformation The CSG Tools The Clipper Edge / Vertex Editing Entities Entity Types The Entity Window Lights Linking Entities Models Using Models Model Tricks Sky Creating sky shaders Skyportals Shaders Shader Syntax What Shaders can do Your First Shader Advanced <|fim▁hole|> Texture Browser & Surface Inspector Patches (Curved Objects) File Formats Glossary Keyboard and Mouse Commands System Shaders Error Messages Wikibook Development Stages Sparse text Developing text Maturing text Developed text Comprehensive text If you need help If you don't understand something in this book, for example a word or a procedure, or simply need any other help using this program, just write about it on this book's talk page. I will then add the thing you don't understand, either as word to the glossary, or if it's error messages, I will add a Error messages section where I will list the messages that people report and solutions to them. If you don't get an answer there, try contacting one of the authors of this book ("Yzmo" or "Darth NormaN") on a Jedi Academy related mapping forum. If you want to help If you know a bit about mapping, which isn't covered yet, you can help this book by writing about it. In case you don't know what to write about, just go for one of the red links. <|fim▁end|> | Shaders (Norman, write this plz) The |
<|fim▁begin|> Malacosoma americanum Eastern Tent Caterpillar Type:CaterpillarBinomial:Malacosoma americanumFamily:LasiocampidaeOrder: LepidopteraMetamorphosis:CompleteDamaging stages:CaterpillarsSeason:Spring and summerGenerations per year:oneVulnerable stages:Egg, larva The Eastern Tent Caterpillar (Malacosoma americanum) is a social species of caterpillar that forms communal nests in the branches of trees. It is sometimes confused with the gypsy moth (Lymantria dispar), or the fall webworm and may be erroneously referred to as a bagworm which is the common name applied to unrelated caterpillars in the family Psychidae. The moths oviposit almost exclusively on trees in the plant family Rosaceae, particularly cherries (Prunus) and apple (Malus). The caterpillars are hairy with areas of blue, white, black and orange. The blue and white colors are mechanical colors created by the selective filtering of light by microtubules that arise on the cuticle. In terms of complexity of interactions, the eastern tent caterpillar, Malacosoma americanum, stands near the pinnacle of caterpillar sociality. The adult moth lays her eggs in a single batch in late spring or early summer. The egg masses contain on average 200-300 eggs. Embryogenesis proceeds rapidly and within three weeks fully formed caterpillars can be found within the eggs. But the small caterpillars lie quiescent until the following spring, chewing their way through the shells of their eggs just as the buds of the host tree begins to expand. The newly hatched caterpillars initiate the construction of a silk tent soon after emerging. They typically aggregate at the tent site for the whole of their larval life, expanding the tent each day to accommodate their increasing size. Under field conditions, the caterpillars feed three times each day, just before dawn, in the evening after sunset, and at mid afternoon. During each bout of feeding the caterpillars emerge from the tent, add silk to the structure, move to distant feeding sites en masse, feed, then return immediately to the tent where they rest until the next activity period. The exception to this pattern occurs in the last instar when the caterpillars feed only at night. The caterpillars lay down pheromone trails to guide their movements between the tent and feeding sites. The insect has six larval instars. When fully grown, the caterpillars disperse and construct cocoons in protected places. The adults emerge about two weeks later. Mating and oviposition typically occur on the same day as the moths emerge from their cocoons and being completely spent the females die soon thereafter. The tent of the eastern tent caterpillar is among the largest built by any tent caterpillar. The tents are constructed in the crotch of the host tree and are typically oriented so that the broadest face of the structure faces the southeast, taking advantage of the morning sun. The caterpillars typically add silk to the structure at the onset of each of their daily activity periods. Silk is added directly to the surface of the tent as the caterpillars walk back and forth over the structure. The silk is laid down under slight tension and it eventually contracts, causing the newly spun layer of silk to separate from the previously spun layer. The tent thus consists of discrete layers separated by gaps within which the caterpillars rest. The tent has openings that allow the caterpillars to enter and exit the structure. Openings are formed where branches jut from the structure but are most common at the apex of the tent. Light has a great effect on the caterpillars while they are spinning and they always spin the majority of their silk on the most illuminated face of the tent. Indeed, if under experimental conditions the dominant light source is directed at the tent from below, the caterpillars will build their tent upside down. Caterpillars continue to expand their tent until they enter the last phase of their larval life. The sixth-instar caterpillar conserves its silk for cocoon construction and adds nothing to the tent. The tents are multifunctional. They facilitate basking, offer some protection from enemies, provide for secure purchase, and act as a staging site from which the caterpillars launch en masse forays to distant feeding sites. The elevated humidity inside the tent may facilitate molting. Eastern tent caterpillars are among the earliest of caterpillars to appear in the spring. Because the early spring weather is often cold, the caterpillars rely on the heat of the sun to elevate their body temperatures to levels that allow them to digest their food. Studies show <|fim▁hole|> the caterpillars are unable to process the food in their guts. Early instars of the tent caterpillar are black and their bodies readily absorb the rays of the sun. When basking, the caterpillars typically pack together tightly, reducing heat loss due to convective currents. The long setae that occur on the caterpillars also serve to stem convective heat loss. The caterpillars may aggregate on the surface of the tent or within the structure. The tents act as miniature glass houses, trapping the heat of the morning sun and allowing the caterpillars to warm more quickly than they would if they remained outside the tent. Studies have shown that basking, aggregated caterpillars can achieve temperature excesses of as much as 44°C. Indeed, the caterpillars can easily overheat and they must take evasive action when they become too hot. Because of its layered structure, the tent is thermally heterogeneous and the caterpillars can adjust their temperature by moving from layer to layer. The caterpillars may also aggregate on the outside of the shaded side of the tent and hang from the tips of their abdomens to enhance convective heat loss and cooling. As shown for some other caterpillars, eastern tent caterpillars are capable of generating a small amount of metabolic heat while they digest their meals. When recently fed caterpillars pack tightly together, the temperature of the caterpillars in the interior of the mass may be several degrees Celsius above ambient temperature even in the absence of a radiant heat source. It is unclear whether this small heat gain has a significant effect on the rate of caterpillar growth. Tent caterpillars, like many other species of social caterpillars, vigorously thrash the anterior part of their bodies when they detect predators and parasitoids. Such bouts of thrashing, which may be initiated by a single caterpillar, radiate rapidly though the colony and may result in group displays involving dozens of caterpillars. Such displays create a moving target for tachinid flies, wasps and other small parasitoids that lay their eggs on or in the body of the caterpillar. They also clearly deter stink bugs and other timid predators. Groups of caterpillars resting on the surface of the tent constitute aposematic displays. Few birds other than the cuckoo find the hairy caterpillars palatable. The leaves of the cherry tree are cyanogenic and the caterpillars regurgitate cyanide ladened juices when disturbed. Tent caterpillars secrete silk from a spinneret wherever they go and frequently used pathways soon bear conspicuous silk trails. As the caterpillars move about the tree, they largely confine their movements to these trails. Curiously, it is not the silk that they follow but a trail pheromone secreted from the posterior tip of their abdomen. Caterpillars deposit exploratory trails by dragging the tip of their abdomen as they move over the tree in search of food. Caterpillars that find food and feed overmark the exploratory trails they follow back to the tent, creating recruitment trails. Recruitment trails are much more attractive to the caterpillars than exploratory trails and they serve to lead hungry caterpillars directly to the newest food finds. It is possible for a single successful forager to recruit the entire colony to its food find. The exact identity of the trail pheromone of the eastern tent caterpillar has not yet been determined but the chemical 5β-cholestane-3-one has been shown to be fully competitive with the authentic trail pheromone. Caterpillars readily follow trails of this chemical, even abandoning their own trails in favor of artificial trails prepared with the compound. The eastern tent caterpillar is of some importance as a plant pest since it may defoliate ornamental trees. Defoliated trees, however, rarely suffer significant damage and typically refoliate within several weeks. More seriously, the caterpillar has been implicated in mare reproductive loss syndrome (MRLS), but the exact mechanism by which the caterpillar triggers abortion in horses has yet to be determined. Symptoms and Signs Symptoms include severe defoliation of the host plant. The sign is the easily recognizable tents made by the colonies. Host plants Acer Alnus Betula Hamamelis Malus Prunus Salix Control Communal Tent Physical removal: Simply turning out the tents can provide good control, so long as the caterpillars are actually inside the tent when it is removed. Organic pesticides: Neem Oil, Horticultural Oil on egg masses Biocontrols (microscopic): Bt References http://web.cortland.edu/fitzgerald/index.html Fitzgerald, T. D. 1995. The Tent Caterpillars. Cornell University Press. <|fim▁end|> | that below 15°C (59°F) |
<|fim▁begin|> A printable version of Designing Sound in SuperCollider is available. (edit it) This book is an independent project based on Designing Sound by Andy Farnell, all about the principles and techniques needed to design sound effects for real-time synthesis. The original book provides examples in the PureData language - here we have re-created some of the examples using SuperCollider. The original book includes much more than what you see here - we're only recreating the examples and not the text! So in a sense this is not a stand-alone book and you'll get the most out of it if you have the original book with you. But we hope the examples are illustrative in <|fim▁hole|> the code we present should be assumed to be our own mistakes, and no reflection on Andy's fine book! Table of contents (Note: the numbering is done to match up with the chapter numbers in the original book.) Introduction Equivalents for Pure Data Objects Tools & Technique 14. Schroeder reverb 17. Additive synthesis Practicals: Artificial sounds 24. Pedestrians 25. Phone tones 26. DTMF 27. Alarms 28. Sirens Practicals: Idiophonics 29. Telephone bell 30. Bouncing ball 31. Rolling can 32. Creaking door 33. Boing Practicals: Nature 34. Fire 35. Bubbles 36. Running water 38. Rain 39. Electricity Practicals: Machines 44. Motors 45. Cars Practicals: Lifeforms 50. Insects Practicals: Sci-Fi 56. Transporter 57. R2D2 58. Red alert <|fim▁end|> | themselves. Any defects in |
<|fim▁begin|> THE BAHÁ'Í FAITH The Bahá'í Faith is an independent monotheistic religion with a worldwide population of some 5 million from more than 2,000 different tribal, racial, and ethnic groups and live in 235 countries and dependent territories. The Britannica Book of the Year (1992) referred to the Bahá'í Faith as the second-most geographically-widespread religion in the world, after Christianity. It originated in Iran in 1844 and has its own sacred scriptures, laws, calendar, and holy days. The Bahá'í Faith teaches that the founders of the world's major religions, including Krishna, Guatama Buddha, Zoroaster, Abraham, Moses, Jesus Christ, and Muhammad, are divine Teachers sent by one God to educate humanity through teachings and laws suited to its stage of development. The Bahá'í Faith recognizes two additional Teachers for this age: the Báb and Bahá'u'lláh. Bahá'ís believe that religious revelation will continue in the future to provide guidance to "an ever-advancing civilization." In 1844 the Báb ("the Gate") founded the Bábí Faith or Bábísm. His main purpose was to prepare humanity for the imminent appearance of another divine teacher who would lead humanity into an age of universal peace. In 1863, one of his followers - Mírzá Ḥusayn-`Alí Nuri - declared himself Bahá'u'lláh ("the Glory of God") and announced that he was the figure foretold by the Báb. The Faith's unity has been preserved through the provisions of a written "Covenant," which established the Faith's principles of succession and institutional authority; there are no clergy in the Bahá'í Faith. The Bahá'í community governs itself by elected councils at the local, national, <|fim▁hole|> only Bahá'ís are permitted to contribute to the funds of their faith. Bahá'ís in Iran have suffered persecution for their beliefs since the Faith's earliest days. The main theme of Bahá'u'lláh's revelation is unity. He taught that "the earth is but one country, and mankind its citizens," emphasizing a oneness of all humans irrespective of national origin. His writings contain principles, laws, and institutions for a world civilization, including: abandonment of all forms of prejudice; equality between the sexes; recognition of the common source and essential oneness of the world's great religions; elimination of the extremes of poverty and wealth; universal compulsory education; responsibility of each individual to search independently for truth; establishment of a world federal system based on principles of collective security; and recognition that religion is in harmony with reason and scientific knowledge. Because of its commitment to these ideals, the Bahá'í community has been an active supporter of international organizations such as the United Nations. Service to humanity is another central teaching of the Bahá'í Faith, which has led Bahá'ís to initiate thousands of social and economic development projects - most of them modest, grassroots efforts such as schools, village health care campaigns, and environmental projects - around the world. The Bahá'í World Centre in the Acre/Haifa area of Israel has been both the spiritual and administrative center of the Bahá'í Faith since Bahá'u'lláh was exiled here in 1868. The Shrines (burial places) of the Báb on Mount Carmel in Haifa and of Bahá'u'lláh near Acre are the two holiest places on earth for Bahá'ís. <|fim▁end|> | and international levels, and |
<|fim▁begin|> An AMD Ryzen 7 1800X CPU. The CPU (Central Processing Unit) performs all the instructions that happen within a computer. It is also referred to as the processor or a microprocessor (a single integrated circuit). The power of the processor means it is "the brain of the computer", which carries out all arithmetic and logic operations so any instructions can be executed. CPUs are made more efficient by improving their construction (their architectures), putting more transistors on the same chip and improving the efficiency of their instructions. Contents 1 Von Neumann Architecture 1.1 Arithmetic Logic Unit 1.2 Control Unit 1.3 Registers 1.4 The Bottleneck 2 Operation of the CPU 2.1 Fetch-Decode Execute Cycle 2.2 Pipelining 2.3 Memory & Caching 2.3.1 Cache Hits & Misses 2.3.2 The 80/20 Principle 2.3.3 Cache Levels 2.4 Parallel Processing 3 Input Devices 3.1 Optical Character Recognition 3.2 Optical Mark Recognition 3.3 Magnetic Ink (Character) Recognition 3.4 Touchscreens 3.4.1 Capacitive 3.4.2 Resistive 3.5 Voice-based 3.5.1 Voice Input 3.5.2 Vocabulary Dictation 3.5.3 Voice-print Recognition 4 Secondary Storage Mediums 4.1 Magnetic 4.2 Flash 4.2.1 SSDs 4.2.2 Memory Sticks/SD cards 4.2.3 Optical Drives 4.3 Fragmentation 4.3.1 Defragmentation of SSDs 5 Networking 5.1 Types 5.1.1 LAN 5.1.2 WAN 5.2 Structures 5.2.1 Client-Server Structure 5.2.2 Peer to Peer 5.2.3 Distributed Processing 5.3 Protocols 5.3.1 HTTP 5.3.2 FTP 5.3.3 SMTP 5.3.4 IMAP 5.3.5 DHCP 5.3.6 TCP 5.3.7 UDP 5.4 Hardware 5.4.1 NIC 5.4.2 WIC 5.4.3 Hubs 5.4.4 Switches 5.4.5 Routers Von Neumann Architecture The Von Neumann Architecture with the ALU and CU described by B and A, respectively. Note the varying shapes which must be used in the exam. The Von Neumann Architecture is a computer architecture that was constructed by mathematician and physicist John von Neumann. He said that there were 3 parts to the CPU: the Arithmetic Logic Unit, Registers and the Control Unit. Arithmetic Logic Unit The ALU is responsible for any arithmetic calculations e.g. floating point multiplication and integer division and logical calculations e.g. comparisons tests like greater than and less than. The ALU acts as a conduit for input and output for the computer. Control Unit The Control Unit (CU) manages the execution of machine code and this is accomplished by sending control signals to the rest of the computer via the Control Bus (see diagram). The CU synchronises the execution of instructions based on the internal clock of the CPU. Registers Registers are small blocks of memory used for any storage needed by instructions currently being executed. This is necessary as instructions can only by executed by first loading them into their relevant registers. There are two types of registers: general purpose registers and special purpose registers. General purpose registers can be used by the developer to store any values they wish, whereas special purpose registers have a specific purpose. For example, the Accumulator (ACC) is located in the ALU and stores the result of any calculations. Values are kept in the ACC and used for the next calculation that needs to be done, rather like a traditional calculator. Other special purpose registers are used for the FDE cycle: PC (Program Counter): used to store the next instruction to be executed. MAR (Memory Address Register): used to store the memory address where the next instruction is located. MDR (Memory Data Register): used to store the data at the memory address that is to be executed. CIR (Current Instruction Register): stores the data of the instruction that is currently being executed. The Bottleneck A CPU is much faster than the RAM (Random Access Memory). Instructions will be executed faster than they're fetched, resulting in times when the processor is not executing any instructions. This is referred to as the Von Neumann bottleneck. Operation of the CPU Fetch-Decode Execute Cycle The fetch, decode, execute (FDE) cycle is the process taken to load an instruction from main memory into registers and finally execute it. Contents of the Program Counter read and loaded into the Memory Address Register. Then the Program Counter is incremented by 1, to point to the next instruction to be executed. The instruction is the MAR is read and the data at that memory address is copied into the Memory Data Register. This contents of the MDR is copied into the Current Instruction Register, where the execution happens. A JUMP instruction would interrupt Pipelining as that means the program will be executed in a non-sequential manner, as different instructions would need to be run rather than executing them one by one. Pipelining The process of pipelining is utilised because of the speed mismatch between the CPU and RAM. The CPU is much faster than RAM, so it will execute instructions much faster than the next one can be loaded from RAM. Therefore, it is left doing nothing, which we call 'idling'. To fix this problem, the CPU will retroactively fetch the next instruction while it is executing to avoid this problem. The process of Pipelining can happen thanks to the use of special-purpose registers in the FDE cycle. Memory & Caching Cache is a form of storage for the CPU. Since fetching data from RAM is much slower, cache memory is utilised, which is local to the CPU, with a small capacity with a very fast access time. Cache memory is very expensive due to the fact it is significantly faster than the CPU. But cache memory is beneficial as it solves the problem of the Von Neumann Bottleneck due to it's locality - essentially acting as a "middleman between main memory and the CPU". The cache memory stores any frequently accessed data meaning that it can be accessed quickly due to the locality of cache to the CPU and the very fast speed. Cache Hits & Misses The CPU, whenever it needs data, will check the cache memory to see whether it is present for access. If the data which is needed is present within the cache, it will be accessed. This is referred to as a 'cache hit'. But if the data which the CPU requires is not located in the cache memory, it will need to fetch the data from main memory (RAM). This is referred to as a 'cache miss'. The 80/20 Principle The 80/20 principle also applies to computing, in terms of program execution. The time a program will take to execute is referred to as the execution time. The majority of a program's execution time is only spent utilising 20% of the code. The rest of the time, the 80%, is rather spent in running repetitive code such as loops. This means that if the 20% of the code the program needs to run is located in cache memory, main memory will not need to be accessed and with the speed advantage of both the cache and the CPU, the program will run much faster. Cache Levels Cache is located in various different levels. These levels represent how close the cache is to the CPU, i.e. its locality. Level 1 is usually embedded into the CPU, and is very fast in terms of speed but small in terms of capacity. Level 2 has a slightly higher capacity but runs a little slower and is usually located on the CPU, but occasionally it is located on a separate chip near the CPU. Level 3 works to improve the performance of Level 1 and Level 2 cache. Parallel Processing Today we have reached the physical limits of how much we can optimise the CPU's design. To make CPUs even faster, we now have multi-core processors. It is not uncommon to see six-core systems now with the advent of more affordable CPUs thanks to AMD's Ryzen chips. In parallel processing, more than one processing unit works on a single task, sharing the load of the processing power required. To do this, the single task is split into smaller 'chunks' called threads and these are assigned to each individual processing unit, which execute the thread immediately. Both processing units need to communicate amongst one another to ensure that they always have the most up-to-date piece of data to work with. Advantages Disadvantages Faster execution, as more instructions run in a shorter time span. Much more difficult to write programs that take advantage of a multi-core system. Each task is shared, so no one processing unit will be more loaded than the others. Data must be up-to-date, and processing units will need to change their calculations based on the actions of other processing units. Cannot split sequential tasks. Concurrency means more software bugs to deal with. Input Devices Input devices add information into a system via user interaction. Optical Character Recognition Optical Character Recognition (OCR) is a post-processing step that converts printed text documents back into digital documents, using some form of scanner. This is done with a internal database of all the possible characters (A, B, C, D, *, !, /, 1, 2, 3, 4, etc.) which are compared with whatever input it receives, i.e. the characters on the printed document. Optical Mark Recognition Optical Mark Recognition (OMR) is based around a pre-defined form where someone can mark an option. The first option seen is recorded as the one the user has put, this can be seen commonly in multiple-choice tests or very old-fashioned paper registers. Magnetic Ink (Character) Recognition Magnetic Ink (Character) Recognition (MIR/MICR) is a form of input where a special ink containing iron oxide is used. This prevents anyone tampering with a document as normal ink does not have this chemical present. The only use case is rather antiquated today, bank cheques, this is owing to the sheer cost of the readers. Touchscreens Used today in 2-in-1 laptop/tablets and normal phones and tablets. They work based on a coordinate based system, and a press is recorded at whatever grid position the user touches with their finger, and x and y coordinates sent back to the system. Capacitive A diagram of a capacitive touchscreen. The user presses the screen and a touch is recorded at that position. Capacitive touchscreens are in majority use today, <|fim▁hole|> nearly every single expensive tech device. These touchscreens use the fact that humans can electrically conduct when they touch something. So, whenever someone presses a screen, even in multiple places, voltages are recorded. This has the disadvantage that a touchscreen pen or gloves cannot be worn, and you will need a specialised version of these products. Resistive Resistive touchscreens can be found on old devices or cheaper tech devices, such as home weather stations. They are made up of two thin transparent sheets and when these are touched together a press is recorded. There must be a significant level of pressure in the touch for a press to be registered in these types of touchscreens. Voice-based Voice Input Makes use of a set of pre-defined commands that can be picked up by the system. For example, "call my best friend Linus". Vocabulary Dictation These input systems can pick up a range of words said by someone and they can be extended with specialist dictionaries such as a medical one. They are commonly used today to dictate texts by pressing the microphone button on a keyboard. Voice-print Recognition This method records someones voiceprint and compares it with another pre-recorded voiceprint. If there is a match, someone can be granted access to a system, for example a bank or high security clearance room. Advantages and Disadvantages of Voice-based Input Advantages Disadvantages Faster than typing. Background noise. No need to learn how to type. Since people have accents, they will be mis-heard. Less danger of RSI (Repetitive Strain Injury). Some people has speech impediments and are ill, so they may be mis-heard. Reduces mis-typing. Cannot keep data private. Less physical space needed. Hetragraphs such as 'two' and 'too' as well as homophones mis-heard. Disabled users may find it easier. Can use a phone 'hands-free' in a car. Some people find it "more natural" than typing. Secondary Storage Mediums Used to store applications, documents and OS (Operating System) files. Magnetic Inside a HDD, where you can see the platter and the actuator arm. A HDD (Hard Disk Drive) is a relatively large capacity storage device that is relatively cheap. HDDs provide a good balance between cost and performance, but their use is declining in home desktops and laptops. Data is stored on a platter and is written and read using an actuator arm. The disk spins when powered on and this allows an actuator arm access to the entire platter as it can only move up and down. The speed at which the platter moves is measured in RPM (Revolutions Per Minute). The actuator arm induces magnetic flux on the disk, and the oxide on the platter maintains this state, which is binary data of a 1 or a 0. Flash SSDs A SSD (Solid State Drive) which is based around NAND flash are common in home desktops and laptops now. It uses EEPROM (Electronically Erasable Programmable Memory) to store data. They are much more cost effective than HDDs as they're cheaper to run in the long term, very fast but relatively expensive for a high capacity at the moment. Since SSDs have no moving actuator arm, they are both shock-proof and drop-proof, and due to their small size they can be much more easily transported. Memory Sticks/SD cards Memory sticks and SD (Secure Digital) cards make use of flash memory. Therefore, they are very similar to SSDs. Optical Drives Optical drives such as DVDs (Digital Video Disk) and BD (Blu-ray Disks) work by using lasers to burn microscopic indentations on disks. These indentations and the lack of them form pits and lands, which represent the binary data of 0s and 1s. To read the data, a laser is aimed at the disks and reflected back. This causes interference, which means that pits/lands can be read. DVD ROMS have a higher capacity, with two layers and the pits/lands are closer together resulting in a higher capacity. Blu-rays are the only common one of these used today, used to store high definition 4K movies. They have a blue wavelength, which is much smaller, meaning a higher capacity is achieved due to more pits/lands being able to fit on the disk. Fragmentation Shows the process of de-fragmenting a HDD, by moving data around the disk. Fragmentation is when data is spread out all across the storage medium. This happens with conventional HDDs as many read/write operations mean that data is stored across many different areas of the disk. This means data access is much slower as the actuator arm must move more than necessary to access data on the various parts of the disk, files are stored in a non-sequential manner. To combat this, we can use a process called Defragmentation. This is a piece of software that analyses all the files on the HDD and moves them all to be stored close to one another, on the same track. This speeds up access as data is now stored in a sequential manner. Defragmentation of SSDs SSDs cannot be defragged and the function is disabled by default. However, an command called the TRIM command happens when you attempt to defrag an SSD. This very slightly improves the operation of writing, but only very minutely. It is not a good idea to defragment an SSD as NAND flash only has about 5,000 read/write cycles per area of the drive. The benefit is very minute, and the cost of the operation outweighs the tiny benefit in write speed. Networking A network is a collection of computers that are connected with each other. A network can be established two ways: via wireless links (using WiFi) and/or wired links (using Ethernet cables). Since there are many computers on a network, we use protocols (an agreed upon set of rules allowing two devices to communicate) allowing multiple devices to communicate with each other. Types LAN A LAN (Local Area Network) is small in size, as it takes up a small geographical area, for example your home network, a business network or a universities network. Since they are small in size, they are inherently more secure as there is a smaller number of clients on them. WAN A WAN (Wide Area Network) is large in size, it takes up a large geographical area, for example the Internet. WANs are inherently insecure as you are exposing yourself to any other client on the network and this is a problem as there will be a very large number of people. Structures Client-Server Structure A client-server structure provides services to anyone connecting to it. Good examples are web servers and file storage servers, in both files are served to any clients connecting to the server. The clients request resources from the server, and the server responds. The name distinguishes between the client and the server as the server holds the processing power at a centralised point. Peer to Peer A P2P (Peer to Peer) network is where every client has the same status as one another. Each client is referred to as a 'peer'. This structure is used in torrents, where files are shared across various computers. New peers will leech the file from other peers (receive it), and when they've got all the files, they will seed (send it) to any other peers in the network, until the seeding peer leaves the network (closes the application, or removes the torrent). Distributed Processing Bitcoin mining computers. This could be used to mine in a pool, if the operator wanted to. Distributed processing is where computers work with one another on a complex task, an example of this would be mining for Bitcoin in a pool, where the result of the calculation would be reported to the peer responsible for consolidating and coordinating the results!, and then the Bitcoin is divided amongst the computers who did the work. Protocols An agreed upon set of rules allowing two devices to communicate with each other. Everyone must use the same set of protocols otherwise the response will not be understood. HTTP HTTP (Hypertext Transfer Protocol): allows multimedia webpages to be transferred over a network, in the way the original author intended it to look. FTP FTP (File Transfer Protocol): the downloading/uploading of files from one computer to another SMTP SMTP (Simple Mail Transfer Protocol): standard for sending emails across two email servers. IMAP IMAP (Internet Message Access Protocol): allows the transfer of emails from a email server to a device. DHCP DHCP (Dynamic Host Configuration Protocol): dynamically assigns IPs to clients, returns any that are no longer needed back to the pool. TCP TCP (Transmission Control Protocol): way to send packets over a network. includes an error-checking mechanism in form of a checksum. UDP UDP (Universal Datagram Protocol): sends datagrams across a network with no error-checking methods. Handshaking: Where two devices establish their readiness to communicate. This is also where the set of protocols are agreed upon. Hardware Certain hardware is required to connect to a network and for that network to be connected to the Internet or other LANs. NIC NIC (Network Interface Card) required to connect to a network, responsible for sending packets down an Ethernet cable. WIC WIC (Wireless Interface Card) allows you to connect to a wireless network. Built-in on some motherboards. Hubs Hubs allow many devices to be interconnected. Every packet is broadcast to every other computer, this is clearly a security concern due to the fact any client can eavesdrop. Switches Businesses make use of switches in their LAN. Organisation is sometimes an afterthought... Switches are the same as Hubs, however have a routing table that contains a list of all the connected computers. This is done with MAC (Media Access Control) addresses, unique to every piece of network hardware. Routers Routers route packets to the correct destination. They have a routing table based on IP (Internet Protocol) addresses, but rather than a switch they connect a LAN to a another LAN/WAN such as the Internet. Much more powerful than a switch, as a router has a powerful CPU, allowing many devices to be connected. <|fim▁end|> | located in all mobile phones and |
<|fim▁begin|> Summary The introduction of a generalized relational database architecture at the beginning of this chapter serves as a framework for describing the major functional components of relational databases. Each of these major architectural areas, storage, memory and process, are then discussed in more detail for as they pertain to the specifics of Oracle and DB2. Although there is a great deal of difference in the implementation at the actual database code level, the way that the databases work is very similar. This is not surprising since they use standard tried and true computer science techniques for memory management, the structures described in Dr. Codds seminal work for handling relational data, and are both implementing the same basic functionality. It can be seen that both use memory allocated at the Instance, Database and Application level, and that structures implemented in these memory areas depends on whether the database is stand alone (Dedicated) or shared (Partitioned). The same techniques are used for storing disk data in memory (the buffer pool) and the buffer pool is serviced by similar LRU algorithms in both cases. The architectures described in this chapter are necessarily simplistic. This chapter is intended to give a fairly detailed functional overview of Oracle and DB2, but some disk resident files, memory structures and processes have been omitted for the sake of clarity. Important instances not included in this architectural overview will be introduced in later sections where appropriate, and the general architectures used here will be referred back to for context. Oracle and DB2 are complex and sophisticated products, and there are structures and processes that are specific to different options and features in each database. Some of these will be covered in later sections, but the primary intent of this section is to introduce general concepts around how each DBMS implements and manages the common structures and processes necessary for basic database operation (reading and writing data from memory to disk and vice versa, logging changes, handling user connections, locking objects in the database and managing the buffer pool). Professionals familiar with Oracle and /or DB2 can easily identify components specific to both, and additional structures unique to each. One of the great strengths (and weaknesses) of software is that there are often many different ways of implementing the same functionality. These differences are usually described by the database vendors as ‘competitive differentiators’; the reason why their chosen implementation is superior. The reason for staring with a generalized architecture is so that people familiar with only one database can see how the other database implements the same functionality – the English to Spanish translation if you wish. The objective of this book is not just to compare and contrast database implementations, it is to describe how Oracle Compatibility is achieved in DB2, and to do this it is necessary to see how each handle implementation of functionality that we need to be equivalent in both. For organizations wishing to change their database, architectural discussions of similarities and <|fim▁hole|> point. There necessarily needs to be a detailed comparison of all similarities and differences because no two Oracle or DB2 implementations are the same. Different organizations implement different features and options, and changing databases is a significant understanding. It is Murphys law that some overlooked difference at the beginning of this process will be the undoing of the whole project, so it is important that all differences are covered as completely as possible so that you can start with the answers to two very important questions: a) Have we identified the differences that are important to us, and b) Have we identified all of them? All relational databases store user data as rows and columns in tables. This structure and its access methods are described by Dr. Codds seminal paper in 1970. The operation of the database is handled by software. Since the model is essentially the same, and software is flexible, it would seem that the data and DBMS should be interchangeable. As database functionality evolved, implementation differences of common functions, and the addition of valuable, but proprietary functionality has meant that database implementations have diverged, and now it is not simply sufficient to know how a database works, but also who’s database it is you are working with. Since the original database implementations, there have always been database migrations – the moving of data from one vendors database to another. This involves comprehensive data manipulation, called Extract, Transform and Load (ETL). Once the data lands, there is another exercise that needs to be undertaken, the modification of the application logic (both in user programs, and in stored procedures, triggers, rules and functions within the database) to have your systems work with the newly migrated database. The next logical step in this process is Compatibility, and the ultimate goal of this is that data can be unloaded from one database and loaded into another without having to worry about manipulating incompatible data structures, and that the applications that access this data simply have their connections routed from the original database to the new database. This approach is achieved by vendors implementing competitive vendors’ features and functionality. The objective is to make either wholesale moving of databases, or interoperability of heterogeneous databases seamless. While there certainly are projects that have gone this smoothly, all of them require the following: • An understanding of the implementation details of the source database. • An understanding of the implementation details of the target database. • An inventory of the features used in the source database system (data structures and application logic) • A mapping of structures in the source database to the target. All user implementations are different, they use different subsets of database functionality and not all of this functionality is directly equivalent between the databases. The remaining sections of this Wikibook provide a more comprehensive list of the implementation details of Oracle and DB2, using the framework of the Memory Model, Process Model and Storage Model for comparison. <|fim▁end|> | differences are just a starting |
<|fim▁begin|> Engines are certified to deliver standard thrusts depending upon flight conditions. Thrust is typically measured in kN or lbs. A 'rating' is a predefined power setting that the pilot can select which may be appropriate for particular flight conditions. Rating terminology differs between civil and military aircraft, reflecting the different requirements of these types of aviation. Contents 1 Civil Aircraft Ratings 1.1 Maximum Takeoff thrust (MTO) 1.2 Maximum Continuous thrust (MCT) 1.3 Maximum Climb thrust (MCL) 1.4 Maximum Cruise thrust (MCR) 1.5 Flight Idle 1.6 High or Approach idle 1.7 Ground Idle 1.8 Example ratings 2 Military Ratings 2.1 Military Thrust Civil Aircraft Ratings The following ratings are typical of commercial airliners. The aircraft/engine manufacturer will have to declare two principal ratings to the certifying authorities, since these define the safe limits of operation of the engine/aircraft - these are the Maximum Take-Off (MTO) rating, and the Maximum Continuous Thrust (MCT or MCN) rating. Maximum Takeoff thrust (MTO) This is the maximum thrust that the engine can deliver for 5 minutes in the take-off envelope of the aircraft. Peak thrust is usually achieved when the engine is static, however the most demanding condition for a modern turbofan engine is end-of-runway or lift-off conditions, typically at about 0.25Mn. This condition usually generates the highest stresses and temperatures in the engine, hence use of this rating is only permitted for up to 5 minutes of operation. It is used, as the name suggests, for take-off when the aircraft is at its heaviest and has to be accelerated to take-off speed in a finite runway distance. The higher the thrust available from the engine, the shorter the runway can be, or the greater the aircraft payload can be. This affects which airports an aircraft can be operated from, and the economics of operation. As an alternative to payload, a higher thrust rating allows more fuel load to be carried into the air, so extending range of operation. These trade-offs between available thrust, runway length, aircraft weight and range may need to be assessed for each flight, and is part of a commercial pilot's preparation prior to take-off. An aircraft may take-off with less than maximum take-off thrust to reduce wear on the engine and extend its life. This is usually termed a 'reduced thrust' take-off, and is used to reduce engine maintenance costs. It is a condition of certification that an aircraft should be able to take-off if one engine fails at the most critical point in the take-off run, when it is going too fast to be able to come to a safe stop in the remaining runway. In the case of twin engine aircraft, they have to be capable of taking off on one engine, so that in normal operation 'de-rate' is usually applied as an excess of thrust is available. If an engine exceeds its 'redline' speeds or temperatures when running at MTO thrust, it is no longer considered airworthy. Sometimes referred to as 'TOGA' thrust, short for take-off/go-around. Maximum Continuous <|fim▁hole|> envelope, the MCT rating defines the maximum thrust that can be demanded by the pilot from the engine. As such, it has particular significance with respect to engine failure in flight, as the aircraft will have to proceed to its destination or nearest diversion airport at max continuous thrust. If the engine cannot achieve this thrust level whilst staying within its operating limits for engine speed and temperature, (the 'amber line'), it is no longer considered airworthy. Maximum Climb thrust (MCL) This is the thrust rating the manufacturer recommends be used during the climb phase of a typical flight. It may be the same as max continuous thrust, and usually is for a three or four engined aircraft. The top of the climb phase is typically the most challenging condition for a turbofan engine outside the take-off regime, and is a critical design requirement. De-rate can be applied to MCL thrust to extend engine life, but at the cost of a slower time to climb and slightly increased trip fuel consumption. Maximum Cruise thrust (MCR) Sometimes defined, but not a particularly useful rating since in cruise the pilot/autopilot will use the thrust required to maintain constant altitude and air speed to meet with air traffic control requirements. Flight Idle The idle rating is the minimum thrust that can be used whilst the aircraft is in flight. It is largely defined by the requirement to keep the engine running, possibly supplying secondary services to the aircraft such as hydraulic and electrical power, and, especially at high altitude, to supply passenger air at a minimum pressure. The flight idle rating is important in that the lower it is, the quicker the aircraft can descend (without going into a dive). It is often determined by stability considerations such as flutter and surge margin. High or Approach idle In the final phases of approach to landing it is important to be able to provide rapid response to throttle movements. This may require the engine to be running at a higher speed than flight idle to be able to provide rapid acceleration if required. There may be a maximum response time requirement to achieve 'TOGA' thrust if a landing is aborted. Ground Idle Used for maneuvering on the ground. Typically defined by the need to keep the engine running and supplying power and services to the aircraft. Generally, the lower this value the better, since brake wear is a significant factor in aircraft running/maintenance costs. Example ratings The figure below shows the typical behavior of a modern turbofan. The orange curves show maximum cruise thrust at altitude. The take-off thrust is about 25% higher than the cruise thrust at sea level since it is permitted for short durations only. Military Ratings Combat aircraft have very different requirements to civil aircraft, and different rating terminology is used, especially for aircraft using reheat or afterburning for thrust augmentation. Military Thrust Typically used to define the maximum available thrust without use of reheat. Sometime referred to as max 'dry' thrust. <|fim▁end|> | thrust (MCT) Outside the MTO flight |
<|fim▁begin|> Contents 1 Template Meta-programming overview 1.1 Compile-time programming 1.2 The nature of template Meta-programming 1.3 Limitations of Template Meta-programming 1.4 History of TMP 1.5 Building blocks 1.5.1 Values 1.5.2 Functions 1.5.3 Branching 1.5.4 Recursion 1.6 Example: Compile-time "If" 1.7 Debugging TMP 1.8 Conventions for "Structured" TMP Template Meta-programming overview Template meta-programming (TMP) refers to uses of the C++ template system to perform computation at compile-time within the code. It can, for the most part, be considered to be "programming with types" — in that, largely, the "values" that TMP works with are specific C++ types. Using types as the basic objects of calculation allows the full power of the type-inference rules to be used for general-purpose computing. Compile-time programming The preprocessor allows certain calculations to be carried out at compile time, meaning that by the time the code has finished compiling the decision has already been taken, and can be left out of the compiled executable. The following is a very contrived example: #define myvar 17 #if myvar % 2 cout << "Constant is odd" << endl; #else cout << "Constant is even" << endl; #endif This kind of construction does not have much application beyond conditional inclusion of platform-specific code. In particular there's no way to iterate, so it can not be used for general computing. Compile-time programming with templates works in a similar way but is much more powerful, indeed it is actually Turing complete. Trait classes are a familiar example of a simple form of template meta-programming: given input of a type, they compute properties associated with that type as output (for example, std::iterator_traits<> takes an iterator type as input, and computes properties such as the iterator's difference_type, value_type and so on). The nature of template Meta-programming Template meta-programming is much closer to functional programming than ordinary idiomatic C++ is. This is because 'variables' are all immutable, and hence it is necessary to use recursion rather than iteration to process elements of a set. This adds another layer of challenge for imperative programmers learning TMP: as well as learning the mechanics of it, they must learn to think in a different way. Limitations of Template Meta-programming Because template meta-programming evolved from an unintended use of the template system, it is frequently cumbersome. Often it is very hard to make the intent of the code clear to a maintainer, since the natural meaning of the code being used is very different from the purpose to which it is being put. The most effective way to deal with this is through reliance on idiom; if you want to be a productive template meta-programmer you will have to learn to recognize the common idioms. It also challenges the capabilities of older compilers; generally speaking, compilers from around the year 2000 and later are able to deal with much practical TMP code. Even when the compiler supports it, the compile times can be extremely large and in the case of a compile failure the error messages are frequently impenetrable. For a template instantiation debugger, see TempLight. Some coding standards may even forbid template meta-programming, at least outside of third-party libraries like Boost. History of TMP Historically TMP is something of an accident; it was discovered during the process of standardizing the C++ language that its template system happens to be Turing-complete, i.e., capable in principle of computing anything that is computable. The first concrete demonstration of this was a program written by Erwin Unruh, which computed prime numbers although it did not actually finish compiling: the list of prime numbers was part of an error message generated by the compiler on attempting to compile the code.[1] TMP has since advanced considerably, and is now a practical tool for library builders in C++, though its complexities mean that it is not generally appropriate for the majority of applications or systems programming contexts. #include <iostream> template <int p, int i> class is_prime { public: enum { prim = ( (p % i) && is_prime<p, i - 1>::prim ) }; }; template <int p> class is_prime<p, 1> { public: enum { prim = 1 }; }; template <int i> class Prime_print { // primary template for loop to print prime numbers public: Prime_print<i - 1> a; enum { prim = is_prime<i, i - 1>::prim }; void f() { a.f(); if (prim) { std::cout << "prime number:" << i << std::endl; } } }; template<> class Prime_print<1> { // full specialization to end the loop public: enum { prim = 0 }; void f() {} }; #ifndef LAST #define LAST 18 #endif int main() { Prime_print<LAST> a; a.f(); } Building blocks Values The 'variables' in TMP are not really variables since their values cannot be altered, but you can have named values that you use rather like you would variables in ordinary programming. When programming with types, named values are typedefs: struct ValueHolder { typedef int value; }; You can think of this as 'storing' the int type so that it can be accessed under the value name. Integer values are usually stored as members in an enum: struct ValueHolder { enum { value = 2 }; }; This again stores the value so that it can be accessed under the name value. Neither of these examples is any use on its own, but they form the basis of most other TMP, so they are vital patterns to be aware of. Functions A function maps one or more input parameters into an output value. The TMP analogue to this is a template class: template<int X, int Y> struct Adder { enum { result = X + Y }; }; This is a function that adds its two parameters and stores the result in the result enum member. You can call this at compile time with something like Adder<1, 2>::result, which will be expanded at compile time and act exactly like a literal 3 in your program. Branching A conditional branch can <|fim▁hole|> two alternative specialisations of a template class. The compiler will choose the one that fits the types provided, and a value defined in the instantiated class can then be accessed. For example, consider the following partial specialisation: template<typename X, typename Y> struct SameType { enum { result = 0 }; }; template<typename T> struct SameType<T, T> { enum { result = 1 }; }; This tells us if the two types it is instantiated with are the same. This might not seem very useful, but it can see through typedefs that might otherwise obscure whether types are the same, and it can be used on template arguments in template code. You can use it like this: if (SameType<SomeThirdPartyType, int>::result) { // ... Use some optimised code that can assume the type is an int } else { // ... Use defensive code that doesn't make any assumptions about the type } The above code isn't very idiomatic: since the types can be identified at compile-time, the if() block will always have a trivial condition (it'll always resolve to either if (1) { ... } or if (0) { ... }). However, this does illustrate the kind of thing that can be achieved. Recursion Since you don't have mutable variables available when you're programming with templates, it's impossible to iterate over a sequence of values. Tasks that might be achieved with iteration in standard C++ have to be redefined in terms of recursion, i.e. a function that calls itself. This usually takes the shape of a template class whose output value recursively refers to itself, and one or more specialisations that give fixed values to prevent infinite recursion. You can think of this as a combination of the function and conditional branch ideas described above. Calculating factorials is naturally done recursively: 0 ! = 1 {\displaystyle 0!=1} , and for n > 0 {\displaystyle n>0} , n ! = n × ( n − 1 ) ! {\displaystyle n!=n\times (n-1)!} . In TMP, this corresponds to a class template "factorial" whose general form uses the recurrence relation, and a specialization of which terminates the recursion. First, the general (unspecialized) template says that factorial<n>::value is given by n*factorial<n-1>::value: template <unsigned n> struct factorial { enum { value = n * factorial<n-1>::value }; }; Next, the specialization for zero says that factorial<0>::value evaluates to 1: template <> struct factorial<0> { enum { value = 1 }; }; And now some code that "calls" the factorial template at compile-time: int main() { // Because calculations are done at compile-time, they can be // used for things such as array sizes. int array[ factorial<7>::value ]; } Observe that the factorial<N>::value member is expressed in terms of the factorial<N> template, but this can't continue infinitely: each time it is evaluated, it calls itself with a progressively smaller (but non-negative) number. This must eventually hit zero, at which point the specialisation kicks in and evaluation doesn't recurse any further. Example: Compile-time "If" The following code defines a meta-function called "if_"; this is a class template that can be used to choose between two types based on a compile-time constant, as demonstrated in main below: template <bool Condition, typename TrueResult, typename FalseResult> class if_; template <typename TrueResult, typename FalseResult> struct if_<true, TrueResult, FalseResult> { typedef TrueResult result; }; template <typename TrueResult, typename FalseResult> struct if_<false, TrueResult, FalseResult> { typedef FalseResult result; }; int main() { typename if_<true, int, void*>::result number(3); typename if_<false, int, void*>::result pointer(&number); typedef typename if_<(sizeof(void *) > sizeof(uint32_t)), uint64_t, uint32_t>::result integral_ptr_t; integral_ptr_t converted_pointer = reinterpret_cast<integral_ptr_t>(pointer); } On line 18, we evaluate the if_ template with a true value, so the type used is the first of the provided values. Thus the entire expression if_<true, int, void*>::result evaluates to int. Similarly, on line 19 the template code evaluates to void *. These expressions act exactly the same as if the types had been written as literal values in the source code. Line 21 is where it starts to get clever: we define a type that depends on the value of a platform-dependent sizeof expression. On platforms where pointers are either 32 or 64 bits, this will choose the correct type at compile time without any modification, and without preprocessor macros. Once the type has been chosen, it can then be used like any other type. Note: This code is just an illustration of the power of template meta-programming, it is not meant to illustrate good cross-platform practice with pointers. For comparison, this problem is best attacked in C90 as follows # include <stddef.h> typedef size_t integral_ptr_t; typedef int the_correct_size_was_chosen [sizeof (integral_ptr_t) >= sizeof (void *)? 1: -1]; As it happens, the library-defined type size_t should be the correct choice for this particular problem on any platform. To ensure this, line 3 is used as a compile time check to see if the selected type is actually large enough; if not, the array type the_correct_size_was_chosen will be defined with a negative length, causing a compile-time error. In C99, <stdint.h> may define the types intptr_h and uintptr_h. Debugging TMP As of 2017, this cannot be done in any meaningful way. Generally it is easier to throw out the templates and start over than try to decipher the byzantine maze of compiler output that results from a single-byte typo in a template metaprogram. Consider these observations from Herb Sutter, secretary for the C++ standardization committee: Herb: Boost.Lambda, is a marvel of engineering… and it worked very well if … if you spelled it exactly right the first time, and didn’t mind a 4-page error spew that told you almost nothing about what you did wrong if you spelled it a little wrong. … Charles: talk about giant error messages… you could have templates inside templates, you could have these error messages that make absolutely no sense at all. Herb: oh, they are baroque. Source: https://ofekshilon.com/2012/09/01/meta-programming-is-still-evil/ Conventions for "Structured" TMP To do:Describe some conventions for "structured" TMP. <|fim▁end|> | be constructed by writing |
<|fim▁begin|> Table of Contents Home Preface Rules Block Wheels Axles Assembly Physics Appendices edit Alignment The process of aligning the wheel vertically (camber angle) and parallel to the direction of travel (toe and steer angles). Axle Slot One of two slots cut in the stock BSA kit block. Beveling tapering the axle to reduce the contact area between the axle head and the outer wheel hub. Balancing Wheel modification to achieve an equivalent mass distributed about the hub. Block The 7 x 1-3/4 x 1-1/4 pine block. Bore polishing Polishing the inner surface of the hub to reduce friction between the wheel and axle. BSA Boy Scouts of America. Coning Modification of the inside wheel hub to reduce hub-to-body friction. Center Rail On wood tracks, a lane guide that is approximately 1/4" inch tall and 1-5/8" wide that the car straddles to keep it on the track. Deburring Axles are essentially one-inch nails that have two burrs under the head from the stamping process. A typical axle treatment consists of removing these burrs followed by sanding and polishing. Dominant Wheel The front wheel that touches when the car is on a flat surface. In a raised front wheel configuration, this is the wheel that is not raised. Extended Wheelbase The largest distance possible between the axles such that the wheels do net extend past the end of the block: 5-3/4" with the axle holes 5/8" from the end of the block. Graphite A form of carbon that is found in pencil lead. It is one of the favored dry lubricants Grooving Notching of axles to reduce the contact area and thus the friction between the axle and the wheel. H Tread A wheel modification in which the tread is cut with a "H" cross-section to allow contact with the track surface on the inner and outer parts of the tread only. Kit The Official BSA "Grand Prix Pinewood Derby Kit" with block, 4 axles, 4 wheels and instructions. Krytox A liquid synthetic lubricant (MSDS).[1], Krytox <|fim▁hole|> (PFPE) synththetic lubricants made by DuPont Light Wheels Wheels that have been reduced in mass, typically by removal of material from the inner side of the wheel. Matched Wheels Wheels taken from the same mold number. Mold The plastic injection mold for pinewood derby wheels. Mold Number The number on the inside of a wheel, indicating the injection mold. Moly Molybdenum disulfide lubricant. Molybdenum disulfide Molybdenum disulfide is a dry lubricant similar to graphite. Nickel plating Nickel plated axles can be polished to a smoother finish than stock zinc BSA axles. Notching or Grooving Axles can be notched or grooved to reduce the contact area and thus the friction between the axle and the wheel. Nyoil A liquid synthetic lubricant (MSDS). Pinewood derby car "outlaw" wheels Outlaw Wheels Thin wheels machined from a high-performance polymer such as delrin that are typically allowed only in open class races. Oversize Axles Oversize axle (e.g. 0.091 diameter) axles can reduce wheel wobble. Official BSA axles are 0.087 inch in diameter. Rail Riding Adjustment of the dominant front wheel alignment to induce a slight steer toward the track center rail to cause the car to hug the rail as it goes down the track. Raised Wheel One wheel (typically front) raised approximately 1/16 inch on the car body. This wheel is not in constant contact with the track and thus contributes less to the rotational inertia. Silicone A polysiloxanes organic/inorganic polymer lubricant. Nickel-plated speed axle Speed Axles Nickel-plated aftermarket axles. Teflon The trade name for polytetrafluoroethylene (PTFE) polymer. Powdered Teflon is a common Derby car lubricant. V Tread A wheel modification in which the tread is cut with a "V" cross-section to allow a single radial point of contact with the track surface. Wheelbase The spacing between the front and rear wheels from wheel center to wheel center. The standard pinewood derby wheelbase is about 4.5 inches and the extended wheelbase is 5.75 inches with the wheels 5/8 inch from the end of the 7 inch block. <|fim▁end|> | oils and greases are perfluoropolyether |
<|fim▁begin|> Compressor power decreases with pressure difference across the compressor. Reduce the minimum condensing temperature set point to save energy when outside temperatures are below the existing approach temperature. Contents 1 When to Apply 2 Key Engineering Concepts 3 Preparation 4 Analysis Process When to Apply When the minimum condensing pressure setting results in condensing temperature (missing word) than 80 degrees F. The corresponding saturation pressure at this temperature is shown below for common refrigerants. Gauge pressures given in the table assume an atmospheric pressure of 14.7 psia. Saturated Condensing Pressure (psig) R-12: 60 degrees F: 57.6 80 degrees F: 84.0 100 degrees F: 117.0 R-22: 60 degrees F: 101.7 80 degrees F: 143.7 100 degrees F: 196.0 R-134A: 60 degrees F: 57.4 80 degrees F: 86.7 100 degrees F: 124.1 R502: 60 degrees F: 116. 80 degrees F: 161.2 100 degrees F: 216.2 Ammonia (R-717) 60 degrees F: 92.4 80 degrees F: 138.4 100 degrees F: 197.3 Key Engineering Concepts Compressor Power increases with compression ratio. Compression ratio (CR) is determined by condensing pressure (pd) and suction pressure (ps); CR = pd / ps. Decrease minimum condensing pressure / temperature settings to decrease compression ratio and compressor power. Condenser fan energy will increase to maintain the decrease in condensing temperature. Fan energy increase typically represents about 10-30% of compressor energy savings. Approach temperature difference is measured relative to wet-bulb temperature for evaporative condensers, and relative to dry-bulb for air-cooled units. Wet-bulb temperature is less than dry-bulb due to evaporative cooling effects. Preparation Tools Required: Therometer Power Meter DMM Clamp-on Ammeter Refrigeration Data Sheets Data Required: Minimum condensing temperature (Tm) - (from condenser fan setpoints, pressure gauge or compressor display) Compressor power (CP) - (measure directly or volts and amps) Total fan power (FP) - (measure directly or volts and amps) Wet and dry bulb temperature Condensing approach temperature difference (minimum of approximately 10 degrees F) - (measure with all condenser fans on) Analysis Process 1) Choose Target Minimum Discharge Pressure Lower condensing pressure saves energy, by the minimum condensing pressure is limited by system requirements. Recommend that the equipment operator set an obtainable minimum condensing pressure in the one of two ways; either experiment by dropping pressure slowly and observe reaction , or consult manufacturer's specifications. Expansion valves require a minimum pressure difference to function properly. In adequate discharge pressure can limit refrigerant circulation through expansion valves, including the liquid injection expansion valve for compressor cooling the system won't function correctly, and the compressor won't be properly cooled if condensing pressure is too low. A minimum condensing temperature of 60 degrees is often achievable. Sometimes system modifications are required to lower condensing pressure. Following are some common problems and solutions: System pressure drop limits minimum condensing pressure. Problem: The expansion valve will not function properly unless the refrigerant passing through it is liquid. If excessive system pressure drop causes flash-gas after the condenser, the condensing pressure will rise until liquid is delivered to the valve. Solution: Use a centrifugal pump or suction gas to sub-cool liquid refrigerant after the condenser. Sub-cooling is achieved by increasing the liquid pressure. Open needle valves, replace orifices or valves to increase flow. These replacements generally cost must less than the compressor savings. Liquid-injection oil cooling limits minimum condensing pressure. Problem: Refrigeration injected into the compressor (for cooling) passes through an expansion valve. If the discharge pressure is not adequate, the expansion valve will not function properly and the compressor will not be adequately cooled. <|fim▁hole|> Oil Cooling. Another option is to install a centrifugal pump in the liquid injection line. This will not save as much energy as thermosyphon cooling, but will be better than a higher average condensing pressure. Undersized condensers limit condensing pressure Problem: Heat transfer form the condenser depends on the temperature difference, the physically determined coefficients, and the heat transfer surface area. A smaller area requires a larger temperature difference. Solution: Install more condensers to increase the condensing surface area and decrease the minimum approach temperature difference. In general, condensers cost less than compressor savings, and the system performs better on hot days. 2) Calculate Condenser Fan Use Factor Condenser fans will operate longer or at higher capacity when the minimum condensing pressure is reduced. This is referred to as increased fan use factor. Bin data is used to model the increase in fan use factor with a decrease in minimum pressure. Calculate use factors for the fan at both existing and proposed conditions with the equations from section 5, Power & Energy, Condenser Fan Use Factor. 3) Calculate Condenser Fan Energy Use Calculate fan energy for existing and proposed conditions. Refer to the proper calculation box, depending on the strategy, in section 5, Power & Energy, Condenser Fan Use Factor, Condenser Fan Energy Use. 4) Calculate Fan Energy Increase A decrease in discharge pressure increases fan operating time. A larger overall heat transfer coefficient is required due to the decrease in average approach temperature difference (temperature difference between cooling medium and lower condensing temperature). Total Fan increase is calculated below: Fan Energy Increase = proposed fan energy - existing fan energy FEI = FEproposed - FEexisting 5) Calculate Compressor Energy Savings Conservatively estimate 1% drop in compressor power for each degree condensing temperature is reduced. You can also calculate compressor power decrease with condensing temperature from compressor manufacturer's specifications. We do not calculate demand savings because peak demand will not change on hot days. Calculations shown are for a simple cycle. Calculate the existing and proposed condensing temperatures for each bin temperature. Remember that the condensing temperature at the maximum refrigeration load can never be closer to ambient temperature than the minimum approach temperature difference (MATD). Condensing temperature (CT) will floar at MATD above ambient temperature until the minimum condensing temperature (Tm) is reached. Condensing Temperature = bin temperature + approach temperature difference Calculate compressor energy savings for each bin temperature. Estimate 1% power (range 0.5%-1.5%) savings for each degree condensing temperature (Tm) is reached. Energy Savings % = (condensing temp change) x 1% x bin hrs x operating hrs / total bin hrs Calculate total compressor energy savings (CES) from the sum of bin energy savings time existing compressor energy use (CE). Compressor energy savings = compressor energy x sum of (energy savings percentages) 6) Calculate Cost Savings Calculate cost savings using the energy cost from the utility bills and energy savings. Total Savings are compressor energy savings minus fan energy increase. 7) Estimate Implementation Cost There is essentially no implementation cost to change the pressure settings at the condenser. If system modifications are require, consider the cost of purchase and installation. Modifications may include adding more condensing capacity to decrease the minimum approach temperature difference, new pumps, or thermosyphon oil cooling. 8) Simple payback period is implementation cost divided by annual cost savings. We neglect effects of interest, escalation, and discount rates over the period because we only estimate savings. These effects are small with short payback periods. <|fim▁end|> | Solution: Refer to Recommmendation #3, Thermosyphon |
<|fim▁begin|> Contents 1 Two-State Dynamic Causal Modelling 1.1 The Two-State model 1.2 Interpreting the results 1.2.1 A-matrix between-region connections 1.2.2 A-matrix self connections 1.2.3 Modulatory (task) effects on the self-connections 1.2.4 Modulatory (task) effects on the between-region connections 1.3 Difference between the paper and SPM12 1.4 References Two-State Dynamic Causal Modelling Two-state DCM [1] is an extension to the standard neuronal model in DCM for fMRI. Whereas the standard neuronal model in DCM represents the activity in each region as a single quantity, two-state DCM has an inhibitory and excitatory population of neurons in each region. This gives an explicit model of intrinsic connectivity within each region, and was adopted to be more plausible and less constrained than the original model. Two-state DCM imposes positivity constraints - all connections between regions are excitatory, which conforms to the organisation of real cortical hierarchies, where long-range connections are glutamatergic. With these richer dynamics, two-state DCM may provide a better fit to fMRI data. Furthermore, the inhibitory and excitatory populations add stability to the model, allowing the priors on the connections to be relaxed, which also may improve the model's ability to explain the data. The Two-State model The model (see figure) involves recurrent connections between the excitatory (E) and inhibitory (I) populations in each region. There is an excitatory connection from E to I, denoted EI, and an inhibitory connection from I to E, denoted IE. There are inhibitory self-connections on E and I, which are referred to as SE and SI respectively. The connections between regions (EE) link the excitatory populations in each. In its current implementation in SPM12, the values assigned to these connections are either estimated when fitting the model to the data (EE and IE), or have fixed values (EI, SI, SE; see table below). The EE extrinsic connections are based on the off-diagonal of the A-matrix (plus modulatory input B if available), whereas the IE self-inhibitory connections take their value from the diagonal of the A-matrix (plus modulatory input B if available). Illustration of the two-state neuronal model implemented in Dynamic Causal Model (DCM). Neuronal populations E and I are excitatory and inhibitory respectively. SE=self-excitation, SI=self-inhibition, EE=excitatory to excitatory, EI=excitatory to inhibitory, IE=inhibitory to excitatory. Connection Description Value IE intrinsic inhibitory to excitatory Estimated EE extrinsic excitatory to excitatory Estimated EI intrinsic excitatory to inhibitory 1 SI intrinsic self-inhibition (inhibitory) 1 SE intrinsic self-inhibition (excitatory) 0.5 Interpreting the results To enable certain connections to always have a positive effect and others to always have a negative effect, the parameters of the connections (A-matrix) and modulatory inputs (B) are log scaling parameters that increase or decrease the prior values. The between-regions EE (excitatory to excitatory) connection strength is computed as follows: E E i j = 1 / 8 ∗ e x p ( J i j ( t ) ) {\displaystyle EE_{ij}=1/8*exp(J_{ij}(t))} Where J i j ( t ) {\displaystyle J_{ij}(t)} is the connection strength (summed across A and B matrices) between a pair of regions i and j at time t: J i j ( t ) = A i j + B i j ∗ u ( t ) {\displaystyle J_{ij}(t)=A_{ij}+B_{ij}*u(t)} The inhibitory self connections IE <|fim▁hole|> same way, but they are always negative, to ensure stability: I E i j = − 1 / 8 ∗ e x p ( J i j ( t ) ) {\displaystyle IE_{ij}=-1/8*exp(J_{ij}(t))} The values in the A- and B-matrices therefore scale the prior connection strength, 1/8Hz. A value of 0 in the A-matrix and 0 in the B-matrix for a between-regions connection would equate to a connection strength of 1/8 * exp(0 + 0) = 1/8Hz. Values of 0 for a self-connection would give -1/8 * exp(0+0) = -1/8Hz. All this means that in order to inspect the results of model estimation, one should first take the exponential of the A- and B-matrices, i.e. exp(DCM.Ep.A) or exp(DCM.Ep.B). (This is done automatically if using the Review tool in the GUI.) The number which results is a scaling factor, which scales the prior. A value of 1 means no effect, values larger than 1 mean a larger amplitude effect than the prior, and values smaller than 1 mean a smaller amplitude effect than the prior. The values in the C-matrix remain in units of Hz. Here are some more examples of how to interpret the parameters. A-matrix between-region connections A between-region connection exp(DCM.Ep.A(i,j)) larger than 1 would mean the excitatory influence of region j on region i is larger than the prior (1/8Hz). A value smaller than 1 would mean the excitatory influence is smaller than the prior. A-matrix self connections A self-connection exp(DCM.Ep.A(i,i)) larger than 1 would mean stronger (more negative) self-inhibition in region i than the prior (-1/8Hz). A self-connection smaller than 1 would mean weaker (less negative) self-inhibition in region i than the prior. Modulatory (task) effects on the self-connections An estimated parameter exp(DCM.Ep.B(i,i)) larger than 1 would mean an increase in self-inhibition in region i caused by the task. Whereas, a value smaller than 1 on this connection would mean a decrease in self-inhibition caused by the task. Modulatory (task) effects on the between-region connections An estimated parameter exp(DCM.Ep.B(i,j)) larger than 1 on a between-regions connection would mean an increase in the connection strength from region j to region i caused by the task. A value smaller than 1 would mean a decrease in this connection due to the task. Difference between the paper and SPM12 The implementation of the model in SPM12, which is described here, has certain differences from its description in the original scientific paper by Marreiros and colleagues [1]. In the paper, all possible intrinsic connections between the excitatory and inhibitory states are modulated and estimated explicitly. Therefore the matrices A and B have size [2xm,2xn] as opposed to [m,n]. This implementation wasn't adopted in SPM, in order to allow a more straightforward model comparison (BMS) with the other single-state and non-linear DCM options. As described above, the software uses a simplified scheme where an estimated parameter larger than 1 on a self-connection on the B-matrix contributes to the IE intrinsic inhibitory to excitatory connection, and therefore an increase in self-inhibition in that region caused by the task. References ↑ a b Marreiros, A.C.; Kiebel, S.J.; Friston, K.J. (2008). "Dynamic causal modelling for fMRI: A two-state model". NeuroImage 39 (1): 269–278. doi:10.1016/j.neuroimage.2007.08.019. ISSN 10538119. <|fim▁end|> | are transformed in the |
<|fim▁begin|> Configuration Remove search paths and search.pro from pro/engineer configuration files (both local and global config files) Remove PRO_FORMAT_DIR from the config.pro. Check out formats from commonspace. File Manipulation Never try to manipulate files at the operating system level. Only use Pro/engineer linked to Intralink to open and modify Intralink controlled files. Clean temporary files from start up directory Check In and Check Out Check in the latest version of an object when someone else needs it. Check files in regularly. This will store a design history and the file will be backed up. Administrators should set access to the root directory as read only to force users to set a destination directory. Only check in the files you intended to change - review the checkin form and remove any that should not have been modified. Family Tables Check out the generic and all instances before the modification of family table driven parts. Verify family tables before checking in <|fim▁hole|> a new workspace for each new task. When finished delete the workspace. This will reduce disk usage and minimise 'check in' conflicts. Check the status of an object before working on it. This will avoid check in conflicts and having to use Integrate. Frames Turn on frames. This will enable you to undo mistakes easily. Pro/Engineer Use Intralink to rename objects it is safer than Pro/Engineer as Pro/Engineer will only update objects that are in session. Intralink will update all objects it knows about. Viewing Objects Without Opening Pro/Engineer Highlight the object (drawing, part or assembly) click Object, Information a preview of the object is shown in a small window. Click the upward arrow to show the image full size. 3D objects in the small image and large window can be rotated by holding down the middle mouse button and moving the mouse. Holding down the ctrl + MMB zooms the object and shift + MMB pans the object. <|fim▁end|> | to Intralink. Workspace Create |
<|fim▁begin|> עברית ישראלית Hebrew Language Course Verbs/Index Verb Template > Next Contents {{hebrew_title| |Hebrew| |Verbs/Index|Contents}} ==Verb Overview== '''Definition:''' English <p><br> Contents 1 Verb Overview 2 Conjugations 2.1 Present 2.2 Past 2.3 Future 2.4 Imperative 2.5 Compilation 3 Illustrations 4 See Also 4.1 Verbs 4.2 Nouns 4.3 Adjectives 4.4 Special Expressions Verb Overview Definition: VerbEnglish · Header English Group Building Infinitive Root English ד ג ב א {{Hebrew/Verb1|English|Header | English | ד | ג | ב | א }} VerbEnglish · Hebrew English Pres. Part. Verbal Noun Group Building Infinitive Root English ו ה ד ג ב א {{Hebrew/Verb|English|Hebrew | English | ו | ה | ד | ג | ב | א }} VerbEnglish · Hebrew English Jussive Act. Part. Verbal Noun Inf. + Pron. Group Building Infinitive Root English ח ז ו ה ד ג ב א {{Hebrew/Verb2|English|Hebrew | English | ח | ז | ו | ה | ד | ג | ב | א }} VerbEnglish · Hebrew English Other Pass. Part. Act. Part. Verbal Noun Inf. + Pron. Group Building Infinitive Root English ט ח ז ו ה ד ג ב א {{Hebrew/Verb3|English|Hebrew | English | ט | ח | ז | ו | ה | ד | ג | ב | א }} Conjugations Present Present TenseHebrew · English English Hebrew Pronoun I am English א אני You are English אתה He is English הוא I am English ב אני You are English את She is English היא We are English ג אנחנו You all are English אתם They are English הם We are English ד אנחנו You all are English אתן They are English הן {{Hebrew/Present|Hebrew|English | א | ב | ג | ד }} Past Past TenseHebrew · <|fim▁hole|> English א אני You English ב אתה You English ג את He English ד הוא She English ה היא We English ו אנחנו You English ז אתם You English ח אתן They English ט הם They English ט הן {{Hebrew/Past|Hebrew|English | א | ב | ג | ד | ה | ו | ז | ח | ט }} Future Future TenseHebrew · English English Hebrew Pronoun I will English א אני You will English ב אתה You will English ג את He will English ד הוא She will English ה היא We will English ו אנחנו You will English ז אתם You will English ז אתן They will English ח הם They will English ח הן {{Hebrew/Future|Hebrew|English | א | ב | ג | ד | ה | ו | ז | ח }} Imperative Imperative TenseHebrew · English English Hebrew Pronoun You will English א אתה You will English ב את You will English ג אתם/ן {{Hebrew/Imperative|Hebrew|English | א | ב | ג }} Compilation ==Conjugations== ===Present=== <p><br> {{Hebrew/Present|Hebrew|English | א | ב | ג | ד }} <p><br> ===Past=== <p><br> {{Hebrew/Past|Hebrew|English | א | ב | ג | ד | ה | ו | ז | ח | ט }} <p><br> ===Future=== <p><br> {{Hebrew/Future|Hebrew|English | א | ב | ג | ד | ה | ו | ז | ח }} <p><br> ===Imperative=== <p><br> {{Hebrew/Imperative|Hebrew|English | א | ב | ג }} Illustrations See Also Verbs English English English Nouns English English English Adjectives English English English Special Expressions ==Illustrations== ==See Also== ===Verbs=== *[[Hebrew/Verbs/|English]] {{Hebrew|}} *[[Hebrew/Verbs/|English]] {{Hebrew|}} *[[Hebrew/Verbs/|English]] {{Hebrew|}} ===Nouns=== *[[Wiktionary:|English]] {{Hebrew|}} *[[Wiktionary:|English]] {{Hebrew|}} *[[Wiktionary:|English]] {{Hebrew|}} ===Adjectives=== *[[Wiktionary:|English]] {{Hebrew|}} *[[Wiktionary:|English]] {{Hebrew|}} *[[Wiktionary:|English]] {{Hebrew|}} ===Special Expressions=== * {{Hebrew|}} * {{Hebrew|}} * {{Hebrew|}} <|fim▁end|> | English English Hebrew Pronoun I |
<|fim▁begin|> an interactive version of this book is available here back to Table of Contents - The Zebrafish in Toxicology Reproduction - Ovary Normal Histology ovary location, general structure The ovary [O] is a paired organ, located bilaterally between the abdominal wall and the swim bladder [SB]. At the level of this section, the ovary is further bounded by the liver [L] and intestines [I]. Part of the pancreas [P] is located in the anterior peritoneal cavity, between gut, liver and swim bladder. (Note that this is a juvenile specimen with a previtellogenic ovary.) Coronal section of a juvenile female zebrafish, 14 mm (6 weeks); H&E staining Two specimen of normal adult zebrafish ovaries, in different stages of the spawning <|fim▁hole|> a high ratio of previtellogenic oocytes [P], suggestive for an early postspawning stage, whereas the lower specimen contains predominantly vitellogenic oocytes [V], indicating an intermediate stage. The postspawning condition of the upper specimen is further indicated by the high ratio of postovulatory follicles [pof]. Note, that the upper image shows a lobulated structure, with interlobular spaces [I] that communicate with the lateral oviduct [L]. Thus, the interlobular spaces give way to ovulated oocytes. Adult female zebrafish ovary; H&E staining In a further (prespawning) stage shown here, mature oocytes have ovulated and are collected in the caudal oviduct [C enclosed by dotted line]. This image is suggestive of a prespawning stage. Adult female zebrafish ovary, prespawning stage; H&E staining <|fim▁end|> | cycle. The upper specimen shows |
<|fim▁begin|> Project Based Learning Definitions The Buck Institute for Education (BIE)[1] defines Project based learning (PBL) as "a systematic teaching method that engages students in learning knowledge and skills through an extended inquiry process structured around complex, authentic questions and carefully designed products and tasks."[2] PBL is not a new idea. It has roots that go back to the late 60's and 70's with open classroom theory and industrial education. In this day and age where teachers need to teach multiple things at various levels, a project based approach makes sense for a majority of teachers. PBL promotes ways to introduce a wider range of learning activities into a normal classroom setting. If done correctly, learners will take on the responsibility of the learning and discover connections to other leaning opportunities around them. PBL also takes into account the learners own background and uses their prior experiences to make the learning more concrete. PBL Benefits to Students When PBL is used in the classroom it makes students switch from their usual mindset. The students are presented with a real life problem to work through to solution. Many times they are required to come up with a few plausible fixes for a problem and told to justify which one they find to be the best. Students that go through this process come away with a more developed knowledge of subject matter, higher levels of confidence and greater technical and collaborative skills. Studies have shown that students who complete a course enriched by using PBL are more likely to develop higher levels of critical thinking and problem solving skills than their traditional classroom setting counterparts. Leadership and collaborative skills also seem to be higher when PBL lessons are used. [3] According to the Northwest Regional Educational Laboratory benefits of project-based instruction include: Preparing learners for the workplace by exposing them to competencies such as collaboration, project planning, decision making, and time management Teachers often see increased motivation through higher levels of attendance, participation, and homework Learners have greater collaborative opportunities to construct knowledge Increases in social and communication skills Learners are able to see connections between disciplines Increased problem-solving skills Increased learner self-esteem Learners use individual learning strengths and diverse approaches to learning Provides real-world experiences to learn and use technology[4] Criteria For PBL Programs BIE published a list of distinguishing criteria of PBL. It appears to be a pretty good list and points out what PBL should encompass. Here is what BIE's list looks like: Put the students at the center of the learning process by recognizing their inherent “drive to learn.” The project work is central rather than peripheral Stress issues that lead students to in-depth exploration of topics Require the use of essential tools and skills, including technology, for learning, self management, and project management Specify products that solve problems, explain dilemmas, or present information generated through investigation and research. Include multiple products that permit feedback Use performance-based assessments that communicate high expectations, various skills, and rigorous challenges Encourage collaboration through large or small group student-led presentations and class project result evaluations A definite beginning, middle and end Real world problems [5] A typical PBL project for high school students might be to design a future school. In doing this, students would be introduced to various advanced math and engineering concepts. An elementary project might consist of building and racing electric cars to learn lessons about energy and efficiency. All projects should give students hands-on, serious, <|fim▁hole|> in Project Based Learning John Dewey theorized that learning should not only prepare one for life, but should also be an integral part of life itself. Simulating real problems and real problem-solving is one function of project-based learning. Students help choose their own projects and create learning opportunities based upon their individual interests and strengths. Projects assist students in succeeding within the classroom and beyond, because they allow learners to apply multiple intelligences [6] in completing a project they can be proud of. Our society values individuals who can solve problems creatively, using multiple strengths, so why shouldn't we encourage students to do the same? However, traditional teaching strategies tend to focus on verbal/linguistic and mathematical/logical intelligences alone. This can create frustration for people who are comfortable with less traditional learning modalities, such as kinesthetic, visual, interpersonal, intrapersonal, musical, or naturalist. Project-based learning allows the teacher to incorporate numerous teaching and learning strategies into project planning and implementation. Assisting learners in developing all of their intelligences will make learning a part of living, not just a preparation for it. The Role of Technology Without computers PBL would be very different and much more difficult. Learners use word processors and databases to help them categorize, analyze and keep track of data. They use the internet, email and online forums for research, communication and collaboration with the outside world. The collaboration element has probably the biggest benefit to any learner. It allows them to talk to numerous experts about a variety of subjects. If used correctly, then learners share information with each other and in doing this, further their own learning. Without these technological advancements the learners working knowledge base would not be as plentiful. [7] Added, technology PBL can enhance the relevance of classroom projects, and foster multidisciplinary exploration, where various activities and subjects are explored and integrated in the project. For example, concepts from Maths, Fine Arts, and Physics can be applied to projects in architecture and design. The collaborative approach to designing PBL instruction can enhance motivation and achievement, as well as promote active learning and effective communication. PBL Research Regie Stites of SRI, International, wrote that researchers have investigated the impact of project-based learning (PBL) in a wide variety of educational contexts ranging from early childhood education to medical and legal education. [8] Stites mentions that the points below "should be kept in mind when considering the findings of research that compare the relative impacts of PBL and more traditional learning activities on student achievement": Project-based learning is typically implemented in the context of comprehensive educational reforms and therefore it is difficult to isolate the effects of PBL on student learning. Project-based learning and closely related instructional strategies (such as problem-based learning and the project approach) are implemented differently in different contexts and therefore it is difficult to compare results across cases. Project-based learning is linked to a theory of learning (constructivism) that entails a shift in learning objectives (stressing higher order thinking skills and performance-based, authentic assessments) and therefore standardized achievement tests may not be the best measures of PBL's impact. The online magazine Edutopia [9] published an article in 2001 listing several of the studies that has been completed in the area of project-based learning. The studies in the article shows that PBL can improve students’ skills in the areas of communication, teamwork and problem solving and improve in core academic areas. [10] Return to Instructional Technology. Return to Learning Management Systems. <|fim▁end|> | authentic experiences. Using Multiple Intelligences |
<|fim▁begin|> Wikipedia has related information at Fresnel lantern 1: Cross section of a Fresnel lens 2: Cross section of a conventional lens of equivalent power A Fresnel lantern is a light which makes use of the Fresnel Lens, named after Augustin-Jean Fresnel. The lens has a stepped appearance, instead of a round, smooth one. This allows the lens to have a much greater curvature than would otherwise be practical. Theatrical Fresnels are typically made in 8, 6 or 3 inch varieties, referring to the diameter of the lens, with lamps ranging in wattage from 150 W (typically with a 3-inch fresnel) to 2000W (with an 8-inch fresnel). Fresnel lenses can operate close to <|fim▁hole|> very cheap to produce, so the lanterns tend to be small and cheap. Unfortunately, Fresnels are not very efficient. The reflector cannot be larger than the lens aperture, and thus all the radiated light that is neither redirected forward by the spherical reflector behind the bulb or emitted directly through the lens is absorbed by the casing as waste heat. Uses The stepped lens gives the beam a very even spread of light, compared to an ERS, and this makes them useful for color washes or back- or top- lighting. They are best used at a medium throw. The lack of beam control can be combated by the use of barn doors. <|fim▁end|> | the light source and are |
<|fim▁begin|> Q3Map2 has now been integrated with the GtkRadiant Project. Windows, Mac and Linux binaries for both 32-bit and 64-bit systems can be download from the project page. The Q3Map2 source code is now available through the GtkRadiant GitHub Repository. Official Support Forum @Splashdamage Current stable version is 2.5.17 Q3Map2 is a BSP compiler for games based on the id Tech 3 engine. It compiles .map files, which are editable with an editor, into .bsp files, which are binary files for the game and are not editable. It currently supports the following platforms: Nexuiz Open Arena Quake 3 Arena/Team Arena Quake Live Return to Castle Wolfenstien Soldier of Fortune II Star Trek Elite Force Star Wars Jedi Knight: Jedi Academy Star Wars Jedi Knight II: Jedi Outcast Tenebrae (Quake1 Engine Modification Project) Tremulous Urban Terror War§ow Wolfenstein: Enemy Territory World of Padman Xonotic Q3Map2 was designed to replace the Q3Map.exe that comes with QERadiant, GtkRadiant and GMAX Tempest. However, there are significant enhancements that require a little twiddling to use, such as faster lighting and enhanced surface production. Fun Facts: Q3Map2 started out as a bugfix for Q3Map, the original Quake 3 map compiler. The bicycle-riding, AIDS LifeCycle participant, wonder-coding superhero, ydnar is the man behind Q3Map2. Contents 1 Usage 2 Switches 2.1 General options 2.2 Major switches 2.3 Minor switches 2.3.1 BSP phase minor switches 2.3.2 VIS phase minor switches 2.3.3 Light phase minor switches 3 Q3Map2-specific entities 3.1 _decal 3.2 _skybox 4 Q3Map2-specific entity keys 5 Specialized tutorials 5.1 A Good "Final" Compile 5.2 Creating an .ase model out of brushwork 5.3 _skybox tutorial 5.4 Decompiling into a .map Usage Q3Map2 is a command-line utility. In general, users make use of Q3Map2 in one of three ways: Using the bsp menu from within GtkRadiant (Wikibook) Writing their own batch file (or comparable shell script if on Linux) Downloading a Q3Map2 front end, such as Q3Map2Build, Q3Map2Toolz or Q3map2GUI It should be noted that the default command lines given in the GtkRadiant bsp menu are by no means a complete showcase of the available Q3Map2 options and switches. You may edit the bsp menu command lines from the GtkRadiant preferences, but for total control of your Q3Map2 compile writing a batch file or using one of the front ends is probably a better idea. Q3Map2 command lines generally follow the format: "C:\path\to\Q3Map2.exe" [<general option>] [<major switch> [<minor switch> <minor switch>...]] "C:\path\to\maps\mapname.map" Switches General options -connect <hostname/ip address> Enables output of Q3Map2 logging to a remote host. This switch allows all other (non-solitary) switches. -info Analyzes a compiled bsp and outputs information to the screen or log. This switch is solitary, and allows for only the path to a compiled bsp (not .map, it should be noted) afterward. -game <quake3|wolf|et|etut|ef|jk2|ja|sof2|tenebrae|qfusion> Enables support for games other than Quake III: Arena. This switch allows all other (non-solitary) switches. -fs_game <mod name> Enables support for game mods other than the basic game defined in your -game switch. This switch allows all other (non-solitary) switches. -fs_basepath <"C:\path\to\game\directory"> Required in order for Q3Map2 to read assets directories of games other than Quake III: Arena. This switch allows all other (non-solitary) switches. -convert [-format <ase|map|quake3|wolf|et|etut|ef|jk2|ja|sof2|tenebrae|qfusion>] Converts a compiled .bsp to another format. This switch is solitary, and allows for only the path to a compiled bsp (not .map, it should be noted) afterward. With no -format sub-switch, -convert converts a compiled .bsp to an .ase model. Q3Map2 -convert outputs mapname.ase to the "maps" directory. Other formats are available via the -format sub-switch: map "decompiles" a .bsp back to a .map (most entities are lost, as is texture alignment information). Q3Map2 -convert -format map outputs mapname_c.map in the "maps" directory. quake3 "cross-compiles" a .bsp from some other game's .bsp format (this "other" game is specified in the -game switch) to Quake III: Arena. For example, to cross-compile from Wolfenstein: Enemy Territory to Quake III: Arena, "-game et -convert -format quake3" would be used. This feature is still a work in progress, and should be treated as experimental for the time being; differences in surfaceparm bitflags can cause weirdness in cross-compiled .bsps. Q3Map2 -convert -format quake3 outputs mapname_c.bsp in the "maps" directory. the other game shortnames work similarly to quake3, but for their respective games instead. -scale <N.N> Scales a compiled .bsp by the prescribed factor. For example, Q3Map2 -scale 0.25 will output a new .bsp that is 25% of the original .bsp's size, while Q3Map2 -scale 2.0 will output a new .bsp that is twice as large. Q3Map2 -scale outputs mapname_s.bsp in the "maps" directory. This switch is solitary, and allows for only the path to a compiled bsp (not .map, it should be noted) afterward. -export Exports internal lightmaps from a compiled .bsp to external .tga images. This switch is solitary, and allows for only the path to a compiled bsp (not .map, it should be noted) afterward. -import Imports external .tga lightmaps back into a compiled .bsp. Imported lightmaps will only work on the unmodified BSP they were exported from. This switch is solitary, and allows for only the path to a compiled bsp (not .map, it should be noted) afterward. -exportents Exports entities from an existing BSP to a .ent file. Example usage: q3map2 -game quakelive -exportents -v mymap.bsp -onlyents Only change the entities in a .bsp using a .ent file. For example: q3map2.exe -game quakelive -fs_basepath "D:\Program Files (x86)\Steam\steamapps\common\Quake Live" -onlyents "D:\ql stuff\pak00\maps\hellsgate.ent" . Will output hellsgate.bsp with updated entities (the original hellsgate.bsp should also be in the folder with your .ent file). -threads <number of threads Q3Map2 should use> Specifies a number of threads to use during compiling. On Windows, Q3Map2 automatically detects the number of CPUs present, and sets the threadcount accordingly. The -threads switch can be used to override this behavior. Linux users will need to manually set -threads in order to activate SMP support in Q3Map2. -v Enables verbose mode. This is generally a good idea. -rename Used to fix an issue with misc_model entities in SOF2. If your misc_models show up unlit and completely black, use the -rename switch. Major switches -bsp Compiles a .map file into a binary space partition (BSP) file for use with the Quake III: Arena engine. Also writes a .prt (portal information) file and a .srf (surface) file. It is not necessary to add -bsp to your command line; it is the default switch. -vis Creates visibility sets based on the portal file. -light Calculates lighting data. With no -light sub-switches enabled, less than desirable output will be achieved. Minor switches <|fim▁hole|> -vis, and -light) all have many options that can be accessed via their respective minor switches. There are quite a few minor switches, so in the interest of readability the lists of minor switches have been organized on separate pages of the Q3Map2 wiki. BSP phase minor switches Q3Map2 BSP phase minor switches have their own page at Q3Map2/BSP VIS phase minor switches Q3Map2 VIS phase minor switches have their own page at Q3Map2/VIS Light phase minor switches Q3Map2 Light phase minor switches have their own page at Q3Map2/Light Q3Map2-specific entities _decal Specifies a decal to be projected. Should contain one or more patch meshes and target an info_null entity. The targetting line drawn between the center of the _decal entity and the targetted info_null is the axis and distance of projection. It helps to think of the _decal mesh as if it were a light gel, the info_null were the target of a spotlight, and that you were "shining" this decal onto map geometry. _skybox The _skybox entity is a true miracle: It specifies the origin of a skybox (a wholly contained, separate area of the map), similar to some games' portal skies. When compiled with Q3Map2, the skybox surfaces will be visible from any place where sky is normally visible. It will cast shadows on the normal parts of the map, and can be used with cloud layers and other effects. Please see the _skybox tutorial for usage info. Q3Map2-specific entity keys Q3Map2-specific entity keys have their own page at Q3Map2/Entity keys. Specialized tutorials A Good "Final" Compile This command line is a good compile to start building off of when you want to produce a "final" compile of your map. It is by no means perfect for every map, but a good place to start tweaking based on your own maps particulars. "C:\path\to\q3map2.exe" -meta -v "C:\path\to\mapname.map" "C:\path\to\q3map2.exe" -vis -v "C:\path\to\mapname.map" "C:\path\to\q3map2.exe" -light -fast -patchshadows -samples 3 -bounce 8 -gamma 2 -compensate 4 -dirty -v "C:\path\to\mapname.map" Games with the r_overbrightbits value enabled by default (i.e. Quake III Arena) may want to use the -gamma and -compensate switches. Otherwise, remove from the compile settings above. Creating an .ase model out of brushwork First, create the geometry for your model. Save this file as model.map (or whatever). Compile model.map with -v -meta -patchmeta in the bsp phase (if your curves look too "low-fi" add "-subdivisions 0" to the compile line. if you want it even more complex, increment the '-subdivisions' value). There is no need to run -vis or -light. You should now have model.bsp in your "maps" directory. Compile model.bsp (not model.map, it should be noted) with -convert. You should now have model.ase in your "maps" directory. Create a new .map and place a misc_model entity. Give this misc_model entity the key/value pair "model"/"maps/model.ase" Here is an example of a batchfile that does both, bsp and convert compile: "C:\path\to\q3map2.exe" -bsp -meta -patchmeta -game [game abbreviation] "C:\path\to\model.map" "C:\path\to\q3map2.exe" -convert ase -game [game abbreviation] "C:\path\to\model.bsp" Et voila! You've now got a misc_model created out of brushwork. Play with the "modelscale" and "angles" entity keys, and see why Q3Map2 .ase conversion is completely and totally great. -subdivisions -subdivisions # Specifies the number of sub divisions to make in your geometry. Larger values increase triangulation and as such, can decrease performance. For extra moxie, import model.map as a prefab to your new map. Select the "model" brushwork, and texture it with clip. Rotate these new clip brushes into place over your misc_model; the brush vertexes of these clip brushes will get screwed up a bit, but since the player can't see clip, you really can't tell in-game. It's lovely, and doesn't have any of the ill effects of Q3Map2 autoclipping. _skybox tutorial The _skybox entity "grabs" all the map geometry it can "see" via the normal entity flooding algorithm and assimilates it into the portal sky heap. This is an important concept to understand; if there is any leak between your "main" map and the separate area designated for the _skybox, your compile will take forever, only to produce a very borked .bsp. With that out of the way... Construct your map as normal, texturing your sky brushes with whatever sky shader you fancy. Seal your map off from the void (of course). Create a small box of sky brushes somewhere slightly removed from your "main" map. You could probably get away with drawing a 128x128x128 cube of your sky shader, then using the CSG "hollow" button. Place more geometry within this tiny skybox, but take care not to make it too complicated. Also: unless you compile with -patchmeta, patch meshes shouldn't go inside the _skybox area... you'll end up with MAX_PATCH_PLANES every time. Place a _skybox entity somewhere inside your tiny sky box. The location of the _skybox entity relative to the rest of the sky box geometry determines where the origin of the portal sky will be relative to the rest of your map... a little experimentation will show you how this works. Compile, and that's that. You've got a portal sky in Quake III: Arena! Notes: The "_scale" key defines the _skybox scaling factor. Depending on what kind of portal sky you are going for, values between 64-256 seem to be pretty good. Picking a power of 2 to keep the _skybox geometry vertexes on the grid might be a good idea. The "angles" key can be used to put your _skybox geometry off-kilter and make players sea-sick. Deformvertexes shaders can be used on _skybox geometry, but the values you use must be scaled up by the same value you assigned to _scale, or else it won't look right. You must also scale down the texture coordinates on _skybox geometry, or else the textures you use will appear extremely stretched out. Authors: see page history Decompiling into a .map Q3Map2 can decompile a .bsp into a .map. This procedure is by no means perfect, and you should never take anything from others maps when license forbids it, but decompiling a map is good to "see how it's done". Put the .bsp that you want to decompile into the same directory as q3map2.exe Open the command prompt and browse to the folder which contains the .bsp and q3map2.exe Type q3map2 -game [game abbreviation] -convert -format map [name of the bsp file].bsp So if the .bsp is called testmap.bsp and you use Jedi Academy, you use this: q3map2 -game ja -convert -format map testmap.bsp You should then find a .map in the same folder as q3map2.exe and the .bsp. <|fim▁end|> | The three major switches (-bsp, |
<|fim▁begin|> Data types in Visual Basic can be divided into three groups: Native: Types that are understood directly by the Visual Basic compiler without assistance from the programmer User-defined: commonly referred to by the initials UDT, meaning User defined Type, these correspond to Pascal records or C structs Classes: the basis for object oriented programming in Visual Basic. Classes include forms, add-ins, and database designers. If you are using Excel VBA, remember that VBA is essentially VB6, and hence those rules apply. Contents 1 Built in Types 2 Byte, Integer & Long 3 Single & Double 4 String 5 Structure 6 Enumeration 7 Type Test Built in Types This section applies to version 7 and newer (i.e, VB.NET) of Visual Basic. The built in types are: Visual Basic type Common language runtime type structure Nominal storage allocation Value range Boolean Boolean Depends on implementing platform True or False Byte Byte 1 byte 0 through 254 (unsigned) Char(single character) Char 2 bytes 0 through 65535 (unsigned) Date DateTime 8 bytes 0:00:00 (midnight) on January 1, 0001 through 11:59:59 PM on December 31, 9999 Decimal Decimal 16 bytes 0 through +/-79,228,162,514,264,337,593,543,950,335 (+/-7.9...E+28) † with no decimal point; 0 through +/-7.9228162514264337593543950335 with 28 places to the right of the decimal; smallest nonzero number is +/-0.0000000000000000000000000001 (+/-1E-28) † Double(double-precision floating-point) Double 8 bytes -1.79769313486231570E+308 through -4.94065645841246544E-324 † for negative values; 4.94065645841246544E-324 through 1.79769313486231570E+308 † for positive values Integer Int32 4 bytes -2,147,483,648 through 2,147,483,647 (signed) Long(long integer) Int64 8 bytes -9,223,372,036,854,775,808 through 9,223,372,036,854,775,807 (9.2...E+18 †) (signed) Object Object(class) 4 bytes on 32-bit platform 8 bytes on 64-bit platform Any type can be stored in a variable of type Object SByte SByte 1 byte -128 through 127 (signed) Short(short integer) Int16 2 bytes -32,768 through 32,767 (signed) Single(single-precision floating-point) Single 4 bytes -3.4028235E+38 through -1.401298E-45 † for negative values; 1.401298E-45 through 3.4028235E+38 † for positive values String(variable-length) String(class) Depends on implementing platform 0 to approximately 2 billion Unicode characters UInteger UInt32 4 bytes 0 through 4,294,967,295 (unsigned) ULong UInt64 8 bytes 0 through 18,446,744,073,709,551,615 (1.8...E+19 †) (unsigned) User-Defined(structure) (inherits from ValueType) Depends on implementing platform Each member of the structure has a range determined by its data type and independent of the ranges of the other members UShort UInt16 2 bytes 0 through 65,535 (unsigned) Byte, Integer & Long This section applies to version 6 and older of Visual Basic, an older version. Example: Dim a as Byte Dim i as Integer Dim x,y as Long 'Define two variables. Note that only the last variable will be a long integer. Now those variables will only be capable of storing integer values (without decimal). Long integers can store a number with a bigger range of value than integers but they occupy a bigger space of RAM. Type Storage Range of Values Byte 1 byte 0 to 254 Integer 2 bytes -32,768 to 32,767 Long 4 bytes -2,147,483,648 to 2,147,483,647 Some functions you need to know: Int() Int() converts a decimal value into an integer value: Dim i as Integer i=Int(3.9) Print i 'Prints 3 Single & Double These data types can store decimal values. "Double" compared to "Single" is similar to the "Long" compared to "Integer": Type Storage Range of Values Single 4 bytes -3.402823E+38 to -1.401298E-45 for negative values 1.401298E-45 to 3.402823E+38 for positive values. Double 8 bytes -1.79769313486232E+308 to -4.94065645841247E-324 for negative values 4.94065645841247E-324 to 1.79769313486232E+308 for positive values. Some useful functions: Round() Round() rounds off a decimal to a certain number of decimal digits that the programmer wants. The first argument should be a decimal value which you want to round off. The second argument specifies the number of decimal digits you want, for example: Dim pi as Double pi=3.141592653589 pi=Round(pi,2) 'Rounds off 3.141592653589 to only two decimal digits Print pi 'Prints 3.14 String A string is an array of characters. As an example: Dim a As String a = "This is a string" Strings can be concatenated (connected together to form a new string) using the "&" operator. For example, dim b as String b = "Wiki" & "book" & "s" Print b 'Prints "Wikibooks" A normal string variable occupies 10 bytes of RAM, plus the string's size, <|fim▁hole|> 2 billion characters! Some frequently used built-in string constants: vbTab, vbCrLf vbTab contains a string that does the same thing as the Tab key on your keyboard, while vbCrLf creates a character return and a line feed(similar to the Enter key): Print "Jack:" & vbTab & "1 pie" & vbCrLf & "me:" & vbTab & "10 pies" Will print: Jack: 1 pie me: 10 pies To include special characters and quotation marks in the strings, the Chr() function may be used: Dim a As String Print "A quotation mark: [" & Chr(34) & "]" a = "Replace 'apostrophes' for quotation marks" Replace( a, "'", Chr(34) ) Print a Some string functions: Str(),Val(),inStr(),Mid(),Replace(),Trim() In fact there are tons of built-in string manipulation functions available. But right now, I'll just introduce two: Str() and Val(). Str() converts any numerical value into a string value while Val() converts a string value into a numerical value(only when it's convertible). Dim MyString As String Dim MyNumber As Single MyString=Str(300) 'converts a number into a string MyNumber=Val("300") 'converts a string into a number Even if you don't do the conversion, you will not end up getting Type Mismatch Errors. However, it is considered better to use explicit type conversions, because it is easier to debug. Even if you do be prepared for next to impossible to debug problems caused by VB refusing to convert something and refusing to tell you what the heck it is. VB is extremely touchy and raises an exception at the least expected times. Structure An example definition of a structured type: Type E2Point x As Double y As Double End Type Sub Test() Dim MyPoint As E2Point Dim MyPoint2 As E2Point MyPoint.x = 4 MyPoint.y = -5 MyPoint2 = MyPoint 'Make a copy MyPoint2.x = 3 MyPoint2.y = -6 Debug.Print MyPoint.x, MyPoint.y '4, -5: not overriden with 3 and -6 Debug.Print TypeOf MyPoint Is E2Point 'True Debug.Print TypeOf MyPoint Is Object 'False End Sub The type has to be defined outside of a procedure. A variable of a structure type is not an object. Links: Type Statement, Office 2013, msdn.microsoft.com Type Statement at Visual Basic for Applications Reference, msdn.microsoft.com Enumeration An example definition of an enumerated type: Enum Colors Red '=0 Green '=1 Blue '=2 End Enum Enum Colors2 Red2 = 1 Green2 '=2 Blue2 '=3 End Enum Sub Test() Debug.Print Red, Green, Blue Debug.Print Red2, Green2, Blue2 Dim MyVar As Colors 'Ends up being typed as Long MyVar = 8 'Does not lead to an error: no restriction on values End Sub Links: Enum Statement, Office 2013, msdn.microsoft.com Enum Statement at Visual Basic for Applications Reference, msdn.microsoft.com Type Test To find out about the type of a variable, you can use "TypeOf ... Is ..." test. The tested types can only be object types and structure types, but the test can be applied to any variable, whether typed as an integer, a string or an object. An example of TypeOf in Excel: Set MyVar = Selection Debug.Print "Selection is an object: " & TypeOf MyVar Is Object Debug.Print "Selection is a range: " & TypeOf MyVar Is Range Debug.Print "Sheets is of type Sheets: " & TypeOf Sheets Is Sheets MyStr = "Hello" Debug.Print "Text is an object: " & TypeOf MyStr Is Object If TypeOf MyVar Is Range Then Set MyCells = MyVar.Cells End If An example test with a "Select Case True": Set MyVar = new Collection Select Case True Case TypeOf MyVar is Range Debug.Print "Range" Case TypeOf MyVar is Collection Debug.Print "Collection" Case Else Debug.Print "Other cases" End Select You can further find out about a type using IsObject and TypeName functions: Debug.Print IsObject(Selection) 'True Debug.Print IsObject("Hello") 'False Debug.Print TypeName("Hello") 'String Debug.Print TypeName(4) 'Integer Debug.Print TypeName(3.5) 'Double Debug.Print TypeName(Selection) 'Range Links: If...Then...Else Statement at Visual Basic for Applications Reference, msdn.microsoft.com TypeName Function at Visual Basic for Applications Reference, msdn.microsoft.com IsObject Function at Visual Basic for Applications Reference, msdn.microsoft.com IsArray Function at Visual Basic for Applications Reference, msdn.microsoft.com IsDate Function at Visual Basic for Applications Reference, msdn.microsoft.com IsNumeric Function at Visual Basic for Applications Reference, msdn.microsoft.com IsNull Function at Visual Basic for Applications Reference, msdn.microsoft.com Previous: Files Contents Next: Procedures and Functions <|fim▁end|> | and can hold up to |
<|fim▁begin|> Final Fantasy VI -> Sidequests: Relm It is recommended that you do Shadow's sidequest before this one. If Shadow was on your airship at the End of the World, it won't be necessary, but if you just got on the airship as soon as you could and let Shadow die in the process, you will have to rescue Relm in a cave before doing this quest. Head to Jidoor. For reference, Jidoor is on the left middle continent, north of Maranda and south of Zozo. Head to Owzer's house in the back of town. Flip the light switch at the end of the room and read the diary. Talk to the portrait of Emperor Gestahl twice to get a clue about the phoenix cave and the emperor's treasure. Then talk to the portrait of the lovely lady in the bottom left corner. Go through the door, and when you see two doors pick the left one <|fim▁hole|> Go into the next room with the constantly changing doors and walk behind it for a relic ring, and go through the very left door when it opens. Continue until you reach the room with the floating chests. Stand underneath them to trigger a fight. Talk to the middle painting when you're done in that room for another fight, which creates a door. Head through the right door in the next room and you'll find yourself in a room with a painting with Owzer and Relm. You'll have to attack the painting itself which transitions between two forms (each with their own store of HP). They are both weak against Fire. When you defeat the Chardanook boss you'll win the Starlet esper and Relm will join your team. This page or section is an undeveloped draft or outline.You can help to develop the work, or you can ask for assistance in the project room. See sidequests list <|fim▁end|> | for a moogle suit. |
<|fim▁begin|> Object is the base class of all other classes created in Ruby. It provides the basic set of functions available to all classes, and each function can be explicitly overridden by the user. This class provides a number of useful methods for all of the classes in Ruby. Object inherits from BasicObject which allows creating alternate object hierarchies. Methods on object are available to all classes unless explicitly overridden. In Ruby, everything is an Object including classes and modules. Object and BasicObject are the most low-level class. Contents 1 Constants 1.1 ARGF 1.2 ARGV <|fim▁hole|> 1.5 STDERR 1.6 STDIN 1.7 STDOUT Constants ARGF ARGF is a stream designed for use in scripts that process files given as command-line arguments or passed in via STDIN. ARGV ARGV contains the command line arguments used to run ruby with the first value containing the name of the executable. DATA DATA is a File that contains the data section of the executed file. To create a data section use __END__: ENV ENV is a Hash-like accessor for environment variables. STDERR Holds the original stderr STDIN Holds the original stdin STDOUT Holds the original stdout <|fim▁end|> | 1.3 DATA 1.4 ENV |
<|fim▁begin|> This book is currently incomplete. This page was imported and needs to be de-wikified.Books should use wikilinks rather sparsely, and only to reference technical or esoteric terms that are critical to understanding the content. Most if not all wikilinks should simply be removed. Please remove {{dewikify}} after the page is dewikified. Contents 1 Regulatory chronology 1.1 1880s 1.2 1890s 1.2.1 Pre Federation 1.2.2 Earliest wireless experiments 1.2.2.1 New South Wales 1.2.2.2 South Australia and the Northern Territory 1.2.2.3 Victoria 1.2.2.4 Queensland 1.2.2.5 Tasmania 1.2.2.6 Western Australia 1.2.3 Marconi patents asserted 1.3 1900s 1.3.1 Federation 1.3.2 Post and Telegraph Act 1901 1.3.3 Continuing wireless experiments 1.3.3.1 New South Wales 1.3.3.2 Victoria 1.3.3.3 Queensland 1.3.3.4 South Australia 1.3.3.5 Western Australia 1.3.3.6 Tasmania 1.3.4 Merchant shipping 1.3.4.1 P & O Line 1.3.4.2 Orient Line 1.3.4.3 Union Line 1.3.4.4 NDL Line 1.3.5 Navy, coastal and ships 1.3.5.1 Australian fleet 1.3.5.2 Japanese fleet 1.3.5.3 USA fleet 1.3.6 Land military 1.3.7 Wireless Telegraphy Act 1905 1.3.8 Coastal network proposals 1.3.9 Intra-Imperial Wireless Conference 1.3.10 The Taylor phenomenon 1.4 1910s 1.4.1 WIA Established 1.4.2 Prominent experiment(er)s 1.4.3 Coastal network Tranche 0 1.4.3.1 Floating coastal stations 1.4.4 Coastal network Tranche 1 1.4.4.1 Hotel Australia 1.4.4.2 AAM Hotel Menzies 1.4.5 Coastal network Tranche 2 1.4.6 Experimental licensing (a trickle) 1.4.7 Experimental licensing (a stream) 1.4.8 Experimental licensing (a flood) 1.4.9 Coastal network Tranche 3 1.4.9.1 VIM Melbourne 1.4.9.2 VIH Hobart 1.4.9.3 VIB Brisbane 1.4.9.4 VIA Adelaide 1.4.10 International Radiotelegraph Convention 1912 1.4.11 Coastal network Tranche 4 1.4.11.1 VII Thursday Island, Qld. 1.4.11.1.1 T-1912 1.4.11.1.2 T-1926 1.4.11.1.3 T-1929 1.4.11.2 VIG Port Moresby, Papua 1.4.11.3 VIY Mt Gambier, S.A. 1.4.11.4 VIN Geraldton, W.A. 1.4.11.5 VIR Rockhampton, Qld. 1.4.11.6 VIC Cooktown, Qld. 1.4.11.7 VIE Esperance, W.A. 1.4.11.8 VIT Townsville, Qld. 1.4.11.9 VIO Broome, W.A. 1.4.11.10 VID Darwin, N.T. 1.4.11.11 VIL Flinders Island, Tas. 1.4.11.12 VIZ Roebourne, W.A. 1.4.11.13 VIW Wyndham, W.A. 1.4.11.14 King Island, Tas. 1.4.12 AWA established 1.4.13 World War 1 commences 1.4.14 War Precautions Act 1914 1.4.15 Amateur experiments cease 1.4.16 AWA enemy part ownership 1.4.17 Naval Wireless WW1 1.4.18 Military Wireless WW1 1.4.19 Wireless Telegraphy Act 1915 1.4.20 Wireless control to Navy 1.4.21 World War 1 concludes 1.4.22 Wireless Telegraphy Act 1919 1.4.23 First taste of wireless telephony 1.4.24 Initial demonstrations of broadcasting 1.4.25 Early concerts and amateur broadcasting 1.5 1920s 1.6 1930s 1.7 1940s 1.8 1950s 1.9 1960s 1.10 1970s 1.11 1980s 1.12 1990s 1.13 2000s 1.14 2010s 2 Topical 2.1 External territories 2.1.1 Australian Antarctic Territory 2.1.2 Christmas Island 2.1.3 Cocos (Keeling) Islands 2.1.4 Coral Islands 2.1.5 Macquarie Island 2.1.6 Nauru 2.1.6.1 N-1908 2.1.6.2 N-1909 2.1.6.3 N-1912 2.1.6.4 N-1913 2.1.6.5 N-1914 2.1.6.6 N-1915 2.1.6.7 N-1916 2.1.6.8 N-1921 2.1.6.9 N-1923 2.1.6.10 N-1925 2.1.6.11 N-1926 2.1.6.12 N-1935 2.1.6.13 N-1937 2.1.6.14 N-1938 2.1.6.15 N-1940 2.1.6.16 N-1941 2.1.6.17 N-1945 2.1.6.18 N-1946 2.1.6.19 N-2007 2.1.7 New Guinea 2.1.8 Norfolk Island 2.1.9 Papua 2.2 Biographies 2.2.1 John Graeme Balsillie 2.2.1.1 B-Biographical 2.2.1.2 B-1909 2.2.1.3 B-1911 3 In-line citations 4 Further reading 4.1 Books, theses & major articles 4.2 Periodicals 4.3 Annuals 4.4 Regulatory Introduction Regulatory Chronology 1880s 1890s 1900s 1910s 1920s 1930s 1940s 1950s 1960s 1970s 1980s 1990s 2000s 2010s Topical Biographies Clubs and Societies Categories Corporates Exhibitions External territories Lists Networks Publications Stations Editorial Guide Research Guide Regulatory chronology 1880s Placeholder 1890s Pre Federation Prior to Australian federation, the regulatory framework was vested in the individual colonies and the province of South Australia. Wireless was closely aligned with the important postal and telegraphy functions and each state had its own post and telegraph department, which were merged into the Postmaster-General's Department (PMG) upon federation. Schedule one of the Post and Telegraph Act 1901 lists numerous State acts which were superseded by the new act, the key being: New South Wales - "An Act to establish and regulate Electric Telegraphs." Victoria - "Post Office Act 1890."[1] Queensland - "The Post and Telegraph Act 1891." South Australia - "An Act to regulate the construction and management of Electric Telegraphs 1857." Western Australia - "The Post and Telegraph Act 1893." Tasmania - The Electric Telegraph Act 1857." Earliest wireless experiments The progressive developments in wireless theory and experimentation by Maxwell, Hertz, Marconi and others were not only described in the professional journals, but captured the public imagination to such an extent that each new success was widely reported in the worldwide press. Australia was no exception when it came to this public fascination. The equipment necessary to duplicate the smaller scale experiments was not difficult to manufacture and similar experiments were soon being undertaken in Australian laboratories and then public demonstrations in all Australian states. The experimenters can be categorised into PMG, Military, Academic and Private Experimenters. Post and Telegraph Departments In each Australian colony, the respective Post and Telegraph Departments were actively engaging in wireless telegraphy experiments. The driver was not purely scientific, submarine cables were an expensive technology (both capital and maintenance) to give effect to communication to near-coast islands and across the Bass Strait. Australia's vast open spaces had already proven expensive projects for deployments of telegraph lines. Wireless telegraphy offered the prospect of very substantial cost savings. Military Military applications for wireless technology were clear and present. Ships of war were isolated from communication upon departure from ports immediately visual contact was lost. A mobile army force could not rely upon existing land lines and considerable effort was required to temporarily deploy additional lines, which in any event were exposed to enemy attention. Academia Australia's leading academic institutions were all following the international developments and had the advantage of bringing together our leading theoreticians and leading technologists. Private experimenters Prior to Federation, it is not clear whether formal licensing of private experimenters was required by individual colonies, or if it was whether it was pursued. No individual licences have been reported, while experiments by the PMG and Military would be exempt from licensing, and those by academia usually in co-ordination with the PMG. As always Australian amateur experimenters followed close in their wake, often overlooking the formal need for licensing by the authorities. New South Wales Richard Threlfall The announcement by Hertz in 1888 of his successful experiments in the existence of free electromagnetic waves created a sensation throughout the scientific world. The Hertz' experiments were repeated in the Physics laboratory at the Sydney the same year. Philip Billingsley Walker On 10 August 1899, the Postmaster-General, one or two officers of the Department and representatives of the press, were invited to a demonstration of wireless under the supervision of P. B. Walker, Engineer-in-Chief of Telegraphs. The transmitting and receiving aerial wires were suspended on the corners of the roof of the Post Office building with the equipment itself in the laboratory below. The demonstration was entirely a success, though interference was present from adjacent tram lines. Walker stated that he felt there was presently limited commercial application, but nevertheless advised that further experiments would be conducted, with sea trials still to be decided upon.[2] The transmitting was undertaken by Walker and the receiving by Watkin Wynne. All the equipment was manufactured by staff of the Government electrician, principally Mr. Nelson. A 12-inch induction coil was used for transmission and a two-inch coherer for reception. An amount of 150 pounds was stated to have been reserved for purchase of equipment from the Marconi Telegraph Company, with further experiments to proceed upon receipt.[3] However Walker fell ill towards the end of 1899, passed August 1900 and with his passing wireless telegraphy seems to have fallen dormant for many years.[4] John Yeates Nelson 1900 F.H. Leverrier 1900 Joseph Patrick Slattery is reported from 1900 as experimenting in wireless telegraphy at St. Stanislaus' College, Bathurst with equipment made by himself, but the experiments were considerably extended from late 1903 when professional Marconi equipment arrived from London and were immediately deployed. South Australia and the Northern Territory William Henry Bragg was working on wireless telegraphy as early as 1895, though public lectures and demonstrations focussed on his X-ray research which would later lead to his Nobel Prize. In a hurried visit by Rutherford, he was reported as working on a Hertzian oscillator. There were many common practical threads to the two technologies and he was ably assisted in the laboratory by Arthur Lionel Rogers who manufactured much of the equipment. On 21 September 1897 Bragg gave the first recorded public demonstration of the working of wireless telegraphy in Australia during a lecture meeting at the University of Adelaide as part of the Public Teachers' Union conference.[5][6] Bragg departed Adelaide in December 1897,[7] and spent all of 1898 on a 12-month leave of absence, touring Great Britain and Europe and during this time visited Marconi and inspected his wireless facilities.[7][8] He returned to Adelaide in early March 1899,[9] and already by 13 May 1899 Bragg and his father-in-law Sir Charles Todd were conducting preliminary tests of wireless telegraphy with a transmitter at the Observatory and a receiver on the South Road (about 200 metres).[10] Experiments continued throughout the southern winter of 1899 and the range was progressively extended to Henley Beach. In September the work was extended to two way transmissions with the addition of a second induction coil loaned by James Oddie of Ballarat.[11] It was desired to extend the experiments across a sea path and Todd was interested in connecting Cape Spencer and Althorpe Island, but local costs were considered prohibitive while the charges for patented equipment from the Marconi Company were exorbitant. At the same time Bragg's interests were leaning towards X-rays and practical work in wireless in South Australia was largely dormant for the next decade. Victoria George William Selby took an interest in all aspects of the new science of electricity, both in practical experiments and public education. As early as 1878 he was demonstrating an induction coil (a key component of the future wireless telegraphy) and Geissler tube.[12] In July 1897, in response to reports of Marconi's success, he announced that, he had also been successful in his experiments which had commenced some three years earlier (i.e. 1894).[13] While, it does appear that no great distance was traversed, his experiments are amongst the earliest in Australia. At a time when public interest in wireless was extreme, Selby was balancing his time against his business interest in accountancy and progress with his experiments was slow. In June 1899, Selby approached the Victorian Defence Department for approval to conduct experiments between the coast and a warship. Approval was given and successful tests were achieved between HMVS Cerberus, which was moored in Hobsons Bay, and the naval depot, Williamstown. It is stated that the apparatus used was that made by Selby in 1897.[14] In February 1900, it was reported that Selby was now successfully communicating between Malvern and Brighton, a distance of 5 miles, but still well behind Jenvey.[15] In February 1901, he auctioned much of his equipment and thereafter there is little record of further experimenting.[16] However his public education activities and commentary continued, including presentation in December 1908 of a major paper on Wireless Telegraphy to the Victorian Institute of Engineers.[17] James Oddie acquired considerable wealth during the gold rush period in Ballarat, and used much of that wealth in philanthropic pursuits. He was closely involved in the Ballarat School of Mines and taught there for a period. In the late 1890s he was involved in wireless telegraphy experiments, but detailed records appear limited.[18] Famously, while visiting Bragg and Todd in Adelaide, he learned of their need for a second large induction coil and promptly arranged dispatch of his own unit which greatly assisted their more advanced experiments.[19] Frederick John Clendinnen was a well-known doctor of medicine practising in Melbourne. He was an early adopter of X-ray technology and in June 1896 published a wide variety of photographs displaying his art.[20] While continuing his work in X-rays, he was also an inventor in electrical fields. In September 1897, he applied for a patent for an improved coin-operated public telephone.[21] In September 1897, a lecture and demonstration by Clendinnen of X-rays included brief work on "Tesla's experiments" assumed to be wireless.[22] A similar lecture and demonstration was given at Kew in December 1897.[23] In February 1899, Clendinnen demonstrated his wireless telegraphy equipment to the Deputy Postmaster-General of Victoria and other officers.[18] His experiments diverged from the usual into remote detonation of fuses by wireless, as reported in December 1899.[24] The wireless detonation of fuses appears to have caught the public attention and this feature was again included in a lecture to the Bendigo School of Mines in August 1900 which principally addressed X-rays. It was noted in the lecture that the induction coil had been manufactured by Edward Hope Kirkby of Williamstown.[25] Thereafter, Clendinnen's professional work with the booming X-ray field became his passion. Sadly, like so many of the earliest workers in the field, the frequent exposure of X-rays on his own body took its toll. At age only 55 years, he passed in London in November 1913, while attending the World Medical Congress.[26] Henry Walter Jenvey, in late 1896, in explaining "Telegraphy without Wires" to the press, refers only to the leakage and inductive methods.[27] But soon afterwards, he himself was actively engaged in the electromagnetic method. In 1899 his lectures had been extended to include Marconi's system.[28] The successful experiments by Walker in Sydney in August 1899 prompted Jenvey to reveal that for some weeks he had been exchanging messages between the General Post Office and the Telephone exchange at Willis Street, a distance of a half mile. The first message to grace the airwaves of Melbourne was "Long reign Duffy" referring to the Postmaster-General for Victoria.[29] By 1900 he was reporting that an experimental network of wireless stations had been established at the Observatory, Wilson Hall at the University and the General Post Office.[30] As part of the Congress of the Association for the Advancement of Science, on 12 January 1900, Jenvey presented a lecture on the current state of wireless telegraphy in the world at the Wilson Hall of the University of Melbourne. At the conclusion of the lecture, he then sent a request from his station erected in the hall and received in return the word "Melbourne" from his station in the tower of the General Post Office.[31] Jenvey continued his experiments throughout 1900, with regular stations established at Heidelberg and Doncaster. From April 1901, efforts concentrated on Point Ormond, Port Phillip Bay and a station was established with a 155 ft. pole near the shoreline, to take advantage of the better propagation over salt water.[32] From Point Ormond, communication was soon established with Point Cook, a distance of 10 miles, by means of a kite-borne aerial at the latter location.[33] The timing of this extension of transmission distance for Jenvey's apparatus was sublime. The Duke and Duchess of Cornwall and York were to visit Australia to participate in the celebrations of Federation. Jenvey sought and obtained permission from Senator Drake, the Postmaster-General, to erect a facility at Queenscliff to send greetings to the royal party as they approached Port Phillip Bay.[34] In the first week of May, a large tent was erected on the recreation reserve near the fort and the equipment installed.[35] On Sunday evening 5 May 1901, news was received at Queenscliff that the R.M.S. Ophir was off Split Point and the message of greeting was sent.[36] No reply was received, but it was later confirmed that the message was received by the escorting ships, but the absence of a Naval code precluded a response.[37] While the convoy was in port, Jenvey established contact with Lieutenant Trousdale, R.N., of the warship Template:HMS and messages were then regularly exchanged with the Point Ormond station. When most of the convoy departed on 18 May, Jenvey exchanged messages with the St. George on the initial part of her journey. The last message received from the St. George was at a distance of 37 miles, a record for Australia which would stand for some years.[38] He continued his experiments throughout the 1900s, but prioritised the essential work of developing and integrating the telegraphic and telephonic networks of the fledgling Commonwealth.[39] Henry Lord 1899 Henry Lord, Electrician with the Post & Telegraph Department on 12 September 1899 gave a lecture and demonstration of wireless telegraphy at the Bruce Auction and Jumble Fair. It was reported as follows: "a lecture on Wireless Telegraphy was delivered by Mr Henry Lord, electrician of the Telephone branch, Melbourne. The hall was decorated for the occasion with bunting, and the attendance was very satisfactory. The Rev. Canon Watson presided. The programme was opened by a selection on the Gramaphone [sic], after which the lecturer commenced his discourse. He said wireless telegraphy was not the proper name to give the wonderful discovery of recent years, rather it should be called Hertzean [sic] wave telegraphy, or space telegraphy, because it was absolutely necessary that they should have wires to transmit and receive the messages .... The lecturer at this stage proceeded to give practical illustrations of the working of the discovery by means of instruments placed upon the platform. Sparks were transmitted from one instrument to another without any intervening wires, and a bell on one instrument was rung by the despatch of electrical waves from the other instrument, an exhibition that was received with loud applause. Gramophone selections, and a display of electric light in colored globes followed, after which the musical portion of the programme was proceeded with .... At the conclusion of the programme Mr H. E. Caldecott proposed a comprehensive vote of thanks to Mr Lord, to the performers, and to those who helped to make the Bruce Auction a success.[40] J. W. Wallace in 1899 was another Postal department figure with a practical interest in wireless telegraphy. The Argus reported on 1 May 1899: "An interesting lecture on the subject of wireless telegraphy was delivered at St. Patrick's College on Friday evening (28 April 1899) by Mr. J. W. Wallace of the Postal department. The lecturer traced the history of telegraphy from its earliest stages down to Marconi's latest triumph, and at the close of his remarks he explained, in response to inquiries, a number of minor features of interest. Mr. Wallace is at present engaged in conducting some private experiments in wireless telegraphy."[41] A very detailed report of the lecture in the Advocate of 6 May makes clear Wallace's deep knowledge of the subject.[42] Edward Hope Kirkby was a jeweler watchmaker in Williamstown who eventually became a manufacturing electrician making systems of fire protection, in 1908 he invented and patented the first automatic sprinkler alarm.[43] He is first recorded as experimenting with X-ray in September 1896 [44] He is reported as experimenting with the medical staff at Williamstown Hospital later that year</ref> Williamstown Chronicle 28th November 1896</ref> In 1900 Dr Clenndinnen was party to demonstrating X-ray at Bendigo School of mines using a Kirkby manufactured X-ray coil, said by him that it was an excellent one.[45] Kirkby eventually moved to Sydney in 1907 where he set up business manufacturing X-ray apparatus and consulting with the medical profession[46] He was first recorded practically demonstrating wireless telegraphy along with X-ray in 1899[47] He was demonstrating experiments in X-ray and wireless at the Federal Exhibition and Palace of Amusements in 1903 [48] In 1905 on the passing of the wireless telegraphy act he was being interviewed as an expert on the subject of wireless telegraphy as the paper didn't trust the PMG Department to adequately understand it's implications [49] Wormalds Bros manufacturers of fire protection equipment were getting rich at his expense and he dissolved his partnership with them. He was looking for a place to manufacture his apparatus. He was friends with a Catholic Priest Father Archibald Shaw MSC. He and his superior, Father Guis, built a factory for Kirkby on their land at the procure where Kirkby began manufacturing his fire systems of fire protection. The procure was always short of money and Shaw asked Kirkby to make wireless for him. He did and they became very successful forming a company the Maritime Wireless Company of Australasia. [50] Francis West Chambers was a professional colleague of Jenvey (government electrician, public works department) and conducted experiments in wireless telegraphy during 1900, both independently and in conjunction with him. At a meeting of the Australian Natives Association on 16 May 1901, he presented a lecture on wireless telegraphy wherein he announced that he had been experimenting in the science for some time. Further that he had been regularly successful in communicating between his residence Mount Eagle, Heidelberg and the Doncaster tower, a distance of 4.75 miles.[51] It was to Chambers that Jenvey telegraphed news of a major development in his experimenting on 17 November 1900 and remarkably that telegraph survived and endures. Museums Victoria Queensland In May 1898, a sole report states that Colonel Howel Gunter, commandant of the Queensland defence forces instructed the conduct of wireless telegraphy experiments at Lytton, to ascertain whether the technique could be utilised for signalling purposes at the forthcoming annual Easter camp. The experiments trialed both the conductive and Hertz wave methods and were reported successful in both instances, however the conductive method was considered more suitable for field use due to utilisation of less skilled men.[52] It does seem likely that immediate supervision of the experiments was with John Hesketh as he definitely supervised the Phonopore telegraphy experiments in June 1898, but this remains to be established.[53] John Hesketh 1898 Edward Gustavus Campbell Barton was prominent in Queensland in early electric lighting projects, including first electric lighting of the Queensland Assembly.[54] He was appointed as Queensland Government Electrical Engineer in 1886.[55] But by March 1888 he had left the public service and formed a partnership with Mr. C. F. White as Barton, White and Co.[56] Barton had a close association with the Technical College and in a private capacity ran courses with lectures which paralleled the rapid advances in all matters electrical at the time.[57] In July 1891 he gave a lecture at the School of Arts on the topic of induction coils, a key component of wireless and X-ray technology.[58] In April 1899 he gave a comprehensively reported lecture on Wireless Telegraphy at the Technical College and concluded with a demonstration of "Marconi apparatus" including both an induction coil and a Branly detector.[59] In mid-1901, Barton gave an entire series of lectures at the Technical College on the subject of Telegraphy and in May 1901 the lecture was devoted to wireless telegraphy, again concluding with a demonstration of his equipment. It was stated that the system had been imported and consisted of a Righi oscillator, induction coil and Branly coherer.[60] A further series of lectures was conducted in 1902, including one in March 1902 on the subject "Wireless Telegraphy and its Position in Regard to Submarine Cables". The descriptions of the demonstration tend to indicate that the wireless apparatus had not been further developed.[61] Indeed, though Barton's own career continue to ascend, there is little further reference to wireless activities. However, amongst his young students was John Graeme Balsillie who went on to become the inventor of the Balsillie system of wireless telegraphy which was used to deploy the majority of Australia's coastal radio network in the early 1910s. William Rooke Creswell 1901 Tasmania Thomas Edward Self 1898 At the monthly meeting of the Royal Society of Tasmania on the evening of 11 July 1898 in the Art Gallery, Argyle-street, Hobart, Thomas Edward Self read a paper on "Telegraphy without wires", and "made some interesting experiments in the presence of the audience. There were two transmitters, one before the lecturer and the other entirely outside the room. It was shown by the continual ringing of a bell in the apparatus in front of the lecturer that there was continual connection between the two, though the connection was invisible."[62] At a lecture at the Technical School on the evening of 8 August 1898, Thomas Self (instructor at the school) again presented his work on electricity and demonstrated the topic with particular reference to "telegraphy without wires."[63] Royal Visit Hobart 1901. William Philpot Hallam, Frederick William Medhurst and Frank Prosser Bowden all participated in a successful wireless telegraphy experiment to communicate with the ships of the Royal Party as they arrived at Hobart. None of the group had prior experience in wireless and it appears that Hallam, the leader, was drafted into the exercise.[64] In a newspaper report of 2 July 1901; "The first quickening throb of excitement over the Royal visit pulsated early on Tuesday morning, when a couple of guns, fired from the Queen's Battery, conveyed the lively information that the Ophir had been sighted at 7.30 a.m. in Storm Bay, attended by the St. George and the Juno. When the three vessels were coming up the river, a communication, by means of wireless telegraphy, was successfully achieved between One Tree Point and the St. George, just as the latter rounded a headland above Brown's River. A wireless telegraphy apparatus was fixed on an 80ft. pole near One Tree Point Lighthouse, and as the St. George steamed along about three miles off, Lieut. Trowsdale, from the ship, opened the conversation, with. "Good morning", and then followed this message to the St. George, telephoned to Mr. Hallam, the chief operator (who had prepared and affixed the apparatus), to forward: "Tasmania greets the Royal yacht Ophir and her consorts", which was at once acknowledged, and some other messages followed, whilst later in the day wireless communication was established between the St. George, lying in the harbour, and the Post Office, by means of an apparatus placed on a pole in the Post Office yard."[65] Western Australia George Phillip Stevens Western Australia, was slow to engage in wireless telegraphy experiments, but there was public outcry in response to a number of marine disasters on the Western Australian coast in 1898. A need for communication between the Rottnest Island lighthouse and Fremantle Port (16 miles) was identified. In January 1899, W. J. Hancock (Government electrician) suggested that wireless telegraphy could be employed for the task at much lower cost than submarine cable and noted that greater distances had already been achieved in England.[66] In May 1899, George Phillip Stevens (Manager and Electrician, General Post-office) announced that preliminary tests had just been completed in a workshop environment and provided a comprehensive description of the equipment which was described as simple.[67] Two further marine disasters of the W.A. coast in July 1899, forced the Government to act immediately and an order for submarine cables was placed.[68] Nevertheless, wireless experiments continued. Various difficulties were encountered in extending transmission distance, but in September 1899, Stevens announced that reliable transmissions were now being achieved across 5 rooms in the basement of the Telegraph Office. It was further announced that attempts would now be made between the General Post-office, Perth and the Windsor Hotel, South Perth (about 1 mile).[69] In October 1899, successful tests were conducted between the Perth Yacht Club and a police launch, out to a distance of 3/4 mile. Stevens was limited by local workshop facilities and his coherer was not able to be evacuated, resulting in loss of sensitivity. He recommended acquisition of Marconi apparatus, but this in turn led to excessive establishment costs and experiments ceased at this point.[70][71] The submarine cable between Rottnest Island and the mainland was officially opened in March 1900.[72] Stevens continued to promote wireless telegraphy through public education activities, including practical demonstrations.[73] As part of the Federal Government proposals in 1906, Stevens made enquiries of the Fremantle Harbour Trust as to their attitude to establishment of a station on Rottnest Island, which was supported.[74] F. McCormick There is a sole report of limited wireless telegraphy experiments at Coolgardie in June 1899. It is stated that the experiments had initially been confused by building wiring induction, but that had now been overcome and Hertzian waves were now being received at a distance of a few feet. McCormick was working with Messrs. Davey and Griffiths in his experiments.[75] Marconi patents asserted In the late 1890s the various patents held by Marconi and related companies in the United Kingdom and the Americas, were separately asserted in each of the Australian colonies. 1900s Federation On 1 January 1901, when the Australian colonies and the province of South Australia joined together to form a new nation, the Constitution of the Commonwealth of Australia gave federal governments power to make laws with respect to specifically defined areas (section 51). In particular, paragraph 51(v) explicitly identified "postal, telegraphic, telephonic, and other like services". While there was no stated specific power in respect of the press, it was considered that such power fell within the scope of paragraph 51(i) "trade and commerce with other countries and among the states", among others. Post and Telegraph Act 1901 The generic powers under section 51(v) were enunciated in detail in the Post and Telegraph Act 1901,[76] but the act only received royal assent 16 November 1901 and commenced 1 December 1901. The act delegated those powers to the newly established Postmaster-General's Department ("PMG"). This Act included two key definitions: (1) "Telegraphic" includes telephonic and (2) "Telegraph" or "telegraph line" means a wire or cable used for telegraphic or telephonic communication including any casing coating tube tunnel or pipe enclosing the same and any posts masts or piers supporting the same and any apparatus connected therewith or any apparatus for transmitting messages or other communications by means of electricity. The Act was silent in respect of the relatively new science of wireless telegraphy, which had not yet assumed commercial proportions but likely fell within the scope of "telegraphic".[77] As wireless telegraphy began to display not only commercial but also defence promise, any possible uncertainty of interpretation was removed by a specific act the Wireless Telegraph Act 1905, which placed these powers under PMG. The possible uncertainty had in no way limited the PMG's interest and participation in the new technology before 1905. Fessenden's tentative initial experiments with wireless telephony would only commence in the following year, but it too clearly fell within scope of the both the Post and Telegraph Act 1901 and the Wireless Telegraphy Act 1905. Nevertheless, once wireless telephony began to shine bright on the commercial and defence horizons, this technology too was deemed to warrant explicit provision and some 14 years later, the Wireless Telegraphy Act 1919 simply amended the definition of wireless telegraphy to include wireless telephony. Continuing wireless experiments Australian radio hams can be traced to the early 1900s. The 1905 Wireless Telegraphy Act[78] while acknowledging the existence of wireless telegraphy, brought all broadcasting matters in Australia under the control of the Federal Government. In 1906, the first official Morse code transmission in Australia was conducted by the Marconi Company between Queenscliff, Victoria and Devonport, Tasmania.[79] However, it must be noted that some sources claim that there were transmissions in Australia as early as 1897 – these were either conducted solely by Professor William Henry Bragg of Adelaide University[80][81] or by Prof. Bragg in conjunction with G.W. Selby of Melbourne.[82] New South Wales Joseph Patrick Slattery of St Stanilaus' College, Bathurst had a keen interest in wireless telegraphy and was conducting experiments at the college as early as 1900 and these experiments continued for more than a decade. He was ably supported in these experiments by several of the staff at the college, with at least the President, Maurice Joseph O'Reilly being especially skilled in the field. John P. King of the New South Wales Postmaster-General's Department in 1904 is reported assisting Slattery at St. Stanislaus' College in his experiments as well as conducting his own private experiments. w:Horace Greeley Robinson also known as Hyman Rabinowitz in his purported ongoing role as Marconi representative in Australia conducted a series of talks and demonstrations at the Centenary Hall, York St, Sydney during September 1906.[83] Refer mainly to Victoria 1900. George Augustine Taylor was a prolific experimenter. In October 1909, he was the driving force behind the Great Exhibition of Building and Engineering, conducted at Prince Alfred Park, Sydney. The exhibition included displays and demonstrations of wireless telegraphy.[84] Charles Dansie Maclurcan and Cyril Lane of the Sydney electrical engineering firm Maclurcan and Lane were granted an experimental licence in 1909 and soon commenced wireless telegraphy transmissions from the rooftop of the Wentworth Hotel (owned by Maclurcan's mother).[85] Maclurcan was to become famous in the broadcasting world in the 1920s when he tranmitted broadcasting programmes from his experimental station with callsign 2CM. Victoria E. J. C. Wraith is reported at an early age in November 1896, for displays of electrical appliances at the Bendigo Juvenile Industrial Exhibition, where he was awarded a gold and a silver medal.[86] From 1898 to 1903 he was a student at the Bendigo School of Mines and employed by the Victorian Railways Department as an engine driver.[87][88] He displayed interest in electrical science and was encouraged in this by school staff and eventually he was constructing his own wireless telegraphy equipment, being the first to do so in the Bendigo district. In January 1902 he is reported as conducting successful experiments with his self-made equipment of the Marconi type, set up in the Bendigo town hall. Messages were sent from one end of the hall to the other, in the presence of G. V. Allen, the secretary of the Bendigo jubilee exhibition.[89] A public demonstration of wireless was subsequently given at the exhibition in March 1902, with the Registrar of the school Captain G. Alec. Thomson assisting.[90] In June 1902, the roles were reversed with Thomson lecturing and Wraith demonstrating both wireless and X-rays technology.[91] Little of Wraith is heard subsequently, he does not appear in early lists of licensed wireless experimenters. In 1916 he filed an application for a patent for Improvements relating to apparatus for inducing air drifts or blasts.[92] Horace Greeley Robinson also known as Hyman Rabinowitz conducted a lecture and exhibition of wireless telegraphy at Glen's Concert Hall, Collins St., Melbourne in August and September 1906.[93] in his stated role as Marconi representative in Australia was providing, upon request, demonstrations of Marconi wireless telegraphy equipment at the premises of the company Munroe and Munroe, 318 Collins St., Melbourne during August & September 1906. Similar lectures and demonstrations were also offered at Centenary Hall, York St., Sydney.[94] But in an interesting twist, it emerged that the demonstrations had been made to lure investors into purchase of shares in the Marconi company. Large sums were paid but few investors ever saw their shares. Robinson / Rabinowitz was arrested in New York and charged with larceny under false pretences in relation the shares.[95] [96] While it was little publicised at the time, Robinson / Rabinowitz was the recipient of the first experimental licence issued by the Department and was no doubt utilised by him to give an air of legitimacy to his scam.[97] Telefunken proposals to link Victoria, Sydney, New Zealand, Lord Howe island, Norfolk Island - May 1905 Marconi temporary facility Queenscliff and Devonport across the Bass Strait - 1905-1906 Henry Sutton was an inventor potentially responsible for the telephone, the lightbulb, and front wheel drive automobiles. From 1906 he extended his investigations into the field of wireless telegraphy and even wireless telephony. When the Postmaster-General's Department pointed out the need for a licence for these activities, he circumvented the problem by involving the Defence Department. "Charles Hughes" is reported as having given a lecture with demonstrations on the subject of wireless telegraphy to the Geelong Lodge of the Manchester Unity Oddfellows in August 1909. He was assisted by T. G. Madden. Hughes is assumed to be the same as C. S. C. Hughes of East Melbourne who appears in the 1914 Wireless Institute of Victoria list of current experimental licences, with callsign XJDU.[98] Victor Charles John Nightingall was a scientist and prolific inventor. He was an early pioneer of X-rays Victoria, undertook experiments with radioactive irradiation of seeds and soils and invented powerful electromagnets. In a letter to the editor of The Age 12 August 1909 in response to the likely loss of the Waratah, states that he has been experimenting with a new system of wireless telegraphy, nearing completion, with input by typewriter rather than morse key. He states that the system will eliminate the need for a skilled wireless operator with very substantial savings.[99] That announcement was silently received, but subsequently a report in February 1910 from Adelaide that Carnotite, a radioactive ore from the Radium Hill mine was being used by Nightingall with great effect (presumed a new form of contact detector) became national news.[100] These experiments led to detailed scrutiny of the obstacles placed in the way of licensing of wireless experimenters, and eventually to the opening of the flood gates for private experimentation.[101] Nightingall's wireless telegraphy system is fully described and beautifully illustrated in The Leader of 12 March 1910.[102] Nightingall is recorded as licensed with callsign XKK in the 1914 WIV list of experimenters. His stature in the wireless industry was reflected in his election as first president of the reformed Wireless Institute of Victoria in 1919.[103] Queensland Hesketh / PMG tests between South Brisbane (Naval Stores) and Moreton Island (Tangalooma) 1903 In November 1903, John Hesketh was both Queensland Government Electrical Engineer and President of the Queensland Electrical Association (both positions having been previously held by Edward Barton. As part of the University Extension Lecture program, Hesketh gave a lecture on the subjects of "Wireless Telegraphy" and "Telephony". At the conclusion of the lecture a demonstration of Marconi wireless apparatus was provided using the equipment of the Naval Defence Force, kindly lent by Captain Creswell.[104] Marconi proposals for Torres Strait islands - April 1904 South Australia Edward Hope Kirkby is reported in August 1907 as demonstrating a complete wireless telegraphy apparatus to a journalist of the Adelaide Advertiser, at the U.S.A. depot, Gawler Place, Adelaide. The set was said to be of the kind used by the large Liverpool-America mailboats.[105] Kirkby was also active his wireless experiments in Victoria in the 1890s and New South Wales 1900s Western Australia Lloyd's proposal for Rottnest Island 1903 Frederick Soddy's services were announced in April 1904 as having been secured by the University Extension committee (of the University of Adelaide) for a series of popular lectures on the subject of radioactivity, X-rays and wireless telegraphy.[106] Soddy had already won fame in his co-discovery (with Rutherford) of the transmutation of elements, though his many other discoveries and award of Nobel Prize lay in the future. The committee was aware that they were fortunate in having such a notable scientist in their midst and arranged a comprehensive program both for Perth and several surrounding country centres. Soddy had concluded his tenure at the University College, London and was about to take up his newly created position as lecturer in physical chemistry and radioactivity at Glasgow University.[107] Soddy arrived at Fremantle 14 June 1904 on board RMS Australia. In an interesting twist, this vessel was wrecked at Point Nepean less than a week later (fortunately with no loss of life).[108] The lectures were entitled "Radium and Modern Views on Electricity and Matter". The planned schedule of lectures was varied in number and timing through the course of the tour, but in the end included 7 in Perth (one of which was a repeat), 3 in Fremantle, 2 in Kalgoorlie and 1 each in Coolgardie, Northam, York, Albany and Bunbury. His first Perth lecture was on 20 June 1904 at St. George's Hall, Perth resulted in an attendance of 800, with some 300 having to be turned away.[109] That first lecture included demonstration of a large induction coil for the production of "high frequency currents", but there was no reference to either a Herzian coil detector or a Branly coherer, so it can not be conclusively said that wireless was covered.[110] The lecture was repeated on 23 June at Queen's Hall, Perth (then the largest capacity hall in the State) to try to accommodate the many who had not been able to be granted entry previously. This venue was also used for all the remaining Perth lectures.[111] The "second" lecture was given on 25 June and mainly addressed fundamentals of physical chemistry and electricity, but concluded with a brief treatment of wireless: "Mr. Soddy concluded with an analogous treatment of wireless telegraphy. He gave several examples of electrical resonance, and also an interesting experiment with miniature wireless telegraphy apparatus."[112] It was his third lecture which was of greatest interest in the history of wireless, being entirely devoted to "Wireless Telegraphy". A comprehensive survey was provided of the theoretical studies of Maxwell, the practical experiments of Herz and the realisation of the technology by Marconi. The demonstrations were properly detailed by solely one journalist versed in the technology: "The radiator which he had on the platform gave a wave a hundred feet long, the hall was about a wave length ... An experiment was then shown in which a wave from the radiator on the platform rang a bell in the back gallery of the hall ... He had on the table a receiving set of instruments as utilised in the Lodge-Muirhead system of wireless telegraphy, and with these he had seen messages sent over a distance of 45 miles. Ordinary telegraph instruments could be adapted to this system. The coherer was of a special type. A steel disc revolved in a pool of mercury covered with a film of oil. In ordinary circumstances the oil insulated the disc from the mercury. A wave coming along broke down the insulation, the two metals cohered and a signal passed through the apparatus into the recorder". [113] The fourth lecture was held on 19 July and addressed the discharge of electricity through rarified gases (a repeat of a Fremantle lecture).[114] The fifth lecture was delivered 22 July and was characterised by the theft of one of the spinthariscopes being circulated amongst the audience.[115] The sixth and final lecture on 23 July addressed primarily geophysical and astronomical matters.[116] The first lecture at Fremantle was given on 21 June at Victoria Hall, which venue was also utilised for subsequent lectures.[117] A second lecture was delivered 27 June.[118] The third lecture on 30 June concluded the series at Fremantle.[119] Further lectures were conducted in each of Kalgoorlie (Her Majesty's Theatre, 5 July[120], 8 July[121]), Coolgardie (Technical School, 7 July[122]), Northam (Town Hall, 12 July[123]), York (Mechanics' Institute, 13 July[124]), Albany (Town Hall, 15 July[125]) and Bunbury (Masonic Hall, 20 July[126]). It is not clear whether the shorter lectures in the country areas addressed wireless telegraphy other than in passing, the focus being upon Radium and radio-activity and it may be that only the instruments were displayed. Soddy's visit to Western Australia caused a significant burst of interest in scientific education in the state and perhaps a trigger for the establishment of its first university The University of Western Australia in 1911. He is recorded as strongly advocating the establishment of a university at the conclusion of his tour.[127] Soddy departed on 27 July aboard the RMS Moldavia for Sydney and thence to North America and Great Britain.[128] Perth Technical School at its annual demonstration 9 December 1904 included a note: "A very popular resort with visitors was the electrical classrooms, in which interesting demonstrations were given. The apparatus includes some of the instruments used by Mr. Soddy in his recent "Radium" lectures, notably an apparatus for showing high frequency currents."[129] The school's annual report for 1904 reveals incidentally further detail of the Soddy instruments: "Mathematical and Physical Department. During this year the work of this department has largely increased with the influx of students, but Mr. Allen and his assistant, Mr. Clucas, have proved equal to the demands made upon them. The appointment of a second assistant will enable important developments to be made. Indents have just been despatched for further valuable apparatus, and soon this school will be fully equipped for the training of electrical and other engineers. One very important gain to this department last year was the acquisition by purchase of most of the apparatus used by Mr. Soddy in his university extension course on radium."[130] It seems unlikely that the Lodge-Muirhead equipment was included in the acquisition, given that that group also fiercely protected its patents, but equally the core equipment would have been easily leveraged into wireless equipment by the lecturers and students of the school. Tasmania Lloyd's proposal for Bass Strait 1901 AWA proposal for Bass Strait 1901-1903 Visit of Japanese training squadron 1903 to Hobart was a matter of great public anticipation. The Mercury of 29 May 1903 announced that William Philpot Hallam would be conducting further wireless telegraphy experiments, attempting to communicate with the warships off Cape Pillar with equipment set up at the Shot tower.[131] The warships however arrived a little earlier than expected and messages were only briefly intercepted before the progress of the vessels up the river resulted in hills along the propagation path and consequent signal attenuation.[132] Hobart Conversazione 1904[133] A Scientific Conversazione was held in Hobart in September 1904. Displays included wireless telegraphy equipment under the charge of W. P. Hallam.[134][135] The Mercury of 19 September reported: "The committee room will be in charge of Messrs. Robert Henry, W. P. Hallam, and Mr. Todd. This room will be fitted up with electrical appliances, including the wireless telegraphy, which will be explained and at work during each evening."[136] A later report makes it clear that the wireless telegraphy equipment was operated by W. P. Hallam, Frederick William Medhurst and C. Hamilton.[137] It was also later revealed that the equipment displayed was the same as that utilised for the Royal Vistit to Hobart in 1901.[138] W. P. Hallam was subsequently granted a wireless experimenter's licence and appears in the 1914 WIV list with callsign XZH. Medhurst also appears in that list with callsign XZD, after WW2 he was licensed as 7AH. Medhurst was never required to pass an AOCP examination, no doubt due to his employment and involvement in the field. Mt Nelson to Tasman Island 1906. 3/4 February 1906, the prodigious William Philpot Hallam conducted a number of successful experiments using home-made equipment and assisted by his team of co-workers at the Telegraph Office of the Hobart GPO. The report was as follows: "On Saturday and Sunday Mr. W. P. Hallam, of the Telegraph Department at Hobart Post-office, conducted some interesting experiments in wireless telegraphy, between Mt. Nelson signal station and Tasman Island, also between that station and a steamer proceeding down the river. The s.s. Moonah left Hobart in the afternoon on Saturday equipped with a wireless receiving apparatus, and signals were sent from Mt. Nelson, and received on board up to the time the steamer passed out of the river. The next day Mr. Hallam's assistant landed from the s.s. Moonah at Tasman Island, fixed up a receiving circuit there, and he received signals sent by Mr. Hallam from Mt. Nelson, from 9 a.m. till 11.50 p.m.; but not having a transmitting instrument the assistant could not reply. The receiving indicator was one of Mr. Hallam's own design. He states that the trial was very satisfactory as far as it went, and it was only a matter of detail to put wireless telegraphy into regular use between those two places. The main object of the test was in connection with the desire of the Marine Board to establish wireless telegraphy between Mt. Nelson and the lighthouses, and it is evident that this may be done without difficulty, being simply a question of cost."[139] Merchant shipping While Australia's deployment of a network of coastal wireless stations was lost for a decade in a regulatory policy impasse, individual ships in international service were often already equipped for wireless communication. Facilities were used for reception of weather information by the high power long wave transmitters elsewhere in the world. When more than one such ship was in or close to an Australian port, the "sparkies" communicated amongst themselves. Many developed countries were contemplating compulsory installation of wireless telegraphy on larger vessels for safety of life reasons. Even Australia which was unable to reach a landing on coastal stations on her own shores, in awarding the England-Australia mail contract for 1909 to Peninsular and Orient Co. made it a requirement that all vessels deployed in the mail service be equipped with wireless. P & O Line RMS Mantua (Callsign: MME[140]) was custom built for the mail contract and was launched in April 1909. She was the 8th of the Caird & Co "M" class vessels and initial fitout included Marconi wireless.[141] Her first Australian port of call was Fremantle, arriving 6 July 1909 and a local reporter of the Perth Daily News gave comprehensive background on the wireless equipment: "Messages through space; M+aphy installed on RMS Mantua a great success; The P. and O. RMS Mantua, the first English mail boat travelling to Australia carrying the Marconi wireless telegraph, arrived at Fremantle this morning, and great public interest was taken in the skeleton looking apparatus placed on both mast heads. The particular instrument carried on the Mantua has a range of 250 miles, and in this respect differs greatly from the huge liners which cross the Atlantic, but it is considered that this range will more than suffice should emergencies arise during the vessel's progress through the Pacific and Indian Oceans. On the Atlantic liners again two operators are carried, but so far the Mantua has hardly found enough employment for one telegraphist. During the voyage out the Mantua's operator, who is one of Marconi's skilled young men, flashed out messages each day in the hope of gaining connection with some other instrument over the vast expanse of water. When the Mantua emerged from the Red Sea, the first vessels she greeted a la Marconi were two Japanese merchant vessels, which, though scores of miles out of sight, returned the felicitous greetings of the Britisher. Then a prowling English man-o'-war skirting round the shallows of the Seychelles Islands, snapped back a hearty business-like message. During the whole of the journey from Tilbury to Port Said people were sending messages ashore to their friends. It was a novelty, and although costing about 1s. a word to dispatch, with a minimum charge of 6s. 6d., the luxury was largely availed of. The Morea and Malwa, sister ships to the Mantua, are also fitted up with wireless telegraph apparatus."[142] She arrived at Hobson's Bay, Melbourne on 12 July 1909 and it was reported that "The steamer is fitted with the Marconi system of wireless telegraphy, and during the passage out other vessels and people on shore were freely communicated with. Captain F. W. Vibert, who is a well-known visitor to Hobson's Bay, has command of the Mantua."[143] Upon arrival in Sydney, the wireless officer A. F. Goodliffe was interviewed and reported on the problems with obtaining acknowlegement of transmissions with many naval vessels due to protocols in place. But noted that approaching Sydney, communication had been established with the HMS Pyramus.[144] RMS Malwa 1909 (Callsign: MMD[145]) RMS Morea (Callsign: MMF[146]) though having been launched without wireless telegraphy, was subsequently retrofitted with the necessary equipment. Upon her arrival in Fremantle 18 August 1909, was reported now to be carrying wireless, further that she had been communicating near Cocos Island with the RMS Mantua.[147] RMS China (Callsign: MMU[148]) On 27 April 1910 it was reported: "The P. and O. Company's R.M.S. China, from London, arrived at Fremantle yesterday morning. The China has recently undergone extensive alterations, and is fitted with a wireless plant.[149] Orient Line Orient Line shared the Australian Government contract for the Great Britain-Australia mail with the P&O Line. Each company had a vessel sailing from England to Australia every two weeks, resulting in a weekly service of fast mail ships. Five ships were launched in early 1909 and maiden voyages commenced mid 1909. The ships were the RMS Orsova, RMS Osterley, RMS Otway, RMS O, RMS O. RMS Orsova (Callsign: MOF[150]) was an ocean liner owned by the Orient Steam Navigation Company. She was built by John Brown & Company at Clydebank, Scotland in 1909 to operate a passenger and mail service between London and Australia (via Suez Canal). The Orient Line and P&O Line shared the mail contract for Britain-Australia. Her maiden voyage was 25 June 1909. It was reported in January 1909 that the ship would be "fitted with wireless telegraphy, and with all modern appliances for securing the safety and comfort of passengers."[151] Immediately prior to her first arrival at Fremantle on 29 July 1909, the wireless facilities were described: "On top of the charthouse is the standard compass and observation platform. Aft of the forward funnel casing, is situated the Marconi house, in which the wireless telegraph apparatus is fitted, and accommodation is provided in same for the operators.[152] RMS Osterley (Callsign: MOY[153]) was an ocean liner owned by the Orient Steam Navigation Company. She was built by the London and Glasgow Shipbuilding Company and launched 27 January 1909.[154] Despite reports that she was fitted initially with wireless telegraphy, this was not the case, the owners stating that they were waiting for Australian coastal stations to be erected.[155] Finally, upon arrival at Fremantle 6 September 1910 it was reported: "Since the last visit of the Orient liner Osterley to Australia, she has been installed with the Marconi system of wireless telegraphy. On the present voyage out from England the ship was in touch with Poldhu (Cornwall) up to within 24 hours of arrival at Port Said, the world's latest telegrams being received daily, and a copy posted in all classes for the passengers' information."[156] RMS Otway (Callsign: MOH[157]) At the time of launch, the Otway was stated to be being fitted for wireless telegraphy equipment. Her sister ship the RMS Otranto had actually been so fitted at time of commissioning and there was an expectation that the Otway would likewise. But when the Otway arrived in Melbourne 1 August 1909, it was reported: "Apparently the Orient S.N. Co. is in no hurry to equip all its liners with "wireless" until the establishment of Australian shore stations admits of practical use being made of the system between sea and land. In view, however, of the fact that the Otranto was installed with "wireless" before she left London on her present visit to the Commonwealth, it was generally anticipated that the other liners of the fleet would be similarly fitted in turn before their departure for Australia. This expectation, however, is not being fulfilled, as the Otway, which arrived at Port Melbourne yesterday morning, having left London a fortnight later than the Otranto, is still without a "wireless" apparatus. So far, therefore, the Otranto is the only vessel of the "Orient" line with this invaluable system installed. The Otway berthed alongside the Port Melbourne Railway Pier early yesterday morning, having experienced a quiet and enjoyable trip from London via the usual stages. The passengers comprised about 90 in the saloon and 480 in the third class, all of whom were apparently well pleased with their sojourn on board the fine liner. She leaves for Sydney to-day."[158] RMS Otranto (Callsign: MOD[159]) Unlike other ships of the Orient line, the RMS Otranto was actually fitted with wireless telegraphy equipment at the time of its commissioning, following its launch 27 March 1909. The Otranto made free use of wireless on her voyage to Australia, establishing communication with shore stations and liners en route. During the maiden voyage of the Otranto, wireless exchanges passed between the liner and the Poldhu station, at Cornwall, England until at a distance of 1,500 miles further contact became impossible. It was noted that items of news received from the land by wireless were greatly appreciated by the Otranto's passengers.[158] RMS Orvieto 1910 (Callsign: MOJ[160]) Union Line RMS Makura (Callsign: MKU[161]) was a ship of the Union Steam Ship Co of NZ which had the mail contract between Australia and Canada. Being fitted with wireless telegraphy equipment was a major marketing advantage. In December 1909 upon arrival in Sydney it was reported: "Since her last visit to Sydney the R.M.S. Makura, of the Canadian-Australian mail line, has been fitted with a powerful wireless telegraphic apparatus, and on the voyage from Vancouver to Sydney, completed yesterday, many experiments of a highly successful character were carried out. The installation was made at Vancouver, and the apparatus extends from the mainmast to the foremast. The best record established in the daytime was 800 miles, while at night-time communication was carried on at much greater distances — up to nearly 2000 miles. It is claimed that under exceptionally favourable conditions it will be possible for the Makura to despatch messages over a distance of nearly 3000 miles. The wireless system of the Makura is said to be the most complete yet installed in any merchant vessel employed in the Pacific Ocean. The Makura was never out of communication with land during the whole of the passage from Vancouver to Honolulu, and the "wireless" station at Nome in Alaska was spoken from a distance of 1100 miles. On an average about 20 messages were despatched for passengers nightly on the run from Vancouver to Honolulu, and "press" messages were received when 1500 miles from Honolulu containing the news of the world. When two days out from Vancouver the Makura picked up the Lurline, then lying to the westward of Honolulu, 1900 miles away, and five days later the two vessels met at the entrance to Honolulu. The Makura after leaving Honolulu remained in communication with that port for five days, and then the mail steamer was out of touch with land until Tuesday night last. All the way from Suva in Fiji the Makura made repeated attempts every night to pick up vessels on the Australian coast, but it was not until Tuesday evening, when steaming down this coast, that she received a reply, and that came from the P. and O. Company's R.M.S. Morea in Neutral Bay."[162] RMS Marama (Callsign: MKM[163])was a ship of the Union Steam Ship Co of NZ. In August 1910, in Sydney it was reported: "The Canadian-Australian RMS Marama arrived from Vancouver, via Victoria, Honolulu, Fanning Island, Suva and Brisbane, at 3.40 yesterday afternoon (9 August). She left Vancouver at noon on July 15, and Victoria the following morning. Fine weather and smooth sea were experienced to Honolulu which port was reached on the morning of July 23. Leaving again in the afternoon of the same day, she called at Fanning Island on 26th, and reached Suva at midday on 2nd inst. Between Honolulu and Fanning strong winds and squalls were experienced; thence fine weather to Suva. She departed from Suva at 2.30 a.m. on the 3rd, and experienced fine weather to Brisbane, which port was reached at 3.30 p.m. on 7th. She left again at 4 a.m. on 8th, and experienced moderate sea with occasional rain squalls on passage to Sydney. While at Vancouver the Marama was installed with wireless telegraphy by the United Wireless Telegraph Company and some very satisfactory results were obtained on the passage."[164] NDL Line SS Bremen (Callsign: DBR[165]) later renamed Constantinople and then King Alexander, was a German Barbarossa class ocean liner commissioned in 1897 by Norddeutscher Lloyd. The SS Bremen was built by F. Schichau of Danzig for the Norddeutscher-Lloyd line. She started her maiden voyage on 5 June 1897 and was sadly most notable for passing through the debris field on 20 April 1912 left by the sinking of the RMS Titanic. On 21 November 1907 it was reported: "The advantage of wireless telegraphy was again demonstrated yesterday, when the N.D.L. steamer Bremen, coming up the coast, communicated with H.M.S. Encounter at Garden Island by means of the "wireless," requesting the commander to convey to the agents of the Norddeutscher Lloyd, Messrs. Lohmann and Co., the fact that the German mail steamer would reach Sydney Harbor at about 5 o'clock. The message was promptly delivered, thus facilitating in a marked degree the arrangements for landing the passengers. The present instance is the first on record of the use of wireless telegraphy by a mail steamer on this coast."[166] SS Königin Luise (Callsign: DKL[167]) was a Template:Sclass- built in 1896 by Vulcan Shipbuilding Corp. of Stettin, Germany, for the North German Lloyd line of Bremen. She is mentioned in a report of November 1909 "After the absence of a few years from the Australian service, the N.D.L. liner Konigin Luise is due at Fremantle on Sunday next from Bremerhaven. Since she was here last she had had wireless telegraphy apparatus installed, and Mr. W. Katsenbuy has charge of it.[168] Navy, coastal and ships Australian fleet Australian naval warships (more precisely ships of the British navy on Australia station) were increasingly equipped with Marconi apparatus, with communication range often in hundreds of miles. Garden Island naval station A naval coastal station was established at Garden Island with little fanfare prior to November 1907. In November 1907 the volume of messages being transacted through the station to and from naval ships was so high that there was informal discussion between relevant authorities whether the ships meteorological reports could be regularised and publicly distributed.[169] In July 1909 it was stated that communication was established with the RMS Mantua while more than 200 miles from the Heads prior to her arrival on her maiden voyage.[170] HMS Euryalus was a Cressy-class armoured cruiser built for the Royal Navy around 1900. Badly damaged by multiple accidents while fitting out, she was not completed until 1904. She became flagship of the Australia Station that year and was reduced to reserve upon her return in 1905. Having been fitted with wireless telegraphy, she is recorded as attempting to contact HMS Powerful while in Fremantle harbour, immediately prior to her return to Great Britain.[171] HMS Powerful was a ship of the Template:Sclass- of protected cruisers in the Royal Navy. She was built by Vickers Limited, Barrow-in-Furness and launched on 24 July 1895. The Powerful was fitted with wireless telegraphy equipment and in Australian waters from December 1905. It does appear that the wireless equipment was being continuously refined and updated, as distance being achieved steadily increased. In September 1906 it was reported that "The Powerful left Melbourne for Sydney direct on Wednesday last, and was followed by H.M.S. Cambrian, H.M.S. Psyche, and H.M.S. Encounter. A series of experiments in wireless telegraphy was made on the trip along the coast with great success. Communications were held between the four warships at distances ranging up to 50 miles, and the Powerful, when to the south-ward of Jervis Bay, 90 miles from Sydney, yesterday morning, sent a message to Garden Island, which was received without mutilation."[172] In March 1907, "The following message was received this afternoon at Garden Island Naval Depot by wireless telegraphy from H.M.S. Powerful — 150 miles south. Will arrive 6.30 a.m. tomorrow. Sea moderate. Strong southerly breeze," a new distance record.[173] By September 1909 the equipment had been upgraded and / or refined to the extent that distances almost ten times that were being achieved: "Return of the Admiral, Island Cruise of the Powerful; HMS Powerful, with his Excellency Vice-Admiral Sir Richard Poore and staff on board, reached Sydney at midnight on Saturday from her cruise in the islands. At Port Vila, in the New Hebrides, the Admiral temporarily transferred his flag to the Prometheus, and proceeded, on a voyage of inspection, to all the principal islands of the group. Subsequently the Powerful visited Suva. On the way from Fiji to Sydney heavy weather was encountered, which delayed the Powerful for some hours. Communication was carried on with Sydney by means of wireless telegraphy, over a distance of 1100 miles."[174] HMS Challenger was a second-class protected cruiser of the Template:Sclass- of the [[[w:Royal Navy|Royal Navy]]. A February 1907 report states "reached Fremantle yesterday morning from Singapore. Commander Tilbits reported that Singapore was left on January 22, the day before the departure of the flagship and Encounter. Connection was made at Java Heads by wireless telegraphy with HMS Pegasus, which had been receiving a new crew at Colombo from H.M.S. Vindictive. The Pegasus was proceeding to Sydney via the east coast of Australia and Batavia. After passing the Straits of Sunda communication was established by wireless telegraphy with the flagship, and continued until Wednesday, when the ships parted company. The Challenger will sail this morning for Albany." [175] In May 1909, focus was on fully bridging the Tasman Sea by wireless between the naval ports at Sydney and Wellington, but the propagation path shielding in the Cook Strait and Wellington Harbour was proving challenging. In a newspaper report it was stated: "Wireless across the Tasman; Another demonstration of wireless communication between ships of the Australian squadron was given during the voyage of HMS Challenger from Sydney to Wellington. The Challenger was able to communicate with the flagship Powerful, lying in Sydney Harbor, over 1200 miles away, right from the time of her departure from Sydney till when she turned in Cook Strait. Only one period of difficulty was experienced, when the high wind flapping the stays against the wires somewhat interfered with the messages. One night the Challenger spoke the Prometheus on her way to Norfolk Island. One of the officers of the cruiser interviewed at Wellington said:— "The Challenger had only two wires aloft previously, now she has eight. And the rigging has all been insulated, cutting off indirect communication with the earth, and doing away with what the wireless men call the 'screening' of messages. These alterations were made while in Sydney, so that these messages were really a test. Other means of improvement have been discovered, and the system will be made more perfect." Official communications to the Commander-in-Chief at Sydney comprised a large part of the messages sent. News of the fever cases on board was also communicated, and news from beyond Australia — of the two-Power standard, the American Fleet, racing topics, etc. — was received."[176] HMS Pyramus was a Template:Sclass- protected cruiser of the Royal Navy. She was laid down at Palmers Shipbuilding and Iron Company, Jarrow in May 1896, and launched on 15 May 1897. She served in various colonial posts, including the Royal Navy on Australian station from 1905. In the voyage to Australia in late 1905, she encountered numerous boiler failures and these continued throughout the earliest period of her Australian deployment. She was equipped with Marconi wireless telegraphy and in March 1906 is reported as calling the HMS Encounter from Garden Island to advise of the problems.[177] She was also the first warship to communicate with the RMS Mantua as she ran up the Australia coast towards Sydney on her maiden voyage to Australia.[144] HMS Pegasus was one of 11 Template:Sclass- protected cruisers ordered for the Royal Navy in 1893 under the Spencer Program and based on the earlier Template:Sclass-. Like all of the Pelorus class cruisers, she had numerous boiler issues, but was briefly on Australian service around 1905. She was fitted with wireless telegraphy equipment. HMS Psyche was a Template:Sclass- light cruiser built for the Royal Navy at the end of the 19th century. Initially operating on the North America and West Indies Station, the cruiser was transferred to the Australian Squadron in 1903, and remained there until the Royal Australian Navy (RAN) took over responsibility in 1913. HMS Encounter was a second-class protected cruiser of the Template:Sclass- operated by the Royal Navy and later the Royal Australian Navy. She was built by HM Dockyard Devonport and completed at the end of 1905. HMS Cambrian was a second-class protected cruiser, of the Royal Navy, built at the Pembroke Dockyard and launched on 30 January 1893.[178] She was the last flagship of the Australia Station. In May 1910 she was a participant in a message which set the Fleet's wireless record. "During the voyage of H.M. flagship Powerful to Fremantle the fleet record for wireless telegraphy in Australian waters was established by the ship. When nearing Fremantle she was able to receive a message form H.M.S. Cambrian in port, at Hobart, a distance of over 1,500 miles away. The Cambrian requested to know if the Powerful had any instructions for her, to which query the Powerful sent a negative reply.[179] HMS Pioneer was a Template:Sclass- light cruiser built for the Royal Navy at the end of the 19th century. A brief report in November 1909 stated: "Wireless signals from HMS Powerful in Sydney Harbor have been picked up by the Pioneer, lying at Lyttelton. This is the first time such signals have been projected across the Tasman Sea without retransmission."[180] Japanese fleet Japanese naval training squadron, Australian visit 1903. In March 1903 it was announced that the Japanese naval training squadron, consisting of the Matsushima, Itsukushima and Hashidate, would be visiting Australia.[181] Rear Admiral Kamimura was in command of the squadron. Note that it was the practice of the squadron for the commander to regularly rotate ship to maximise training effectiveness for all crew, hence the flagship also would regularly rotate. All three cruisers were fitted with Marconi wireless telegraphy equipment. The squadron had left Yokosuka, Japan on 15 February[181] and the tour included Hong Kong, Singapore, Batavia, Perth (Itsukushima, awaiting news of other two cruisers, 4 April to X April),[182] Onslow (Matsushima & Hakidate, unscheduled due to damage to Matsushima during cyclone, X April to X April), Carnarvon (unscheduled due to cyclone dame & resultant need for recoaling, 19 April to 21 April), Perth (22 April to 30 April),[183] Adelaide (7 May to 13 May),[184] Melbourne (16 May to 30 May),[185] Hobart (1 June to 2 June),[186] Sydney (5 June to 14 June),[187] Townsville (????), Thursday Island (1 July),[188] Manila, Amoy, Fusan, Formosa, returning to Yokosuka.[189] Japanese naval training squadron, Australian visit 1906. In March 1906 it was announced that the Japanese naval training squadron, consisting again of the Matsushima, Itsukushima and Hashidate, would again be visiting Australia.[190] Rear Admiral Shimamura was in command of the squadron. All three cruisers were fitted with Marconi wireless telegraphy equipment. The squadron had left Yokosuka, Japan on 15 February and the tour schedule included Korean ports, Chinese ports, Manila, Thursday Island (18 April to 20 April),[191] Townsville, Melbourne (9 May to 17 May),[192] Sydney (21 May to 28 May),[193] Goode Island (Thursday Island) (10 June),[194] Batavia, Singapore, Formosa, returning to Yokosuka.[195] Japanese naval training squadron, Australian visit 1907. In March 1907 it was announced that the Japanese naval training squadron, consisting again of the Matsushima, Itsukushima and Hashidate, would again be visiting Australia, albeit briefly.[196] Rear Admiral Tomioka was in command of the squadron. All three cruisers were fitted with Marconi wireless telegraphy equipment. The squadron had left Yokosuka, Japan on X February and the tour schedule included Honolulu (Hawaii), Suva (Fiji) (19 March to 25 March), Wellington (New Zealand) (31 March to 7 April), Brisbane (13 April),[197] Thursday Island, Batavia, Singapore, returning to Yokosuka. Japanese naval training squadron, Australian visit 1910. In February 1910 it was announced that the Japanese naval training squadron, consisting of the Aso and the Soya would be visiting Australia.[198] Rear Admiral Hikojirō was in command of the squadron. Both cruisers were fitted with Telefunken wireless telegraphy equipment. The tour included Thursday Island (March 3),[199] Townsville (March 7 to March 13),[200] Brisbane (13 March to 17 March),[201] Sydney (March 19 to March 27),[202] Hobart (March 30 to April 4),[203] Melbourne (April 7 to April 16),[204] Adelaide (April 19 to April 23),[205] Albany (April 29 to May 2),[206] Fremantle (May 4 to May 11),[207] Batavia, Suraybaya, Singapore, Hong Kong, Formosa, Shanghai, returning to Yokosuka. Template:Nihongo (Callsign ?) was a Template:Sclass- protected cruiser of the Imperial Japanese Navy. She was part of the Japanese squadron of three cruisers (initially the flagship) which visited Australia in 1903, all of which were equipped with Marconi wireless telegraphy. In perhaps the first recorded instance of wireless telegraphy being put to practical effect (rather than simple communication) near Australian waters, when the three cruisers of the squadron became separated during a cyclone and the Matsushima damaged her boilers, she announced her plight by wireless telegraphy and the Hashidate came to her aid. The two cruisers then travelled in company to the calmer waters of Exmouth Gulf, where repairs were effected.[208] At this stage the Rear-Admiral transferred to the Hashidate, which then became the flagship for the remainder of the tour. The Matsushima was sunk in 1908 in a terrible accident with the loss of more than 200 lives. Template:Nihongo (Callsign JUN) was the lead ship in the Template:Sclass- of protected cruisers of the Imperial Japanese Navy. The Japanese cruiser became separated from its squadron in the course of cyclonic weather in April 1903 and was the first to arrive at the port of Fremantle, thereby becoming the first vessel of the squadron to make port in Australia. The ship was equipped with wireless telegraphy equipment.[209] Template:Nihongo (Callsign JUO) was the third (and final vessel) in the Template:Sclass- of protected cruisers in the Imperial Japanese Navy. She was part of the Japanese squadron which visited Australia in 1903, all of which were equipped with Marconi wireless telegraphy. An enterprising reporter has provided a comprehensive account of the Hashidate while in Sydney Harbour.[210] Aso (Callsign JRL) was originally the cruiser Bayan, the name ship of the four Template:Sclass- armoured cruisers built for the Imperial Russian Navy in the first decade of the 20th century. She struck a mine and sunk during the Russo-Japanese War of 1904–05. She was salvaged and extensively repaired by the Imperial Japanese Navy, then renamed the Aso. She served initially as a ]training ship]. She was equipped with [w:Telefunken|Telefunken wireless telegraphy apparatus and visited Australia in 1910 as part of the visit of the training squadron.[211] On 6 May 1910, the Encounter and HMS Challenger were also at Fremantle port, and the Encounter wirelessed an invitation to Admiral Ijichi to attend a dinner with Vice-Admiral Poore on board the HMS Powerful on 7 May 1910, the latter ship being about to enter the port also.[212] Soya (Callsign JLD) was originally the Russian cruiser Varyag. The ship was badly damaged during the Russo-Japanese War of 1904–05 and scuttled. After the war, she was salvaged by the Imperial Japanese Navy and extensively repaired. She was renamed the Soya and served initially as a training ship. She was equipped with Telefunken wireless telegraphy apparatus and visited Australia in 1910 as part of the visit of the training squadron.[211] USA fleet The "Great White Fleet" of the USA visited Australia (Sydney, Melbourne, Albany) in August & September 1908. The depth of fond sentiment towards the United States displayed at the time of the announcement that the Great White Fleet would be visiting can be gauged by the following: The Fleet that is Coming to Sydney; An official despatch from Washington states that Rear Admiral Robley D. Evans, in charge of the major portion of the battle fleet of the United States, will leave San Francisco on July 6. The fleet will visit Hawaii, Samoa, Melbourne, and Sydney. It will then proceed to the Philippines for the autumn gunnery practice, and return to the Atlantic, via the Suez Canal. The Right Hon. James Bryce, British Ambassador at Washington, supported the Commonwealth's invitation to the fleet to visit Australia. On Saturday evening, at the Centenary Hall, Sydney, when the Prime Minister concluded his address on national defence, he intimated that he had just received a cable message to the effect that the American fleet would visit Melbourne and Sydney. In an instant the hall rang with tumultuous cheering. Mr. Deakin, waiting with uplifted hand, for a lull in the storm, presently shouted: 'The least we can do is to give three cheers for the United States.' The great audience rose en masse, and cheer after cheer was given to the waving of hats and canes and handkerchiefs. The Prime Minister: I venture to say that a welcome such as that fleet has never known, outside its own country at all events, will be given it in Australia. (Great cheering.)[213] The fleet entered Sydney Harbour on 20 August 1908 with a vast and tumultuous welcome in a "spectacle of unparalleled majesty" viewed by more than half a million people.[214] After a week of celebrations, the fleet departed for Melbourne 28 August 1908.[215] It was less than two days steaming before the fleet arrived at Port Phillip, Melbourne to a welcome on 29 August 1908 only slightly more subdued than that at Sydney.[216] After the scheduled week in Melbourne, the fleet departed on 5 September 1908 with the newspapers of the day publishing patriotic poems about the visit.[217] The fleet's arrival a few hours early on 11 September 1908 at Albany, Western Australia (the then small town with the large harbour), caught the residents and many country visitors literally napping. When the word spread there was a rush of people to the vantage points on the heads and elsewhere.[218] A further week in Albany allowed both coaling operations and celebrations, with the majority of the fleet departing 18 September 1908.[219] While the fleet did not visit any other Australian ports, it closely hugged the Western Australian coastline on its way to Manila and local shipping companies did good business taking tourist out to view the fleet under steam.[220] For Australia, with wireless telegraphy equipment only deployed to a handful of British naval vessels on Australia Station at the time, the temporary presence of the Great White Fleet meant a 200+ per cent increase in its wireless systems. The vast majority of vessels in the USA fleet were equipped with wireless telegraphy. It is curious that a wide variety of different wireless systems were being utilised by the USA fleet, with no known inter-operability issues. Yet a few years later, Australia remained concerned about the ability of each system to work with the others. The vessels and their wireless equipments were as follows[221]: USS Ajax (relief, callsign BD) USS Connecticut (flagship, callsign DC, Shoemaker system, wavelength 425 metres, power 3kW) USS Culgoa (auxiliary, callsign DG, Composite system, wavelength 425 metres, power 3kW) USS Georgia (callsign EM, Stone system, wavelength 425 metres, power 2kW) USS Glacier (auxiliary, callsign EN, Composite system, wavelength 425 metres, power 2kW) USS Illinois (callsign FL, Fessenden system, wavelength 425 metres, power 1kW) USS Kansas (callsign GF, Stone system, wavelength 425 metres, power 5kW) USS Kearsarge (callsign GI, Composite system, wavelength 425 metres, power 2kW) USS Kentucky (callsign GK, Composite system, wavelength 425 metres, power 2kW) USS Louisiana (callsign GT, Shoemaker system, wavelength 425 metres, power 3kW) USS Minnesota (callsign HO, Stone system, wavelength 425 metres, power 3kW) USS Missouri (callsign HQ, Composite system, wavelength 425 metres, power 2kW) USS Nebraska (callsign IE, Telefunken system, wavelength 425 metres, power 3kW) USS New Jersey (callsign IK, Shoemaker system, wavelength 425 metres, power 3kW) USS Ohio (callsign IW, Shoemaker system, wavelength 425 metres, power 2kW) USS Panther (auxiliary, (callsign JG, Composite system, wavelength 425 metres, power 2½kW)) USS Rhode Island (callsign KA, Shoemaker system, wavelength 425 metres, power 1½kW) USS Vermont (callsign LO, Telefunken system, wavelength 425 metres, power 3kW) USS Virginia (callsign LQ, Shoemaker system, wavelength 425 metres, power 3kW) USS Wisconsin (callsign MB, Shoemaker system, wavelength 425 metres, power 3kW) USS Yankton (relief, callsign MK, Telefunken system, wavelength 425 metres, power 1kW) As the fleet steamed west from Pearl Harbour, its movements were widely reported in the media as "wireless messages" and "Marconigrams". But the implied directness was not representative and the messages had to almost circumnavigate the globe due to the lack of receiving facilities in Australasia, coupled together with the British Admiralty's refusal to communicate with non-Marconi systems: How Wireless Messages were Obtained. Mr. Henry M. Collins (general manager for Australasia of Reuter's Telegraph Company, Limited) wrote to us under date Melbourne, August 6:— "As a good deal of curiosity has been aroused by the wireless telegrams received by this company from the American Fleet during the past few days, it may be of interest to the public to know how the information has been obtained. For some time past endeavours have been in progress to get into touch with the battleships before their arrival at Auckland for which port they steamed direct from Honolulu. It was at first attempted to establish communication through the good offices of the British Admiral; but it was found on enquiry that H.M.S. Powerful could not exchange wireless messages with the American vessels, presumably because different systems are employed. During last week the United States storeship Glacier arrived at Suva, and on Friday we learned from our correspondent there that efforts would be made to speak with our representative on board one of the battleships on Tuesday, the 4th instant, at a distance of 1,200 miles. Meanwhile it would be sought to establish a chain of communications on our behalf through the United States vessel Yankton, then lying at Tonga, and the Panther, at the coaling station Pago Pago, in the Samoan group. In this success was achieved, with the result that we have been able to place the information so obtained at the disposal of your readers on five days in succession. As the Glacier left Suva today the aerial "chain" has been broken — for the time being, at least."[222] Prior to the fleet's arrival in Australia, there was only a brief report that Lee de Forest's wireless telephony equipment had been installed in the vessels of the Great White Fleet.[223] However, while the Great White Fleet was in Australian ports, there was surprisingly little reference to the ships' wireless telegraphy equipment. But a month after the fleets' departure, a detailed report was provided stating that all the warships were not only equipped with wireless telegraphy equipment, but also for wireless telephony. This is among the earliest recorded use of the latter technology in the Commonwealth: All the ships in the American fleet which recently left Australian waters are fitted with a wireless telephone, besides the usual wireless telegraph gear. The success of the installation of this system — invented by Dr. De Forest — has been so thoroughly established that it has been possible to establish communication thereby to distances up to 25 miles. The average working range, however, is about five or 10 miles. The system is a comparatively new one, a successful demonstration of it not having been given until the middle of last year. Seeing the value of such a useful addition to the wireless telegraph, the United States Navy authorities at once ordered trial sets of the instruments to be installed in the battleships Connecticut and Virginia, in conjunction with a shore station. It proved of such value during the grounding of the Kentucky, in Hampton Roads, that it was decided to fit all the ships of Admiral Evans's fleet with it before they left for their voyage round the world. This was done with the utmost despatch, and a month or two later everything was complete.[224] The article goes on to fully describe the aerial, the transmitting gear and the receiving gear. The lack of detailed reporting on such an important development can be explained by the fact that the US Navy had found the equipment to be too unreliable to meet their needs at all sets were removed upon the fleet's return to Hampton Roads, Virginia.[225] Land military In August 1909 Major Cox-Taylor gave a lecture describing a portable wireless station, and advocated wide deployment in war time.[226] On the 28th March 1910 at the easter camp conducted at Heathcote NSW, George Taylor organised for the attendance of 3 civilians to bring their own equipment and conduct experiments to show his superiors the practical application of wireless telegraphy in the field. The civilians were Edward Hope Kirkby, Walter Henry Hannam and Reginald Wilkinson who were credited by Taylor in his own written account. [227][228] Wireless Telegraphy Act 1905 The United Kingdom enacted it Wireless Telegraphy Act in 1904 and it was considered within Australia that a similar approach should be taken. While it appeared clear that the Constitution of the Commonwealth of Australia placed responsibility for wireless telegraphy with the Commonwealth rather than the individual States and Territories, to remove any possible doubt, the Wireless Telegraphy Act of 1905 made this explicit. The Wireless Telegraphy Act, No. 8 of 1905 may be cited as the Wireless Telegraphy Act 1905 and was assented to 18 October 1905. The initial Act was brief and to the point, being only a single page and even after almost 80 years of amendments, remained equally concise when finally repealed in 1983. The Act[229]: Defined Australia (in the context of the Act) to include the territorial waters of the Commonwealth and any territory of the Commonwealth Defined "Wireless telegraphy" to include all systems of transmitting and receiving telegraphic messages by means of electricity without a continuous metallic connexion between the transmitter and the receiver Was defined not to apply to ships belonging to the King's Navy Gave the Postmaster-General the exclusive privilege of establishing, erecting, maintaining, and using stations and appliances for the purpose of transmitting messages by wireless telegraphy within Australia, and receiving messages so transmitted transmitting messages by wireless telegraphy from Australia to any place or ship outside Australia receiving in Australia messages transmitted by wireless telegraphy from any place or ship outside Australia Provided penalty for breach of Act Provided for forfeiture of appliances unlawfully erected Search warrants for appliances unlawfully erected Gave the Postmaster-General the right to institute proceeding Gave the Governor-General the right to make regulations, prescribing all matters for carrying out or giving effect to this Act Coastal network proposals In the 1900s there were several unsolicited proposals from major wireless companies seeking to gain a footing in the Australasian market. The proposals were often heavily discounted and strongly guaranteed in the knowledge that initial acceptance would likely lead to further contracts. Intra-Imperial Wireless Conference In late 1909 a conference was held in Melbourne of all parties interested in the establishment of a chain of wireless stations link Australia, New Zealand and the islands of the southwest Pacific. The Taylor phenomenon George Augustine Taylor is remembered today mostly for his advocacy for commencement of high power wireless broadcasting in Australia during the mid-1920s through the efforts of his Association for the Development of Wireless in Australia, New Zealand and Fiji. But arguably his work in the late 1900s and early 1910s was even more valuable. Within a civilian/military context he was responsible for demonstrations of the practical military applications for wireless. He then went on to demonstrate that wireless could be used in moving railway trains (and associated signalling applications) and transmission of pictures by wireless. Taylor solely driven by patriotic intent and without any commercial motivation. His inventions were claimed by others, sometimes decade or more subsequent. Taylor, although an advocate never invented anything. At his demonstrations and lectures he always used Edward Hope Kirkby and wireless equipment manufactured by him. Taylor's own publication recognises this fact[230] 1910s WIA Established The public at large was fascinated by wireless generally, and individuals with a practical bent were wanting to explore the technology for themselves. While the WT Act 1905 made specific provision for licensing of wireless experimenters, the PMG's Department employed its absolute discretion in the matter to great effect with only a handful of private licences issued before 1910. Robert Scott made much of the secrecy provisions and penalties for interfering with Government communications.[231] George Augustine Taylor was a prominent patriot advocating for the need for more support for aviation and wireless in Australia with a view to its future defence. As early as October 1909 he was publicly stating the need for an institute to represent the interests of private experimenters and particularly to press for relaxation of policy in respect of licensing of wireless experimenters. It was clearly implied that many wireless experimenters were being forced to operate without licences.[232] Hannam was becoming incredibly frustrated, having waited 18 months for his application to be processed and he embarked upon a publicity campaign to try to change the system. His efforts were eventually assisted by solicitor F. Leverrier another experimenter desiring a licence. The timing of the campaign seemed rather more than fortuitous.[233] On 11 March 1910 a preliminary meeting was held with a view to formally constituting an institute. The Daily Telegraph reported the event under the catchcry headline Three Guineas for the use of the Air: Wireless telegraphy experimenters and enthusiasts are beginning to co-operate, and a number met last afternoon in the Hotel Australia in order to take the preliminary steps towards forming an institution. Vigorous comment was made upon the Government's action in regard to experimental licenses, and it was plain that besides a feeling for mutual help and interest, the restrictions alleged had had a large share in hurrying on the movement. Two ladies were among those present. Mr. G. A. Taylor, who was elected chairman, explained the object of the meeting, and touched on the wonderful future ahead of the movement. "It is wise," he said, "to put our heads together and profit by each other's discoveries. Experimenters did not think the authorities were giving them fair encouragement. Every experimenter was at the beck and call of the military, naval, and postal authorities, and was allowed no legal redress if departmental officers thought he was breaking the rules. Mr. Taylor proposed the formation of an institution amongst experimenters and enthusiasts in wireless, for their mutual benefit. The object of founding the institution was to obtain justice, he explained; it would not be founded in opposition to any Government institution or department. Walter Henry Hannam, seconding the motion, repeated the account of his attempts to obtain a Government license. I have had a great deal of trouble with three Postmaster-Generals," said he, "and haven't got my license yet. They're still quibbling. We have all been treated in the same way, but no one has said or done anything until lately. Seventeen months of my time have been wasted since I was ready to erect my plant. Why should we have to pay three guineas for the use of the air, so far as experiments are concerned? The aerial navigation experimenters are charged nothing." One regulation, he complained, penalised an experimenter if the chief electrical engineer of the Postmaster-General's Department should certify telegraphic communication had been interfered with by his wireless appliance used "or intended to be used"! J. H. A. Pike also supported the motion, which was carried, and a provisional committee was appointed to arrange for the next meeting. Later, a general meeting of those interested will be called, and officers elected. It is proposed to assist in the formation of, and perhaps affiliate with, similar organisations in other States. The provisional committee is as follows:— Messrs. J. H. A. Pike, Walter Henry Hannam, F. Bartholomew, W. H. Gosche, F. and H. Leverrier, F. A. Cleary, and A. Garnsey, Major Rosenthal, Captain Cox-Taylor, Dr. Brissenden, and the chairman. Mr. Hannam will act as hon. secretary pro tem. Besides these gentlemen, the Misses Perratt Hill, and Messrs. R. B. Armstrong and J. A. Henderson attended, and gave in their names as prospective members.[234] On 22 April 1910 the first formal meeting was held at the Employers' Federation rooms. There were 36 in attendance and it was announced that membership already stood at 70 persons. The name "Institute of Wireless Telegraphy" was adopted.[235] Prominent experiment(er)s J. H. A. Pike Walter Henry Hannam William Henry Haire Wilkinson Hotel Australia Australasian Antarctic Expedition 1911-1914 Coastal network Tranche 0 Floating coastal stations The delay of more than a decade by Australia in commencing to establish a network of coastal stations, meant that Australia had failed to keep pace with the deployment of wireless fitouts on shipping. Many shipping lines insisted that the capital and ongoing expense of wireless equipment would not be incurred until at least the high-powered stations in the coastal radio network had been established. But since these ships were often also operating in other regions where coastal stations existed, many ships proceeded with wireless regardless. As a result the large numbers of wireless equipped ships plying the Australian coast at any given time in the early 1910s, meant that ships remote from ports could often relay messages through other ships closer to port, to give effect to communication upon its arrival. Coastal network Tranche 1 Hotel Australia The Australasian Wireless Co. had established a low power experimental station at Hotel Australia, Castlereagh St, Sydney. Hotel Australia was at the time, Australia's most luxurious hotel and the destination of choice for the wealthy and famous. The hotel was the venue for the first meeting for the establishment of the Wireless Institute of Australia in March 1910. This station itself, was useful to the company, primarily for testing equipment at its main station at Underwood St, Sydney (the head office for the Bulletin, part owner of the company). It is first reported in the press in November 1910, but this appears to be a major upgrade rather than initial usage. Medium power equipment was transferred at this time from Underwood Street and a large antenna installed on the rooftop of the hotel, at its highest 80ft. above the roof (170 ft. AGL). The wireless apparatus was installed in a room immediately below the roof.[236] The apparatus was of the Telefunken system, the company having the rights to that system in Australia.[237] The PMG allocated the callsign AAA.[238] Despite its brief existence, the station made its mark in history. On 5 December 1910, a journalist of the Sydney Sun conducted an "interview" with world champion sculler Dick Arnst, by means of the Hotel Australia station and the fitted-for-wireless RMS Ulimaroa. This was claimed as an Australian first.[239][240] In a sideline story, the journalist provides an eloquent description of the wireless room.[241] In another triumph, the Hotel Australia station played a major part in establishing that the training ship Mersey was fine when fears were held for her safety at sea.[242] Due to delays in the establishment of the high power Pennant Hills coastal station, Australasian Wireless Co. (the contractors for the construction of the Pennant Hills station), sought and received a commercial licence to establish at their own cost a temporary facility at Hotel Australia. This new licence was given effect without material change to the technical equipment already installed there. But now the company could advertise its formal approval to solicit communications with nearby merchant shipping, and to charge for the service. The station formally commenced service on 3 June 1911.[243] The service appears to have been an immediate commercial success and daily advertisements offering communication appeared in the local newspapers, together with a list of ships expected to be within wireless range on the day.[244][245] It is telling that the Postmaster-General's Department intervened with the Australasian Wireless Co. to increase the rates for transmission of messages. This was to ensure parity with future charges for the Pennant Hills station.[246] A controversy enveloped the station 1 January 1912 when Farmer, the operator of the station reported brief wireless contact with the Macquarie Island station of the Australasian Antarctic Expedition immediately after the Island being in communication with HMS Encounter. Subsequently the Encounter asserted that no such communication had occurred and the PMG made definitive statements to that effect. It was considered in the press that Farmer had been the victim of a hoax. But Farmer held to his statements. Hotel Australia was using Telefunken equipment identical to that at Macquarie Island which was distinctive in note. Also the two Macquarie Island wireless operators were Charles Albert Sandell and Arthur John Sawyer. Sandell was formerly a Sydney experimenter while Sawyer was, immediately prior to the expedition, was the chief operator at the Hotel Australia station. Farmer would have been familiar with the "fist" (the distinctive operating style) of either operator, and on balance of evidence it does appear that the contact occurred, despite it being the height of summer in the southern hemisphere.[247][248] Farmer nevertheless promptly responded to Macquarie Island when a message was relayed from the RMS Ulimaroa to Hotel Australia, being a message from Sawyer to his mother. P. Farmer quickly established direct communication with Macquarie Island, which stated that they had been hearing Hotel Australia for some time. Farmer provided a vast amount of Australian news for the Island's crew and indertook to provide daily updates henceforth.[249] This was an era of rapid repositioning in wireless regulation. Balsillie had been engaged as Commonwealth wireless expert and offered his "Australian Wireless" system gratis to the Commonwealth. The Australian Wireless system was evaluated by an independent expert and found to be more efficient than either the Marconi system or the Telefunken system. The Commonwealth promptly swung its support behind the Australian Wireless system. The first two coastal stations had been contracted to Australasian Wireless Co. but the Commonwealth now swiftly proceeded with new stations commencing with Melbourne (callsign VIM) and Hobart (VIH). Pennant Hills (callsign VIS) was essentially complete, but the Commonwealth would not sign off on "practical completion". Australasian Wireless Co. did not seem entirely unhappy with this system, as it permitted the commercial operations at Hotel Australia to continue for a longer period than envisaged. Finally, on 3 June 1912, the Department gave three months notice of cancellation of the commercial licence, stating that if Pennant Hills was not complete at that time, they would make alternative arrangements.[250][251] Circa 3 September 1912 the AAA equipment was relocated back to Underwood St (becoming callsign ATY).[252] The "alternative arrangements" alluded to by the PMG were made clear on 10 September 1912 when equipment at Pennant Hills failed, only a few days after cancellation of the licence and the outage was covered by wireless apparatus at Father Shaw's wireless factory at Randwick, the facility at Hotel Australia being dismantled.[253] AAM Hotel Menzies The Postmaster-General approved the establishment of another commercial licence for AWCL at the Menzies Hotel in Melbourne. The callsign AAM[22] was allocated by the PMG's Department, however there appear to be no reports of actual operation by the station, so it is probable that the proposal did not proceed. Coastal network Tranche 2 The high power government coastal station at Sydney had originally been specified in the contract with Australasian Wireless Co., Ltd. to be at a coastal location. This was with a view to taking full advantage of superior radiofrequency propagation across sea water. But Defence had not been properly consulted and when they became fully aware of the circumstances, they insisted on an inland location to provide immunity from enemy shelling. Eventually the Pennant Hills location was selected and acquired, but in order to be confident of meeting contractual performance requirements, Australasian Wireless insisted that the transmission facility be of greater power. A substantial increase in contracted price resulted. VIS Sydney (commenced xxxx, callsign during testing by Australasian Wireless unknown, then POS for Post Office Sydney, after 1912 convention VIS) VIP Perth (commenced xxxx, callsign during testing by Australasian Wireless MNS[254], initially proposed though never implemented POF[255] for Post Office Fremantle, then POP for Post Office Perth, after 1912 convention VIP) From 1912, the government progressively established a wide network of low and high power coastal stations to facilitate communications with shipping throughout the Commonwealth. The earlier temporary stations were replaced and the network expanded, eventually consuming the entire series of callsigns VIA to VIZ. Experimental licensing (a trickle) Experimental licensing (a stream) Experimental licensing (a flood) Coastal network Tranche 3 Following the Government's decision to utilise Balsillie's system for all further deployments in the Coastal network, developments proceeded apace and all capital cities were quickly provided with wireless telegraph stations: VIM Melbourne (commenced 8 February 1912, callsign initially POM for Post Office Melbourne) VIH Hobart (commenced 30 April 1912, callsign initially POH for Post Office Hobart) VIB Brisbane (commenced 2 September 1912, callsign initially POB for Post Office Brisbane) VIA Adelaide (commenced 1 October 1912, callsign initially POA for Post Office Adelaide) VIM Melbourne (commenced 8 February 1912) VIH Hobart (commenced 30 April 1912) VIB Brisbane (commenced 2 September 1912) VIA Adelaide (commenced 1 October 1912) Balsillie arrived in Adelaide 3 July to undertake preliminaries for the construction of the station. Previously in Hobart, he had undertaken tests of various types earth systems, but stated that the Adelaide system would be conventional. The transmitter site was stated to be Rosewater near Port Adelaide. On 5 July 1912 he proceeded to Brisbane and was to return to Adelaide subsequently with the raising tackle.[256] International Radiotelegraph Convention 1912 Most countries with existing or proposed coastal radio services participated in a conference in London. The primary work of the conference was to prepare a Convention to govern overall principles of operation of their services as well as a set of Regulations to details specifics of operation and protocols to be adhered to. Coastal network Tranche 4 From 1912, the government progressively established a wide network of low and high power coastal stations to facilitate communications with shipping throughout the Commonwealth. The earlier temporary stations were replaced and the network expanded, eventually consuming the entire series of callsigns VIA to VIZ. Upon the completion of the capital city stations, work commenced on further stations at commercially and defence-strategic locations and Australia finally had a network capable of servicing all vessels plying their trade in passengers and cargo along its vast coastline: VII Thursday Island, Qld. (commenced 26 February 1913) VIG Port Moresby, Papua (commenced 26 February 1913, callsign later changed to VJZ) VIY Mt Gambier, S.A. (commenced 1 March 1913) VIN Geraldton, W.A. (commenced 12 May 1913) VIR Rockhampton, Qld. (commenced 24 May 1913) VIC Cooktown, Qld. (commenced 12 June 1913, closed circa 1948, callsign later allocated 1960s Carnarvon, W.A.) VIE Esperance, W.A. (commenced 21 July 1913) VIT Townsville, Qld. (commenced 7 August 1913) VIO Broome, W.A. (commenced 18 August 1913) VID Darwin, N.T. (commenced 25 September 1913) VIL Flinders Island, Tas. (commenced 8 October 1913) VIZ Roebourne, W.A. (commenced 26 January 1914) VIW Wyndham, W.A. (commenced 18 May 1914) King Island, Tas. (commenced January 1916) VII Thursday Island, Qld. T-1912 (commenced 26 February 1913) T-1926 The seriously ageing transmission plant at the Thursday Island coastal radio station was finally replaced in February 1926: ILLUSTRATIONS. THURSDAY ISLAND WIRELESS. The new coastal radio transmitting plant for Thursday Island comprises a 7-10 K.W. set, capable of C.W., I.C.W., and (with attachment) telephony. It was manufactured at the radio-electric works of Amalgamated Wireless (Australasia), Limited. The panel on the left hand accommodates the oscillator and rectifier valves, with their associated power transformers, and smoothing circuits. By means of the high tension switching panel, located immediately in front of the valves, it is possible to change the power circuit arrangements to allow for signalling by continuous waves or radio telephony, and tonic train transmission at a frequency of 300 cycles per second. The latter method of signalling is accomplished by connecting the 300-cycle alternating cur-rent supply direct to the plates of the oscillator valves. Below the valves is situated the high tension power trans-former with two 12,500-volt secondary windings, and behind it are the filter condensers, filter reactor, and filament lighting transformer. The power control of this oscillator is taken care by the control panel to the right, which is located in the operating room. The four meters on the top enable the operator to see at a glance the condition of the various power supplies, filament voltages, and plate current; while the other controls and switches are for the regulation of various supplies to the desired valve. To the right of the panel are the transmitting inductances, wound with heavy copper tubing, and insulated to withstand the very heavy frequency potentials to which they are subjected in operation. The engine alternator unit employs a Fordom four-cylinder water-cooled high speed engine, directly coupled to a rotary field 300-cycle, 7.5 KVA alternator which is excited by means of the D.C. generator on its left. This generator, in addition to supplying direct current, has slip-rings for the supply of alternating current at 50 cycles to operate the filament lighting transformers. On the four-cylinder engine a sensitive governor keeps the speed within exceptionally close limits, which is essential on account of the rapidly fluctuating load caused by telegraph signal-ling. Electric starting is also employed, to obviate the necessity of the operator leaving the operating room to attend to this detail.[257] T-1929 Technology for power generating plant was rapidly progressing in the late 1920s. AWA embarked upon a program of network wide upgrades as reported in February 1929: NEW POWER-GENERATING PLANT FOR A.W.A. COASTAL RADIO STATIONS. An interesting power plant has recently been assembled to the order of Amalgamated Wireless (A/asia) Ltd., consisting of a 4-cylinder Fordson tractor engine, direct coupled to a 250-volt 500-cycle alternator and a double current 240-volt D.C., 160 volt 60-cycle generator, the whole being mount-ed on a heavy girder bedplate. Special features comprise the fitting of impulsator ignition and a governor, the first-mentioned for easy starting and the latter for consistent speed under varying loads. A starting motor is fitted in order that the engine may be started at a distance by means of a switch from the operating table at the wireless station, another switch being provided to stop the engine when required. The object of the plant is to generate power for operating the wireless transmitters at A.W.A. coastal radio stations. Power units of this description have already been fitted at the coastal radio stations at Thursday Island, Brisbane and Suva. At the latter station duplicate power equipment is installed. Those power units are shortly to be installed at the coastal radio stations at Broome (W.A.) and at Darwin (N.T.).[258] VIG Port Moresby, Papua (commenced 26 February 1913) VIY Mt Gambier, S.A. (commenced 1 March 1913) VIN Geraldton, W.A. (commenced 12 May 1913) VIR Rockhampton, Qld. (commenced 24 May 1913) VIC Cooktown, Qld. (commenced 12 June 1913) VIC was originally intended for construction after the VIT Townsville station, but there were difficulties with site acquisition at Townsville and VIC was brought forward. When, in November 1912, supervising engineer A. S. MacDonald arrived at Townsville to arrange onforwarding of the wireless apparatus to Cooktown, there was concern in the town that Townsville would be removed from the deployment programme. Formal protest by the local Chamber of Commerce was made.[259] In late November 1912 it was reported that: "During last week over 20 men were employed in making a passable road to Bald Hill, the site of the wireless station (says the Cooktown "Independent" of 26th November), and on Friday a start was made by Mr. T. E. Thomas , with a team of five horses, in carting the material. On Sunday afternoon quite a large number of people were to be seen climbing the hill out of curiosity to see the site on which the station is to be erected."[260] The wooden mast was hauled into position 8 January 1913.[261] The station commenced 12 June 1913 without florish. In early July 1913 is was reported: "The local wireless station has been sending and receiving messages for the past three weeks. The longest station so far communicated with was New Zealand, a distance of about 2,800 miles.[262] VIE Esperance, W.A. In September 1912, John Graeme Balsillie was at the Perth coastal station to confirm performance of VIP and stated that Esperance was to be included in the coastal network and would be commissioned before June 1913.[263] The Albany Chamber of Commerce had been seeking the installation of a coastal station at Albany, but in January 1913 the PMG Department advised that Esperance was the chosen location and as the range of that station would be 350 miles, an Albany station would not be required.[264] The oversight of construction of the station was to have been entirely by Mr. Cox.[265] The Western Mail of 24 January 1913 reported: "Work has commenced on the wireless station. Mr. Cox is the officer in charge and Mr. Mason the operator. The site chosen is on Dempster's Head, and has an elevation of about 300ft. with an uninterrupted view of the Southern Ocean, except for a few islands."[266] However at the end of January 1913, Cox was relieved in order to proceed to Wyndham and select a site there and to overcome other difficulties with that station.[267] A detailed progress report on the installation at the end of March 1913 also sheds light on the process of erecting a typical mast of the medium power stations: The work is progressing (says a correspondent) at the Wireless on Radio Telegraph Station at Esperance, and the mast, one of the principal items of a station, is erected to enable the aerial wires to be suspended at a suitable height, so that intervening obstacles will not obstruct the message. The mast has been built on the site where the station is erected, and is 160 feet in length, having about 5880 superficial feet of oregon, bolted and coach screwed together, and is 21 in. square, its approximate weight being 25 tons. Three thousand bolts have been used in the putting of the mast together. The planning and construction of the mast has been carried out under the supervision of Mr. Mason, of Melbourne, and the work compares favourably with any of the similar masts that have been erected on the Australian coast. The raising of this lengthy and weighty mast is a work requiring skill and experience. Mr. J. Johnson of Melbourne, had this part of the work entrusted to him, of which he is an expert. A derrick, 40 feet in height, was erected first and by means of this derrick the jury mast, which was built on top of the mast as it lay on the ground, was raised to an upright position. This jury mast, 75 feet in height, was built up of oregon planks, to a width of 21 in. square and it weighs about 10 tons. The heel of the jury mast was fixed with stout iron plates and bolted on top at the heels of the mast, and five banjo stays from the top of the jury mast were fixed to the main mast at 25 feet apart. These stays hold the mast all along its length and prevents its buckling. An 8-inch Manila rope, through purchase blocks, was fixed to the top of the jury mast, and to a powerful winch. The winch is geared at 32 to 1, and with this eight men were able to raise the mast from the ground, a lift which is estimated to have a pull equal to a 90-ton load, and in pulling down the jury mast the mast slowly but surely ascended to its height of 160 feet. The time taken in raising the mast occupied five and a half hours, and the mast now stands in the proper position and is quite a landmark, and can be seen for miles around. The mast is erected on an ebbwater position. The surface is of concrete. The foundation on which the mast stands is about 250 feet above sea level. The mast is guyed by 12 wire stays at the four corners of the compass. On top of the mast is a 20 ft. gaff, from which the aerial wires are suspended, and that on which the messages are received and conveyed. The electrical parts of the wireless station are entrusted to Mr. M. L. Lloyd, who has had experience in wireless telegraphy. The buildings in which the engines and receiving stations are to be are in course of construction. The walls are of concrete, and this part of the work is carried out under the supervision of Mr. G. Riley, and with the gang of men under him he will soon, have the buildings completed. The station, when in working order, will be lit up by electric light, generated on the station. The Esperance Radio Telegraph station will undoubtedly be one of the sights of Esperance.[268] VIE formally commenced operation 21 July 1913.[269] After the commencement of WW1, a brigade of 20 men was despatched to Esperance for the purpose of guarding the wireless station. The Albany Advertiser reported: "On Wednesday morning 20 men of the 88th Infantry Brigade arrived at Albany by train, en route for Esperance. Upon arrival Lieut. Morris, who is in charge, formed the men up outside the station. After being inspected by Major Meeks they were marched to the steamer Eucla, lying at the Town Jetty. The squad are going to Esperance for the purpose of guarding the wireless station."[270] In early 1916, Charles Albert Sandell one of the wireless operators at the Macquarie Island station of the Australasian Antarctic Expedition was stationed at Esperance and gave a lecture there about his Antarctic experiences.[271] VIT Townsville, Qld. (commenced 7 August 1913) VIO Broome, W.A. (commenced 18 August 1913) VID Darwin, N.T. (commenced 25 September 1913) VIL Flinders Island, Tas. (commenced 8 October 1913) VIZ Roebourne, W.A. (commenced 26 January 1914) VIW Wyndham, W.A. (commenced 18 May 1914) King Island, Tas. (commenced January 1916) AWA established Ernest Fisk (1886–1965) was the dominant figure among numerous pioneers in early wireless developments. Fisk headed Amalgamated Wireless (Australasia) (AWA) during 1917–44, when it was a leader in electronics manufacturing and broadcasting.[272] World War 1 commences Hostilities were declared in 1914 and out of this immense tragedy, the sole victor was technology. War Precautions Act 1914 The War Precautions Act , No 10 of 1914[273] was an Act to enable the Governor-General to make Regulations and Orders for the safety of the Commonwealth during the present state of war. It was assented to 29th October, 1914. The Act was brief and incorporated into the Defence Act 1903-1912. It was designed: to prevent persons communicating with the enemy, or obtaining information for that purpose or for any purpose calculated to jeopardize the success of the operations of any of His Majesty's forces, in Australia or elsewhere, or to assist the enemy; or to secure, the safety of any means of communication or of any railways, docks, harbors, or public works; or to prevent the spread of reports likely to cause disaffection or alarm. The Act was extensively amended through the course of WW1, twice in 1915, again in 1916, and finally in 1918, before being repealed in 1920 by the War Precautions Act Repeal Act 1920.[274] The War Precautions Act itself was silent in respect of specific provisions addressing wireless telegraphy, however the War Precautions Regulations (Statutory Rules, 1915, No 77)[275] of 19 May 1915 rectified this. Section 23 was as follows: No person shall without the written permission of the Postmaster-General, make, buy, sell, or have in his possession or under his control, any apparatus for the sending or receiving of messages by wireless telegraphy, or any apparatus intended to be used as a component part of such apparatus; and no person shall sell any such apparatus to any person who has not obtained such permission as aforesaid; and if any person contravenes the provisions of this Regulation, he shall be guilty of an offence against the Act. If the competent naval or military authority has reason to suspect that any person having in his possession any apparatus for sending or receiving messages by telegraphy, telephony, or other electrical or mechanical means, is using or about to use the same for any purpose prejudicial to the public safety or the defence of the Commonwealth, he may by order, prohibit that person from having, any such apparatus in his possession, and may take such steps as are necessary for enforcing the order; and if that person subsequently has in his possession any apparatus in contravention of the order, he shall be guilty of an offence against the Act. For the purposes of this Regulation, any apparatus ordinarily used as a distinctive component part of apparatus for the sending or receiving of messages by wireless telegraph, shall be deemed to be intended to be so used unless the contrary is proved. Again the regulations were amended several times throughout the course of the war and subsequently. A typical prosecution under the act and regulations was reported as follows: "Toy Wireless Apparatus; Hapless Owner Pilloried with Penalty of £15/15/-; Henry Albert Livermore, engineer, of 239 Nicholson street, was fined £10, with £5 5s costs, at Footscray Court on Thursday for having in his possession, contrary to the War Precautions Act, certain parts of a wireless telegraph apparatus. Wm. T. S. Crawford, Radio Inspector for the Mail Department, found in a shed at Livermore's place certain wireless apparatus customarily used by an amateur for demonstration purposes. It would be possible with the parts there to transmit messages for a distance of 100 yards, but not to receive them. The P.M. in imposing the fine, said the times were too serious to have wireless plant left lying round, and the penalty was just to emphasise the point that possession of wireless plant must be reported and a licence obtained. The P.M. excused defendant of any illicit dealing. Livermore had, further, to enter into a recognisance of £25 to comply with the regulations.[276] No record has yet been identified of Livermore ever having held a wireless experimenter's licence. Amateur experiments cease AWA enemy part ownership The AWA company was part-owned by Telefunken and upon declaration of war, shareholdings of all German-based firms were effectively quarantined. The degree of control over the company exercised by Fisk was greatly increased by this action. More than a decade would pass (long after cessation of hostilities) before ownership of these shares would be resolved. Naval Wireless WW1 The Australian Navy was already well advanced in its use of wireless telegraphy at the time of commencement of WW1. Additional ships were acquired and constructed and deployed in the war effort in unison with the British Navy, with principal deployments in the southwest Pacific. All vessels of any size or war capacity were fitted with wireless which now became indispensable. Australian wireless experimenters were welcome recruits as wireless officers and men, and served with particular distinction. Military Wireless WW1 The Australian military was not so well advanced in wireless as the Australian Navy, but quickly came up to speed in expanding the numbers of officers and men, as well as acquiring the necessary materials to equip several signals divisions. There were several campaigns, mostly in the Middle East, but the deployment to Mesopotamia was both prominent and noteworthy. As in the case of the Navy, Australian wireless experimenters were welcome recruits as wireless officers and men, and served with particular distinction. Wireless Telegraphy Act 1915 With the commencement of WW1, the government of the day desired to place all matters relating to wireless telegraphy under defence control while necessary. To this end the Wireless Telegraphy Act 1905 was amended to provide greater flexibility by replacing the delegation of powers specifically to the "Postmaster-General" to "the Minister for the time being administering the Act." https://www.legislation.gov.au/Details/C1915A00033 Wireless control to Navy Upon the amendment of the Wireless Regulations to transfer control of wireless from the Postmaster-General's Department to Department of Defence, the entire staff of the PMG's wireless section was transferred to Department of Navy. World War 1 concludes Wireless Telegraphy Act 1919 Again, while it appeared clear that the Constitution of the Commonwealth of Australia placed responsibility for wireless telephony with the Commonwealth, to remove any possible doubt, the Wireless Regulations of 1919 made explicit provision for this form of communication, recognising the increasing importance of the technology. First taste of wireless telephony Wireless regulation in Australia remained under the control of the Department of Navy after the close of World War I and licensing was very largely limited to shipping and coastal stations. Wireless telegraphy was almost universally employed for communication due to its efficiency and capacity for long distance transmission. However, there are several reports of telephony transmissions, both music and speech, from international ships visiting Australian ports in the years immediately following World War I. Similarly, enterprising individuals at the coastal stations from time to time provided brief periods of music transmissions. While the equipment was designed for wireless telegraphy, modification to permit telephony was possible. The wireless operators on these ships and coastal stations were often also keen wireless experimenters in private life. The ships were visited by the land-based hams while in port and their equipment viewed in awe. The U.S.A. in particular was years ahead of Australia in use of telephony and their wireless-equipped ships offered rare glimpses of the state of the art for Australian experimenters. At first the listening audience was restricted to other ships and coastal stations, but from 1920, private experimenters were licensed (for reception only). Initial demonstrations of broadcasting Much was made then (and still is) of the 13 August 1919 demonstration of wireless telephony by Ernest Fisk (later Sir Ernest) of AWA – Amalgamated Wireless. "At a lecture on wireless communication before the industrial section of the Royal Society on Wednesday night, Mr. E. T. Fisk gave a remarkable demonstration of wireless telephony with the aid of an apparatus designed and manufactured in Sydney by the Amalgamated Wireless Company. A gramophone was played into a wireless telephone transmitter at the company's works in Clarence street, and the music was received on a few wires strung along the wall in the Royal Society's lecture-room in Elizabeth Street. The music was clearly audible in all parts of the hall. The lecture was suitably closed with the audience standing while the National Anthem was played by wireless telephone."[23]</ref> Early concerts and amateur broadcasting Following the successful public demonstrations of broadcasting by the AWA and others, the AWA commenced in 1921 a regular series of concerts that were widely heard all over Australia and laid a framework for the introduction of broadcasting in Australia. The handful of wireless experimenters licensed to transmit at the time also commenced regular and intermittent transmissions of speech and music. A number of amateurs commenced broadcasting music in 1920 and 1921. These included 2CM, Sydney; 2YG, Sydney; 2XY, Newcastle; 3ME, Melbourne; 3DP, Melbourne; 4CM, Brisbane; 4AE, Brisbane; 4CH, Brisbane; 5AC, Adelaide; 5AD, Adelaide (not associated with 5AD which commenced in 1930); 5BG, Adelaide; 7AA, Hobart; 7AB, Hobart. Many other amateurs soon followed.[277] 2CM was run by Charles MacLuran who started the station in 1921 with regular Sunday evening broadcasts from the Wentworth Hotel, Sydney. 2CM is often regarded as Australia's first, regular, non-official station.[277][278] 1920s Placeholder 1930s Placeholder 1940s Placeholder 1950s Placeholder 1960s Placeholder 1970s Placeholder 1980s Placeholder 1990s Placeholder 2000s Placeholder 2010s Placeholder Topical Placeholder External territories Placeholder Australian Antarctic Territory Placeholder Christmas Island Placeholder Cocos (Keeling) Islands Placeholder Coral Islands Willis Island in the Willis Islets was utilised as a meteorological observation station even prior to wireless telegraphy development. Coastal shipping deposited and retrieved observers for annual stints at this lonely outpost off the northern Queensland coastline. Wireless equipment was first deployed in the 1910s around the time of the establishment of the coastal station network. An already valuable station, it became invaluable with the ability to communicate weather observations of approaching cyclones which would subsequently directly impact the northern Queensland coast. In later years, many of the observer / operators were licensed radio amateurs and there is at least once instance recorded of one of the hams conducting broadcasts. Macquarie Island Wireless telegraphy was first established at Macquarie Island in 1912 as part of the Australasian Antarctic Expedition. The callsign allocated by the PMG Department was MQI, which was a duplicate with that for the SS Saxon of the Union-Castle Line (such duplication was common prior to implementation of the 1912 London agreement).[279] Following implementation of the agreement, the callsign was changed to VIQ.[280] Practical equipment of the day was not capable of a direct link between the main base at Cape Denison on the Antarctic mainland and their Hobart main base. Mawson decided to establish an intermediate station at Macquarie Island primarily to relay messages between Cape Denison and Hobart (VIH), but also to originate its own messages. Walter Henry Hannam oversighted the construction and commissioning of the Macquarie Island station, then left the facility in charge of Charles Albert Sandell, in accordance with Expedition plans. Much to his chagrin, the Macquarie station proved effective from the start and continued so, while the Cape Denison station in its first year was problematic at best. The meteorological data from Macquarie was considered so important that upon the relief of the two expedition wireless operators in 1914, the Department of Meteorology provided two further operators to continue the data gathering a further year. Arthur John Sawyer Charles Albert Sandell Nauru During the wireless era, the island country of Nauru saw a variety of colonial rulers. It was annexed by Germany in 1888 and incorporated into her Marshall Islands protectorate. Following the outbreak of World War I, the island was captured by Australian troops in 1914. The Nauru Island Agreement made in 1919 between the governments of the United Kingdom, Australia and New Zealand provided for the administration of the island and for working of the phosphate deposits by an intergovernmental British Phosphate Commission (BPC). The terms of the League of Nations Mandate were drawn up in 1920, but it was not till 1923, the League of Nations gave Australia a trustee mandate over Nauru, with the United Kingdom and New Zealand as co-trustees. Japanese troops occupied Nauru in mid-1942. The Japanese garrison surrendered to Australian troops in September 1945. In 1947, a trusteeship was established by the United Nations, with Australia, New Zealand, and the United Kingdom as trustees. Nauru became self-governing in January 1966, and following a two-year constitutional convention it became independent in 1968. N-1908 The earliest reference to the possibility of a wireless station at Nauru is September 1908, when an English syndicate by the name of Pacific Islands Radio Telegraph Company proposed the establishment of a wide chain of stations across the South Pacific: LINKING THE PACIFIC. COMPLETE WIRELESS SERVICE. A VALUABLE SCHEME. BENEFIT TO SHIPPING. In the cable news yesterday was an item to the effect that the "New 'York Herald" announced that a plan was taking shape to link the important islands of the Pacific by wireless telegraphy. This referred, no doubt, to the scheme proposed by the Pacific Islands Radio Telegraph Company, an English syndicate, whereby not only would the wireless system be installed on the various islands, but connection would also be made between Australia and New Zealand. The company has been working on the scheme for some months, and it is understood that their suggestions are meeting with the favourable consideration of the various Governments concerned. It is intended to thoroughly cover Oceania. Every island or group of importance will be provided with a radio-telegraphic station. The exact location of all these stations has not yet been disclosed, but it is known definitely that among the points selected are Fiji, Samoa, New Hebrides, Solomon, Marshall, Caroline, Gilbert, Fanning, Sandwich, Tahiti, Tonga, and New Guinea. It is also on the cards that the Pacific Phosphates Company will have the installation carried out on their possessions. Ocean and Pleasant Islands. The promoters of the scheme are meeting with every encouragement, and by the end of the year it is anticipated that a start will be made with active preparations for installing the service. The company is to maintain communication, and for so doing is asking the various Governments controlling the places to be benefited, to support the service. It is understood that the Fijian authorities have proposed to pay a large sum for the installation of the service on the principal islands under their jurisdiction. Other islands have agreed to co-operate with the company, but nothing has yet been decided with regard to the two most important centres, Australia and New Zealand, without which the scheme would be incomplete. The matter has been considered by the Governments of the Commonwealth and the Dominion, and it is an open secret that the proposal has been favourably received. The question will be placed before the Federal Parliament when it meets, and should the scheme be approved of, and New Zealand be willing, no time will be lost in getting on with the work of linking up the scattered groups. It has been decided to make Suva the head-quarters in the Pacific, and from there the messages will be flashed on to Australia and New Zealand. In the Pacific the scheme is being strongly suported, as it is well known that there is little chance of a cable service between the scattered islands being installed. Traders recognise the necessity of a faster means of communication than they now possess, and once the system is started it will not be long before every island of importance is connected. In addition to the scheme proving most valuable from a commercial point of view, it will be of considerable assistance to meteorologists in forecasting the weather, as daily reports can be sent from the outlying parts giving warning of sudden changes, which will enable traders and others to prepare for the hurricanes which prove so disastrous in the islands. Then, again, it is claimed that the system will prove of valuable assistance in the matter of defence, as with stations scattered all over the Pacific, a hostile fleet will have little chance of getting close to Australia without being seen. Apart from the increased convenience to be derived from a radio service through the islands, such an installation will be of financial benefit to the Commonwealth. It is intended to transmit all messages received at Fiji from the other islands to Sydney and New Zealand by means of the Pacific Company's cable. This will materially increase the earnings of that body and the Federal Government will not be called upon to make up such a large deficiency as it does at present. It is not intended to utilise the radio service between Fiji and Australia except as an emergency, as once a cable is installed the wireless system cannot profitably compete with it. However, a wireless station will be put in close proximity to the cable station, and should the latter service be interrupted by any means, communication can be maintained with the new system. Another important feature of the scheme is its value to the shipping industry. With radio stations scattered about the Pacific Ocean and on the Australian and New Zealand coasts, the shipping companies will be able to install apparatus on their boats, and thus be able to maintain communication con-stantly with the shore. In fact, negotiations have been carried on between the Union Steamship Company and the Pacific Islands Radio Telegraphic Company with regard to the installation of the service on their liners, and it is understood that directly the island scheme is settled, all the New Zealand and island boats will be fitted with apparatus. This would prove of considerable convenience to shipping people, besides being a safeguard against such accidents as might easily befall a vessel drifting about disabled, as the Hawea did last month. The system of wireless telegraphy to be used in linking up the islands is the Poulson. This is the latest invention, being an arc system instead of a spark. The company originally used the De Forest idea, but as it found the Poulson to be much more reliable and less expensive, it altered all its stations, and installed the Danish invention. The system has been found to be thoroughly efficient. Several lines of steamers are fitted with it, and messages have been received from a distance of 2500 miles. A thoroughly competent operator can send as many as a hundred words a minute through the air, but the average sending speed is 30 words a minute.[281] The loss of the Aeon was just one of many shipping losses in the maritime history of the Pacific, but the extraordinarily long time before the loss could be confirmed was used as leverage to progress the proposal of the Pacific Islands Radio Telegraph Company: The London "Shipping World," in referring to the recent shipping disaster at Christmas Island, says:— "The long delay in advising the loss of the Aeon is likely to have a good effect in hastening the proposal to link up the Islands in the Pacific by wireless telegraphy. The scheme at present is to connect Ocean Island and Pleasant Island, of the Gilbert Group, from which large quantities of phosphate are now shipped to Australia and Europe, with the mainland of Australia, and gradually to bring the various groups of islands in the Pacific into connection. The suggested system will probably include ten or twelve circles, the largest having a radius of 1250 miles. Each station will require an engine of 60 horse power." [282] Further support to the Pacific Islands Radio Telegraph Company proposal was offered in October 1908: WIRELESS TELEGRAPHY FOR AUSTRALIA. According to a statement made by the Bureau of Manufacturers of the United States, a project is on foot to establish wireless telegraphy among the scattered islands of the Pacific Ocean. Capitalists who are interested in the extensive phosphate operations on Ocean and Pleasant Islands of the Gilbert Group, and in the new works about to be established on the island of Makatea of the Tuamotu Archipelago, are pushing the scheme, and propose to connect nearly all the groups of islands in the South Pacific by the service. It is desired to include in this system the Commonwealth of Australia, the Dominion of New Zealand, the Fijis, the New Hebrides, the Solomon, Samoan, Cook, Society, and Marquesa Islands, and the phosphate Islands of Ocean, Pleasant, and Makatea. It is expected that the various Governments having possessions in the South Pacific will aid in the establishment of the proposed system. Negotiations have already proceeded so far that the success of the efforts seems to be almost assured. The nearest available ocean cable office to Tahiti is at Auckland, 2250 miles away, from which a steamshlp of the Union line of New Zealand arrives at Papeete once every 28 days, and a direct communication by a steamship of the Oceanic Company with San Francisco, 3658 miles distant, is had once in every 36 days. The name of the proposed concern is the Pacific Islands Radio-Telegraph Company. Of the proposed capital of £70,000 the owners of the phosphate deposits on Ocean and Pleasant Islands have subscribed £10,000. In this radial system there will probably be 10 or 12 circles, the largest having a radius of 1250 miles, and requiring for each station an engine of 60-h.p. It has not yet been decided where the main office of the proposed company will be.[283] Despite a clear disposition by the Australian Government for a Postmaster-General's Department controlled and operated network of coastal stations, the Government came out, at least in principle, in favour of the Pacific Islands Radio Telegraph Company scheme: LINKING THE PACIFIC. WIRELESS TELEGRAPHY SCHEME. COMMONWEALTH GOVERNMENT APPROVES. An important scheme for linking Australia and New Zealand with many of the principal islands of the Pacific has received the preliminary approval of the Commonwealth Prime Minister, and negotiations are now proceeding between Mr. Deakin and Sir Joseph Ward with the object of defining formally the relations of the two Governments and the business men who are backing the project. The scheme is the child of an English syndicate, the Pacific Islands Radio Telegraph Company, whose representative, Mr. Hamilton, had several interviews with Mr. Deakin when he was in Melbourne a few months ago. The plans of the syndicate are comprehensive, and are said to be viewed with favor by the imperial authorities, as well as by the two Australasian Governments. Every importaunt island or group in Oceania is to be linked with Australia and New Zealand, and the location of radio-telegraphic stations at the principal strategic and commercial centres is already under discussion. It is definitely known that among the islands selected are Fiji, the New Hebrides, the Marshalls, Samoa, the Solomons, the Carolines, the Gilberts, Sandwich, Tonga, Fanning Island, Tahiti, Papua. It is also said to be probable that the Pacific Phosphates Company will have an installation of plant at their depots on Ocean and Pleasant islands. It is further stated that the Government of Fiji has promised to pay a large sum for sub-installations at the small islands under its jurisdiction. The British authorities in other islands have promised similar co-operation. So sanguine are the promoters of success that when certain negotiations in London are complete they propose to make arrangements for the installations to be made early in January, 1909. It has been decided to make Suva the head quarters in the Pacific, and to join the Oceanic wireless services with the cable service of the Pacific Cable Board. Communications have passed between the Union Steamship Company and the syndicate, and it was announced last week in New Zealand that directly the islands scheme is settled all the company's boats will be fitted with wireless apparatus. The New Zealand Government is pressing for an extension of the scheme, so as to embrace the establishment of stations on the Auckland and Chatham Islands. The Australian Prime Minister, when seen on Thursday, said that he was generally favorable to the scheme, but the details had yet to be fully discussed. He had written to Sir Joseph Ward on the matter and expected an answer by any mail.[284] N-1909 The formation of the Pacific-Radio Telegraph Company was announced in February 1909: AUSTRALIA AND THE ISLANDS. WIRELESS COMMUNICATION. A COMPANY FORMED. LONDON, Wednesday Afternoon.— The Pacific-Radio Telegraph Company has been formed, with a registered capital of £60,000, to provide inter-communication between the islands in the Pacific and Australia and New Zealand. The "Western Electrician," of Chicago, recently said, with reference to the movement to connect groups of islands in the Pacific by a system of radiotelegraphy:— "It is proposed to include in this system Australia, New Zealand, and the Fiji group, as well as the New Hebrides, the Solomon, Samoan, Cook, Society, and Mar-quesas Islands, and the phosphate islands of Ocean, Pleasant, and Makatea. "It is expected that the various Governments having possessions in the South Pacific will aid in the establishment of the proposed system. Negotiations have already proceeded so far that the success of the efforts seems to be almost assured, says Mr. J. D. Dreher, the United States Consul in Tahiti. As the nearest available ocean-cable office to Tahiti is at Auckland, 2250 miles away, from which a steamship arrives at Papeete once every 28 days, and a direct communication by steamship with San Francisco, 3658 miles distant, is had once in every 36 days, it will be understood how deeply interested the French colony of Tahiti and its dependencies are in the complete success of these negotiations. "The name of the proposed company is the Pacific Islands Radio-Telegraph Company. Of the proposed capital, of 340,000 dollars, the owners of the phosphate deposits on Ocean and Pleasant Islands have subscribed about one-seventh. In this radial system there will probably be 10 or 12 circles, the largest having a radius of 1250 miles, and requiring for each station an engine of 60 horse-power. It has not yet been decided where the main office of the proposed company, will be."[285] Further detail of the proposal emerged in March 1909: LINKING THE ISLANDS. The "Wireless" Scheme, STATIONS TO BE FITTED UP. It transpires that the scheme for linking up the islands of the Pacific by wireless telegraph is that of an English syndicate — the Pacific Islands Radio Telegraph Co. Every important island in the South Pacific is to be linked with Australia and New Zealand, and the location of the radio telegraph station <|fim▁hole|> centres is already under discussion. Among the islands selected are Fiji, the New Hebrides, Marshalls, Samoa, the Solomons, Carolines, Gilberts, Sandwich, Tonga, Fanning Island, Tahiti, and Papua. It is also said to be probable that the Pacific Phosphates Co. will have an installation of plant at their depots on Ocean and Pleasant Islands. It is further stated that the Government of Fiji has promised to pay a large sum for subinstallation at the small islands under its jurisdiction, and that the British authorities in the other islands have promised similar co-operation. When certain negotiations in London are complete, the promoters propose to make arrangements for the installation to be made early in January, 1903 [sic, 1913?]. It has been decided to make Suva the headquarters in the Pacific, and to join the Oceanic wireless service with the cable service of the Pacific Cable Board.[286] The details of the proposal and its backers were more fully fleshed out in a report of August 1909: LINKING UP THE PACIFIC. THE WIRELESS TELEGRAPHY SCHEME. Brief reference was made in "The Age" yesterday to a scheme for linking up the South Pacific Islands by wireless telegraphy, Mr. J. T. Hamilton, the representative of the Anglo-Australian syndicate, which, by the way, is backed by Earl Crawford, Sir James Mills, Sir Sidney Hutchison, Colonel James Burns and Mr. J. T. Rundle, is now in Melbourne, and called on several Federal Ministers with the object of placing his plans before them. Ministers are, on general principles, sympathetic, but until the budget statement is delivered on Thursday it is impossible to say how far sympathy is to be supported by action. In its earlier stages the scheme as a whole was watched with interest by the Federal Government, though of course no promises of aid were given. The syndicate has behind it a capital of about £60,000, but it is understood that unless the Australian, New Zealand, German and French Governments interested in the South Pacific Islands extend to its pioneer work some form of assistance its operations will be severely restricted, if not rendered altogether impossible. The scheme put forward for linking up the islands include groups of wireless telegraph stations arranged as follows:— GROUP I.— Proposed Long Distance Stations: Ocean Island, Levuka (Fiji). GROUP II.— Government Stations: Pleasant Island, Tahiti, Raratonga, Tonga, Vila (New Hebrides). GROUP III.— (Other Government stations, not essential to present scheme, but desirable from the point of view of certain Governments): Port Moresby, Samarai, Southport (Queensland), Doubtless Bay (New Zealand). GROUP IV.— (Supplementary Stations: Norfolk Island, Lord Howe Island, Vaya, Pago Pago, Jaluit (Marshall Islands), Tarawa (Gilbert Islands), Herbertshohe (German New Guinea), Ponape, Gavutu (Solomon Islands). Although in due course the project is expected to pay its way on commercial lines, it commends itself to many members of the Federal Parliament on grounds which are far removed from considerations of cash profit and loss. Under present conditions a hostile fleet could hide amongst the South Pacific Islands for months waiting for a chance to descend upon Australia, and the Commonwealth would have no means of learning of the fleet's existence. To link the islands by cable will be impracticable for a generation. To do so by wireless telegraph installations is a matter of a few months.[287] There was apparent progress with the proposal of the Pacific-Radio Telegraph Company in September 1909: WIRELESS IN POLYNESIA. Steps are being taken to install the wireless system in Polynesia. News was received by the Canadian mail steamer Marama that Mr. Arundel, one of the directors of the Pacific Radio and Electric Company, recently visited Honolulu in connection with the scheme, and extended an offer to Mr. S. A. Phelps, at present wireless operator, on board the mail steamer Alameda, to go to Ocean Island, Pleasant Island, and the Fijis, and install wireless outfits. Mr. Phelps will probably go to Vancouver and take the Canadian Pacific line to Fiji, where he will establish his headquarters, and within a few months the dots on the map which are now geographical mysteries to the junior class in geography will become as much within the ken of civilised countries as Sydney. Mr. Phelps is one of the most prominent among the wireless operators of the United Wireless Company. Several months ago he broke the long distance record for ship's wireless communication, talking with the Mariposa over several thousand miles of ocean. He will have complete charge of the proposed island wireless system, and will superintend the installation of the various instruments in the various stations.[288] N-1912 In late July 1912, there were preliminary reports of plans for a chain of high power coastal stations in the German Pacific territories: GERMAN PACIFIC ISLANDS. WIRELESS COMMUNICATION. Sydney, July 29. The German Government has granted a concession to the Telefunken Company and the German and Netherlands Telegraph Company for the installation and working of four large coastal wireless stations on the Telefunken system for the purpose of linking up the German possessions in the Pacific. There will be two stations in New Guinea and one each at Samoa and Island of Nauru. A company is being formed to work the stations.[289] More details of the new chain of coastal stations were revealed in September 1912: LINKING UP THE ISLANDS. BIG WIRELESS SCHEME. The German Government has just granted a concession to the Telefunken Company and to the German and Netherlands Telegraph Company for the installation and working of four large coastal wireless stations, on the Telefunken system, for the purpose of linking up the German possessions in the Pacific. It has been decided that each of these stations shall be fitted with a heavy iron tower 394ft. in height. They will each have a power installation of at least 120 h.p. The object of the new stations is to link together the German South Sea possessions, which so far have no connection by telegraph, of Yap and Rabaul (New Guinea), Apia (Samoa), and the island of Nauru. The new wireless stations will be connected at Yap with the German and Netherlands cable station. A company is to be formed to work the stations, and several engineers of the Telefunken Company will visit Rabaul and Yap at an early date. They will take with them all necessary machines and appliances. It is anticipated that the first two stations will be ready by April 1, 1913. The distances to be covered by the installations are:— Yap to New Guinea, 1367 miles; from Yap to Nauru, 2113 miles; from New Guinea to Samoa, 2486 miles; from New Guinea to Nauru, 1056 miles; and from Nauru to Samoa, 1678 miles.[290] Again in September 1912, When further details of the German proposal were revealed in the British Press, unfavourable comparisons were drawn with the costs and conditions pf Marconi's Imperial Wireless Telegraph Scheme: Various questions asked in the House of Commons indicate a belief that the British Government is probably paying the [[w:Guglielmo Marconi|Marconi} company too well, both in respect of capital outlay, and royalty, for its services in connection with the Imperial wireless telegraph scheme. An alternative course is shown by the arrangements which Ger-many has just completed for the establishment of similar communication between its island possessions in the Pacific. The undertaking is to be financed, not by the Government, but by a company, which has just been formed with a capital of £650,000. A concession for 20 years — 8 years shorter than the term fixed in the case of the British scheme — has been granted to the company, on which the Imperial post office will be represented by a commissary. The construction work is to be entrusted to the Telefunken company. Four large stations will be built — at Rabaul, in New Guinea; Apia, in Samoa; Nauru, in one of the Marshall Islands; and on Yap, which is one of the Caroline Islands. The latter contains the cable station of the German-Dutch Telegraph Society. A Berlin report in the "Times" states that the inadequacy of communication between the German possessions in the Pacific, which has necessitated the use of cable lines in foreign hands, has long been a subject of complaint in the German press, both on commercial and on strategic grounds. The provision in other German possessions has been rather more satisfactory. There is a wireless station at Swakopmund, in German South-west Africa, and another at Luderitz Bay. Both have a range of 625 miles. There has also been a proposal for the establishment of wireless communication between the Cameroons and Togo.[291] In October 1912, the foreshadowed shipment of equipment for Nauru was reported: LINKING UP THE GERMAN ISLANDS. The scheme for linking up the islands of the Bismarck Archipelago by wireless is being pushed on rapidly. A quantity of apparatus has already been landed at New Britain, where the wireless station is now being erected. Nauru Island, the well-known phosphates depot attached to the Caroline Group, will be another station. The appliances, together with a quantity of gear for the station at Nauru, has been shipped by the steamer Australian Transport, which sails from Sydney today direct for the islands.[292] A December 1912 report in The Sun (Sydney) provided detail of the operating company for the venture: GERMANY IN THE PACIFIC. BIG WIRELESS SCHEME. A company called the German South Sea Company for Wireless Telegraphy has been formed with a capital of 3,250,000 dollars for the purpose of wirelessly linking up Germany's possessions in the Pacific. The company has obtained a concession for twenty years from the Imperial Post Office, which will be represented in the company by a commissary. The work will be entrusted to a German wireless society. Four large stations will be built at Rabaul in New Guinea, Apia in Samoa, Nauru in one of the Marshall Islands, and Yap, which is one of the Caroline Islands. On Yap is a cable station of the German-Dutch Telegraph Society. The inadequacy of communication between the German possessions in the Pacific, which have been obliged to use cable lines in foreign hands, has long been a subject of complaint in the German press, both on commercial and strategic grounds.[293] N-1913 In the 1924 report to the Permanent Mandates Commission of the League of Nations, detail as to acquisition of land for the wireless station is given: The Nauru report for 1924, which the Mandates Commission examined in the presence of Sir Joseph Cook (High Commissioner for Australia), says that the only lands belonging to the State are the Government station and an area required for the wireless station, amounting approximately to 100 acres. The German Government acquired this area by purchase from native owners, and transferred its mandatory power under the Peace Treaty. The area had since been dealt with as the property of the Administration.[294] In October 1913, the completion of the Nauru station was briefly reported: WIRELESS IN THE PACIFIC. INSTALLED AT NAURU ISLAND. Nauru Island, a well-known phosphate depot in the Pacific, has been brought into wireless touch with several islands in the Pacific. News was brought to Sydney yesterday by the steamer Ellerlie that the installation on the island was completed at the end of last month, and a wireless expert had taken up his residence on the island.[295] The official commencement of service (1 December 1913) of the Nauru station was advised as follows: The new wireless stations at Yap (Carolines) and Nauru (Marshall Islands), which have been erected by the German South Seas Company for Wireless Telegraphy, were opened for service on December 1 of last year. As a result, Nauru is by way of Yap, where there is already a German cable station, now connected with the international telegraph system.[296] The immediate value of the Nauru wireless station can be seen by the following report of December 1913: THE FRITHJOF. A wireless message has been received from Nauru stating that the Norwegian steamer Frithjof was to leave there yesterday for Sydney with a full cargo of phosphates.[297] The following report of March 1914 clearly demonstrates that the Nauru wireless station was operating efficiently, also of the strategic value of the facility: In November last the German cruiser Nuernberg, when in far eastern waters, succeeded in achieving some remarkable results as regards long instance [sic, distance] communication by wireless. The cruiser obtained perfectly clear messages from the German wireless station at Nauru on the Bismarck Archipelago, that is to say, over a distance of 5000 nautical miles, and similar results were obtained in communicating with the German station at Yap in the Caroline Islands, the distance in the latter case being even considerably larger, namely 6600 nautical miles. Excellent results were also obtained by the German wireless station at Tsingtau when communicating with the German warships stationed in Eastern waters, the distances covered varying between 2800 and rather more than 4000 nautical miles.[298] N-1914 The ongoing value of the Nauru wireless station was again evidenced by the following report in May 1914: THE CAIRNHILL ADRIFT. The German steamer Prinz Sigismund, which arrived at Sydney last Saturday from Kobe, via Hongkong and Rabaul, brought particulars of a serious mishap to the British steamer Cairnhill, 4981 tons register. It appears that the Cairnhill left Nauru on the 27th March for Stettin with 7100 tons of phosphates, and all went well until the evening of the 31st March, when the tail-shaft snapped and the propeller dropped off and sank, leaving the vessel helpless. Thirty four members of the crew left the steamer on the 9th April to obtain assistance. Only the captain and four men were left aboard. When one of the Cairnhill's boats arrived at Rabaul, the breakdown of the Cairnhill was reported, and the steamers Meklong, belonging to the N.D.L. Co., and the Siar, belonging to the New Guinea Trading Company, were despatched to look for her. After searching for some days without success, the vessel returned, as their coal was running short. The chief officer of the Cairnhill, D. M. Culloden, left Rabaul on May 6 in the steamer Sumatra, which is making a 23 days' search. The steamer Germania was in Rabaul at the time, and a wireless message was sent by her to Nauru regarding the Cairnhill. The latest news from Rabaul reports that a large steamer was sighted from Nissan Island, which may be the Cairnhill.[299] The Postmaster-General's Department announced acceptance of telegraphic traffic for Nauru on 21 May 1914 as follows: TELEGRAPHIC BUSINESS. The Deputy Postmaster-General advises that approval has been given for the introduction from today (21st May, 1914) of weekend cable service between the Commonwealth, India, Burmah, and Ceylon. Tariff 7½d. per word with a minimum of 20 words. Messages are subject to the same rules as those applying to deferred cablegrams, and will be dealt with telegraphically throughout. Delivery to be made on the Tuesday following date of lodgment. Also that wireless traffic may now be accepted for Nauru., Marshall Islands, at the sender's risk, for disposal via Thursday Island, at the rate, of 1s. 1d. per word; porterage charges to be collected from the addressee. Also that a radio station is now open for business at Wyndham, West Australia, between 6 a.m. and 8 p.m.[300] In a press report of 6 June 1914, the arrival of Telefunken's Herman Kaspar in Sydney was announced, stating that he would depart shortly to inspect the Nauru station: WIRELESS IN THE PACIFIC. It was mentioned some days ago that Great Britain is perfecting a chain of wireless stations in the Polynesian Islands, which will give a complete wireless circle. A similar system is being inaugurated by Germany amongst her Pacific dependencies. One of the Principal German stations is at Nauru, in the Marshall Islands, and Mr. Herman Kaspar, a representative of the Telefunken Company of Berlin, has just arrived from Windhuk, in German West Africa (where there is claimed to be the largest wireless station in the world) to inspect the plant which has been constructed at Nauru. Mr. Kaspar expects to leave for the Marshall islands in about three weeks time.[301] The strategic potential of the wireless station was demonstrated at the outbreak of WW1, as evidenced by this report: GERMANS IN THE PACIFIC. SMALL BRITISH STEAMER SEIZED. SYDNEY, September 24. The steamer Moresby, which arrived today from the Pacific Islands, brought news of the capture by the Germans of Burns, Philp, and Co.'s small steamer Induna, 699 tons, at Juluit, in the Marshall Islands. The high power wireless station Nauru, since reported to have been captured by the British, enabled the Germans to take precautionary measures long before the British in the Pacific Islands knew of the true position. As soon as the first news of the war was received by wireless at Nauru, the German authorities immediately took steps to warn German traders in the outlying islands. Small German steamers were despatched from Nauru, and these carried news of the war to the Germans in the Marshall Islands and the outlying Caroline Islands. The news also drifted through to Ocean Islands, where the British Government Resident for the Gilbert and Ellice Island is located. The Germans, however, appear to have received the news first at the various groups. It was learned by the Moresby that five vessels were lying at Juluit, namely, the Induna, a Japanese steamer, a German warship, and a couple of small vessels. As far as is known, the Induna was going her usual round in the Marshall Islands, the captain and crew evidently being unaware that war had been declared. She went to Juluit, and was anchored there with other vessels. On September 3 her white crew was all on board, but the native crew had been sent back to their homes in various islands of the Marshall group. What happened at the time of the seizure, and the name of the German warship which probably figured in the taking of the Induna and the Japanese steamer was apparently not learned by those on the Moresby, but no doubt was left, it seems, of the fact that the Induna had been seized. So far as is known here the detained officers of the Induna are:— Captain Webster; A. Pry, chief officer; B. Walford, chief engineer; A. C. Horlock, second officer; S. Carrick, second engineer; W. Howle, third engineer; A. Mumford, chief purser; J. H. M'Murchie; M. Smith, T. O'Connell, A. M'Bride, J. Stanton, E. Scott, E. Elliott, R. Underwood, P. R. Jones, and J. Leonard. It is probable, however, that there were several changes after the Induna left Sydney, men having been transferred to other steamers of the Burns, Philp line.[302] On 22 September 1914, The Age (Melbourne) reported the destruction of the Nauru wireless station by Australian troops as follows: LANDING ON NAURU. At dawn on 11th September, contemporaneously with the capture of Rabaul, a landing party of 21 sailors from one of the Australian war ships, under the command of Lieutenant-Commander Bloomfield, Lieutenant Cooper and Engineer-Lieutenant Creswell, and Staff-Surgeon Brennand, who acted as interpreter, effected a landing on the island of Nauru without any opposition. In fact, none was expected, as the island is neither fortified nor garrisoned. The only trouble experienced was in getting a boat through the heavy surf. However, this was safely accomplished, and the Governor was called upon to surrender. Possession was then taken, and two wireless operators were arrested. The wireless station, one of the most powerful in the German Pacific chain, and erected at a cost of £25,000, was destroyed. After the station had been destroyed a cruiser cleared out with the two operators as prisoners. The whole wireless chain in the Pacific has now been destroyed or captured.[303] An interesting, if unverified, addition to the story was reported after the conclusion of WW1: The Missing Radio-Plant Shortly after the outbreak of war the Australian navy "rushed" Nauru in order to silence the wireless station. On the approach of our warships the Huns in charge, believing that they would soon be in possession of the island again after their raiders had swept our ships off the Pacific, tried to render the station useless to the British by hiding all the essential parts of their wireless plant in a big cave. The entrance to this cave was afterwards closed and hidden with rubbish. Unfortunately for the Germans, a dog watched their work, and when the Australians landed on the island this animal led them to the concealed cave, where it commenced to dig vigorously. The excited animal was soon assisted by a band of helpers, who uncovered the opening and located the missing parts.— "Reef-comber."[304] N-1915 On 16 January 1915, The Herald (Melbourne) reported on the re-opening of the Nauru wireless station: WIRELESS STATION AT NAURU; A wireless telegraph station has been opened at Nauru, Marshall Islands, and is now available for the transaction of public business. The rates will be threepence a word radio charges, plus ordinary land line rates, and delivery charges, if any, at Nauru, the latter to be collected from the addressee.[305] A few days later, 18 January 1915, The Sun (Sydney) provided further detail: VIA WIRELESS TO NAURU. The postal authorities notify that the wireless station at Nauru, Marshall Islands, is now open for the transaction of public business. The charges are 3d a word radio charges, in addition to ordinary land line charges and delivery charges, if any, at Nauru, the latter charge to be collected from the addressee. The service is limited at present, and is subject to delays, but every endeavor will be made by the department to dispose of traffic as early as possible. Traffic will be confined at present to messages to and from the Commonwealth, no messages being exchanged with ship stations. For the present traffic will be sent via radio, Brisbane.[306] Again, on 18 January 1915, The Sydney Morning Herald provided additional detail and background: NAURU. WIRELESS STATION. Communication has been established between Australia and the island of Nauru, formerly owned by Germany, but now occupied by Australian troops. The postal authorities notify that the wireless station at Nauru is now open for the transaction of public business. The charges are 3d per word radio charges, plus ordinary land line charges, and plus delivery charges, if any, at Nauru, the latter charge to be collected from the addressee. The service is limited at present, and is subject to delays, but every endeavour will be made by the department to dispose of traffic as early as possible. Traffic will be confined at present to messages to and from the Commonwealth, no messages being exchanged with ship stations. For the present traffic will be sent via radio Brisbane. Nauru, formerly called Pleasant Island, which lies a few miles south of the Equator, and about 150 miles north-west of Ocean Island, was attached for administrative purposes to the Marshall Islands, although it is not properly one of them. It is an upraised atoll of circular form, about three and a half miles in diameter, the highest elevation being about 150 feet. There are large deposits of phosphates, similar to those on Ocean Island. The right to work the deposits is held by the Phosphates Company, an English concern. Cocoanuts grow well on the Island, and a considerable quantity of copra is annually manufactured. There are about a thousand natives, a number of them having been recruited from other islands. The island formed one of the links in the wireless chain which Germany had nearly completed when the war broke out, and which enabled the residents of this secluded spot to get news as speedily as ourselves. Nauru was wirelessly linked up by Germany with Yap, in the Caroline Islands, which, besides being a central wireless station, was in communication with the outside world by means of submarine cable, and from Nauru messages were transmitted by the Germans to Apia, in Samoa.[307] Despite WW1 continuing to rage in Europe, the situation in the Pacific had stabilised to the point where Australia sought tenders for a regular merchant shipping service including Nauru in February 1915. It was specified that all ships must be equipped with wireless telegraphy: Department of External Affairs, Melbourne, 26th February, 1915. STEAM SERVICE TO PACIFIC ISLANDS. TENDERS are invited, and will be received at the Department of External Affairs, Melbourne, until Noon on Friday, the 30th April, 1915, from persons or companies desirous of contracting for the provision of the following steam services between Australia and the Pacific Islands. . . . 3. Gilbert, Ellice, and Marshall Islands:— (а) Three-monthly service from Sydney to these groups. Vessels to call at Ocean Island, Nauru, and all usual stopping places. (b) As in 3 (a), including calls each way at Brisbane. (c) Trunk line service, Sydney to Ocean Island, and limited number of other central ports to be named by tenderers. (d) Inter-island service connecting with (c). (e) Service as in 3 (a), (b), or (c), with Melbourne as terminal port. Tenderers should state the size and speed of the vessels proposed to be employed, the extent of accommodation for passengers, the time to be occupied on the service, and the time of stoppage in each port of call and in the terminal ports. Tenderers may submit offers for all or any of the services required, or may submit alternative proposals combining services to different groups of islands. Tenderers may submit offers stipulating that they will not engage in any trading operations whatsoever in connexion with the service or services. Alternative proposals may be submitted reserving the right to carry on certain trading operations, the nature of which should be stated. . . . 2. The usual conditions as to the conveyance of mails in contracts with the Postmaster-General of the Commonwealth will be adopted, and will form part of the contract to be made with the successful tenderers. 3. Tenderers to furnish full description of the vessels proposed to be employed in each of the services, including information as to cold storage capacity, if any. . . 7. The vessel or vessels to be employed shall be fitted with wireless telegraphy apparatus. . . . 11. In considering tenders, regard will be had to the fact that the services are not only for the conveyance of mails, but also intended to assist in the development of the various islands. [308] In a publication dated May 1915, "List of Radio Stations of the World" by Frank A. Hart (Chief Inspector, Marconi Wireless Telegraph Company of America) and H. M. Short (Resident Inspector (U.S.A.), Marconi International Marine Communication Co., Ltd.), the coastal wireless station at Nauru is listed under Marshall Islands with Callsign KBN but no technical details. Control is stated as "Operated and controlled by the Deutsche Sudsee-gesellschaft fur drahtlose Telegraphic, A. G., Berlin, Germany." The authors would have been aware that the station was now in possession of Australia, however the USA at that stage was still neutral and protocol would likely require pre-War status to be reflected. Australia would not have made use of the German callsign series and it is likely that use of the VKT callsign was implemented soon after the capture.[309] In November 1915, a report in the Papuan Times was reproduced in The Telegraph (Brisbane) which summarised the history of the German coastal radio network and how the Commonwealth had reinstated the facilities and further extended the network, with Nauru as a vital link: WIRELESS IN THE PACIFIC. Had this great world war not have occurred, Germany by this time would have had a splendid system of communication linking up her various Pacific colonies (says the "Papuan Times" of 27th October). High power wireless stations of a uniform design had been erected for this purpose, and were established at Yap, Nauru, Anguar, Apia, and another in the last stages of completion at Rabaul. The power of these stations made daylight communication possible, and as Yap was lined up with the Eastern Extension Company's cable system, it was possible for any of Germany's Pacific colonies to be in telegraphic communication with the fatherland at any hour of the day or night, a matter of no small importance. The war, however, put a stop to German activity in this direction. It was a well known fact that wireless would play an important part in the war, and on the outbreak of hostilities steps were immediately taken to put out of action the enemy's Pacific wireless stations. The principal station at Yap was the first to go, then Apia and Nauru. At Rabaul the huge mast and plant was destroyed by the Germans themselves. After our occu-pation of these places no time was lost in re-establishing communication, and new stations erected at Freiderich Willhelmshafen (Madang), and Kieta, in the Solomons. A telegraph service has been established between these places and the Commonwealth, the tariff and service comparing favourably to any in the world.[310] N-1916 N-1921 In a long report describing life and conditions at Nauru in April 1921, brief reference is made to the ongoing wireless facilities: Away up on a hill about a mile and a quarter distant from the Phosphate Co.'s settlement, is the famous Telefunken high-power wireless station, which keeps in daily touch with the world in general. Daily bulletins of war news used to be issued by the officer in charge to residents, free of charge. The chief engineer of the station is another West Australian named Caisley, who worked his way up from a private to the position he now occupies. The wireless mast at Nauru is much about the same height as the one at Applecross, and can be seen by ships at sea for hours before the island itself comes into view.[311] N-1923 A single set of test transmissions using wireless telephony between Nauru and Ocean Island was undertaken in January 1923: RADIO TELEPHONY. IN USE AT NAURU PROSPHATES FOR 200 YEARS. Talking by wireless telephone, Mr. H. B. Pope, Australian Commissioner on the British Phosphate Commission, was distinctly heard at Nauru Island from Ocean Island, and vice versa, and through receiving sets 1600 miles away. Mr. Pope and Mr. A. F. Ellis, New Zealand's member of the commission, are in Sydney conferring as to development of the phosphate industry. During his last visit to the islands, Mr. Pope was accompanied by Mr. Hoskines, a special officer sent by courtesy of Amalgamated Wireless, Ltd. They took a wireless telephony set on the Nauru Chief, and found it so successful that the establishment of wireless telephone stations on the two islands is contemplated, radio telephony having proved so much in advance of radio telegraphy.[312] N-1925 The News (Hobart) reported in May 1925 upon what is believed to be the first installation of wireless telephony facilities at Nauru: A half K.W. wireless telephony set recently supplied by Amalgamated Wireless (Australasia) Limited to the British Phosphate Commission at Nauru, is giving exceptionally good results. Reports to hand state that tests between the set at Nauru and the radio station at Bita Paka (Rabaul). a distance of nearly 900 miles, resulted in good speech both ways during daylight.[313] It should be noted that this facility was not administratively part of the existing Coastal Radio station VKT (a public traffic facility), but rather a private operation, solely for the use of the British Phosphate Commission with the licence being held by the Administrator of Nauru. It is not known whether the two facilities were co-located with VKT. N-1926 There were few english language stations to listen to at night on Nauru and the wireless officers would have appreciated the strong new signals from 4QG Brisbane when it increased power from 500 watts to 5kW in March 1926: For Wireless Fans. 4QG. MORE EXCELLENT REPORTS. ON NEW POWER RESULTS. During the weekend further reports of reception from the new station (4QG) came to hand from many parts of Australia. So heavy was the mail received that it was found necessary to employ the full clerical staff on Saturday and Sunday, acknowledging by card the various telegrams and letters. Sunday's full programme was transmitted on high power, and was the first daylight test from the new station. Yesterday telegrams from the north and western portions of Queensland reported excellent results, and from Sydney and Melbourne clear reception was also reported. As reported in yesterday's "Standard," the wireless officer of steamer Makambo, which at the time was off the New Hebrides, radiogramed station 4QG on Sunday night, to the effect that he was receiving the band concert very clearly, and at great volume, on a single valve set. The radio station at Nauru also wirelessed a report yesterday stating that 4QG was being received at maximum strength.[314] In October 1926, the RAAF was anticipating major growth in aerial traffic in the Australian territories of the SW Pacific. A full survey of all facilities was undertaken by Group-captain Williams and his staff with a view to assisting with aeronautical navigation: AID TO AVIATION. The survey of the mandated territory now being made by Group-captain Williams and staff of the Royal Australian Air Force, directs attention to the advantage of wireless to aviation, and the important part it is bound to play in the development of aerial services in the immediate future. As a matter of fact, wireless forms the only means of communication between many of the islands of the Pacific now under the suzerainty of Australia and the outside world. There are in all seventeen commercial and four private wireless stations in the islands adjacent to the Australian coast. In the Australian mandated territory of New Guinea there are seven radio stations controlled and operated by Amalgamated Wireless (Australasia), Limited. These are situated at Rabaul, Morobe, Madang, Aitape, Manus, Kavieng, and Kieta. There are two stations in the British Solomon islands, one at Tulagi and the other at Ocean Island, both of which are operated under the control of the British High Commissioner at Suva. The station in the mandated island of Nauru is controlled by the Administrator of Nauru, who also controls a private station on that island. The Japanese Government controls radio stations at the following points in the Japanese mandated territory of the Caroline Islands:— Truk, Ponape, Jaluit, Saipan, Yap, Paloa, and Angaur Island. A private radio station at Roviana is operated by Rev. Mr. Goldie, of the Solomon Islands Methodist Mission. A private station at Tarawa is operated by Burns, Philp, and Co., Ltd.; and one at Vanikoro is operated by the San Cristobal Estates, Tulagi. The station at Rabaul ranks as a high power station, and it receives and transmits all the traffic between Australia and the north and west Pacific Islands, including those of the British Solomons and the mandated territory of Japan in the Caroline Islands. This station was originally erected by Germany, and was captured by the Australians in 1914 under romantic and exciting circumstances. It has been remodelled on the lines of the stations controlled by Amalgamated Wireless, Limited, and is capable of handling almost continuous news and commercial traffic. It will thus be seen that Captain Williams will not be out of touch with headquarters at Melbourne during the period of his survey unless there should be a mishap to his wireless apparatus. His trip will do much to emphasise the commercial importance of radio in the development of the resources of the Pacific islands, as well as the more remote portions of the Australian continent.[315] This report makes clear the two distinct lines of control for the public traffic coastal station VKT and the BPC's private traffic station. N-1935 Wireless telephony was utilised in smaller vessels due to its lesser requirements for operating skill, illustrated by the March 1935 report in the Labor Daily (Sydney): The British Phosphate Commissioners' new motor vessel Triaster, which has started on her maiden voyage to Australia, was in touch, by short wave radio, with the Sydney station of Amalgamated Wireless yesterday from the Bay of Biscay. In view of the circumstances of the phosphate trade, the Triaster has been fitted with facilities for wireless telephony which enables the captain to communicate with his offices at Nauru and Ocean Island.[316] In May 1935, following the "King's Speech," the Nauruan branch of the Royal Empire Society participated in an empire-wide expression of loyalty, whereby all Society branches despatched messages gathered together by the Sydney coastal station VIS which were then forwarded in facsimile form by the Beam Wireless station and delivered in the United Kingdom: LOYALTY. JUBILEE ADDRESS. EMPIRE CIRCLE. WONDER OF RADIO. BEFORE its transmission to London by Beam Wireless in facsimile early this morning, the Royal Empire Society's Jubilee address to the King had already circled the Empire — a snowball of goodwill gathering loyal greetings as it travelled. It was a message from an Empire, linked not only by the common bonds of kinship, but by the wonders of modern communication — a message that united East and West, the old world and the new, in a tribute of loyalty to the British Throne. From Sydney to Rabaul, to Hongkong and the East, to Alexandria via India, to Durban and London, and back to Sydney via New Zealand, the message had flashed, returning by picturegram transmission to London this morning. From the New South Wales branch of the Royal Empire Society the idea of the "Around the Empire" message — a striking commentary on the advance made in Empire communication during the King's reign — originated. A message was prepared, with the signature of the president (Sir Hugh Denison) attached, and by means of radio, cable and other means of communication was started out on its long journey round the world. Endorsed By Empire At each Empire centre where the message was received it was endorsed by the following representatives of the Royal Empire Society:— Dr. W. N. Robertson (Brisbane), Sir James W. Barrett (Melbourne), Sir Henry S. Newland (Adelaide), Gordon Thomas (Rabaul), Hon. Sir H. E. Pollock (Hongkong), G. A. Bambridge (Madras), J. A. Tarbat (Colombo), Lieutenant-Colonel J. B. Barron (Alexandria), J. R. T. Cramp-ton (Durban), Professor Sir Augustus Bartolo (Malta), Arthur O. Carrara (Gibraltar), Sir Archibald Weigall, K.C.M.G. (Chairman of the council, London), W. Tees Curren (Montreal), G. Kingsley-Roth (Suva), Professor F. P. Worley (Auckland) , A. E. Flower (Christchurch), Rupert C. Garsia (Nauru). On reaching Sydney again, the messages were assembled and transmitted by Beam Wireless in facsimile to Buckingham Palace. The message reads as follows:— May it please Your Majesty, the fellows of the Royal Empire Society, assembled in their respective domiciles throughout Your Majesty's Empire, pray Your Majesty to accept this expression of their deep affection and unswerving loyalty. They rejoice with all your subjects on the occasion of Your Majesty's Sliver Jubilee, and pray that you may long reign over us. The invisible bonds of kinship which bind the people of the Empire as one family in common allegiance to the Crown have been knit closer by the development of wireless, which has progressed during Your Majesty's reign to the extent of enabling your subjects, wherever they may be, to hear Your Majesty's voice. When this telegram, originating in the southern seas on the sixth day of May, 1935, will have reached Your Majesty it will have been transmitted around the Empire and will have been endorsed on behalf of the fellows by a representative of the society in each of the places named hereunder, the messages having been assembled and transmitted from Australia to England by Beam Wireless facsimile. Ever Your Majesty's faithful subjects nineteen thirty-five. The success of the experiment was made possible by the cooperation with the society with the deputy-general manager of A.W.A. (Mr. L. A. Hooke), who supervised the technical arrangements. The telegrams and facsimile transmission were sent by courtesy of Amalgamated Wireless (Australasia), Ltd., and Cable and Wireless, Ltd.[317] N-1937 On 2 July 1937, the Nauru coastal radio station VKT was the second last station to hear aviatrix Amelia Earhart and aviation navigator Fred Noonan on their final attempt to cross the Pacific, before the plane disappeared in the vicinity of Howland Island: Their one year old plane was a modified version of the new Lockheed Electra 10E. The shiny body was formed from a new aluminum alloy, the two wings were painted a strong red, and the identification number NR16020 was screened in bold black lettering under the left wing, on top of the right wing, and also upon the tail. This trustworthy plane had been almost completely readied for the long haul flight on Thursday, and now on Friday morning the two aviators attended to the final last minute preparations. The two major items of radio equipment aboard the Electra were a standard 12 volt aircraft transmitter and a separate receiver, both manufactured by Western Electric. The three channel transmitter, model number WE13C, was rated at 50 watts, and it was factory adjusted for use on 500 kHz, 3105 kHz and 6210 kHz, for communication in both voice and Morse Code. The official American callsign was KHAQQ. The aircraft receiver, model WE20B, was a regular 4 band aircraft receiver, for reception on longwave, mediumwave, tropical shortwave and international shortwave. The main antenna was a V doublet on top of the plane, with stubby masts above the fuselage and on top of the twin tails. Another main antenna was a long trailing wire underneath the plane that needed to be unrolled and deployed when in use. However, it appears that this antenna had been removed before their departure from Lae, either accidentally or intentionally. . . . At 10:30 GMT during the dark hours of the Pacific night, that is 10-1/2 hours out from Lae, Amelia radioed that she saw the lights of a ship, which happened to be the Myrtlebank, en route from Auckland New Zealand to the isolated island of Nauru. Communication station VKT on Nauru heard the call and responded, but apparently Amelia never heard this confirmation call.[318] N-1938 The Daily Commercial News and Shipping List (Sydney) in a prophetic call for development of a Nauru emergency evacuation plan, made disparaging reference to the current state of the wireless station (noting that the plan sought only to address the European community on the island): NAURU. Nauru Island is a mandated territory, the mandate of which is divided between Great Britain, Australia and New Zealand. Since the mandate went into effect it has practically been controlled by the Australian Government, neither of the other mandatory parties interfering. Replying to a question in the House of Representatives yesterday, a question placed by the Deputy Leader of the Opposition, Mr. Forde, the Prime Minister stated that plans were being formulated to protect the inhabitants of the island of Nauru, in the event of an emergency. It can well be understood that this small community would be in serious danger of being cut off, captured, bombarded, bombed or other incidents of war, with little hope of relief at that distance and with only a very imperfect wireless station on the island, kept going only by the careful nursing of the wireless operator attached to it. Plans, therefore, for the evacuation, any how of the women and children, from the island should be a matter of some consideration to the higher authorities responsible for the mandate.[319] N-1940 On 8 December 1940, the Nauruan wireless station kept Australian authorities informed of the shelling of a merchant ship with visual reports from the island: SHELLING SEEN FROM SHORE. Mr. Hughes summarised the reports as follows:— "On Sunday morning last a vessel was sighted on fire shortly after daylight. She was a few miles off shore, awaiting favourable weather to proceed into port to load. Visibility was bad at the time, and shortly after she was seen the vessel was obscured from the shore. In spite of a careful watch being kept, nothing further was seen until the afternoon, when the weather cleared, and a ship was seen to be on fire some distance from the land. Another vessel was in her vicinity, and was apparently firing on her. Both vessels disappeared from view shortly afterwards. A number of other vessels was known to be in the vicinity of the island the unfavourable weather having caused an unusual concentration of shipping awaiting an opportunity to proceed to loading berths. On receipt of the reports from Nauru, all shipping in the area was instructed to disperse and make for other ports." NO REPORTS FROM OTHER SHIPS "Since the incidents seen from Nauru on Sunday, no further ships have been sighted from the island, which has been in continuous wireless communication with the mainland. This, however, was to be expected in view of the instructions to shipping to give the island a wide berth. The fact that nothing has been heard from the ships concerned is not necessarily of significance, as they would not use their wireless for fear of giving their positions away to any possible enemy. Information is likely to be received from them when they reach another port. Such information is now awaited."[320] Within a week of the reported shelling it was confirmed that all 5 merchant vessels that had been in the immediate vicinity of the island of Nauru at the time of the shelling, were lost, either sunk or captured.[321] The wireless station played a role (if passive one) in the first German attack on Nauru: HOW RAIDER ATTACKED NAURU. Made Signal, "Do Not Use Wireless" SYDNEY, December 28.— In a statement this afternoon Mr. Hughes said, "Later reports from Nauru describing the attack on the island on the morning of December 27 state that an enemy raider bearing a Japanese name arrived off the island shortly before daybreak and signalled the island by name with a Morse lamp. "The enemy then signalled Nauru, 'Do not use your wireless or I shall shoot the mast down. I am going to shoot at the phosphate loading jetties in order to save the destruction of human life and property.' "The instruction not to use the wireless was complied with and at 6.40 a.m., Nauru local time, the raider opened fire on the essential potash store and loading gear, the cantilever loading jetty, all the oil storage tanks and cantilever shore storage. "The mooring gear, store and other phosphate buildings were shelled at close range but the mooring buoys were destroyed by pompom fire. The oil fuel tanks were still burning last night. The wireless station, however, remains intact as also does the power station. Private houses were not fired on. "It is now stated by Nauru that the raider hoisted the Nazi flag before opening fire." Mr. Hughes added that this confirmed the suspicion that the raider got within safe range and ascertained that no war ships were in the vicinity before revealing its identity.[322] N-1941 In April 1941, following the release of a New Zealand report into merchant shipping losses made allegations against the Nauran wireless officers, but shortly thereafter greatly moderated the charges: HUGHES' SPY CHARGE. From Our Special Representative. CANBERRA, Wednesday. "The suggestion that spies are not at Nauru is one which, in view of all that has come and gone, I cannot entertain," said the Minister for the Navy (Mr. W. M. Hughes) to-day. The Minister's statement was inspired by the report of the Royal Commission which inquired in New Zealand into the sinking of the Holmwood, Rangitane, Komata and the Vinni, and the Commission's criticism of the "inexplicable failure of the Nauru Island authorities to issue a warning." Earlier today Mr. Hughes had said that when the wholesale sinkings of merchant ships occurred off Nauru last December, there were on the island some spies, traitors, or paid agents of Germany or of whatever Power was responsible for the sinkings. This, he said, was the only explanation for the failure of the Nauru Island authorities to give warning of the approach of a ship using the Japanese flag as a disguise. "We have made inquiries, and that is the only explanation," he declared. Later this afternoon Mr. Hughes made the following statement:— "Sound And Loyal" "The inquiry which I mentioned this morning was made by an officer of the Navy Department who was sent to Nauru for the purpose. He interrogated various people concerned. "The result was that he could discover nothing to suggest that anything was wrong with the wireless people at Nauru. "But it was conceivable, according to the report, that a leakage of information arose out of messages sent by Bentley's code on behalf of the Phosphate Commission. This would be enough to indicate what shipping movements were going on. "Then, again, the issue of meteorological reports to the effect that westerly winds were blowing would indicate that ships were lying off the island. "Our inquiries go to show that the personnel of the wireless station was competent, sound and loyal. "Message Delayed" "Further, as to whether the people were negligent in not keeping watch for signals, the report of the Triadic's distress signal was actually heard at Ocean island. The operator on watch at the time seems to have been incompetent, since he took no steps to broadcast this message immediately. "It was not until an hour later that he attempted to pass on a garbled version of the message to Suva radio. This is confirmed by the New Zealand officer who investigated the matter." Mr. Hughes said he thought it right to supplement this report by repeating what the captain of the Rangitane had said to him during his recent visit to Australia. When the captain on the raider intimated to the captain of the Rangitane that he was going to Nauru again, the captain of the Rangitane expressed the opinion that the cruisers would have been warned, and that the raider would be running into trouble. The captain of the raider said, "Oh, that is all right. Everything has been fixed." "The captain of the Rangitane took that to mean that effective warnings of the former visit of the raider had not been broadcast," Mr. Hughes said. "Greatly Impressed" "I know nothing of the thing myself, but I was greatly impressed with what the captain of the Rangitane said. "He was a man of excellent reputation in command of a ship of 17,000 tons, and I could not but believe that he was repeating what he had heard the captain of the raider say." Asked how this information affected his statement made earlier today in which he referred to spies, traitors and paid agents at Nauru, Mr. Hughes said: "I expressed my opinion. It would appear that the suspicions I entertained in regard to the negligence or incompetence of the wireless operators at Nauru are not confirmed. I spoke at the time as I felt, but that there has been negligence — although in another quarter, at Ocean Island — has been abundantly proved." "But what about the spies you mentioned?" he was asked. "If you ask me that," said Mr. Hughes, "I will ask you, 'Where is there a country where spies are not to be found working tirelessly in the interests of our great enemy?' " "The suggestion that spies are not at Nauru is one which, in view of all that has come and gone, I cannot entertain."[323] A few days later the professional Radio Employees' Institute expressed clear support for the reputation of the radio officer of the Nauru coastal radio station: RADIO MEN FIRM IN LOYALTY Mr. L. A. McPherson, general secretary of the Professional Radio Employees' Institute, writes:— "The governing council of the Professional Radio Employee' Institute of Australasia has considered a Press report of a statement made by the Minister for the Navy (Mr. Hughes) in regard to the sinkings of merchant vessels which occurred off Nauru in December last. It was felt that the reference to the radio staff at Nauru constituted a most unjust attack on a member of this institute, and might well lead the public to suspect the loyalty of professional men engaged in providing services, which in the present emergency are of special importance and involve the strictest confidence and discretion." "At this meeting," Mr. McPherson said, "the following resolution was carried unanimously:— "That this Council views with deep concern and resentment the reported statement of the Minister for the Navy (Mr. W. M. Hughes) that 'spies, traitors or paid agents were either in charge of the Nauru wireless or in a position to influence personnel.' This statement places a member of the Institute under suspicion of treachery, and we consider that, in justice to this man whose loyalty has been impugned, and in justice to other members of the Institute who, on land, sea and in the air, are performing services of great national importance, Mr. Hughes should either withdraw his statement or announce that he has been misquoted, and that no stigma attaches to the officer in charge of Nauru radio station." STAFF EXONERATED "Mr. Hughes has since indicated that the report of the naval officer who conducted an investigation at Nauru completely exonerated the radio station staff. He did little, however, to make amends for the injury to the reputation of a thoroughly trustworthy officer. "I shall be pleased if you will publish this letter for the information of those members of the public who have been misled by the earlier report."[324] The Japanese attack on Pearl Harbour and Hawaii of 8 December 1941, that immediately brought the United States into WW2, is well known. But in the hours immediately following there were numerous other attacks across the Pacific and south-east Asia. Nauru itself was bombed at this time.[325] On 9 December 1941, the New Zealand Government reported that Nauru had been bombed for a second time.[326] On 10 December 1941, Nauru was bombed for a third time by a single aircraft, according to a BBC report.[327] A fourth bombing raid was reported summarily with a prophetic reference to possibility of Japanese occupation: FOUR AIR ATTACKS ON NAURU. Four separate raids have been made on Nauru Island by Japanese aeroplanes, according to official advices received in Melbourne. These may be based in the mandated Caroline Islands about 300 miles distant. First raid was made on Monday when one of the attackers was reported to be a 4-engined bomber. The second was made by one plane, the third by 2, and the fourth on Thursday by 3 planes. Extent of the damage has not been disclosed and no loss of life has been reported. Because of the repeated attacks it is feared that an effort may be made by Japanese to take possession of the island although no information has been received of any attempt to make a landing.[328] All the newspaper reports of the day were silent as to the target of the bombing raids, but it later became clear that the focus had been on the wireless station itself and that the station had been destroyed: Japanese forces launched simultaneous attacks against US, Australian, British and Dutch forces, on 8 December 1941 (7 December in the w:western hemisphere). That same day, a Japanese surveillance aircraft was sighted above Nauru.[329] The first attack took place on 9 December; three planes flying from the w:Marshall Islands bombed the wireless station at Nauru,[330] but failed to cause any damage.[331] The Nauruans, warned by observers on Ocean Island 350 kilometers (Template:Convert/nmi mi) to the east, managed to seek shelter before the attack.[331] The following day, another plane made a second attempt on the radio station. The third day, four planes made a low-altitude strike and finally destroyed it.[331] During these three days, 51 bombs were dropped on or close to the station.[331] The governor of the island, Lieutenant-Colonel Frederick Chalmers, sent a message to w:Canberra stating that he thought the Japanese had not destroyed phosphate production facilities because they intended to occupy the island for its resources.[331] All maritime contact with the rest of the world was interrupted.[332] It is interesting to note that there do not appear to have been any contemporaneous Australian newspaper reports of the occupation on Nauru by Japanese forces: Operation RY was the name given by the Japanese to their plan to invade and occupy Nauru and Ocean Island. The operation was originally set to be executed in May 1942, immediately following Operation MO (the invasion of New Guinea and the Solomon Islands), and before Operation MI (the attack on Midway). The first attempt to occupy Nauru began on 11 May, when an Imperial Japanese invasion force consisting of a cruiser, two mine-layers and two destroyers, with Special Naval Landing Force units, under the command of Rear Admiral Shima Kiyohide, departed Rabaul.[333] The task force was attacked by the United States Navy submarine Template:USS, leading to the loss of the minelayer Template:Ship. Attempts by the rest of the task force to continue with the operation were called off after Japanese reconnaissance aircraft sighted the American aircraft carriers Template:USS and Template:USS heading towards Nauru. A second invasion force departed Truk on 26 August, and three days later, a company of the 43rd Guard Force (Palau) conducted an unopposed landing on Nauru and assumed occupation duties. They were joined by the 5th Special Base Force company, which departed Makin on September 15 and arrived at Nauru two days later. By October 1942, there were 11 officers and 249 enlisted Japanese soldiers on Nauru.[334] On 7 March 1943, Captain Takenao Takenouchi arrived to take command of the garrison (known as 67 Naval Guard Force); he, however, was ill and bed-ridden throughout his tenure, and command was effectively held by Lt. Hiromi Nakayama, who had led the initial landing force. On 13 July, Captain Hisayuki Soeda arrived to replace Takenouchi as commander of 67 Naval Guard Force, a position he held until the end of the war.[335][336] The re-establishment of wireless communication facilities would have been a major focus of the occupying force, particularly in view of the ultimate size of the contingent. N-1945 Immediately following the surrender of the Japanese forces on Nauru, Australia re-established civil administration and a radio station (likely a temporary facility) was placed into service: Civil Administration on Nauru Island. SYDNEY. Sunday.— Civil administration has been re-established on the mandated territory of Nauru, rich phosphate island in the Central Pacific, which the Japanese occupied in August, 1942, and who surrendered to Australian naval and military forces on September 15, said the Minister for External Territories (Mr. Ward). Mr. M. Ridgway, formerly Accountant and Collector of Customs of the Nauru Administration, has been appointed Administrator. Very considerable damage had been caused to all buildings and equipment on the island, and it would be some time before all facilities of the former civil administration had been restored. A commercial radio station had been re-established for service between Nauru and Australia.[337] In a brief statement, in The Argus (Melbourne) of 23 November 1945, the essential resumption of a wireless telegraphy service to Nauru was announced: RADIO SERVICE TO NAURU The wireless telegraph service between Australia and Nauru, suspended during the war, is again available for public communications. Messages will be accepted at the Beam Wireless office or at any telegraph office.[338] N-1946 In August 1946, communication between Australia and Nauru was again extended with the provision of a radio-telephone service: RADIO-TELEPHONE. SERVICE TO NAURU. CANBERRA, Tuesday.— The Postmaster-General, Senator Cameron, announced today that a radio-telephone service between Australia and Nauru was opened yesterday. The service was being run in conjunction with Amalgamated Wireless (Australasia), Limited. Calls would cost 10/ a minute, with a minimum fee of 30/.[339] N-2007 In April 2007, a new FM radio service "Radio Pasifik Nauru, Triple 9 FM" was established at Nauru, it was funded by a grant from the Fiji-based University of the South Pacific: Radio Pasifik Nauru begins on a wave of success. The Pacific’s newest radio station promises to assist USP Nauru students and their community with a blend of modern technology and traditional broadcast media. Radio Pasifik Nauru, Triple 9 FM, began broadcasting on 2 April. It is a sister station to USP’s main student and community radio station, Radio Pasifik, Triple 8 FM, located at the Laucala Campus in Suva, Fiji. The Nauru project was initiated by Linda Austin, Media Resource Coordinator in the USP Media Centre, and Alamanda Lauti, USP campus director in Nauru. The pair envisioned a solar-powered educational radio station as a way to both assist USP students in Nauru and foster the development of a community-based radio service. For many reasons, students in Nauru face unusual problems that impact their study success. Frequent power cuts, scarcity of transportation and fuel, and some social disruption caused by Nauru’s unstable economy all hamper student performance and motivation. The proposed radio station is designed to initially broadcast recorded lectures and tutorials in course with high enrolment, such as foundation English, Maths and sciences. Technically, the equipment used includes a 30-watt FM "radio in a suitcase" designed by the Commonwealth of Learning and Wantok Enterprises of Canada. To overcome unreliable electrical power supplies, the radio station is supported by a solar power system capable of operating the station for at least six hours a day. Funding for the project includes a research grant from the Pan Asia ICT R&D Grants Program (AUD$35,000) and from the USP Campus development fund (FJ$21,000). The project’s research component will investigate the useful of such blended technology to regional distance students. The radio station’s inaugural broadcast was to include speeches from government and civil dignitaries as well as programs on piggery operation, coconut recipes, love stories and other traditional tales, and local music. However, about 90 minutes into the festivities, Nauruans received a tsunami warning as a result of the 2 April earthquake and tsunami in Solomon Islands. Scheduled programming was curtailed and the Radio Pasifik Nauru team focused instead on broadcasting emergency evacuation information, weather updates, and helpful tips for families before they themselves headed to higher ground and safety.[340] New Guinea Placeholder Norfolk Island Placeholder Papua Placeholder Biographies John Graeme Balsillie B-Biographical DISTINGUISHED QUEENSLANDER SELECTED. The news that Mr. Balsillie had been selected in London by the Prime Minister as wireless expert for the Commonwealth gave rise to a good deal of satisfaction in Brisbane yesterday. The selection brings yet another honour to the State of Queensland, where Mr. Balsillie was born. John Graeme Balsillie, who is now about 27 years of age, was born at Toowong, and was educated at the Normal School for boys, whence he passed on to the Brisbane Grammar School. He also attended classes at the Brisbane Technical College, where he was a pupil of Mr. E. C. Barton. The study of electricity led him to a keen interest in wireless telegraphy, and some five or six years ago his mother, a widow, left Brisbane for London, with her two boys, in search of that wider sphere for their abilities which the Old World promised. Mr. J. G. Balsillie, the elder of the two, was first employed by a wireless company, for whom he did work at Oxford, Cambridge, and other centres. He was then sent to Russia, where he spent two years, and afterwards he visited China, in connection with wireless operations. After his return to London he was asked to again visit China, but by this time he had patented wireless methods of his own, and a company was formed to work them.[341] J. G. Balsillie - A Brilliant Young Australian. "Now, look here, Mr. 'Sunday Times,' " remarked Sir Rupert Clarke on board the R.M.S. Orontes last Tuesday, "if you want to meet a real good fellow, go and interview Mr. J. G. Balsillie. He's a fine fellow, and a good Australian." This recommendation sent our man post-haste below deck in search of Mr. Balsillie. We were surprised at his youth. This man, who has secured the important post of chief wireless expert to the Commonwealth Government, is only 27 years of age, and yet he is one of the foremost men in the world of radio-telegraphy. This is his thumbnail autobiography: "I was born in Queensland 27 years ago. Always had a taste for electrical matters, and radio-telegraphic work interested me tremendously 10 years ago. Couldn't find a vent for my enthusiasm home, so I migrated to Europe. Then, I was 17 years of age. Studied under the best professors of the science — a science then but little known. Attended the lectures of such scientific brilliancies as Dr. Seibt and Dr. Rosenthal. When once I had acquired the knowledge, the rest was easy. Soon I was entrusted with the work of the British Radio Telegraph and Telephone Company. I travelled to such out-of-the-way places as China, Russia and Siberia for the purpose of erecting wireless stations." Were not the Russians suspicious of the fact that you were a foreigner? "Not at all. It was a very uneventful trip; nothing exciting happened at all. I never even had an adventure. The only experience I had was the frightful cold. With the temperature at 20 degrees below zero, I often wished for sunny Australia." Mr. Balsillie is a fine conversationalist, and can talk on most subjects. He is a thin young man with a strikingly intellectual forehead and keen grey eyes. Besides being a wireless expert of the first degree he is actually an inventor of one of the twelve wireless systems of the world, a system named after himself, the "Balsillie." "I had a great deal of litigation over this system of mine," continued the expert, "Signor Marconi claiming that I had infringed his patent. Look at this (pointing to a mass of legal documents). There is all the result of the legal proceedings. In the end the Court found that an infringement had been committed. The world of radio-telegraphy is even now throbbing with litigation. Actions are pending everywhere. No, the science will not progress until all this litigation is settled." And then? "Ah! then, who shall know its bounds? No, I don't think it will permanently take the place of the land wire — at least, not for years to come, if it comes at all. Radio-telegraphy will be useful when the upkeep of the land wire is too great. No, I think that wireless will have its own field in the same manner as does the cable and the land wire." It won't become so domestic as the telephone? "I don't think so. Of course, there are people who even now experiment with toy instruments, but these are of very slight range, and are of no commercial benefit." By the way, this appointment of yours must be gratifying to you? "It is. I feel it a great honor, both on account of my profession and also because I am an Australian born. They have said, haven't they, that a man receives no honor in his own country? I am young — I shall not be 28 years of age until the day I reach Melbourne. I have been engaged by the Commonwealth Government for a period of three years, receiving a remuneration £600 a year. Yes; it is very gratifying." Mr. Balsillie did not know until the Orontes touched at Fremantle that he would be required to break his journey. He is now residing at a well-known Perth hotel, and intends during his fortnight's stay here to inspect the wireless station now being erected on the south side of the Swan. It is very evident that the Federal Government intends to push on with the completion of this very important work, as every week complaints are received from the incoming mailboats that no connection can be made with the shore. "I am not sure," concluded Mr. Balsillie, "where my headquarters will be, or what system is to be employed. I am anxious, however, to get into harness."[342] "WIRELESS" IN AUSTRALIA. ARRIVAL OF FEDERAL EXPERT. The newly appointed Federal wireless expert, Mr. G. G. Balsillie, who was selected from eight applicants by the High Commissioner, reached Melbourne from London yesterday. Mr. Balsillie has been appointed for three years, at a salary of £600 a year. He is a native of Queensland, 27 years old, and has spent ten years in Europe in the study and operation of wireless telegraphy. Ten stations have been erected by him in Europe, and several in China and Siberia, but his principal work has been that of inventing. His inventions were controlled by the British Radio-Telegraph Company, of which he was manager. The famous Parker judgment, holding that a certain combination of oscillator and radiator infringed the Marconi master patent, caused the amalgamation of Mr. Balsillie's company with another. Mr. Balsillie fought the case through the court. Mr. Balsillie has a great belief in wireless telegraphy. It has advanced far enough, he states, to eliminate the duplication of cables. Wireless telegraphy, which costs only one-tenth or one-fifteenth of cable telegraphy, will work a while longer beside the cables. While naval stations employ wave lengths of 1600 metres or more, proceeded Mr. Balsillie, when interviewed, commercial stations employ a 600-metre wave. The exceptions to this are the large coastal stations. The trans-Atlantic stations employ even 6000 or 8000 metre waves. Many European countries are legislating for the carriage of wireless equipment by all large passenger ships. At present only 45 per cent. in European waters are equipped. Europe is discovering new uses for wireless — that, for instance, of transmitting electric power. Australia lags behind, but Mr. Balsillie will prepare a general scheme for the Government, and portion of its cost will be provided on the new estimates. In Fremantle Mr. Balsillie inspected the new high power station, which is nearing completion. He will also report on the Sydney station this month.[343] Balsillie, the Rain-Bringer. You very rarely see a real, downright, bad Scot. Sometimes he gets bad enough; but it is not innate, as a rule. In Greenock they swear that the old joke about beer applies to Scotchmen — there are none bad; simply some are better than others. It is a characteristic of Lowlands men, anyhow, that, like pimples and growing pains, the badness mostly develops itself in early youth. In Aberdeen, now, where in prewar conditions the dram was dearly loved on Sunday mornings, the chief public offence of the male population lay in its eccentric efforts to go straight home — nothing more. You seldom hear of a murder in Dumfries, in the South. If the devil is in a Scot, it shows out inevitably in his teens; after that, either he or his keepers succeed in exorcising it — as a rule. A Fair Young Imp. Twenty-two years ago or so, in Brisbane a youngster with a Scotch accent was shoved reluctantly under the notice of Head Teacher Kerr, of the Normal School — an academy of State education, by-the-way, round which this writer has been belted more times than he cares to remember. The "Scotch kiddie," they called him; but he wasn't Scotch any more than that the taste of it was in his mouth, so to speak. He was Brisbane born, but his father and mother were Scotch, with the burry accent like Andra Fisher, and the boy tasted of the same spoon. Anyhow, he proved a fair young rip, did the "Scotch kiddie." He started off by saying "Sha'n't" to everything they bid, told, or asked him. After that brief period of recalcitrance he upended a tack on the absent master's chair, and when the harrowing result came about he roared so heartily in Scotch that they felt instinctively that he deserved the biggest hiding that old Kerr had dealt out since the year before last. But, with all his bodily tenderness, next day he stuck two boys to the form with cobbler's wax, and made another's nose bleed in the dinner-hour. Teachers reported that he could be neither led nor driven. He would not learn. Through many tannings, he was impervious to the cane. What on earth was to be done? His First Job. Who was this impossible youth, anyhow? His name had been entered on the roll as John Graeme Balsillie. The school admitted that, like a fractious thoroughbred, there was pace all right in Graeme if he could be got to show it. So his uncle, who had cared for him since his father's death when he was an infant, sent him to the Brisbane Grammar School to try him out. At fifteen years the boy conceived an ambition to be a civil engineer. He almost promised to be good if they would let him satisfy this desire; but just at that period the family resources were running out, and one morning the schoolboy found himself transformed into a messenger and generally useful in a warehouse. This, indeed, was the unkindest cut of all. From the sublimity of his ambition as a successful professional man, and even inventor, to the ridiculous realism of sweeping out the boss's office and posting the letters! It made a deep impression on the mind of young Balsillie, and at the end of the first week he went home and thought long and moodily. A year or so earlier he would have kicked over the traces and broken something — perhaps somebody — at being pushed into this deadend occupation, but this knock sobered him up. He lit out on a course of study of his own. From that point he had cast out his boyish devil. Things Move. From that hour John Graeme Balsillie looked the world squarely and resolutely in the face. An opportunity came for him to visit England, where his cousin was in charge of the Forest Hill Public School. For three years the youth studied by day and stewed by night. He longed to be an inventor of something that would not only make men talk, but would provide him with a monument by reason of its world benefits. In this direction he made something of a start at nineteen years, when he invented a magnetic detector, which is used widely in radio telegraphy to-day. In the same year he joined the British de Forest Wireless Company as engineer, and as he was entrusted with the erection of stations in England for that concern, he began to feel that he was locating the high road towards the goal of his early ambition. He must have been something in the way of a prodigy, at all events, for at twenty years he was putting up wireless stations in Russia, and twelve months later saw him in laboratories in Berlin under such high authorities in radio telegraphy as Drs. Seibt and Rosenthal and Baron von Traubenberg. It is strange that a change so rapid should have come over this highbrowed young devil who five years previously had imagined that the only aim in life was to kick and avoid being kicked. But there it was unquestionably — he was full steam ahead on the main track. Germany, Russia and China. Balsillie was now unalterably tied up with wireless, and his activities radiated from and reached various parts of Germany. In his twenty-third year he was demonstrating the Poulsen system to the German military authorities at Schmargendorf, and six months later was at Russian headquarters establishing wireless. Soon after this the Chinese Government heard of the alert young Britisher with the hair brushed back like a Yankee dude, and it sent for him to knock down a few of the old pagodas at Pekin, Tientsin, and Pastingfu, and put up wireless stations instead. All the pig-tailed old "bugs" of Canton made their obeisance to him when he had finished the job, and generally treated him with all the respect due to a thunder god or a wooden joss. Then he went back to Britain, where the Radio Telegraph Company was formed to operate certain of his patents. Although the system based on these patents was used extensively, it was held to be an infringement of the Marconi system. Australia's Turn. It was when Andy Fisher was in London at the Imperial Conference of 1911 that that shrewd Caledonian heard there was a coming man in the wireless world. As it happened, Australia at the time was badly in need of a wireless expert. Other countries of less standing than the Commonwealth had absolutely lost us in this direction; so that when Balsillie, a Queensland native, was introduced to Fisher, a Queenslander, what more natural than that they should discuss the position, with pointed reference to Balsillie's suitability for the job of expert to the Federal Government? So it came that the engagement was made which brought out to Australia for important scientific work a lad of twenty-six. It looked like a bit of an experiment, but the lad had papers in his pocket to prove that it was nothing of the kind. When he himself heard of these doubts he simply moved his pipe from one jaw to the other and remarked — "What I can do for the Chinese I can do for my own people, surely to heaven!" No Business Nous. As a matter of fact, the young experimenter had reached the top in wireless, and felt, under his feet in Australia a springboard to higher achievement. He was not quite ready to take a running jump into further success — a leap that at that stage might have only led to futile notoriety; so he "lagged in," with the ardour of youth and the confidence of experience, for four and a half years to satisfy the radio telegraph needs of the Commonwealth. It was his own system that he installed, and the Government did him proud by adopting it as this country's system. On his part, he did the Government a generous turn by refusing to sell the system, but in giving the Commonwealth free use of it. "You'll never be a rich man, young fellow, if you conduct all your transactions like that," remarked a business man, reproachfully. "You should have got five figures out of it." And, as a matter of fact, when Charley Fraser was Postmaster-General he expressed the opinion that £10,000 should be handed over for the use of the system. Which shows that Balsillie's brains are limited, after all, in the ambit of their activities. The Rain-Maker. But the public just now is much less concerned with Balsillie's wireless than it is with himself as a rain-making professor. When, a couple of years ago, he announced that he held the cards for bringing down at will anything from garden showers to water-spouts — or something to that effect — they reckoned that his name should be spelt Bally-silly. Maybe; but the dapper little gentleman with the backward swept hair has not dealt his cards yet. If it should prove that he holds the joker, or even the right bower, he is destined to become easily the really greatest man Australia has produced. Any person who, by a magic wave of his hand, can "cause the artificial precipitation of aqueous particles in suspense in the atmosphere" — in other words, who can produce rain; can obviate or break an Australian drought — is "some" scientist. But this rain-maker does not lay entire claim to the credit for his recipe. With that disclaiming modesty which is supposed to characterise successful scientists, he points out that he is only collating the work of others. "I will accept all the distinction," he remarks, "when the climax comes, and I think I am just 'It.' So far, I am not 'It.' " This retiring attitude is right enough, but some credit seems due to the man who, from collation or his own direct discoveries, can make it rain when Jupiter Pluvius is away on the loose. Practical, If Pretty. Whatever the result may be of all this coaxing of aqueous particles to earth, it cannot be said that Balsillie has outstayed his welcome. His effective wireless work was shown after the out-break of war by the activity of the Australian stations, which successfully "jambed" many messages from one enemy boat to another. Soon after the war burst out, also, he offered the use of his system free to the Allies, and was told in effect, after being thanked all round, that he was indeed "the" one. And although there is still sufficient of youth in him at thirty-one to dictate a preference in the colour of socks and the cut of a suit, all such considerations go by the board when there's a practical job to be done. When, for instance, the steamer Werribee was ordered to be fitted out with wireless before leaving in search of the trawler Endeavour, Balsillie took a gang of men to complete the job in the quickest time on record. The hands say to this day that the way the mild-faced little toff jumped into his overalls, squeezed himself into impossible places, and did all the practical as well as the thinking part of the business was a treat. All that, however, is by the way. The salient thought to-day, and the inspiration for these remarks, is that if Balsillie becomes a successful rain merchant we'll all be on a glorious wicket. Mr. Punch is one of those, however, who want results before they start to cheer. Old hands remember how hoarse they have often become through shouting out of their turn.[344] B-1909 Wireless Telegraphy. Sir John Quick has authorised Captain Collins to secure an expert report on the value of the Balsillie system of wireless telegraphy. In so doing the Postmaster-General has acted wisely. A revolution in telegraphy is coming, or, should it be said, has come? Mr Marconi informed the delegates who attended the Imperial Press Conference that "all the ships in the North Atlantic service are fitted with wireless telegraphy apparatus." He explained that the Mediterranean, the coasts of Great Britain, of Ireland, of the United States, and of Canada are so well supplied with stations that the ships find the apparatus invaluable. He expressed the opinion that the route to the East could and should be as fully supplied. At the date of his utterance, July last, Mr Marconi said that, when possessed of the necessary stations, his company would be prepared to forward press messages from England to Canada at twopence a word. The cost of the stations he put down at L50,000 each, and the capacity of a single service at 25 words a minute. In reply to Mr Bruce Smith, Sir John Quick last week informed the House of Representatives that the Tasmanian cable cost L127 per nautical mile, and that from 15 to 20 words per minute is a fair speed for cable messages. Clearly, then, when long distances are in question, there is a splendid future for wireless telegraphy. That the system can be adopted for the transmission of messages, press and other, between England and Australia, Mr Marconi has no doubt. Indeed, he stated certain grounds for supposing that "a message at the Antipodes might be received better than one half-way to the Antipodes." It would seem that we are within measurable distance of realising Mr Henniker-Heaton's dream of penny messages throughout the Empire, New Zealand is alert. Sir Joseph Ward, in his Budget statement last night, declared that his Government would wait twelve mouths, as great improvements in "wireless" are likely within that time, and then adopt a vigorous policy which will forge new links between the Dominion, Great Britain, and Australia.[345] B-1911 In the late 1890s, Marconi had assigned his patents to the Marconi's Wireless Telegraph Company and that company had assiduously registered those patents in most of the developed nations of the world, including all the individual states of Australia. Numerous systems of wireless telegraphy were developed by competitor individuals and companies, and all claimed sufficient novelty to be independent inventions. The Marconi company asserted patent infringement in most instances, but it was not until 1910 that specific action was taken and that was against the Radio Telegraph and Telephone Company Limited with which Balsillie was associated. Indeed the system being used by the latter company was one invented by Balsillie himself and referred to as the "Balsillie System." Marconi's action relied upon three of its patents and failed in all except its first in 1900. However that successful patent was so broad that the "Parker Judgement" sent shockwaves throughout the wireless world. QUESTION OF PATENTS. MARCONI CLAIM UPHELD. LONDON, Feb. 21. An action has been heard in the Chancery Court, before Mr. Justice Parker, in which Mr. Guglielmo Marconi and Marconi's Wireless Telegraph Co. (Limited) proceeded against the British Radio Telegraph and Telephone Company Limited, alleging infringements of the plaintiffs' three patents with reference to wireless telegraphy. The patents were taken out in the years 1900, 1902, and 1907 respectively. The claim made by the 1900 patent was for improvements in apparatus for wireless telegraphy, comprising — "(1) A transmitter for electric wave telegraphy, consisting of a spark producer, having its terminals connected through a condenser with one circuit of a transformer, the other circuit being connected in a conductor and to the earth, the time period of electrical oscillations in the two circuits being the same or harmonics of each other; (2) a system of electric wave telegraphy in which both the transmitter and the receiver contain a transformer, the time period of electrical oscillations in the four circuits of the two transformers being the same or harmonics of each other; (3) a system of electrical wave telegraphy in which both the transmitter and the receiver contain a transformer, one circuit of which is a persistent oscillator, and the other a good radiator or absorber of electrical oscillations, all four circuits having the same time period or being harmonics of each other; (4) apparatus for wireless telegraphy substantially as described and illustrated in the drawings." The defendants' system was called the "Balsillie system of Radio-Telegraphy," and it was complained that they offered for sale under this system apparatus constructed according to the plaintiffs' patents. Mr. Justice Parker has upheld the Marconi claim in respect of the 1900 patent.[346] It is intriguing that the Prime Minister in selecting a wireless expert for Australia to advise upon a wireless system for Australia, selected Balsillie who admittedly was likely the most competent Australian expert in the field, but who had also been recently most intimately involved in action by the Marconi company and wh's own system had been the subject of the patent litigation. WIRELESS TELEGRAPHY. INSTALLATION FOR AUSTRALIA. AN EXPERT ENGAGED. [From Our Special Representative.] MELBOURNE, June 28. Mr. Hughes, on being seen today regarding the difficulty that has arisen in connection with the installation of wireless telegraphy in Australia, said that he hoped in a little while that certain steps would be taken which would remove the obstacles. "The whole difficulty arises under the Parker judgment in the Radio Telegraphy Patent Rights case," said Mr. Hughes. "That judgment seems to go so far as to practically preclude any other system of wireless being operated than the Marconi. I should not like to say that that is actually so, and only with very great reluctance would I come to such a conclusion; but if it be so, the facts have to be faced. Wireless telegraphy is almost as much a necessity in these days as air and light, and therefore Australia will have to get it under any circumstances." In reply to a question as to what was the estimated amount for which the Marconi rights might be acquired for Australia, Mr. Hughes said that inquiries were being made from the holders of the various systems as to what they are prepared to dispose of them for if the Commonwealth desired to acquire them. If such a step were decided upon the rights will be acquired, not only for naval and military purposes, but for commercial and general use. The Postmaster-General received a cable message today from Mr. Fisher, stating that he had selected Mr. Balsillie as a wireless expert for Australia. He added that Mr. Balsillie was educated in Australia, and had been closely associated with practical wireless telegraphy since 1905. He was one of those recommended as suitable by the experts who were consulted. In official circles in Melbourne it as stated that the Mr. Balsillie referred to is the inventor of the wireless system which bears his name. He is 27 years of age, and is regarded as a capable wireless engineer. His salary will be £600 a year.[347] WIRELESS TELEGRAPHY. ARRIVAL OF THE COMMONWEALTH EXPERT. Among the passengers by the Orontes from England yesterday was Mr. M. G. Balsillie, the radio-telegraph or wireless telegraphy expert for the Commonwealth. M. Balsillie is himself an Australian, and was born in Queensland less than 30 years ago. Nearly half his life has, however, been spent in the study of "wireless," and until recently he had a company of his own, by which several wireless stations were in-stalled in Germany, Russia, and other coun-tries. He is making a stay in Western Australia of about a week with a view to thoroughly inspecting and reporting upon the wireless station site adjacent to Lucky Bay, on the Swan River, and to pay-ing a visit to the goldfields. In conversa-tion with a representative of the "West Australian" yesterday Mr. Balsillie stated that so far as he could see at present the local station was well situated, and was probably far enough inland to prevent any possible enemy on the seaboard from blow-ing it to pieces at any time. It was, of course, to be used for defence purposes, and as such had to be protected as much as pos-sible. It is common knowledge that great. strides have been made in wireless tele-graphy during the past two or three years, Marconi having lately been able to demon-strate the fact that he can make a paying proposition of the transmission of wireless messages for a distance of over 2,000 miles. Mr. Balsillie himself stated yesterday that he believed at no very distant date, say 10 years, it would be found that all present cable distances would be bridged by "wire-less." The advantages of being able to use wireless telegraphy instead of a cable ser-vice were great if merely from the economic side, for two communicating stations, at a distance of about 2,000 miles apart, would only cost something like £1,000 apiece to install. He believed that the local station would under favourable conditions be found to be capable of communicating direct with Sydney, but that feat might not, of course, be possible in the immediate future.[348] A report of Balsillie's return to his Australian homeland showed that the Parker Judgement was still weighing heavily on his mind. But he had little time to contemplate this as a message received from the Department requested that he stay in Western Australia to review the construction of the Applecross installation. RADIO-TELEGRAPHY. Queenslander's Appointment. PERTH, September 6. Lodged Sydney 8.30 a.m.; delivered 9.35 a.m. Yesterday at Fremantle by the Orontes there arrived Mr. J. G. Balsillie, who is to take charge of the radio telegraphic department of the Commonwealth. He is a Queenslander, and has been engaged for three years at a salary of £600. He left Queensland ten years ago in order to study wireless systems, and underwent a thorough course with the best German professors of science, attending lectures by such men as Dr. Seibt and Dr. Rosenthal, who were then leading lights in the radio telegraphic world. Mr. Balsillie afterwards was sent all over the world to such places as China, Russia and Siberia, for the purpose of erecting wireless stations. "Where will be your headquarters?" he was asked. "That I am not sure about yet. All I know is that I am requested to stay in this State a fortnight, to look at stations." Asked what he thought of the future of radio telegraphy, he said that he did not think that there would be much of a future tor it, until there came about a solution of the legal aspects of the business.[349] Balsillie's arrival in Australia could not come soon enough as the Government was being attacked in both Houses for the inordinate delays in establishing the Telefunken stations and that arrival was used to deflect, at least in part, some difficult questions. The Government's failure to get its wireless telegraphic stations in order during the long recess has brought a crop of questions down upon the Postmaster-General. Replying to Mr. Hedges in the House of Representatives yesterday, the Minister stated that he "was unable to say definitely" at what date the Fremantle station would be ready for public use. Nor was he aware that a station erected on Cocos Island was put up and in use three days after the arrival of the steamer which carried the apparatus. He comforted members with the news that Mr. Balsillie, the wireless expert being imported by the Government, reached Fremantle on Tuesday.[350] The newly-engaged wireless telegraphy ex-pert (Mr. G. G. Balsillie) arrived in Melbourne last week. He is a native of Queensland, and, though he is only 27 years of age, has been engaged for ten years in the study and practice of wireless telegraphy and the construction of apparatus. He has erected a number of stations in England, Europe, and Asia. While at Fremantle he inspected the station now in course of erection. Mr. Balsillie will take up his work at once, and will make recommendations to the Government on the subject of medium and low-power stations, with which it is intended to supplement the so-called "high power" stations now being built at Sydney and Fremantle.[351] In-line citations ↑ http://www.austlii.edu.au/au/legis/vic/hist_act/poa1890125.pdf ↑ "Wireless Telegraphy". The Sydney Morning Herald (19,161): p. 3. 11 August 1899. http://nla.gov.au/nla.news-article14218590. Retrieved 8 February 2018. ↑ "Wireless Telegraphy". The Daily Telegraph (Sydney) (6292): p. 6. 11 August 1899. http://nla.gov.au/nla.news-article239529972. Retrieved 8 February 2018. ↑ "Death of Colonel Walker". The Daily Telegraph (Sydney) (6600): p. 4. 6 August 1900. http://nla.gov.au/nla.news-article237307065. Retrieved 8 February 2018. ↑ "Public Teachers' Union". South Australian Register LXII (15,869): p. 6. 22 September 1897. http://nla.gov.au/nla.news-article54509107. Retrieved 8 February 2018. ↑ "Second Day". Adelaide Observer LIV (2,921): p. 14. 25 September 1897. http://nla.gov.au/nla.news-article162381651. Retrieved 8 February 2018. ↑ a b "The Late Mr. McPherson". The Express and Telegraph (South Australia) XXXV (10,241): p. 2. 15 December 1897. http://nla.gov.au/nla.news-article209126386. Retrieved 11 February 2018. ↑ "Astronomical Society". The Advertiser (Adelaide): p. 3. 11 May 1899. http://nla.gov.au/nla.news-article73222367. Retrieved 8 February 2018. ↑ "Return of Professor Bragg". Evening Journal (Adelaide) XXXI (8817): p. 2. 6 March 1899. http://nla.gov.au/nla.news-article207915588. Retrieved 11 February 2018. ↑ "Wireless Telegraphy". South Australian Register LXIV (16,381): p. 4. 15 May 1899. http://nla.gov.au/nla.news-article54382369. Retrieved 8 February 2018. ↑ "Wireless Telegraphy". Evening Journal (Adelaide) XXXI (8989): p. 2. 28 September 1899. http://nla.gov.au/nla.news-article207930155. Retrieved 11 February 2018. ↑ "Saturday, September 28, 1878". The Argus (Melbourne) (10,073): p. 7. 28 September 1878. http://nla.gov.au/nla.news-article5950186. Retrieved 4 March 2018. ↑ "Wave Telepgraphy". The Argus (Melbourne) (15,932): p. 14. 24 July 1897. http://nla.gov.au/nla.news-article9176111. Retrieved 4 March 2018. ↑ "Current Topics". Launceston Examiner (Tasmania) LIX (154): p. 5. 29 June 1899. http://nla.gov.au/nla.news-article39809320. Retrieved 4 March 2018. ↑ "Narre Warren". South Bourke and Mornington Journal (Victoria) XXXV (42): p. 2 (WEEKLY.). 7 February 1900. http://nla.gov.au/nla.news-article70045303. Retrieved 4 March 2018. ↑ "Important Sale of Electrical Apparatus". The Age (Victoria) (14,335): p. 6. 14 February 1901. http://nla.gov.au/nla.news-article196060268. Retrieved 4 March 2018. ↑ "Institute of Engineers". The Argus (Melbourne) (19,463): p. 9. 4 December 1908. http://nla.gov.au/nla.news-article10174426. Retrieved 4 March 2018. ↑ a b "Departmental". The Age (Victoria) (13712): p. 5. 13 February 1899. http://nla.gov.au/nla.news-article189682000. Retrieved 4 March 2018. ↑ "Wireless Telegraphy". Evening Journal (Adelaide) XXXI (8989): p. 2. 28 September 1899. http://nla.gov.au/nla.news-article207930155. Retrieved 4 March 2018. ↑ "New Photography". Weekly Times (Victoria) (1,401): p. 13. 13 June 1896. http://nla.gov.au/nla.news-article221202038. Retrieved 4 March 2018. ↑ "New Patents". Mercury and Weekly Courier (Victoria) (1156): p. 3. 3 September 1897. http://nla.gov.au/nla.news-article58571842. Retrieved 4 March 2018. ↑ "Victoria". The Advocate (Victoria) XXIX (1493): p. 17. 4 September 1897. http://nla.gov.au/nla.news-article170171705. Retrieved 4 March 2018. ↑ "Parochial Intelligence". The Church of England Messenger for Victoria and Ecclesiastical Gazette for the Diocese of Melbourne (Victoria) XXX (351): p. 9. 1 January 1898. http://nla.gov.au/nla.news-article197318172. Retrieved 4 March 2018. ↑ "News of the Day". The Age (Victoria) (13,985): p. 6. 30 December 1899. http://nla.gov.au/nla.news-article188655192. Retrieved 4 March 2018. ↑ ""MODERN USES OF ELECTRICITY."". Bendigo Advertiser (Victoria, Australia) XLVIII, (14,107): p. 3. 29 August 1900. http://nla.gov.au/nla.news-article89617067. Retrieved 30 March 2018. ↑ "Dr. Clendinnen". The Argus (Melbourne) (20,996): p. 19. 8 November 1913. http://nla.gov.au/nla.news-article7253362. Retrieved 4 March 2018. ↑ "Without Wires". The Herald (Victoria) (5133): p. 1. 26 December 1896. http://nla.gov.au/nla.news-article241085453. Retrieved 7 February 2018. ↑ "Wireless Telegraphy". The Argus (Melbourne) (16,434): p. 11. 8 March 1899. http://nla.gov.au/nla.news-article9530550. Retrieved 7 February 2018. ↑ "Wireless Telegraphy". The Herald (Victoria) (5949): p. 4. 11 August 1899. http://nla.gov.au/nla.news-article241250181. Retrieved 18 February 2018. ↑ "Wireless Telegraphy". The Argus (Melbourne) (16,693): p. 13. 6 January 1900. http://nla.gov.au/nla.news-article9044348. Retrieved 7 February 2018. ↑ "News of the Day". The Age (Victoria) (13,997): p. 8. 13 January 1900. http://nla.gov.au/nla.news-article196019338. Retrieved 26 February 2018. ↑ "Wireless Telegraphy". The Australasian (Victoria) LXX (1827): p. 36. 6 April 1901. http://nla.gov.au/nla.news-article139158417. Retrieved 26 February 2018. ↑ "Wireless Telegraphy". The Argus (Melbourne) (17,083): p. 5. 11 April 1901. http://nla.gov.au/nla.news-article10544990. Retrieved 26 February 2018. ↑ "Wireless Telegraphy". The Australian Star (New South Wales) (4107): p. 5. 16 April 1901. http://nla.gov.au/nla.news-article228506255. Retrieved 26 February 2018. ↑ "Wireless Telegraphy". Weekly Times (Victoria) (1,656): p. 24. 4 May 1901. http://nla.gov.au/nla.news-article223799428. Retrieved 27 February 2018. ↑ "The Royal Visit". Geelong Advertiser (Victoria) (16,888): p. 2. 6 May 1901. http://nla.gov.au/nla.news-article147721849. Retrieved 27 February 2018. ↑ "Wireless Telegraphy". The Argus (Melbourne) (17,116): p. 9. 20 May 1901. http://nla.gov.au/nla.news-article10551442. Retrieved 27 February 2018. ↑ "Departure of the War Ships". The Age (Victoria) (14,415): p. 6. 20 May 1901. http://nla.gov.au/nla.news-article190036875. Retrieved 27 February 2018. ↑ "Town Talk". Geelong Advertiser (Victoria) (17,838): p. 2. 30 May 1904. http://nla.gov.au/nla.news-article148900326. Retrieved 27 February 2018. ↑ "Wireless Telegraphy". Independent (Victoria, Australia) (858): p. 3. 16 September 1899. http://nla.gov.au/nla.news-article73250159. Retrieved 29 March 2018. ↑ "The Argus". The Argus (Melbourne) (Victoria, Australia) (16,479): p. 5. 1 May 1899. http://nla.gov.au/nla.news-article9505303. Retrieved 11 April 2018. ↑ "Victoria". Advocate (Victoria, Australia) XXXI, (1580): p. 8. 6 May 1899. http://nla.gov.au/nla.news-article169716819. Retrieved 11 April 2018. ↑ AOJP patent 11477 14th May 1908 ↑ Williamstown Chronicle 19th September 1896 ↑ Bendigo Advertiser 29th August 1900 ↑ Salute to the X-ray Pioneers of Australia J.P.Trainor 1946 ↑ "Wireless Telegraphy". Independent (Victoria, Australia) (860): p. 3. 30 September 1899. http://nla.gov.au/nla.news-article73250220. Retrieved 29 March 2018. ↑ Argus !st January 1903 ↑ Weekly Times 21st January 1905 ↑ letter Father Guis to Father Field - archives of the Missionaries of the Sacred Heart Roma St Kensington NSW 7th May 1911 ↑ "Lecture on Wireless Telegraphy". Mercury And Weekly Courier (Victoria, Australia) (1333): p. 2. 17 May 1901. http://nla.gov.au/nla.news-article58579129. Retrieved 10 March 2018. ↑ "The Philippine Islands". The Brisbane Courier (Queensland, Australia) LIV, (12,588): p. 4. 17 May 1898. http://nla.gov.au/nla.news-article3671672. Retrieved 7 March 2018. ↑ "The Encampment". The Brisbane Courier (Queensland, Australia) LV, (12,621): p. 5. 24 June 1898. http://nla.gov.au/nla.news-article3674028. Retrieved 7 March 2018. ↑ "The Brisbane Courier.". The Brisbane Courier (Queensland, Australia) XLII, (8,952): p. 4. 23 September 1886. http://nla.gov.au/nla.news-article4486457. Retrieved 11 May 2018. ↑ "The Morning Bulletin, ROCKHAMPTON.". Morning Bulletin (Queensland, Australia) XXXIV, (1774): p. 4. 9 November 1886. http://nla.gov.au/nla.news-article52061670. Retrieved 11 May 2018. ↑ "EPITOME OF NEWS.". The Brisbane Courier (Queensland, Australia) XLIV, (9,413): p. 4. 16 March 1888. http://nla.gov.au/nla.news-article3470264. Retrieved 11 May 2018. ↑ "The Brisbane Courier.". The Brisbane Courier (Queensland, Australia) XLVI, (9,871): p. 4. 3 September 1889. http://nla.gov.au/nla.news-article3500763. Retrieved 11 May 2018. ↑ "Scientific Scraps.". The Week (Queensland, Australia) XXXII, (814): p. 32. 31 July 1891. http://nla.gov.au/nla.news-article184251519. Retrieved 10 May 2018. ↑ "WIRELESS TELEGRAPHY.". The Brisbane Courier (Queensland, Australia) LV, (12,875): p. 2. 18 April 1899. http://nla.gov.au/nla.news-article3692064. Retrieved 10 May 2018. ↑ "Wireless Telegraphy.". The Telegraph (Queensland, Australia) (8,898): p. 4. 28 May 1901. http://nla.gov.au/nla.news-article174378271. Retrieved 10 May 2018. ↑ "ELECTRICITY AT THE TECHNICAL COLLEGE.". The Brisbane Courier (Queensland, Australia) LVIII, (13,791): p. 4. 26 March 1902. http://nla.gov.au/nla.news-article19129589. Retrieved 10 May 2018. ↑ "Royal Society of Tasmania". The Mercury (Tasmania) LXXII (8849): p. 3. 12 July 1898. http://nla.gov.au/nla.news-article9426282. Retrieved 7 February 2018. ↑ "The Mercury". The Mercury (Tasmania) LXXII (8872): p. 2. 8 August 1898. http://nla.gov.au/nla.news-article9428124. Retrieved 7 February 2018. ↑ "Wireless Telegraphy". Daily Telegraph (Tasmania, Australia) XXI, (156): p. 5. 3 July 1901. http://nla.gov.au/nla.news-article157738285. Retrieved 25 March 2018. ↑ "The Royal Visit". The Mercury (Tasmania) LXXVI (9769): p. 3. 3 July 1901. http://nla.gov.au/nla.news-article9569556. Retrieved 7 February 2018. ↑ "Wireless Telegraphy". The West Australian (Western Australia) 15, (4,019): p. 7. 17 January 1899. http://nla.gov.au/nla.news-article3219715. Retrieved 8 March 2018. ↑ "Wireless Telegraphy". The West Australian (Western Australia) 15, (4,125): p. 3. 22 May 1899. http://nla.gov.au/nla.news-article3227027. Retrieved 8 March 2018. ↑ "City of York". Kalgoorlie Miner (Western Australia) 4, (1126): p. 5. 17 July 1899. http://nla.gov.au/nla.news-article88183449. Retrieved 12 March 2018. ↑ "General News". The Inquirer And Commercial News (Western Australia) LVIII, (3,256): p. 10. 8 September 1899. http://nla.gov.au/nla.news-article67050453. Retrieved 8 March 2018. ↑ "Wireless Telegraphy". The West Australian (Western Australia) 15, (4,267): p. 10. 4 November 1899. http://nla.gov.au/nla.news-article3238020. Retrieved 8 March 2018. ↑ "Wireless Telegraphy". The Inquirer And Commercial News (Western Australia) LVIII, (3,295): p. 5. 10 November 1899. http://nla.gov.au/nla.news-article67053260. Retrieved 8 March 2018. ↑ "The Rottnest Cable". The Daily News (Western Australia) XVII, (7,680): p. 4. 6 March 1900. http://nla.gov.au/nla.news-article83059058. Retrieved 8 March 2018. ↑ "University Extension Lectures". The Daily News (Western Australia) XXI, (8,415): p. 1. 11 August 1902. http://nla.gov.au/nla.news-article82443599. Retrieved 8 March 2018. ↑ "News and Notes". The West Australian (Western Australia) XXII, (6,179): p. 11. 6 January 1906. http://nla.gov.au/nla.news-article25532432. Retrieved 8 March 2018. ↑ "Correspondence". Coolgardie Miner (Western Australia) 5, (1408): p. 3. 20 June 1899. http://nla.gov.au/nla.news-article217345000. Retrieved 12 March 2018. ↑ https://www.legislation.gov.au/Series/C1901A00012 ↑ "News of the Day". The Age (Victoria) (14,298): p. 4. 2 January 1901. http://nla.gov.au/nla.news-article196061948. Retrieved 25 February 2018. ↑ http://www.comlaw.gov.au/Details/C2004C07914 ↑ R.R. Walker, The Magic Spark – 50 Years of Radio in Australia (Melbourne, 1973). ↑ When Radio was the Cat's Whiskers, Bernard Harte, Dural NSW, 2002 – Google Books ↑ http://www.wia.org.au/members/history/research/documents/WIA%20MAIN%20T-%20LINE-Nov%202013%20EXTENDED.pdf ↑ Mimi Colligan, Golden Days of Radio, Australia Post, 1991 ↑ "Advertising". Evening News (New South Wales, Australia) (12,252): p. 2. 15 September 1906. http://nla.gov.au/nla.news-article114090490. Retrieved 13 March 2018. ↑ "Advertising". The Daily Telegraph (New South Wales, Australia) (9462): p. 2. 25 September 1909. http://nla.gov.au/nla.news-article238317469. Retrieved 13 March 2018. ↑ "Wireless". Sunday Times (New South Wales, Australia) (1297): p. 7. 27 November 1910. http://nla.gov.au/nla.news-article123828881. Retrieved 18 April 2018. ↑ "The Juvenile Industrial Exhibition". Bendigo Advertiser (Victoria, Australia) XLIV, (12,943): p. 3. 16 November 1896. http://nla.gov.au/nla.news-article88993292. Retrieved 11 March 2018. ↑ "School of Mines". The Bendigo Independent (Victoria, Australia) (7866): p. 3. 1 February 1899. http://nla.gov.au/nla.news-article180892091. Retrieved 11 March 2018. ↑ "School of Mines Examinations". The Bendigo Independent (Victoria, Australia) (10,448): p. 2. 7 January 1904. http://nla.gov.au/nla.news-article227004493. Retrieved 11 March 2018. ↑ "Notes and Comments". Bendigo Advertiser (Victoria, Australia) L, (14,496): p. 2. 13 January 1902. http://nla.gov.au/nla.news-article88610708. Retrieved 10 March 2018. ↑ "Gold Jubilee Exhibition". Bendigo Advertiser (Victoria, Australia) L, (14,548): p. 2. 14 March 1902. http://nla.gov.au/nla.news-article88615326. Retrieved 11 March 2018. ↑ "Electrical Currents". The Bendigo Independent (Victoria, Australia) (9052): p. 4. 20 June 1902. http://nla.gov.au/nla.news-article227553765. Retrieved 11 March 2018. ↑ "Commonwealth Patents". Sunday Times (New South Wales, Australia) (1603): p. 4. 8 October 1916. http://nla.gov.au/nla.news-article121335202. Retrieved 11 March 2018. ↑ "Advertising". The Age (Victoria, Australia) (16063): p. 12. 4 September 1906. http://nla.gov.au/nla.news-article201675192. Retrieved 17 March 2018. ↑ "Advertising". Evening News (New South Wales, Australia) (12,252): p. 2. 15 September 1906. http://nla.gov.au/nla.news-article114090490. Retrieved 17 March 2018. ↑ "Wireless Telegraphy Deal". The Sydney Morning Herald (New South Wales, Australia) (22,282): p. 6. 15 June 1909. http://nla.gov.au/nla.news-article15065248. Retrieved 17 March 2018. ↑ [1] ↑ [2] ↑ "Manchester Unites Oddfellows". Geelong Advertiser (Victoria, Australia) (19,447): p. 4. 6 August 1909. http://nla.gov.au/nla.news-article150852093. Retrieved 12 March 2018. ↑ "Wireless Telegraphy". The Age (Victoria, Australia) (16,977): p. 7. 12 August 1909. http://nla.gov.au/nla.news-article198471407. Retrieved 12 March 2018. ↑ "Wireless Telegraphy". Evening Journal (South Australia) XLIV, (12126): p. 1 (Late Edition). 12 February 1910. http://nla.gov.au/nla.news-article208012669. Retrieved 13 March 2018. ↑ "Wiresless Experiments". The Age (Victoria, Australia) (17,136): p. 6. 15 February 1910. http://nla.gov.au/nla.news-article196076739. Retrieved 13 March 2018. ↑ "Nightingall's Automatic Wireless Telegraph System for Ships". Leader (Victoria, Australia) (2827): p. 24. 12 March 1910. http://nla.gov.au/nla.news-article196492658. Retrieved 13 March 2018. ↑ "Personal". Table Talk (Victoria, Australia) (1765): p. 6. 22 May 1919. http://nla.gov.au/nla.news-article148563347. Retrieved 13 March 2018. ↑ "UNIVERSITY EXTENSION LECTURE.". The Brisbane Courier (Queensland, Australia) LX, (14,305): p. 4. 18 November 1903. http://nla.gov.au/nla.news-article19251793. Retrieved 11 May 2018. ↑ "General news". The Advertiser (South Australia) L, (15,245): p. 8. 28 August 1907. http://nla.gov.au/nla.news-article5086340. Retrieved 13 March 2018. ↑ "A Scientific Treat". The Daily News (Western Australia) XXIII, (9037): p. 3. 28 April 1904. http://nla.gov.au/nla.news-article82942894. Retrieved 5 April 2018. ↑ "University Extension Lectures". The West Australian (Western Australia) XX, (5,695): p. 7. 15 June 1904. http://nla.gov.au/nla.news-article25090994. Retrieved 4 April 2018. ↑ "Wreck of the R.M.S. Australia". The Daily News (Western Australia) XXIII, (9080): p. 1 (Second Edition). 20 June 1904. http://nla.gov.au/nla.news-article82946518. Retrieved 8 April 2018. ↑ "Mr. Soddy in Perth". Coolgardie Miner (Western Australia) X, (2967): p. 3. 22 June 1904. http://nla.gov.au/nla.news-article218097666. Retrieved 4 April 2018. ↑ "University Extension Lectures". Western Mail (Western Australia) XIX, (965): p. 7. 25 June 1904. http://nla.gov.au/nla.news-article38683403. Retrieved 8 April 2018. ↑ "News and Notes". The West Australian (Western Australia) XX, (5,701): p. 6. 22 June 1904. http://nla.gov.au/nla.news-article25091444. Retrieved 4 April 2018. ↑ "Radium, Electricity and Science". The Daily News (Western Australia) XXIII, (9086): p. 2. 27 June 1904. http://nla.gov.au/nla.news-article82466113. Retrieved 9 April 2018. ↑ "University Extension Lectures". The West Australian (Western Australia) XX, (5,710): p. 9. 2 July 1904. http://nla.gov.au/nla.news-article25092334. Retrieved 9 April 2018. ↑ "Electricity, Radium and Science". The Daily News (Western Australia) XXIII, (9106): p. 4. 20 July 1904. http://nla.gov.au/nla.news-article82473859. Retrieved 9 April 2018. ↑ "Theft or Mistake?". The Daily News (Western Australia) XXIII, (9109): p. 5. 23 July 1904. http://nla.gov.au/nla.news-article82474951. Retrieved 9 April 2018. ↑ "The Lesson of Radium". The West Australian (Western Australia) XX, (5,729): p. 3. 25 July 1904. http://nla.gov.au/nla.news-article25094180. Retrieved 9 April 2018. ↑ "Electricity, Radium and Science". The Daily News (Western Australia) XXIII, (9082): p. 1. 22 June 1904. http://nla.gov.au/nla.news-article82941425. Retrieved 4 April 2018. ↑ "Electricity, Radium and Science". The Daily News (Western Australia) XXIII, (9087): p. 5. 28 June 1904. http://nla.gov.au/nla.news-article82468251. Retrieved 9 April 2018. ↑ "University Extension Lectures". The West Australian (Western Australia) XX, (5,709): p. 6. 1 July 1904. http://nla.gov.au/nla.news-article25092264. Retrieved 9 April 2018. ↑ "University Extension Lecture". Kalgoorlie Miner (Western Australia) 8, (2740): p. 6. 6 July 1904. http://nla.gov.au/nla.news-article89168721. Retrieved 5 April 2018. ↑ "University Extesnsion Lectures". Kalgoorlie Miner (Western Australia) 8, (2743): p. 4. 9 July 1904. http://nla.gov.au/nla.news-article89165850. Retrieved 5 April 2018. ↑ "Univers[?"]. Coolgardie Miner (Western Australia) X, (2981): p. 3. 8 July 1904. http://nla.gov.au/nla.news-article218098510. Retrieved 5 April 2018. ↑ "Local and General News". The Northam Advertiser (Western Australia) XI, (970): p. 2. 16 July 1904. http://nla.gov.au/nla.news-article211687146. Retrieved 5 April 2018. ↑ "Country". The West Australian (Western Australia) XX, (5,723): p. 4. 18 July 1904. http://nla.gov.au/nla.news-article25093595. Retrieved 5 April 2018. ↑ "University Extension Lecture". Albany Advertiser (Western Australia) XVII, (2,302): p. 4. 20 July 1904. http://nla.gov.au/nla.news-article69936209. Retrieved 5 April 2018. ↑ "Lecture". Southern Times (Western Australia) 16, (140): p. 5. 21 July 1904. http://nla.gov.au/nla.news-article158084151. Retrieved 5 April 2018. ↑ "The Proposed University". Western Mail (Western Australia) XIX, (969): p. 16. 23 July 1904. http://nla.gov.au/nla.news-article38685431. Retrieved 5 April 2018. ↑ "Shipping". The Daily News (Western Australia) XXIII, (9112): p. 1 (Second Edition). 27 July 1904. http://nla.gov.au/nla.news-article82471030. Retrieved 5 April 2018. ↑ "Perth Technical School". The West Australian (Western Australia) XX, (5,848): p. 7. 12 December 1904. http://nla.gov.au/nla.news-article25369159. Retrieved 9 April 2018. ↑ "Perth Technical School". The West Australian (Western Australia) XXI, (5,904): p. 4. 16 February 1905. http://nla.gov.au/nla.news-article25374446. Retrieved 9 April 2018. ↑ "The Japanese Warships". The Mercury (Tasmania, Australia) LXXIX, (10,361): p. 4. 29 May 1903. http://nla.gov.au/nla.news-article12271986. Retrieved 22 March 2018. ↑ "Wireless Telegraphy Experiment". The Mercury (Tasmania, Australia) LXXIX, (10,362): p. 4. 30 May 1903. http://nla.gov.au/nla.news-article12273135. Retrieved 22 March 2018. ↑ https://trove.nla.gov.au/newspaper/result?l-publictag=Hobart%20Conversazione%201904 ↑ "Scientific Conversazione Committee". The Mercury (Tasmania, Australia) LXXXII, (10,759): p. 6. 7 September 1904. http://nla.gov.au/nla.news-article9689347. Retrieved 19 March 2018. ↑ "Municipal Vagaries". Tasmanian News (Tasmania, Australia) , (7290): p. 2 (Fourth Edition). 19 September 1904. http://nla.gov.au/nla.news-article185293606. Retrieved 19 March 2018. ↑ "Scientific Conversazione". The Mercury (Tasmania, Australia) LXXXII, (10,769): p. 5. 19 September 1904. http://nla.gov.au/nla.news-article9690025. Retrieved 19 March 2018. ↑ "Clock and Chimes Fund". The Mercury (Tasmania, Australia) LXXXII, (10,771): p. 3. 21 September 1904. http://nla.gov.au/nla.news-article9690104. Retrieved 20 March 2018. ↑ "Improved Telephoning". The Mercury (Tasmania, Australia) LXXXIII, (10,868): p. 4. 11 January 1905. http://nla.gov.au/nla.news-article12287124. Retrieved 25 March 2018. ↑ "Wireless Telegraphy—Mount Nelson to Tasman Island". The Mercury (Tasmania, Australia) LXXXV, (11,200): p. 4. 6 February 1906. http://nla.gov.au/nla.news-article12754581. Retrieved 20 March 2018. ↑ [3] ↑ "Launch of the R.M.S. Mantua". The Examiner (Tasmania) (Tasmania, Australia) LXVIII, (87): p. 4 (DAILY). 13 April 1909. http://nla.gov.au/nla.news-article50362812. Retrieved 12 March 2018. ↑ "Messages Through Space". The Daily News (Western Australia) XXVIII, (10,635): p. 6. 6 July 1909. http://nla.gov.au/nla.news-article76792563. Retrieved 23 March 2018. ↑ "R.M.S. Mantua". The Herald (Victoria, Australia) (10,522): p. 1. 12 July 1909. http://nla.gov.au/nla.news-article242060674. Retrieved 12 March 2018. ↑ a b ""Wireless" on the R.M.S. Mantua". The Daily Telegraph (New South Wales, Australia) (9401): p. 8. 16 July 1909. http://nla.gov.au/nla.news-article238332239. Retrieved 24 March 2018. ↑ [4] ↑ [5] ↑ "Wireless Telegraphy". The Argus (Melbourne) (Victoria, Australia) (19,682): p. 4. 19 August 1909. http://nla.gov.au/nla.news-article10727540. Retrieved 12 March 2018. ↑ [6] ↑ "Weather Forecast". The Ballarat Star (Victoria, Australia) 55, (16820): p. 2. 27 April 1910. http://nla.gov.au/nla.news-article216055240. Retrieved 29 March 2018. ↑ [7] ↑ "The New Orient Steamers". Leader (Victoria, Australia) (2765): p. 30. 9 January 1909. http://nla.gov.au/nla.news-article196902571. Retrieved 25 March 2018. ↑ "Commonwealth Mail Service". The Daily News (Western Australia) XXVIII, (10,654): p. 2. 28 July 1909. http://nla.gov.au/nla.news-article76785372. Retrieved 25 March 2018. ↑ [8] ↑ "New Orient Service". The Register (Adelaide) (South Australia) LXXIV, (19,410): p. 6. 28 January 1909. http://nla.gov.au/nla.news-article57560335. Retrieved 26 March 2018. ↑ "New Orient Line Osterley". The West Australian (Western Australia) XXV, (7,321): p. 12. 11 September 1909. http://nla.gov.au/nla.news-article26237301. Retrieved 26 March 2018. ↑ "Wireless". The Daily News (Western Australia) XXIX, (10,996): p. 3 (Second Edition). 6 September 1910. http://nla.gov.au/nla.news-article80074562. Retrieved 26 March 2018. ↑ [9] ↑ a b "R.M.S. Otway". The Argus (Melbourne) (Victoria, Australia) (19,978): p. 6. 2 August 1910. http://nla.gov.au/nla.news-article10448876. Retrieved 28 March 2018. ↑ [10] ↑ [11] ↑ [12] ↑ "Wireless onthe Makura". The Sydney Morning Herald (New South Wales, Australia) (22,452): p. 10. 30 December 1909. http://nla.gov.au/nla.news-article15094852. Retrieved 22 March 2018. ↑ [13] ↑ "R.M.S. Marama". The Sydney Morning Herald (New South Wales, Australia) (22,643): p. 10. 10 August 1910. http://nla.gov.au/nla.news-article15170723. Retrieved 22 March 2018. ↑ [14] ↑ "Wireless Telegraphy on the Bremen". The Daily Telegraph (New South Wales, Australia) (8885): p. 4. 22 November 1907. http://nla.gov.au/nla.news-article238251414. Retrieved 18 March 2018. ↑ [15] ↑ "Wireless Telegraphy". Daily News (Western Australia) XXVIII, (10,736): p. 4. 2 November 1909. http://nla.gov.au/nla.news-article76516059. Retrieved 14 March 2018. ↑ "News of the Day". The Age (Victoria, Australia) (16,439): p. 4. 19 November 1907. http://nla.gov.au/nla.news-article204999090. Retrieved 18 March 2018. ↑ "Liner's Wireless Message". The Argus (Melbourne) (Victoria, Australia) (19,653): p. 7. 16 July 1909. http://nla.gov.au/nla.news-article10719450. Retrieved 12 March 2018. ↑ "News and Notes". The West Australian (Western Australia) XXI, (6,149): p. 4. 1 December 1905. http://nla.gov.au/nla.news-article25529614. Retrieved 14 March 2018. ↑ "Toll Telephones Again". The Sydney Morning Herald (New South Wales, Australia) (21,394): p. 12. 29 September 1906. http://nla.gov.au/nla.news-article14821064. Retrieved 18 March 2018. ↑ "H.M.S. Powerful". The Australian Star (New South Wales, Australia) (6044): p. 5. 27 March 1907. http://nla.gov.au/nla.news-article229517774. Retrieved 18 March 2018. ↑ "Return of the Admiral". The Sydney Morning Herald (New South Wales, Australia) (22,365): p. 7. 20 September 1909. http://nla.gov.au/nla.news-article15108333. Retrieved 22 March 2018. ↑ "News and Notes". The West Australian (Western Australia) XXIII, (6,511): p. 4. 1 February 1907. http://nla.gov.au/nla.news-article25695144. Retrieved 14 March 2018. ↑ ""Wireless" Across the Tasman". The Daily Telegraph (New South Wales, Australia) (9346): p. 7. 13 May 1909. http://nla.gov.au/nla.news-article238271197. Retrieved 24 March 2018. ↑ "H.M.S. Pyramus". The Daily Telegraph (New South Wales, Australia) (8354): p. 5. 13 March 1906. http://nla.gov.au/nla.news-article239451859. Retrieved 18 March 2018. ↑ Bastock, pp. 138-139. ↑ "News and Notes". The West Australian (Western Australia) XXVI, (7,525): p. 7. 11 May 1910. http://nla.gov.au/nla.news-article26256817. Retrieved 15 March 2018. ↑ "Original Court". Zeehan And Dundas Herald (Tasmania, Australia) XXI, (31): p. 3. 18 November 1909. http://nla.gov.au/nla.news-article85612698. Retrieved 25 March 2018. ↑ a b "Visit of Japanese War Vessels". The Register (Adelaide) (South Australia) LXVIII, (17,579): p. 4. 18 March 1903. http://nla.gov.au/nla.news-article56649063. Retrieved 18 March 2018. ↑ "Visiting War Vessels". The West Australian (Western Australia) XIX, (5,324): p. 7. 4 April 1903. http://nla.gov.au/nla.news-article24858952. Retrieved 18 March 2018. ↑ "Japanese Warships". The Daily News (Western Australia) XXII, (8,627): p. 1. 22 April 1903. http://nla.gov.au/nla.news-article83158481. Retrieved 18 March 2018. ↑ "The Japanese War Vessels". Evening Journal (South Australia) XXXVI, (10082): p. 2 (1 O'clock Edition). 8 May 1903. http://nla.gov.au/nla.news-article207974653. Retrieved 18 March 2018. ↑ "The Japanese Squadron". The Argus (Melbourne) (Victoria, Australia) (17,736): p. 6. 18 May 1903. http://nla.gov.au/nla.news-article9816949. Retrieved 18 March 2018. ↑ "Imports — June 1". The Mercury (Tasmania, Australia) LXXIX, (10,364): p. 4. 2 June 1903. http://nla.gov.au/nla.news-article12277563. Retrieved 18 March 2018. ↑ "Japanese Squadron". The Sydney Morning Herald (New South Wales, Australia) (20,363): p. 8. 15 June 1903. http://nla.gov.au/nla.news-article14532467. Retrieved 18 March 2018. ↑ "Telegraphic and Cable News – New Zealand Shipping". Daily Commercial News And Shipping List (New South Wales, Australia) XII, (3608): p. 5. 3 July 1903. http://nla.gov.au/nla.news-article157975937. Retrieved 18 March 2018. ↑ "Visit of Japanese War Vessels". Evening Journal (South Australia) XXXVI, (10040): p. 1 (1 O'clock Edition). 18 March 1903. http://nla.gov.au/nla.news-article207970743. Retrieved 18 March 2018. ↑ "A Japanese Squadron". Evening Journal (South Australia) XL, (10938): p. 2. 2 March 1906. http://nla.gov.au/nla.news-article200838415. Retrieved 18 March 2018. ↑ "Japanese Squadron". The Telegraph (Queensland, Australia) (10,428): p. 5 (Second Edition). 20 April 1906. http://nla.gov.au/nla.news-article187239800. Retrieved 18 March 2018. ↑ "The Japanese Squadron". The Argus (Melbourne) (Victoria, Australia) (18,662): p. 5. 10 May 1906. http://nla.gov.au/nla.news-article10047826. Retrieved 18 March 2018. ↑ "The Japanese Squadron". Evening News (New South Wales, Australia) (12,151): p. 6. 21 May 1906. http://nla.gov.au/nla.news-article114320160. Retrieved 18 March 2018. ↑ "Telegraphic Shipping News". The Sydney Morning Herald (New South Wales, Australia) (21,300): p. 8. 12 June 1906. http://nla.gov.au/nla.news-article14778548. Retrieved 18 March 2018. ↑ "The Commonwealth. Visiting Japanese Warships". The Sydney Morning Herald (New South Wales, Australia) (21,228): p. 7. 20 March 1906. http://nla.gov.au/nla.news-article14760309. Retrieved 18 March 2018. ↑ "Reform of the Lords". The Sydney Morning Herald (New South Wales, Australia) (21,573): p. 6. 11 March 1907. http://nla.gov.au/nla.news-article14849899. Retrieved 18 March 2018. ↑ "Imperial Japanese Squadron". The Brisbane Courier (Queensland, Australia) LXIII, (15,368): p. 5. 15 April 1907. http://nla.gov.au/nla.news-article19497252. Retrieved 18 March 2018. ↑ "Japanese Gunboats". The Express And Telegraph (South Australia) XLVII, (13,939): p. 1. 19 February 1910. http://nla.gov.au/nla.news-article209899376. Retrieved 18 March 2018. ↑ "Japanese Cruisers". The Star (New South Wales, Australia) (305): p. 6. 3 March 1910. http://nla.gov.au/nla.news-article228316611. Retrieved 18 March 2018. ↑ "Japanese Cruisers". The Telegraph (Queensland, Australia) (11,639): p. 7 (Second Edition). 8 March 1910. http://nla.gov.au/nla.news-article186593571. Retrieved 18 March 2018. ↑ "Japanese Cruisers". The Telegraph (Queensland, Australia) (11,644): p. 3. 14 March 1910. http://nla.gov.au/nla.news-article186590702. Retrieved 18 March 2018. ↑ "Japanese Cruisers Arrive". Evening News (New South Wales, Australia) (13,346): p. 7. 19 March 1910. http://nla.gov.au/nla.news-article116049791. Retrieved 18 March 2018. ↑ "Visiting Japanese Warships". Tasmanian News (Tasmania, Australia) , (8968): p. 4 (5.30 Edition). 30 March 1910. http://nla.gov.au/nla.news-article186975910. Retrieved 18 March 2018. ↑ "Japanese Cruisers". The Herald (Victoria, Australia) (10,745): p. 8. 7 April 1910. http://nla.gov.au/nla.news-article242088489. Retrieved 18 March 2018. ↑ "Japanese Warships". Evening Journal (South Australia) XLIV, (12690): p. 1. 19 April 1910. http://nla.gov.au/nla.news-article208018528. Retrieved 18 March 2018. ↑ "The Japanese Squadron". Albany Advertiser (Western Australia) XXII, (2839): p. 3. 30 April 1910. http://nla.gov.au/nla.news-article69953804. Retrieved 18 March 2018. ↑ "The Japanese Warships". The West Australian (Western Australia) XXVI, (7,520): p. 5. 5 May 1910. http://nla.gov.au/nla.news-article26256221. Retrieved 18 March 2018. ↑ "The Japanese Warships". The West Australian (Western Australia) XIX, (5,339): p. 5. 23 April 1903. http://nla.gov.au/nla.news-article24860265. Retrieved 17 March 2018. ↑ "Western Australia". The Sydney Morning Herald (New South Wales, Australia) (20,303): p. 8. 6 April 1903. http://nla.gov.au/nla.news-article14557646. Retrieved 15 March 2018. ↑ "On Board The Flagship". The Sydney Morning Herald (New South Wales, Australia) (20,356): p. 9. 6 June 1903. http://nla.gov.au/nla.news-article14527056. Retrieved 15 March 2018. ↑ a b "Wireless". The Daily Telegraph (New South Wales, Australia) (9625): p. 9. 4 April 1910. http://nla.gov.au/nla.news-article239395368. Retrieved 18 March 2018. ↑ "The Japanese Warships". The West Australian (Western Australia) XXVI, (7,521): p. 6. 6 May 1910. http://nla.gov.au/nla.news-article26256357. Retrieved 18 March 2018. ↑ "The Fleet that is Coming to Sydney.". The Sydney Mail And New South Wales Advertiser (New South Wales, Australia) LXXXV, (2419): p. 722. 18 March 1908. http://nla.gov.au/nla.news-article164344061. Retrieved 9 May 2018. ↑ "AUSTRALIA WELCOMES AMERICA'S FLEET.". The Sydney Morning Herald (New South Wales, Australia) (22,027): p. 9. 21 August 1908. http://nla.gov.au/nla.news-article15002980. Retrieved 10 May 2018. ↑ "VIEW FROM CLIFTON.". The Sydney Morning Herald (New South Wales, Australia) (22,033): p. 7. 28 August 1908. http://nla.gov.au/nla.news-article15022970. Retrieved 10 May 2018. ↑ "MELBOURNE WELCOMES". The Herald (Victoria, Australia) (10,251): p. 5. 29 August 1908. http://nla.gov.au/nla.news-article242905889. Retrieved 10 May 2018. ↑ "THE FINAL STAGE". The Herald (Victoria, Australia) (10,257): p. 8. 5 September 1908. http://nla.gov.au/nla.news-article242924302. Retrieved 10 May 2018. ↑ "AMERICAN FLEET". The Evening Star (Western Australia) 11, (3225): p. 3 (SECOND EDITION). 11 September 1908. http://nla.gov.au/nla.news-article204577977. Retrieved 10 May 2018. ↑ "THE VISIT OF THE AMERICAN FLEET.". Albany Advertiser (Western Australia) XXI, (2675): p. 3. 19 September 1908. http://nla.gov.au/nla.news-article69964000. Retrieved 10 May 2018. ↑ "THE AMERICAN FLEET". The Daily News (Western Australia) XXVII, (10,391): p. 5. 19 September 1908. http://nla.gov.au/nla.news-article76818667. Retrieved 10 May 2018. ↑ [16] ↑ "THE AMERICAN FLEET,". Evening Journal (South Australia) XLII, (11667): p. 2. 7 August 1908. http://nla.gov.au/nla.news-article208638351. Retrieved 10 May 2018. ↑ "WIRELESS TELEPHONY.". Kalgoorlie Miner (Western Australia) 13, (3952): p. 2. 29 May 1908. http://nla.gov.au/nla.news-article96582146. Retrieved 10 May 2018. ↑ "WIRELESS TELEPHONY". The Australian Star (New South Wales, Australia) (6530): p. 5 (FIRST EDITION). 15 October 1908. http://nla.gov.au/nla.news-article229099580. Retrieved 9 May 2018. ↑ History of Communications-Electronics in the United States Navy by Captain L. S. Howeth, USN (Retired), 1963, "The Radio Telephone Failure", pages 169–172. ↑ "Wireless Telegraphy for War Time". The Daily Telegraph (New South Wales, Australia) (9426): p. 11. 14 August 1909. http://nla.gov.au/nla.news-article238335378. Retrieved 24 March 2018. ↑ "By Wireless" How we got the signals through Lieutenant George A Taylor Army Intelligence Corps ↑ Radio Waves No 122 October 2012 ↑ https://www.legislation.gov.au/Details/C1905A00008 ↑ Construction:Weekly Supplement to Building 25th July 1910 ↑ "The News in Melbourne". The Sydney Morning Herald (New South Wales, Australia) (22,504): p. 7. 1 March 1910. http://nla.gov.au/nla.news-article15140312. Retrieved 24 March 2018. ↑ "A Wireless Institute". The Daily Telegraph (New South Wales, Australia) (9474). 9 October 1909. http://nla.gov.au/nla.news-article238242034. Retrieved 24 March 2018. ↑ "Wireless Telegraphy". The Daily Telegraph (New South Wales, Australia) (9598): p. 5. 3 March 1910. http://nla.gov.au/nla.news-article238350765. Retrieved 24 March 2018. ↑ "A Wireless Enthusiasts' Institute". The Daily Telegraph (New South Wales, Australia) (9606): p. 15. 12 March 1910. http://nla.gov.au/nla.news-article238353379. Retrieved 24 March 2018. ↑ "The Wireless Institute". The Daily Telegraph (New South Wales, Australia) (9642): p. 12. 23 April 1910. http://nla.gov.au/nla.news-article239400879. Retrieved 24 March 2018. ↑ "Wireless". Sunday Times (New South Wales, Australia) (1297): p. 7. 27 November 1910. http://nla.gov.au/nla.news-article123828881. Retrieved 20 April 2018. ↑ "The New Wireless Station". The Sun (New South Wales, Australia) (135): p. 5 (Cricket Edition). 5 December 1910. http://nla.gov.au/nla.news-article229985503. Retrieved 20 April 2018. ↑ History - Australia ↑ "Thro' the Air". The Sun (New South Wales, Australia) (135): p. 5 (Cricket Edition). 5 December 1910. http://nla.gov.au/nla.news-article229985500. Retrieved 20 April 2018. ↑ "The Interviews". The Sun (New South Wales, Australia) (135): p. 5 (Cricket Edition). 5 December 1910. http://nla.gov.au/nla.news-article229985506. Retrieved 20 April 2018. ↑ "In the Operating Room". The Sun (New South Wales, Australia) (135): p. 5 (Cricket Edition). 5 December 1910. http://nla.gov.au/nla.news-article229985505. Retrieved 20 April 2018. ↑ "Wireless and the Mersey". The Sun (New South Wales, Australia) (175): p. 1 (Latest Edition). 20 January 1911. http://nla.gov.au/nla.news-article221575371. Retrieved 20 April 2018. ↑ "Wireless for the Public". Sunday Times (New South Wales, Australia) (1324): p. 6. 4 June 1911. http://nla.gov.au/nla.news-article120778469. Retrieved 17 April 2018. ↑ "Over the Sea". The Sun (New South Wales, Australia) (321): p. 1 (Latest Edition). 10 July 1911. http://nla.gov.au/nla.news-article221551860. Retrieved 20 April 2018. ↑ "Over the Sea". The Sun (New South Wales, Australia) (399): p. 10 (Latest Edition). 9 October 1911. http://nla.gov.au/nla.news-article221527464. Retrieved 20 April 2018. ↑ "Cost of Radiograms". The Daily Telegraph (New South Wales, Australia) (9995): p. 5. 9 June 1911. http://nla.gov.au/nla.news-article239101066. Retrieved 20 April 2018. ↑ "Mawson's New Year". The Daily Telegraph (New South Wales, Australia) (10172): p. 7. 2 January 1912. http://nla.gov.au/nla.news-article239063921. Retrieved 20 April 2018. ↑ "A Wireless" Mystery". The Age (Victoria, Australia) (17,728): p. 7. 11 January 1912. http://nla.gov.au/nla.news-article197401812. Retrieved 20 April 2018. ↑ "Bridging the Gulf – Wireless to the South Pole – Message from MacQuarie Island – Operator's Lonely Life". The Sun (New South Wales, Australia) (509): p. 1 (Final Extra). 15 February 1912. http://nla.gov.au/nla.news-article222004674. Retrieved 20 April 2018. ↑ "Sydney Wireless Station". The Daily Telegraph (New South Wales, Australia) (10303): p. 7. 3 June 1912. http://nla.gov.au/nla.news-article238746855. Retrieved 20 April 2018. ↑ "Australian Princess". The Sydney Morning Herald (New South Wales, Australia) (23,212): p. 8. 4 June 1912. http://nla.gov.au/nla.news-article15339086. Retrieved 20 April 2018. ↑ History - Australia ↑ "Mishap at Pennant Hills Station". The Age (Victoria, Australia) (17,936): p. 9. 11 September 1912. http://nla.gov.au/nla.news-article196254339. Retrieved 20 April 2018. ↑ "WIRELESS.". Gippsland Times (Victoria, Australia) (6,251): p. 3 (MORNINGS.). 28 March 1912. http://nla.gov.au/nla.news-article65318545. Retrieved 2 May 2018. ↑ [17] ↑ "WIRELESS STATION". Daily Herald (South Australia) 3, (727): p. 3. 4 July 1912. http://nla.gov.au/nla.news-article124828728. Retrieved 30 April 2018. ↑ "ILLUSTRATIONS.". The Queenslander (Queensland, Australia) (5993): p. 40. 27 February 1926. http://nla.gov.au/nla.news-article22752093. Retrieved 19 May 2018. ↑ "NEW POWER-GENERATING PLANT FOR A.W.A. COASTAL RADIO STATIONS.". The Age (Victoria, Australia) (23051): p. 15. 22 February 1929. http://nla.gov.au/nla.news-article204232787. Retrieved 20 May 2018. ↑ "Townsville Wireless Station.". Townsville Daily Bulletin (Queensland, Australia) XXIX, (9374): p. 6. 9 November 1912. http://nla.gov.au/nla.news-article62557350. Retrieved 29 April 2018. ↑ "C00KT0WN WIRELESS STATION.". The Telegraph (Queensland, Australia) (12,495): p. 11 (SECOND EDITION). 4 December 1912. http://nla.gov.au/nla.news-article175892198. Retrieved 29 April 2018. ↑ "Wireless Station at Cooktown.". The Brisbane Courier (Queensland, Australia) (17,159): p. 4. 10 January 1913. http://nla.gov.au/nla.news-article19867236. Retrieved 29 April 2018. ↑ "THE NORTHERN MINER.". The Northern Miner (Queensland, Australia): p. 4. 5 July 1913. http://nla.gov.au/nla.news-article79121511. Retrieved 29 April 2018. ↑ "LINKING UP". The Daily News (Western Australia) XXXI, (11,627): p. 5 (THIRD EDITION). 24 September 1912. http://nla.gov.au/nla.news-article79935802. Retrieved 29 April 2018. ↑ "ALBANY CHAMBER OF COMMERCE.". Albany Advertiser (Western Australia) XXIV, (3122): p. 3. 25 January 1913. http://nla.gov.au/nla.news-article70106790. Retrieved 28 April 2018. ↑ "NEWS AND NOTES.". The Daily News (Western Australia) XXXII, (11,726): p. 4 (THIRD EDITION). 21 January 1913. http://nla.gov.au/nla.news-article79938991. Retrieved 28 April 2018. ↑ "ESPERANCE.". Western Mail (Western Australia) XXVIII, (1,413): p. 19. 24 January 1913. http://nla.gov.au/nla.news-article37956961. Retrieved 28 April 2018. ↑ "GERALDTON.". Western Mail (Western Australia) XXVIII, (1,414): p. 16. 31 January 1913. http://nla.gov.au/nla.news-article37957610. Retrieved 28 April 2018. ↑ "WIRELESS STATION AT ESPERANCE". Kalgoorlie Miner (Western Australia) 19, (4452): p. 3. 26 March 1913. http://nla.gov.au/nla.news-article92227178. Retrieved 28 April 2018. ↑ "RANGE OF WIRELESS TELEGRAPHY.". The Herald (Victoria, Australia) (11,770): p. 1. 26 July 1913. http://nla.gov.au/nla.news-article241844935. Retrieved 29 April 2018. ↑ "THE COMMONWEALTH.". Albany Advertiser (Western Australia) XXV, (3290): p. 3. 12 September 1914. http://nla.gov.au/nla.news-article70117644. Retrieved 28 April 2018. ↑ "MAWSON'S ANTARCTIC EXPEDITION". Kalgoorlie Miner (Western Australia) 22, (5326): p. 2. 1 February 1916. http://nla.gov.au/nla.news-article87273781. Retrieved 28 April 2018. ↑ Given, Jock (2007). "Not Being Ernest: Uncovering Competitors in the Foundation of Australian Wireless". Historical Records of Australian Science 18 (2): 159–176. doi:10.1071/hr07012. ↑ https://www.legislation.gov.au/Series/C1914A00010 ↑ https://www.legislation.gov.au/Series/C1920A00054 ↑ https://www.legislation.gov.au/Series/C1915L00077 ↑ "Toy Wireless Apparatus". Independent (Victoria, Australia) (1538): p. 2. 3 June 1916. http://nla.gov.au/nla.news-article74254612. Retrieved 29 March 2018. ↑ a b Bruce Carty, Australian Radio History (4th ed. Sydney, 2013) ↑ see Short wave ↑ [18] ↑ Jose, Arthur W. (1941). The Royal Australian Navy 1914-1918 (9th ed.). Sydney: Angus and Robertson. pp. 438-439. https://www.awm.gov.au/collection/C1416831. Retrieved 4 May 2018. ↑ "LINKING THE PACIFIC.". The Sydney Morning Herald (New South Wales, Australia) (22,042): p. 4. 8 September 1908. http://nla.gov.au/nla.news-article15017163. Retrieved 20 May 2018. ↑ "SHIPPING INTELLIGENCE.". The Age (Victoria, Australia) (16,734): p. 4. 30 October 1908. http://nla.gov.au/nla.news-article202184978. Retrieved 20 May 2018. ↑ "WIRELESS TELEGRAPHY FOR AUSTRALIA.". The Sydney Morning Herald (New South Wales, Australia) (22,087): p. 9. 30 October 1908. http://nla.gov.au/nla.news-article15017938. Retrieved 20 May 2018. ↑ "LINKING THE PACIFIC.". The Age (Victoria, Australia) (16735): p. 13. 31 October 1908. http://nla.gov.au/nla.news-article202186773. Retrieved 20 May 2018. ↑ "AUSTRALIA AND THE ISLANDS.". The Daily Telegraph (New South Wales, Australia) (9269): p. 7. 12 February 1909. http://nla.gov.au/nla.news-article238209163. Retrieved 20 May 2018. ↑ "LINKING THE ISLANDS.". The Star (New South Wales, Australia) (4): p. 1. 16 March 1909. http://nla.gov.au/nla.news-article226755061. Retrieved 20 May 2018. ↑ "LINKING UP THE PACIFIC.". The Age (Victoria, Australia) (16,975): p. 7. 10 August 1909. http://nla.gov.au/nla.news-article198482497. Retrieved 20 May 2018. ↑ "WIRELESS IN POLYNESIA.". The Daily Telegraph (New South Wales, Australia) (9449): p. 7. 10 September 1909. http://nla.gov.au/nla.news-article238336226. Retrieved 20 May 2018. ↑ "GERMAN PACIFIC ISLANDS.". The West Australian (Western Australia) XXVIII, (8,214): p. 8. 30 July 1912. http://nla.gov.au/nla.news-article26517237. Retrieved 13 May 2018. ↑ "LINKING UP THE ISLANDS.". The Daily Telegraph (New South Wales, Australia) (10,386): p. 14. 7 September 1912. http://nla.gov.au/nla.news-article239174312. Retrieved 13 May 2018. ↑ "LONDON NOTES.". The Age (Victoria, Australia) (17,935): p. 10. 10 September 1912. http://nla.gov.au/nla.news-article196247176. Retrieved 13 May 2018. ↑ "LINKING UP THE GERMAN ISLANDS.". The Daily Telegraph (New South Wales, Australia) (10,414): p. 10. 10 October 1912. http://nla.gov.au/nla.news-article239167664. Retrieved 15 May 2018. ↑ "GERMANY IN THE PACIFIC.". The Sun (New South Wales, Australia) (780): p. 3 (CRICKET EDITION). 26 December 1912. http://nla.gov.au/nla.news-article228839134. Retrieved 15 May 2018. ↑ "MANDATORY POWERS". News (South Australia) IV, (601): p. 7 (SPORTING EDITION). 27 June 1925. http://nla.gov.au/nla.news-article129729991. Retrieved 15 May 2018. ↑ "WIRELESS IN THE PACIFIC.". The Daily Telegraph (New South Wales, Australia) (10731): p. 13. 15 October 1913. http://nla.gov.au/nla.news-article238898971. Retrieved 15 May 2018. ↑ "NOTES AND COMMENTS.". The Sydney Morning Herald (New South Wales, Australia) (23,726): p. 23. 24 January 1914. http://nla.gov.au/nla.news-article28120964. Retrieved 15 May 2018. ↑ "THE FRITHJOF.". Daily Commercial News And Shipping List (New South Wales, Australia) (7151): p. 4. 5 December 1913. http://nla.gov.au/nla.news-article159218174. Retrieved 15 May 2018. ↑ "NOTES FROM ALL SOURCES.". Daily Commercial News And Shipping List (New South Wales, Australia) (7227): p. 13. 10 March 1914. http://nla.gov.au/nla.news-article159123939. Retrieved 15 May 2018. ↑ "THE CAIRNHILL ADRIFT.". Daily Commercial News And Shipping List (New South Wales, Australia) (7283): p. 4. 18 May 1914. http://nla.gov.au/nla.news-article159120273. Retrieved 16 May 2018. ↑ "TELEGRAPHIC BUSINESS.". The Telegraph (Queensland, Australia) (12,949): p. 7 (SECOND EDITION). 22 May 1914. http://nla.gov.au/nla.news-article176219530. Retrieved 15 May 2018. ↑ "WIRELESS IN THE PACIFIC.". The Daily Telegraph (New South Wales, Australia) (10932): p. 19. 6 June 1914. http://nla.gov.au/nla.news-article238798001. Retrieved 14 May 2018. ↑ "GERMANS IN THE PACIFIC.". The Brisbane Courier (Queensland, Australia) (17,690): p. 7. 25 September 1914. http://nla.gov.au/nla.news-article19985895. Retrieved 16 May 2018. ↑ "LANDING ON NAURU.". The Age (Victoria, Australia) (18,567): p. 8. 22 September 1914. http://nla.gov.au/nla.news-article198629167. Retrieved 12 May 2018. ↑ "STRANGE BUT TRUE". Smith's Weekly (New South Wales, Australia) II, (20): p. 18. 10 July 1920. http://nla.gov.au/nla.news-article234221040. Retrieved 15 May 2018. ↑ "WIRELESS STATION AT NAURU". The Herald (Victoria, Australia) (12,231): p. 1. 16 January 1915. http://nla.gov.au/nla.news-article242272069. Retrieved 12 May 2018. ↑ "VIA WIRELESS TO NAURU.". The Sun (New South Wales, Australia) (1423): p. 7 (FINAL EXTRA). 18 January 1915. http://nla.gov.au/nla.news-article229324463. Retrieved 12 May 2018. ↑ "NAURU.". The Sydney Morning Herald (New South Wales, Australia) (24,033): p. 8. 18 January 1915. http://nla.gov.au/nla.news-article15563675. Retrieved 12 May 2018. ↑ "STEAM SERVICE TO PACIFIC ISLANDS.". Commonwealth Of Australia Gazette (Australia) (17): p. 352. 6 March 1915. http://nla.gov.au/nla.news-article232451063. Retrieved 16 May 2018. ↑ [19] ↑ "WIRELESS IN THE PACIFIC.". The Telegraph (Queensland, Australia) (13,413): p. 3. 17 November 1915. http://nla.gov.au/nla.news-article177960535. Retrieved 16 May 2018. ↑ "WONDERFUL NAURU". Sunday Times (Perth) (Western Australia) (1216): p. 6 (First Section). 24 April 1921. http://nla.gov.au/nla.news-article58043169. Retrieved 15 May 2018. ↑ "RADIO TELEPHONY". The Daily Telegraph (New South Wales, Australia) (13,630): p. 8. 17 January 1923. http://nla.gov.au/nla.news-article245827376. Retrieved 15 May 2018. ↑ "“ON THE AIR”". The News (Tasmania, Australia) II, (305): p. 11. 23 May 1925. http://nla.gov.au/nla.news-article233694905. Retrieved 13 May 2018. ↑ "For Wireless Fans 4QG". Daily Standard (Queensland, Australia) (4112): p. 10 (SECOND EDITION-3 p.m.). 16 March 1926. http://nla.gov.au/nla.news-article179494839. Retrieved 19 May 2018. ↑ "WIRELESS.". The Sydney Morning Herald (New South Wales, Australia) (27,690): p. 4. 4 October 1926. http://nla.gov.au/nla.news-article16332447. Retrieved 19 May 2018. ↑ "To Make A Long Story Short". The Labor Daily (New South Wales, Australia) (3524): p. 5. 23 March 1935. http://nla.gov.au/nla.news-article236518567. Retrieved 17 May 2018. ↑ "LOYALTY". The Sun (New South Wales, Australia) (7906): p. 10 (LAST RACE FOOTBALL). 6 May 1935. http://nla.gov.au/nla.news-article230263194. Retrieved 17 May 2018. ↑ [20] ↑ "NAURU.". Daily Commercial News And Shipping List (New South Wales, Australia) (15,420): p. 4. 16 June 1938. http://nla.gov.au/nla.news-article161963775. Retrieved 17 May 2018. ↑ "SHELLING SEEN FROM SHORE.". The Sydney Morning Herald (New South Wales, Australia) (32,125): p. 15. 14 December 1940. http://nla.gov.au/nla.news-article17696934. Retrieved 18 May 2018. ↑ "FIVE SHIPS CAPTURED OR DESTROYED". The Age (Victoria, Australia) (26,734): p. 22. 21 December 1940. http://nla.gov.au/nla.news-article205224871. Retrieved 18 May 2018. ↑ "HOW RAIDER ATTACKED NAURU". The Telegraph (Queensland, Australia): p. 4 (SPORTS FINAL). 28 December 1940. http://nla.gov.au/nla.news-article172359328. Retrieved 18 May 2018. ↑ "HUGHES' SPY CHARGE". The Sun (New South Wales, Australia) (9748): p. 3 (LAST RACE ALL DETAILS). 2 April 1941. http://nla.gov.au/nla.news-article231209770. Retrieved 18 May 2018. ↑ "RADIO MEN FIRM IN LOYALTY". The Sun (New South Wales, Australia) (9751): p. 2 (LAST RACE ALL DETAILS). 5 April 1941. http://nla.gov.au/nla.news-article231208550. Retrieved 17 May 2018. ↑ "JAPAN ATTACKS BY AIR AND SEA HEAVY DAMAGE; CASUALTIES IN HAWAII, 3,000". The Sydney Morning Herald (New South Wales, Australia) (32,433): p. 7. 9 December 1941. http://nla.gov.au/nla.news-article17777818. Retrieved 18 May 2018. ↑ "OVERSEA NEWS.". The Sydney Morning Herald (New South Wales, Australia) (32,434): p. 1. 10 December 1941. http://nla.gov.au/nla.news-article17777949. Retrieved 18 May 2018. ↑ "DEFENDERS WITHDRAW FROM AIR BASE". The Sydney Morning Herald (New South Wales, Australia) (32,435): p. 9. 11 December 1941. http://nla.gov.au/nla.news-article17778220. Retrieved 18 May 2018. ↑ "FOUR AIR ATTACKS ON NAURU". The Argus (Melbourne) (Victoria, Australia) (29,737): p. 5. 13 December 1941. http://nla.gov.au/nla.news-article8222371. Retrieved 18 May 2018. ↑ Gill 1957, p. 486 ↑ Gordon L. Rottman (2002). World War II Pacific Island Guide. Greenwood Publishing Group. p. 477. ISBN 0-313-31395-4. https://books.google.com/books?id=ChyilRml0hcC. ↑ a b c d e Invalid <ref> tag; no text was provided for refs named Garrett13-20 ↑ w:Japanese occupation of Nauru#Declaration of war by Japan ↑ Bullard, p. 57. ↑ Invalid <ref> tag; no text was provided for refs named Jersey ↑ Yuki Tanaka. "Japanese Atrocities on Nauru during the Pacific War: The murder of Australians, the massacre of lepers and the ethnocide of Nauruans 太平洋戦争中のナウル島における日本軍の残虐行為−−オーストラリア人殺害、癩病患者大量殺戮、ナウル人文化根絶 :: JapanFocus". http://www.japanfocus.org/site/view/3441. Retrieved 23 December 2014. ↑ Japanese occupation of Nauru ↑ "Civil Administration on Nauru Island". Newcastle Morning Herald And Miners' Advocate (New South Wales, Australia) (21,568): p. 3. 19 November 1945. http://nla.gov.au/nla.news-article134377929. Retrieved 19 May 2018. ↑ "RADIO SERVICE TO NAURU". The Argus (Melbourne) (Victoria, Australia) (30,962): p. 7. 23 November 1945. http://nla.gov.au/nla.news-article12154855. Retrieved 17 May 2018. ↑ "RADIO-TELEPHONE SERVICE TO NAURU". The Sydney Morning Herald (New South Wales, Australia) (33,891): p. 9. 7 August 1946. http://nla.gov.au/nla.news-article29764423. Retrieved 17 May 2018. ↑ [21] ↑ "DISTINGUISHED QUEENSLANDER SELECTED.". The Brisbane Courier (Queensland, Australia) (16,682): p. 5. 30 June 1911. http://nla.gov.au/nla.news-article19711693. Retrieved 1 June 2018. ↑ "J. G. Balsillie—A Brilliant Young Australian". Sunday Times (Perth) (Western Australia) (714): p. 20. 10 September 1911. http://nla.gov.au/nla.news-article57719030. Retrieved 1 June 2018. ↑ ""WIRELESS" IN AUSTRALIA.". The Age (Victoria, Australia) (17,630): p. 10. 18 September 1911. http://nla.gov.au/nla.news-article196216988. Retrieved 1 June 2018. ↑ "People We Know". Punch (Victoria, Australia) CXXV, (3181): p. 6. 13 July 1916. http://nla.gov.au/nla.news-article121077562. Retrieved 2 June 2018. ↑ "Wireless Telegraphy.". The Herald (Victoria, Australia) (10,619): p. 4. 11 November 1909. http://nla.gov.au/nla.news-article241947309. Retrieved 1 June 2018. ↑ "QUESTION OF PATENTS.". The Argus (Melbourne) (Victoria, Australia) (20,153): p. 7. 23 February 1911. http://nla.gov.au/nla.news-article10881177. Retrieved 1 June 2018. ↑ "WIRELESS TELEGRAPHY.". The Brisbane Courier (Queensland, Australia) (16,681): p. 5. 29 June 1911. http://nla.gov.au/nla.news-article19698647. Retrieved 1 June 2018. ↑ "WIRELESS TELEGRAPHY.". The West Australian (Western Australia) XXVII, (7,936): p. 11. 6 September 1911. http://nla.gov.au/nla.news-article26350208. Retrieved 1 June 2018. ↑ "RADIO-TELEGRAPHY.". The Telegraph (Queensland, Australia) (12,107): p. 2 (SECOND EDITION). 6 September 1911. http://nla.gov.au/nla.news-article175872581. Retrieved 1 June 2018. ↑ "NEWS OF THE DAY.". The Age (Victoria, Australia) (17,621): p. 8. 7 September 1911. http://nla.gov.au/nla.news-article196225002. Retrieved 1 June 2018. ↑ "NOTES AND NOTICES.". The Australasian (Victoria, Australia) XCI, (2,373): p. 41. 23 September 1911. http://nla.gov.au/nla.news-article142950998. Retrieved 1 June 2018. Further reading Books, theses & major articles Bastock, John. Ships on the Australia Station, (Child & Associates Publishing Pty Ltd, Frenchs Forest, 1988) ISBN 0-86777-348-0 Branch, Lorayne. Henry Sutton, The Innovative Man, Australian Inventor, Scientist and Engineer, (to be published) online Burger, David. Callsign History Australia - Australian Amateur Radio Callsigns, (IEEE, 2014) online Carty, Bruce. Australian Radio History (4th ed. Sydney, 2013) [24] Crawford, Robert. But wait, there's more...: a history of Australian advertising, 1900–2000 (Melbourne Univ. Press, 2008) [25] Cunningham, Stuart, and Graeme Turner, eds. The Media & Communications in Australia (2nd ed. 2010) online Curnow, Geoffrey Ross. "The history of the development of wireless telegraphy and broadcasting in Australia to 1942, with especial reference to the Australian Broadcasting Commission: a political and administrative study". online Durrant, Lawrence. The seawatchers : the story of Australia's Coast Radio Service (angus & Robertson, Sydney, 1986) Trove NLA Elliot, Hugh. "The Three-Way Struggle of Press, Radio and TV in Australia". Journalism & Mass Communication Quarterly (1960) 37#2 pp: 267–274. Geeves, P. "The Dawn of Australia's Radio Broadcasting". online Given, Donald Jock. "Transit of Empires: Ernest Fisk and the World Wide Wireless". (Melbourne, 2007) [26] Griffen-Foley, Bridget. Changing Stations the story of Australian commercial radio [27] Griffen-Foley, Bridget. "Australian Commercial Radio, American Influences—and The BBC". Historical Journal of Film, Radio and Television (2010) 30#3 pp: 337–355. online Griffen‐Foley, Bridget. "From the Murrumbidgee to Mamma Lena: Foreign language broadcasting on Australian commercial radio, part I". Journal of Australian Studies 2006; 30(88): 51–60. part 1 online; part 2 online Hadlow, Martin Lindsay. "Wireless and Empire ambition: wireless telegraphy/telephony and radio broadcasting in the British Solomon Islands Protectorate, South-West Pacific (1914-1947): political, social and developmental perspectives". (Martin Hadlow, Brisbane, 2016) [28] [29] Harte, Bernard. When Radio Was The Cat's Whiskers (Rosenberg Publishing, 2002) [30] Hewitson, Peter. Australian MCS; A brief history of the Australian Coastal Radio Service (Website) [31] Inglis, K. S. This is the ABC – the Australian Broadcasting Commission 1932–1983 (2006) [32] Inglis, K. S. Whose ABC? The Australian Broadcasting Corporation 1983–2006 (2006) [33] Johnson, Lesley. The Unseen Voice: a cultural study of early Australian radio (London, 1988) [34] Johnstone, James. Coastal Radio Stations (Webpages) [35] Johnstone, James. Beam Wireless (Webpages) [36] Jolly, Rhonda. Media ownership and regulation: a chronology (Canberra, 2016) [37] Jones, Colin. Something in the air : a history of radio in Australia (Kenthurst, 1995) [38] Jose, Arthur W. The Official History of Australia in the War of 1914-1918; Volume IX, The Royal Australian Navy (Angus & Robertson, Sydney, 9th Ed, 1941) Online (especially Chapter XIV: Sundry services: Radio-Telegraphy, Censorship, Coaling, etc.) Kent, Jacqueline. Out of the Bakelite Box: the heyday of Australian radio (Sydney, 1983) [39] Langhans, Ron. The First Twelve Months of Radio Broadcasting in Australia 1923–1924 (R. Langhans, 2013) [40] Mackay, Ian K. Broadcasting in Australia (Melbourne University Press, 1957) [41] MacKinnon, Colin. Australian Radio Publications and Magazines (Ian O'Toole, 2004) online Martin, Fiona (2002). "Beyond public service broadcasting? ABC online and the user/citizen". Southern Review: Communication, Politics & Culture 35 (1): 42. Moran, Albert, and Chris Keating. The A to Z of Australian Radio and Television (Scarecrow Press, 2009) [42] Muscio, Winston T. Australian Radio, The Technical Story 1923–1983 (Kangaroo Press, 1984) [43] Petersen, Neville. News Not Views: The ABC, Press and Politics (1932–1947) (Sydney, 1993), Emphasizes newspaper restrictions on broadcasters [44] Potter, Simon J. "‘Invasion by the Monster’ Transnational influences on the establishment of ABC Television, 1945–1956". Media History (2011) 17#3 pp: 253–271. Potts, John. Radio in Australia (UNSW Press, 1989) [45] Ross, John F. A History of Radio in South Australia 1897–1977 (J. F. Ross, 1978) [46] Ross, John F. Handbook for Radio Engineering Managers (Butterworths, 1980) [47] Ross, John F. Radio Broadcasting Technology, 75 Years of Development in Australia 1923–1998 (J. F. Ross, 1998) [48] Sanderson, Doug G. On Air (History of the NBS in Qld and PNG) (D. G. Sanderson, 1988) [49] Semmler, Clement. The ABC: Aunt Sally and Sacred Cow (1981) [50] Shawsmith, Alan. Halcyon Days, The Story of Amateur Radio in VK4, Queensland (Boolarong Publications, 1987) [51] Thomas, Alan. Broadcast and Be Damned, The ABC's First Two Decades (Melbourne University Press, 1980) [52] United States, Navy Department, Bureau of Steam Engineering. List of wireless telegraph stations of the world, 1912 (Government Printing Office, 1912) Online Walker, R. R. The Magic Spark: 50 Years of Radio in Australia (Hawthorn Press, 1973) [53] Ward, Ian (1999). "The early use of radio for political communication in Australia and Canada: John Henry Austral, Mr Sage and the Man from Mars". Australian Journal of Politics & History 45 (3): 311–330. doi:10.1111/1467-8497.00067. https://www.questia.com/library/journal/1G1-56182731/the-early-use-of-radio-for-political-communication. White, Thomas H. Early Radio Station Lists Issued by the U.S. Government (Website) Online (includes HTMLs of all known copies of Wireless Telegraph Stations of the World 1906 to 1912 with, inter alia, lists of merchant ship and shore station callsigns) Wireless Institute of Australia (editor Wolfenden, Peter). Wireless Men & Women at War (Wireless Institute of Australia, Melbourne, 2017) [54] Young, Sally (2003). "A century of political communication in Australia, 1901–2001". Journal of Australian Studies 27 (78): 97–110. doi:10.1080/14443050309387874. https://www.questia.com/library/journal/1G1-110806188/a-century-of-political-communication-in-australia. Periodicals "Sea Land and Air". (1918 to 1923) [55]online "Wireless Weekly". (1922 to 1939+) [56]online "Australasian Radio Review". (1923 to 1924) online "Radio in Australian and New Zealand". (1923 to 1928) online "Queensland Radio News". (1925 to 1933) online "Listener In" "Broadcasting Business" & "Commercial Broadcasting". (1934 to 1947) online "Australasian Radio World". (1936 to 1950) online "Radio and Hobbies". (1939 to 1965) online "Radio Science". (1948 to 1949) online Annuals "Radio Trade Annual of Australia". (1933 to 1937) online "Broadcasting Business Year Book". (1936 to 1939) online "Broadcasting and Television Year Book". (1958 to 1990+) online Regulatory Oversight Department Australia, Postmaster-General's Department. "Annual Reports 1910–1975" NLA Australia, Department of the Media. "Annual Reports 1973–1976" NLA Australia, Postal and Telecommunications Department. "Annual Reports 1978–1980" NLA Australia, Department of Communications (1). "Annual Reports 1981–1987" NLA Australia, Department of Transport and Communications. "Annual Reports 1988–1993" NLA Australia, Department of Communications (2) Australia, Department of Communications and the Arts. "Annual Reports 1994–1998" NLA Australia, Department of Communications, Information Technology and the Arts. "Annual Reports 1999–2007" NLA Australia, Department of Broadband, Communications and the Digital Economy. "Annual Reports 2008–2013" NLA Australia, Department of Communications (3). "Annual Reports 2014–2015" NLA Australia, Department of Communications and the Arts (2). "Annual Reports 1999–2007" NLA Subordinate Agencies Australian Broadcasting Control Board. "Annual Reports 1949–1976" NLA online Overseas Telecommunications Commission (Australia). "Annual Reports". 1965–1973 NLA 1974–1981 NLA 1982–1984 NLA 1985–1991 NLA Australian Telecommunications Commission T/as Telecom Australia. "Annual Reports". 1976–1991 NLA 1993-Present NLA Australian Broadcasting Tribunal. "Annual Reports 1977–1992" NLA online Australian Telecommunications Authority T/as AusTel. "Annual Reports 1990–1997". NLA Australian and Overseas Telecommunications Corporation. "Annual Reports" 1992 NLA Australian Broadcasting Authority. "Annual Reports 1993–2005" NLA Australia, National Transmission Agency. "Annual Reports 1993–1996" NLA Australia, Spectrum Management Agency. "Annual Reports 1994–1997" NLA Australia, National Transmission Authority. "Annual Reports 1997–1999" Australian Communications Authority. "Annual Reports 1998–2005" NLA Australian Communications and Media Authority. "Annual Reports 2006–present" NLA Broadcasters Australian Broadcasting Commission. "Annual Reports 1933–1983" NLA Australian Broadcasting Corporation. "Annual Reports 1984–present" NLA Special Broadcasting Service. "Annual Reports 1979–1991" NLA Special Broadcasting Service Corporation. "Annual Reports 1992–present" NLA Related Government Australian Bureau of Statistics. "Year Book Australia 1908-2012" online 1908 has material back to Federation, refer Transport & Communications <|fim▁end|> | at the principal strategic and commercial |
<|fim▁begin|> The agricultural revolution The conversion of our predecessors from hunter-gatherers to herder-farmers circa 8000 BC is the great dichotomy of the human experience. From that point on, the dominance of our species, at least for the present, was assured. The growing of food crops and the domestication of food producing animals changed human activity overnight, in geologic terms. It is important to note, however, that this revolution took many thousands of years to unfold and never reached large parts of the world. The importance of agriculture Agriculture removed much of the uncertainty in obtaining food. People no longer had to search it out over large areas—they found places where it could be produced in abundant quantities year after year and fixed themselves there. Instead of relying on the environment’s natural bounty, they could direct and manipulate the provision of that bounty. Abundant and dependable food supplies allowed population to grow and set the stage for the rise of civilization. The human population on Earth two million years ago has been estimated at 100,000. At the beginning of the agricultural revolution this number had risen to perhaps five million, thanks to better adaptation, technology, and abundant resources that became available as the ice sheets receded. By 3000 BC, the time of the first Egyptian dynasty, world population had increased to approximately 100 million. By the birth of Christ, world population was well over 200 million. The beginnings of agriculture Agriculture was a gradual discovery. It is believed that early gatherers first learned the relationship between plants, the foods they produced, and their growing cycle. At some point the gatherers learned how to encourage the plants they depended on and inhibit those of no use. Then came the steps of gathering seeds, planting seeds, and nurturing the plants. By selecting seeds from the strongest and most productive plants for replanting, the early planters interrupted and redirected the process of natural selection to improve the yield of the useful plants. For example, researchers in Mexico have found evidence of the ancient corn plant with only a few kernels that became the much more productive corn plant of ancient America through selection over many thousands of years. The first domesticated grain is believed to have been a wild wheat that grew in southern Turkey. To domesticate this plant, the early gatherers had to learn how to harvest the grain seeds, extract the wheat kernel, grind it, and bake it, all before they learned how to grow the plant and select it so that it increased in kernel size. Until fertilization or crop rotation were developed, fields had to be moved regularly or placed near a river whose annual floodings brought new soil. All this was a complicated learning process that took time. Less is known about how and when the rice plant was domesticated, but it was clearly as important in Asia as wheat was in the Middle East and corn in America. The agricultural revolution accelerated as innovations increased arable land, crop yields, and farmer productivity. Land was cleared by grazing or fire. Soil was prepared by digging first, and then plowing. Irrigation insured adequate water. Fertilization and crop rotation increased yields. Specific tools like the sickle, scythe, plow, and hoe increased farmer efficiency. Domestication of animals Dogs were domesticated from wolves perhaps 15,000 years ago in both America and the Near East, but dogs were useful mainly as <|fim▁hole|> aids. The first domesticated food producing animal was probably the goat, a source of meat, milk, and waterproof hides. This breakthrough occurred in the hills of modern Iraq. Domestication of the goat was followed by sheep (meat and wool), cattle (meat, milk, hides, power), horses (meat, milk, transport), pigs (meat and fat), chickens (meat and eggs), and others. Cattle are considered the most significant domestication. In addition to providing meat, milk, and hides, they were also valuable as beasts of burden. They pulled wagons, greatly improving land transport. They pulled ploughs, greatly improving agriculture. The existence of domesticated cattle is thought to have been primarily responsible for the doubling of population in the Near East between 4000 and 5000 BC. The process of domestication must have been to obtain young animals, raise them in captivity over enough generations so that they grew less wild and more tolerant of being managed. It is unclear why some animals could be domesticated but not others. Why the cow but not the buffalo? Predators would be unlikely choices for domestication, but the wolf was a predator and so was the cat, which was domesticated much later. Domestication of animals brought many important advantages. They were dependable sources of meat. Cattle and goats converted grass, of little use to humans, into milk and milk products like cheese. Vast grasslands that could previously support only a few hunters could now support much larger populations of herders. Sheep and vicuñas produced wool each year. Animals could graze on broken lands of little use for farming. Horses, oxen, llamas, and other animals provided power for pulling, ploughing, and carrying. Military uses were eventually found for onagers, asses, and horses, and to some extent, elephants, although elephants are not considered domesticated. The horse was domesticated first in the north Asian steppes and its use spread from there, probably in the wake of Asian migrations to the south and west. Paleontologists believe the horse evolved in the Americas actually, but went extinct there, perhaps due to hunting pressure. Mounted Asian barbarians are thought to have overrun the first towns rising in Asia Minor and the Middle East around 6000 BC. The people that were overrun may not have seen a domestic horse previously, much less one on which a warrior could ride. And speaking of the first towns... Birth of Cities People have always lived in groups; all the way back to primitive fish struggling in the ocean, all our ancestors have lived in some form of community. However, it isn't until around 6000 BC that humans began to settle down in clustered permanent structures to till the land more efficiently; the first cities. The earliest towns were founded in places where several of many different factors came together to create a favorable spot. Many towns had rivers that ran through or nearby them, providing them a place to gather drinking water from and dump their waste; most had naturally rich soil, promoting intensive farming and allowing a surplus of goods to support non-farmers; some had flat pastures, good for raising a wide variety of animals; a few had valuable resources in the earth nearby, such as valuable metal ores (especially copper, for the first cities), gems, or some other valuabe material; and several were conveniently located between other towns, serving as a welcome stop for trade caravans and growing rich off of the cash they spent. <|fim▁end|> | companions, guards, and hunting |
<|fim▁begin|> A printable version of Entomology is available. (edit it) Entomology is the scientific study of insects. Insects have many kinds of interactions with humans and other forms of life on earth, so it is an important specialty within biology; unlike many other fields of biology, entomologists include both persons studying insects for their own sake, and those employed by commercial concerns interested in the control of insects (usually pest species). This divides the field into basic and applied entomology. Because of this divide, any given university might put <|fim▁hole|> either the biology department (with an emphasis on basic entomology) or in the agriculture department (with an emphasis on applied entomology. Despite this difference, today many entomology groups study both basic and applied aspects of the science. The definition of entomology, especially as far as entomology departments is concerned, is sometimes widened to include the study of other terrestrial arthropods, such as spiders, scorpions, and ticks (the arachnids). Table of Contents Introduction What are insects? Common insects Lepidoptera Other insects What are arachnids? Common arachnids Other arachnids <|fim▁end|> | their department of entomology in |
<|fim▁begin|> Contents 1 Legal Issues 1.1 Legal Standpoints 1.2 Usage 1.3 Regulation Problems 2 Ethical Issues 2.1 Digital Identity 2.2 Anonymity 2.3 Dependency on Passwords 2.4 Blockchain as a tool for democracy 2.5 Immutability 3 References Legal Issues Ever since Bitcoin became successful, the legalization of cryptocurrency has been a hot issue. There are several cryptocurrencies other than Bitcoin (BTC), such as Ethereum (ETH), Litecoin (TCC), Dash, Ripple, etc., which is why it is hard to keep track of which country is allowing which cryptocurrency. Legal Standpoints Although not every country is allowing cryptocurrency, there are a lot of countries that are allowing some cryptocurrencies. For example, Bitcoin is legal in the United States, Canada, Japan, Germany, etc.[1] Some countries that do not allow any type of cryptocurrencies are Algeria, Bolivia, Vietnam, and Saudi Arabia.[1] There are some “undecided” countries as well such as Argentina, Columbia, Peru, Nigeria, and the United Arab Emirates.[2] These countries do not ban Bitcoin or cryptocurrencies, but they do not have any clear laws or regulations.[2] Usage A lot of Nigerians (32%) have used or owned cryptocurrency.[3] The reason for this was mainly due to the high cost of transferring money to different countries. Recently, companies have released crypto plugins for phones so that people can use cryptocurrency to complete transactions with/on their phones. People in Vietnam and the Philippines also have a lot of experience with cryptocurrency. In the Philippines, even the government encouraged it by setting up a blockchain app, bonds.ph, with Unionbank for government bonds allocation.[3] Furthermore, the Unionbank installed a Bitcoin ATM in Makati (Metro Manila) which shows that Bitcoin is used widely.[3] Regions and countries that use cryptocurrency widely are Africa, Southeast Asia, Latin America, the United States, and Japan. In fact, the Japanese national currency held over 60% of the total bitcoin in circulation in 2020.[4] The United States followed Japan with a market share greater than 25% in 2020.[4] Regulation Problems However, cryptocurrencies have a big problem; they are not regulated. This is also one of the reasons why countries are hesitant to allow them. Countries have to make their own laws and regulations when making Bitcoin and other cryptocurrencies legal. For example, in the United States, cryptocurrency transactions fall under the scope of the Bank Secrecy Act (BSA).[5] This implies that cryptocurrency exchange service providers must have the appropriate license approved by Financial Crimes Enforcement Network (FinCEN), implement an Anti-Money Laundering/Combating the Financing of Terrorism (AML/CFT) and Sanctions program, maintain appropriate records, and submit reports to authorities.[5] The US Securities and Exchange Commission (SEC) views cryptocurrencies as securities which is why they apply securities laws to digital wallets.[5] Furthermore, FinCEN expects crypto exchanges to comply with record-keeping requirements and the “Travel Rule” in response to Financial Action Task Force (FATF)’s guidelines published in June 2019.[5] There are some countries that have developed their own cryptocurrency. For example, Venezuela launched Petro in February 2018. According to their December 2017 announcement, it was supposed to be backed up by the country's oil and mineral reserves and was intended to supplement Venezuela’s bolívar fuerte currency.[6] As of August 2018, Petro appears to not be a currency, although Venezuela’s government said that their new currency, soberano, has connections with it.[6] Russia has also developed its own crypto, CryptoRubble, in October 2017.[7] This cryptocurrency was issued by Russia’s Central Bank.[7] The unique aspect of this cryptocurrency is that it is managed by the Russian government.[7] One of the reasons they are doing this is to circumvent financial sanctions that have been placed on them.[7] Ethical Issues The ethical consequences of blockchain technology can be diverse and wide-ranging, and have a huge impact on one’s social life. Blockchain can be an invaluable tool of democracy on the other hand it can also be used by governments or other private entities to exert and consolidate power over people and information. Cryptocurrency as crypto-economic plays a critical role in increasing financial inclusion and creating innovative microeconomies, and these structures <|fim▁hole|> systems or undermine existing payment and financial systems. In recent years the effective anonymity of cryptocurrencies has also been used for criminal activity at large. Whereas blockchain has the ability to restore personal control over data, it could also have the effect of consolidating and codifying the control of certain entities over information and personal data due to the immutability nature of this technology.[8] The following examples represent some of the many potential consequences of the trade-offs made in blockchain design. These examples are meant to be representative, not comprehensive; they illustrate the breadth of the challenges and potential consequences that arise from the practical applications of blockchain design and implementation. At one end of the impact spectrum, blockchain technologies could create or exacerbate severe power inequities in communities, or they could consolidate power over individuals and information by entities that design and implement the technology to their own advantage. At the other end of the impact spectrum, particular technical design issues such as private key systems and encryption algorithms are presented to show that even these seemingly innocuous design details can significantly affect people.[8] Some of the ethical issues with Blockchain are: Digital Identity One of the most important things that blockchain can do is create digital identity. The attributes of blockchain like immutability and verifiability enable the establishment of permanent and portable digital identities. Is it ethically fair to allow people a digital identity without having an official recognized identity? Anonymity Crypto economics systems can increase financial inclusion and create innovative micro economies, these structures could also create exploitative systems with bypassing existing payment and monetary systems. The effective anonymity of cryptocurrencies has also been used for criminal activity.[8] Is anonymity required for any financial transaction, if so under what circumstances? Does it imply bribery? And illegal activity? Dependency on Passwords In blockchain security and control over a digital asset are established with encryption algorithms, the public key is known as the address and the private key is either a key or in some cases its a password for the encryption algorithm. What if the key is lost or the password is forgotten, countless have lost money in bitcoin after losing passwords and thus access to their funds. Is this justifiable to accept the technology knowing this is a concerning factor. Blockchain as a tool for democracy This technology can be very useful when Governments use it as an instrument of Democracy because of the transparency attribute. But as the same time groups and governments can use this as a tool to bypass the existing laws and regulation to pass secret agreements. Immutability Immutability attribute for this technology makes its almost impossible to delete the data once its entered in the system. Usage of this technology for government applications can cause concerns with existing laws. For example under witness protection act, ones identity should be protected and in many cases a new identify is provided to the witness. Imagine if this information have ever entered into a system which is part of blockchain, it violates the existing law in protecting witness protection. References ↑ a b Cryptonews. (2020). Countries Where Bitcoin Is Banned or Legal In 2020. Cryptonews; Cryptonews. https://cryptonews.com/guides/countries-in-which-bitcoin-is-banned-or-legal.htm ↑ a b Gupta, A. (2018, May 15). List of Countries where Bitcoin/ICO/Cryptocurrency is legal & Illegal. SAG IPL - a Technology Blog. https://blog.sagipl.com/legality-of-cryptocurrency-by-country/ ↑ a b c Buchholz, K. (2021, February 18). What countries use cryptocurrency the most? World Economic Forum. https://www.weforum.org/agenda/2021/02/how-common-is-cryptocurrency/ ↑ a b StarofMysore. (2020, September 7). 5 Countries Where Bitcoin Is Legal and 5 Countries Where It Is Not - Star of Mysore. Star of Mysore. https://starofmysore.com/5-countries-where-bitcoin-is-legal-and-5-countries-where-it-is-not/ ↑ a b c d ComplyAdvantage. (2021, March 25). Crypto Regulations in the United States. ComplyAdvantage. https://complyadvantage.com/knowledgebase/crypto-regulations/cryptocurrency-regulations-united-states/ ↑ a b Wikipedia Contributors. (2021, April 20). Petro (cryptocurrency). Wikipedia; Wikimedia Foundation. https://en.wikipedia.org/wiki/Petro_(cryptocurrency) ↑ a b c d Frankenfield, J. (2021, April 6). CryptoRuble. Investopedia. https://www.investopedia.com/terms/c/cryptoruble.asp#:~:text=The%20CryptoRuble%20is%20a%20digital,value%20of%20a%20regular%20ruble ↑ a b c Lapointe, C & Fishbane L (2018). The Blockchain Ethical Design Framework. https://beeckcenter.georgetown.edu/wp-content/uploads/2018/06/The-Blockchain-Ethical-Design-Framework.pdf <|fim▁end|> | can also create exploitative |
<|fim▁begin|> Computing » Computer Science » Computer Programming » Ada Programming This language feature is only available from Ada 2005 on. Contents 1 Specification 2 See also 2.1 Wikibook 2.2 External examples 2.3 Ada Reference Manual 2.3.1 Ada 2005 2.3.2 Ada 2012 2.4 Open-Source Implementations Ada.Numerics.Real_Arrays is a unit of the Predefined Language Environment since Ada 2005. This page is a stub. You can improve the Ada Programming wikibook by reading the contributing guidelines and expanding it. Specification -- Standard Ada library specification -- Copyright (c) 2003-2018 Maxim Reznik <reznikmm@gmail.com> -- Copyright (c) 2004-2016 AXE Consultants -- Copyright (c) 2004, <|fim▁hole|> Copyright (c) 2000 The MITRE Corporation, Inc. -- Copyright (c) 1992, 1993, 1994, 1995 Intermetrics, Inc. -- SPDX-License-Identifier: BSD-3-Clause and LicenseRef-AdaReferenceManual -- ------------------------------------------------------------------------- .mw-parser-output .ada-kw{background:none;border:none;padding:0;margin:0;color:DodgerBlue;font-weight:bold}.mw-parser-output .ada-kw a,.mw-parser-output .ada-kw a:visited{color:inherit}with Ada.Numerics.Generic_Real_Arrays; package Ada.Numerics.Real_Arrays is new Ada.Numerics.Generic_Real_Arrays (Float); See also Wikibook Ada Programming/Libraries/Ada External examples[edit source] Search for examples of Ada.Numerics.Real_Arrays in: Rosetta Code, GitHub or this Wikibook. Search for any post related to Ada.Numerics.Real_Arrays in: Stack Overflow, comp.lang.ada or any Ada related page. Ada Reference Manual Ada 2005 G.3.1: Real Vectors and Matrices (Annotated) Ada 2012 G.3.1: Real Vectors and Matrices (Annotated) Open-Source Implementations FSF GNAT Specification: a-nurear.ads drake Specification: numerics/a-nurear.ads <|fim▁end|> | 2005, 2006 Ada-Europe -- |
<|fim▁begin|> Previous: Getting Started/Install on OS X Index Next: Getting Started/Don´t repeat yourself Contents 1 Install on Linux 1.1 Install or update Ruby 1.1.1 Debian 1.2 Install RubyGems 1.3 Install Rails Install on Linux Install or update Ruby It is important that you get the right version of the language. Versions 1.8.2 and 1.8.4 are recommended. 1.8.3 has problems, and 1.8.5 (the current stable version) runs fine, but you will not be able to use breakpointer for debugging (a very handy tool). So I recommend 1.8.4. Get <|fim▁hole|> website Get it from the SVN repository Debian For Debian-based systems (Debian, Ubuntu, etc.), your best bet is to type: sudo apt-get install ruby -t '1.8.4' sudo apt-get install irb rdoc This should install the Ruby language interpreter, the RDoc documentation generator, and irb command-line interpreter. Install RubyGems You should be able to obtain RubyGems by going to the Gems Website and clicking the "download" link. Choose the proper archive and install. Install Rails Get to the command-line and type: sudo gem install rails --include-dependencies <|fim▁end|> | it from the official Ruby |
<|fim▁begin|> English Irish (singular) Irish (plural) artichoke bliosán bliosáin asparagus asparagas/lus súch(súgach) aubergine ubhthoradh ubhthorthaí bean pónaire (f) pónairí beansprout péacan pónaire péacáin phónaire beetroot biatas/meacán biatais meacáin bhiatais broccoli brocailí Brussel sprout bachlóg (f) Bhruiséile bachlóga Bruiséile cabbage cabáiste cabáistí carrot cairéad/meacán dearg cairéid/meacáin dhearga cauliflower cóilis (f) cóiliseacha celery soilire cherry tomato tráta silín trátaí silín chickpea sicphiseánach sicphiseánaigh corn arbhar arbhair courgette cúirséad cúirséid cucumber cúcamar cúcamair eggplant ubhthoradh ubhthorthaí fennel finéal garlic gairleog (f) gairleoga ginger sinséar sinséir green bean pónaire (f) ghlas pónairí glasa horseradish <|fim▁hole|> fiáine kale cál cáil leek cainneann (f) cainneanna lentil lintile (f) lintilí lettuce leitís (f) leitísí mushroom muisiriún/beacán muisiriúiní/beacáin olive ológ (f) ológa onion oinniún oinniúin parsley peirsil (f) peirsilí parsnip meacán bán meacáin bhána pea pis (f) piseanna pepper piobar piobair potato práta prátaí pumpkin puimcín puimcíní radish raidis (f) raidisí rhubarb biabhóg (f)/rúbarb rúbarbaí rocket ruachán rosemary marós scallion/spring onion scailliún scailliúin shallot seallóid (f) seallóidí spinach spionáiste squash puimcín puimcíní swede(rutabaga) svaeid svaeideanna sweet-potato práta milis prátaí milse tomato tráta trátaí turnip tornapa tornapaí watercress biolar <|fim▁end|> | raidis (f) fhiáin/meacán ragaim raidísí |
<|fim▁begin|> < Evolution before Darwin Jean-Baptise Lamark (1774-1829) Jean-Baptiste Lamarck (1774 – 1829) was a French botanist who proposed two ideas that had great impact in the theory of evolution. Lamarck did not believe that a species could become extinct. Instead, he saw the idea of extinction as every member of a species evolving into another species. He believed that change was brought about through use and disuse and inheritance of acquired characteristics. This was the first time that a mechanism was proposed in order to explain how a change in a species occurred. The first idea of use and disuse is only the first part of Lamarck’s revolutionary thought. It is referred to as the 'First Law' of his publication, Philosophie Zoologique. . The use or disuse theory explains that the parts of an organism that the organism uses most will undergo hypertrophy and will become more developed. Hypertrophy is the growth of a specific organ or tissue. So by this idea, the more an organism uses a part of its body, the larger and more developed that part will become. The parts of the organism that are not used as much undergo atrophy and begin to degrade from lack of use. This means that the part of the organism will get decrease in size due to the lack of use for that particular part of the organism. This is the beginning of the idea of inheritance of acquired traits. The inheritance of acquired traits, also known as his 'Second Law' in Philosophie Zoologique, <|fim▁hole|> the traits of an organism that undergo hypertrophy will be inherited by the next generation. This hypertrophy suggests an adaptation to the environment that can be passed on to the next generation through the genetic code of the organism. Even though Lamarck made astounding progress throughout his life, this theory of evolution has been revised by following studies. The Lamarckian view of evolution is seen as a tendency for a species to reach perfection where it is actually simply adapting to their environment in a single generation. We now know that the inheritance of acquired characteristics is not an actual mechanism of evolution. Darwin saw that Lamarck had some very good ideas that could lead to evolution. Many of Lamarck’s ideas can be seen in Darwin’s Origin of Species. Lamarck was a believer in immutability. Darwin used this idea to further his research on how species were indeed mutable. Darwin also used Lamarck’s inheritance of acquired characteristics as support for his natural selection idea. He used Lamarck’s basic structure, but changed the theory Lamarck used into the actual mechanism of natural selection. Instead of saying that the traits one organism acquires during its lifetime to better its success, Darwin said that these characteristics would eventually reveal themselves in offspring and later generations instead of in the present organism. These were just some of the ideas Darwin modified while writing the Origin of Species. References Wikipedia has related information at Jean-Baptiste Lamarck Campbell, Reece. Biology, Sixth edition. Benjamin Cummings. 2001. http://www.ucmp.berkeley.edu/history/lamarck.html http://www.cartage.org.lb/en/themes/Biographies/MainBiographies/L/Lamarck/1.html http://www.sparknotes.com/biology/evolution/lamarck/section2.rhtml http://www.danceimages.com/OutlineV.html[dead link] http://www.sciencenetlinks.com/lessons.cfm?DocID=387 <|fim▁end|> | is the idea that |
<|fim▁begin|> Contents 1 Free/Open Source Software and Learning Management and Course Management Systems 1.1 Free Software 1.2 Open Source Software 1.3 How Free and Open Source Software (FOSS) benefits the educational community 1.4 FOSS alternatives to proprietary software 2 Learning Management, Course Management, and Content Management Systems 2.1 Learning Management Systems (LMS) 2.2 Course Management Systems (CMS) 2.3 Content Management Systems or Learning Content Management Systems (LCMS) 3 Considerations when adopting a Free/Open Source LMS, CMS, or LCMS 4 References Free/Open Source Software and Learning Management and Course Management Systems The terms "free software" and "open source software" are often used interchangeably as are the terms "learning management system," "course management system," and "content management system." However there are fine distinctions between each. In order to address your organization's software needs, it is important to understand these distinctions. Free Software The Free Software Movement focuses on moral and ethical issues related to the freedom of users to use, study, modify and redistribute software (Tong, 2004, p.1). Here the term "free" reflects the freedom to run, copy, distribute, study, change and improve the software. It is not simply a reflection of price (Free Software Foundation, n.d.). The Free Software Foundation lists four conditions necessary to meet the "free software" designation. These are: The freedom to run the program, for any purpose. The freedom to study how the program works, and change it to make it do what you wish. Access to the source code is a precondition for this. The freedom to redistribute copies so you can help your neighbor. The freedom to improve the program, and release your improvements (and modified versions in general) to the public, so that the whole community benefits. Access to the source code is a precondition for this. (Free Software Foundation, n.d.) Video: Stephen Fry explains the value of Free Software and contrasts it with the "kind of tyranny" imposed by proprietary software (GNU, 2008). Open Source Software Open Source Software is an approach to the design, development, and distribution of software; it focuses on practical accessibility to the software's source code. ("Open Source," 2009). Open source software is often distributed for free. However vendors can charge for their versions of open software and for technical support. The Consortium for School Networking (CoSN) further clarifies that "open source software is different from "public domain" whose copyright is held by the public and "freeware" or "shareware" which are applications that are distributed in some form for free but whose source code is held by the author and cannot be freely changed or redistributed" (CoSN, n.d.). The benefit of open source development is distributed peer review and transparency of process. The Open Source Initiative (2007) points to the promise of open source as "better quality, higher reliability, more flexibility, lower cost, and an end to predatory vendor lock-in." In terms of development practices free software and open source software are similar in that they invite open peer review, and source code transparency and access. However, according to Richard Stallman, founder of the Free Software Movement, the critical difference is a philosophical one: "The Free Software Movement is a social movement for computer users' freedom. The Open Source philosophy cites practical, economic benefits" (Perens, n.d.). Essentially, the difference boils down to: "Free Software is superior because it's Free. Open Source software will become superior because the development is Open" (Chisnall, 2007). What does this philosophical difference between "free software" and "open source" mean to the educational community? The free software movement argues that people should not support proprietary software since it philosophically prohibits freedoms. How Free and Open Source Software (FOSS) benefits the educational community All would likely agree: we need to prepare students for success in the global economy of the 21st century, a period marked by rapid changes in technology and information access. How can the use of free and open source software in schools support this goal? For one, while students may need to learn how to use word processors to communicate and spreadsheets to explore and expand on data and applications, is it necessary to teach these skills via proprietary applications when free software with the same functionality is available? Do schools teach students and by extension families to standardize to proprietary products, many that may be too costly for home purchase? By adopting the use of FOSS in schools, educators can support students in developing technical skills that transcend the particular idiosyncrasies of the applications (Pfaffman, 2007, p. 40). Further, since there are no license restrictions with FOSS software, all machines (in school and at home) can have the same version of the program and there is no need to purchase additional licenses for new machines or pay for software upgrades. FOSS licenses also guarantee that the software will be freely available forever; users are not limited to free versions of proprietary applications that offer fewer features or limited use (Pfaffman, 2007, p. 40). Two popular examples of FOSS software include Firefox and OpenOffice.org. Both applications were based on commercial code that was subsequently released as open source (Pfaffman, 2007, p. 39). The United Nation's International Open Source Network (IOSN) advocates FOSS for education for its: lower costs, reliability, performance and security, building of long-term capacity, open philosophy, encouragement of innovation, alternative to illegal copying, possibility of localization, and learning from source code. (Tong, 2004, p. 3) The IOSN acknowledges that while initial cost of FOSS and upgrades is negligible, the Total Cost of Ownership (TCO) which includes maintenance, support, and training should be considered. However in various IOSN comparisons the TCO for FOSS is still lower than that for proprietary software (Tong, 2004, p. 10). The savings realized by using FOSS over proprietary software can be put to "better purposes such as buying more computers, providing training for administrative and academic staff or developing non-ICT related infrastructure for the institution‚" (Tong, 2004, p. 10). "In some situations, the availability of funds or lack of it is such that it is not a choice between proprietary software and FOSS but a choice between FOSS and nothing. By using inexpensive or donated hardware with FOSS, some institutions may be able to provide computing facilities to their students that would otherwise be impossible‚" (Tong, 2004, p. 10). From a pedagogical standpoint, educators are increasingly promoting collaboration and authorship. In an open source model, "students and teachers are learning to work collaboratively within a global community toward the end of improving a product for the good of all" (Guhlin, 2008). FOSS fosters innovation, critical thinking, and the development of 21st century skills. Educators will need to form and refine their own attitudes toward technology and change, if they are to model them for students. The Consortium for School Networking asks district technology leaders to consider these benefits of open technologies for K-12 school: Cost: License Fees and TCO: Licensing and purchasing costs for proprietary technologies often limit the scope of use in educational settings. Open technologies, often blended with proprietary technologies, may provide a means for the use of technology in a more ubiquitous fashion for students and teachers by leveraging the funding available. Data integrity/interoperability: Data interoperability through open standards increases the efficiency of systems through the use of common data elements and ensures greater data integrity. These open standards assist in both proprietary and open source applications working well together in a blended technology environment. Independence and Flexibility: Because the source code is open, advanced users can deeply customize applications and operating systems to their environment. This opens the door to innovation which is in turned shared with others. Upgrades are voluntary, so users are not locked into continuing maintenance fees or enforced obsolescence. Stability and Reliability: There is high confidence that open source software will have a viable future because so many people are independently vested in it. It is stable because so many skilled developers are working on it and testing it in many different environments. Open source operating system users report that their systems are more reliable, offer greater performance, are easier to manage, and provide better support. Broader Access to Information: Huge libraries of content are being assembled by organizations, agencies and individuals. Search engines make this quickly available at the point of instruction. Community Support: Content management systems make it easy to build attractive informational sites to communicate to the public. An informed community in turn supports schools. Engage Students in Collaboration: It's well documented that our students live in a world characterized by collaboration. They expect to be part of a larger community in the creation of knowledge, not just sharing, but actively contributing to the end result, whether it's the area of music, research or literature. The use of open technologies in education reinforces that view of the world and encourages students and teachers to <|fim▁hole|> global community typically involved in the creation of these technologies. (CoSN, n.d.) FOSS alternatives to proprietary software The following sites provide FOSS alternatives to proprietary software: Open Source as Alternative School Forge Wikipedia: Open Source Software Packages Learning Management, Course Management, and Content Management Systems Learning management systems, course management systems, and content managements are server-based systems that are designed to manage learning content and learner interactions. To varying extents they enable an online learning environment with public or private access, areas for collaboration, asynchronous discussion, email, archives and storage, and submission and publication of user-generated content. Some provide data management such as attendance, enrollment, class schedules, mastery progress, assessment, and reporting. Most empower school administrators, faculty, and students to post, publish, and manage content directly without the need for programming skills, thus providing these constituents with anywhere/anytime access to a learning environment. These systems can support collaborative learning inside and outside of the school in order to extend the learning environment to the home and further involve parents (Watson & Watson, 2007). Though the terms ‚"learning management system," "course management system," and "content management system" are often used interchangeably. They each have their specific focus as noted below. Learning Management Systems (LMS) Learning Management Systems focus on the logistics of managing learners, learning activities, and the competency mapping of an organization (Watson & Watson, 2007). The LMS manages the learning process as a whole and provides an infrastructure for delivering and managing instructional content, assessing individual and organizational learning goals, tracking progress towards those goals, and collecting and presenting data (Watson & Watson, 2007). Essentially, the LMS delivers content but also handles course registration and administration, skills gap analysis, tracking and reporting. Course Management Systems (CMS) Course Management systems support the placement of course materials online, "associating students with courses, tracking student performance, storing student submissions and mediating communication between the students as well as their instructor" (Watson & Watson, 2007). LMS also contain many of these functions; however, LMS are not limited to CMS functionality. A CMS provides educators with a framework, templates, and tools to create course content and to manage discussion and interactions with students within the course, without the need for programming skills (Watson & Watson, 2007). Common features of most CMS include areas for content, asychronous discussion boards, chat rooms, assignment drop boxes, quizzes, rosters, surveys, and an area for students and teachers to set-up their own templated homepages. Students and teachers are able to share resources, collaborate, participate in forums, take online tests, access grades, and upload assignments (Ioannou & Hannafin, 2008, p. 46). CMS support student-teacher communication and collaboration. However, they do not have all of the administrative functions that an organization-wide learning management system would such as tracking school attendance, total enrollment, and customized organizational reporting. Content Management Systems or Learning Content Management Systems (LCMS) Content management systems enable web content development. With the LCMS the content is separated from the design and programming of the site; thus CMS software makes it easy to manage content without web design or programming skills (Farkas, 2008). The LCMS is a multi-user environment where developers may create, store, reuse, manage, and deliver digital learning content from a central object repository ("Learning Content Management System," 2009). The LCMS allows anyone to take on the role of webmaster and thus allow educators or students to distribute the responsibility for updating web content (Watson & Watson, 2007). A LCMS allows an individual or a community of users to easily publish, manage and organize a wide variety of content on a website including: blogs, wikis, resource directories, collaborative authoring environments, picture galleries, podcasts, video sharing, discussion forums, content syndication, and news aggregation (drupal.org). Like LMS and CMS, the LCMS also features role-based permissions for users. Considerations when adopting a Free/Open Source LMS, CMS, or LCMS Guhlin (2007) offers the following tips when considering a move to open source technologies. Eight Steps to a Smooth Transition Convene a committee representative of teachers, administrators, and office staff and share the problem with them. The problem: We're spending a lot of money on software licenses. Let's brainstorm some solutions that lower that total cost. Get buy-in on beginning with a familiar basic application open source tool, such as OpenOffice, which can be easily shared and includes a clipart library. Prioritize the different solutions. Thoroughly evaluate each solution in a test situation so that the committee is aware of why something works or doesn't. Have the members keep a blog or journal of what they experiencing. Survey all stakeholders. Focus on function and need rather than product. This will give you the data you need to make decisions on the best solutions. Maintain regular communication. Via newsletters and a Web page, disseminate committee findings and keep stakeholders abreast over time of funds saved and how they've been redirected to worthy projects that directly impact students, teachers, and community. Immediately create quick reference cards for the open source solutions you choose. Also train your help desk. You can turn to OpenOffice textbooks as well as Web site resources. Make the transition across several campuses, setting up training and offering to do on-site demonstrations for teachers. Also setup a FAQ page online to help train everyone. When you announce the decision, make CDs of the software available for people who do not have a high-speed Internet connection at home, including parents of district students. Offer to give those away at the cost of the media/duplication. (Guhlen, 2007) Video: Instructional Designer Matt Bodek discusses the reasons why he selected an open source CMS (Drupal) to develop course sites (Bodek, 2009). Technologies can "change people's understandings of what they can do, what they want to do, what they think they need to do" (Burbules & Callister, 2000, p. 33). Ali Jafari models a comprehensive "Next-Generation E-Learning Environment" (Jafari, 2006). In planning for new learning environments, educators should examine their needs, wishlists, and also the affordances of the technologies. Are they static and instructive, allowing for fixed representations and one-way transmission of information? Or are they more collaborative and productive, allowing more flexible, multimodal representations that can be modified and shared (Bower, 2008)? To compare specific LMS, CMS, and LCMS features in the areas of communication, productivity, student involvement, support, course delivery, content development, and or technical specifications, visit the sites below. EduTools CMSmatrix.org References Bodek, M. (2009). Interview: Working With an Open Source CMS (video file). Video posted to http://www.youtube.com/watch?v=330k7eiZT6g Bower, M. (2008). Affordance analysis - matching learning tasks with learning technologies. Educational Media International, 45(1), 3-15. Retrieved July 13, 2009, from Wilson Web database. Burbules, N.C., & Callister, Jr., T.A. (2000). Watch it: The risks and promises of information technologies for education. Boulder: Westview Press. Chisnall, D. (2007, March 16). Free Software Versus Open Source Software. Retrieved July 12, 2009, from http://www.informit.com/articles/article.aspx?p=706208 CMSmatrix.org (n.d.). CMS Comparison Tool. Accessed July 13, 2009, from http://www.cmsmatrix.org CoSN: K-12 Open Technologies. (n.d.). How can open technologies benefit K-12 schools? Retrieved July 11, 2009, from http://www.k12opentech.org/how-can-open-technologies-benefit-k-12-schools CoSN: K-12 Open Technologies. (n.d.). What are open technologies? Retrieved July 11, 2009, from http://k12opentech.org/what-are-open-technologies Drupal.org. (n.d.) CMS Features. Retrieved July 13, 2009, from http://drupal.org/features EduTools. (n.d.). Course Management Comparison: How to Use this Site. Accessed July 13, 2009, from http://www.edutools.info/static.jsp?pj=4&page=HOWTO Farkas, M. (2008). CMS for Next-Gen Websites. American Libraries, 39(10), 36. Retrieved July 11, 2009, from Wilson Web database. Fry, S. (2008). Happy Birthday to GNU(video file). Video posted to http://www.gnu.org/fry/ Guhlin, M. (2008, August 22). The Case for Open Source. Tech & Learning. Retrieved July 12, 2009, from http://www.techlearning.com/article/6944 Ioannou, A. & Hannafin, R.D. (2008, January/February). Course Management Systems: Time for Users to Get What They Need. TechTrends, 52(1), 46-50. Retrieved July 11, 2009, from Wilson Web database. Jafari, A., McGee, P., & Carmean, C. (2006, July/August). Managing Courses, Defining Learning: What Faculty, Students, and Administrators Want. EDUCAUSE Review, 41(4),50-71. Retrieved July 12, 2009, from http://www.educause.edu/EDUCAUSE+Review/EDUCAUSEReviewMagazineVolume41/ManagingCoursesDefiningLearnin/158070 Learning Content Management System. (2009, July 13). In Wikipedia, the free encyclopedia. Retrieved July 13, 2009, from http://en.wikipedia.org/wiki/Learning_management_system Open Source Initiative. (2007). Open Source Definition. Retrieved July 11, 2009, from http://opensource.openmirrors.org/ Open Source Software. (2009, July 11). In Wikipedia, the free encyclopedia. Retrieved July 11, 2009, from http://en.wikipedia.org/wiki/Open_source_software Perens, B. (n.d.). Public Policy Area: Open Source Software. Retrieved July 12, 2009, from [http://perens.com/policy/open-source/ http://perens.com/policy/open-source/ Pfaffman, J. (2007, May/June). It's Time to Consider Open Source Software. TechTrends. 51(3), 38-43. Retrieved July 12, 2009, from Wilson Web database. The Free Software Definition. (n.d.). Retrieved July 11, 2009, from http://www.fsf.org/licensing/essays/free-sw.html Tong, T. W. (2004). Free/Open Source Software: Education. Retrieved July 11, 2009, from UNDP International Open Source Network web site: http://www.iosn.net/education/foss-education-primer/ Watson, W. R. & Watson, S. L. (2007, March/April). What are Learning Management Systems, What are They Not, and What Should they Become? TechTrends, 51(2), 28-34. Retrieved July 11, 2009, from Wilson Web database. <|fim▁end|> | be active members of the |
<|fim▁begin|> The Judicial Branch of the United States has the de facto role of evaluating both the legislative and executive branches of the United States Federal government. Laws which are passed by the legislative branch can be declared null and void by the Supreme Court, and the actions of a sitting president can be called into question by the judicial and legislative branches. However, there is neither a formal nor informal check on the power of the judicial branch itself; decisions made by the Supreme Court are final and can only be overturned or modified by future Supreme Court justices and the principle of precedence. As such, it can be argued that the judicial branch can potentially operate contrary to or without the mandate of the electorate. United States Supreme Court Justices are appointed by the president and confirmed by the Senate. In theory, this procedure allows both the executive and legislative branches to have some power over the judiciary and thus "check" the judicial branch's power. However, following confirmation by the Senate, all Supreme Court justices hold office for life unless they are impeached or they voluntarily retire. The principle of checks and balances allows branches of government to be "isolated from each other so that no branch has total power over all functions of government...an attack on or abuse of power by individuals of a single branch will not lead to tyranny or the fall of the entire government." The judicial branch, however, holds the potential to nullify laws approved by the legislative branch, disregard the executive branch, and, in essence, control the rule of law in the United States in accordance to the opinions of its sitting justices. While there have not been any historically prominent abuses, the United States has had a history of irregular and even hypocritical laws as justices rotate and the political atmosphere of the country changes. There are several checks on the powers of the Judicial branch. First, they can only pronounce on those cases brought before them. <|fim▁hole|> They can only interpret laws, treaties and the constitutions of the states and the United States. If Congress feels that a law has been misinterpreted, they can pass laws to clarify their meaning as has been done many times before. If enough people feel that the Constitution is wrong, it too can be amended as it has been 27 times to date. Judges are subject to impeachment and removal by the Congress, and Congress may, by law, establish how the courts operate and within some constitutional limits, Congress may decide which cases are heard by which courts and how large courts are. Some people have proposed that judges be elected or their ruling subject to overrule. Elected judges are not independent. They will rule based on what is popular, rather than what the laws provide. Many rights that we now take for granted were once restricted based on majorities. Inter-racial marriage, restrictions on speech, and even a woman's right to work were once restricted based on popularly supported laws. An independent judge can make the tough decisions that an elected judge would be afraid to make. In The Federalist No. 78, Alexander Hamilton wrote: "The standard of good behavior for the continuance in office of the judicial magistracy, is certainly one of the most valuable of the modern improvements in the practice of government. In a monarchy it is an excellent barrier to the despotism of the prince; in a republic it is a no less excellent barrier to the encroachments and oppressions of the representative body. And it is the best expedient which can be devised in any government, to secure a steady, upright, and impartial administration of the laws." Hamilton goes on to quote from Montesquieu's Spirit of Laws Vol. 1 that "there is no liberty, if the power of judging be not separated from the legislative and executive powers." Insert examples Insert links supporting/developing current controversies in the United States re: President Bush's potential nominations, Senator Arlen Spector and the abortion issue, etc. <|fim▁end|> | Judges cannot make law. |
<|fim▁begin|> Goodwin, Jean. "Cicero's Authority." Philosophy & Rhetoric 34 (2001): 38-60. In this essay Jean Goodin explores the interaction of speaker and audience and the role of ethos as a means of persuasion. As a case study, Goodin focuses on Cicero’s representation of a man named Sulla, who is a defendant in a conspiracy trial. In his official capacity as Roman Consul, Cicero had previously investigated the same conspiracy that eventually led to the execution of five conspirators. In this case, by defending another charged in the same conspiracy, Cicero is now batting from the other side of the plate. In today’s legal world, bar officials would undoubtedly censure him for violating ethical standards prohibiting conflict of interest. Despite this apparent ethical dilemma, Cicero bases his defense of Sulla, not on the evidence, but on the merit of Cicero’s own reputation. In essence, the defense he raises is ‘you should find Sulla not guilty because I tell you he is not guilty. Trust me.’ After describing the prosecution’s attack on Cicero’s situation (that his conflict of interest cancels his ethos) Goodin carefully evaluates the considerations facing the jury members in context <|fim▁hole|> it existed in ancient Rome. By Roman standards, a respected public figure must be given credibility and respect until there is proof that the respect and authority has been forfeited. In the same way the presumption of innocence gives and accused an advantage in a criminal trial, the orator with the best reputation is given a presumption of believability. Unless there is good reason to question the great one’s ethos, the audience should defer to his or her judgment. To do otherwise would show disrespect and invite public disfavor. Cicero counters the prosecution’s attack on his ethos by serving up and even bigger dose of ethos by arguing ‘would I be so mad as to risk my reputation, to sully my grand achievements to act falsely in this case.’ In other words, would anyone in Cicero’s position be crazy enough to risk everything for anything other than a just cause. Would such an argument prevail in a modern courtroom? No. In fact such an argument would not be allowed because it is considered irrelevant. Was the argument effective in Sulla’s case? Suffice it to say the jury found Sulla not guilty. <|fim▁end|> | of the concept of ethos as |
<|fim▁begin|> x86 Assembly quick links: registers • move • jump • calculate • logic • rearrange • misc. • FPU Very few projects are written entirely in assembly. It's often used for accessing processor-specific features, optimizing critical sections of code, and very low-level work, but for many applications, it can be simpler and easier to implement the basic control flow and data manipulation routines in a higher level language, like C. For this reason, it is often necessary to interface between assembly language and other languages. Contents 1 Compilers 2 C Calling Conventions 2.1 CDECL 2.2 STDCALL 2.3 FASTCALL 3 C++ Calling Conventions (THISCALL) 4 Ada Calling Conventions 5 Pascal Calling Conventions 6 Fortran Calling Conventions 7 Inline Assembly 7.1 C/C++ 7.2 Pascal 8 Further Reading Compilers The first compilers were simply text translators that converted a high-level language into assembly language. The assembly language code was then fed into an assembler, to create the final machine code output. The GCC compiler still performs this sequence (code is compiled into assembly, and fed to the AS assembler). However, many modern compilers will skip the assembly language and create the machine code directly. Assembly language code has the benefit that it is in one-to-one correspondence with the underlying machine code. Each machine instruction is mapped directly to a single Assembly instruction. Because of this, even when a compiler directly creates the machine code, it is still possible to interface that code with an assembly language program. The important part is knowing exactly how the language implements its data structures, control structures, and functions. The method in which function calls are implemented by a high-level language compiler is called a calling convention. The calling convention is a contract between the function and caller of the function and specifies several parameters: How the arguments are passed to the function, and in what order? Are they pushed onto the stack, or are they passed in via the registers? How are return values passed back to the caller? This is usually via registers or on the stack. What processor states are volatile (available for modification)? Volatile registers are available for modification by the function. The caller is responsible for saving the state of those registers if needed. Non-volatile registers are guaranteed to be preserved by the function. The called function is responsible for saving the state of those registers and restoring those registers on exit. The function prologue and epilogue, which sets up the registers and stack for use within the function and then restores the stack and registers before exiting. C Calling Conventions Wikipedia has related information at x86 calling conventions CDECL For C compilers, the CDECL calling convention is the de facto standard. It varies by compiler, but the programmer can specify that a function be implemented using CDECL usually by pre-appending the function declaration with a keyword, for example __cdecl in Visual studio: int __cdecl func() in gcc it would be __attribute__( (__cdecl__ )): int __attribute__((__cdecl__ )) func() CDECL calling convention specifies a number of different requirements: Function arguments are passed on the stack, in right-to-left order. Function result is stored in EAX/AX/AL Floating point return values will be returned in ST0 The function name is pre-appended with an underscore. The arguments are popped from the stack by the caller itself. 8-bit and 16-bit integer arguments are promoted to 32-bit arguments. The volatile registers are: EAX, ECX, EDX, ST0 - ST7, ES and GS The non-volatile registers are: EBX, EBP, ESP, EDI, ESI, CS and DS The function will exit with a RET instruction. The function is supposed to return values types of class or structure via a reference in EAX/AX. The space is supposed to be allocated by the function, which unable to use the stack or heap is left with fixed address in static non-constant storage. This is inherently not thread safe. Many compilers will break the calling convention: GCC has the calling code allocate space and passes a pointer to this space via a hidden parameter on the stack. The called function writes the return value to this address. Visual C++ will: Pass POD return values 32 bits or smaller in the EAX register. Pass POD return values 33-64 bits in size via the EAX:EDX registers For non-POD return values or values larger than 64-bits, the calling code will allocate space and passes a pointer to this space via a hidden parameter on the stack. The called function writes the return value to this address. CDECL functions are capable of accepting variable argument lists. Below is example using cdecl calling convention: global main extern printf section .data align 4 a: dd 1 b: dd 2 c: dd 3 fmtStr: db "Result: %d", 0x0A, 0 section .bss align 4 section .text ; ; int func( int a, int b, int c ) ; { ; return a + b + c ; ; } ; func: push ebp ; Save ebp on the stack mov ebp, esp ; Replace ebp with esp since we will be using ; ebp as the base pointer for the functions ; stack. ; ; The arguments start at ebp+8 since calling the ; the function places eip on the stack and the ; function places ebp on the stack as part of ; the preamble. ; mov eax, [ebp+8] ; mov a int eax mov edx, [ebp+12] ; add b to eax lea eax, [eax+edx] ; Using lea for arithmetic adding a + b into eax add eax, [ebp+16] ; add c to eax pop ebp ; restore ebp ret ; Returning, eax contains result ; ; Using main since we are using gcc to link ; main: ; ; Set up for call to func(int a, int b, int c) ; ; Push variables in right to left order ; push dword [c] push dword [b] push dword [a] call func add esp, 12 ; Pop stack 3 times 4 bytes push eax push dword fmtStr call printf add esp, 8 ; Pop stack 2 times 4 bytes ; ; Alternative to using push for function call setup, this is the method ; used by gcc ; sub esp, 12 ; Create space on stack for three 4 byte variables mov ecx, [b] mov eax, [a] mov [esp+8], dword 4 mov [esp+4], ecx mov [esp], eax call func ;push eax ;push dword fmtStr mov [esp+4], eax lea eax, [fmtStr] mov [esp], eax call printf ; ; Call exit(3) syscall ; void exit(int status) ; mov ebx, 0 ; Arg one: the status mov eax, 1 ; Syscall number: int 0x80 In order to assemble, link and run the program we need to do the following: nasm -felf32 -g cdecl.asm gcc -o cdecl cdecl.o ./cdecl STDCALL STDCALL is the calling convention that is used when interfacing with the Win32 API on Microsoft Windows systems. STDCALL was created by Microsoft, and therefore isn't always supported by non-Microsoft compilers. It varies by compiler but, the <|fim▁hole|> a function be implemented using STDCALL usually by pre-appending the function declaration with a keyword, for example __stdcall in Visual studio: int __stdcall func() in gcc it would be __attribute__( (__stdcall__ )): int __attribute__((__stdcall__ )) func() STDCALL has the following requirements: Function arguments are passed on the stack in right-to-left order. Function result is stored in EAX/AX/AL Floating point return values will be returned in ST0 64-bits integers and 32/16 bit pointers will be returned via the EAX:EDX registers. 8-bit and 16-bit integer arguments are promoted to 32-bit arguments. Function name is prefixed with an underscore Function name is suffixed with an "@" sign, followed by the number of bytes of arguments being passed to it. The arguments are popped from the stack by the callee (the called function). The volatile registers are: EAX, ECX, EDX, and ST0 - ST7 The non-volatile registers are: EBX, EBP, ESP, EDI, ESI, CS, DS, ES, FS and GS The function will exit with a RET n instruction, the called function will pop n additional bytes off the stack when it returns. POD return values 32 bits or smaller will be returned in the EAX register. POD return values 33-64 bits in size will be returned via the EAX:EDX registers. Non-POD return values or values larger than 64-bits, the calling code will allocate space and passes a pointer to this space via a hidden parameter on the stack. The called function writes the return value to this address. STDCALL functions are not capable of accepting variable argument lists. For example, the following function declaration in C: _stdcall void MyFunction(int, int, short); would be accessed in assembly using the following function label: _MyFunction@12 Remember, on a 32 bit machine, passing a 16 bit argument on the stack (C "short") takes up a full 32 bits of space. FASTCALL FASTCALL functions can frequently be specified with the __fastcall keyword in many compilers. FASTCALL functions pass the first two arguments to the function in registers, so that the time-consuming stack operations can be avoided. FASTCALL has the following requirements: The first 32-bit (or smaller) argument is passed in ECX/CX/CL (see [1]) The second 32-bit (or smaller) argument is passed in EDX/DX/DL The remaining function arguments (if any) are passed on the stack in right-to-left order The function result is returned in EAX/AX/AL The function name is prefixed with an "@" symbol The function name is suffixed with an "@" symbol, followed by the size of passed arguments, in bytes. C++ Calling Conventions (THISCALL) The C++ THISCALL calling convention is the standard calling convention for C++. In THISCALL, the function is called almost identically to the CDECL convention, but the this pointer (the pointer to the current class) must be passed. The way that the this pointer is passed is compiler-dependent. Microsoft Visual C++ passes it in ECX. GCC passes it as if it were the first parameter of the function. (i.e. between the return address and the first formal parameter.) Ada Calling Conventions Pascal Calling Conventions The Pascal convention is essentially identical to cdecl, differing only in that: The parameters are pushed left to right (logical western-world reading order) The routine being called must clean the stack before returning Additionally, each parameter on the 32-bit stack must use all four bytes of the DWORD, regardless of the actual size of the datum. This is the main calling method used by Windows API routines, as it is slightly more efficient with regard to memory usage, stack access and calling speed. Note: the Pascal convention is NOT the same as the Borland Pascal convention, which is a form of fastcall, using registers (eax, edx, ecx) to pass the first three parameters, and also known as Register Convention. Fortran Calling Conventions This section is empty. Please help by expanding it. Inline Assembly C/C++ This Borland C++ example splits byte_data into two bytes in buf, the first containing high 4 bits and low 4 bits in the second. void ByteToHalfByte(BYTE *buf, int pos, BYTE byte_data) { asm { mov al, byte_data mov ah, al shr al, 04h and ah, 0Fh mov ecx, buf mov edx, pos mov [ecx+edx], al mov [ecx+edx+1], ah } } Pascal The FreePascal Compiler (FPC) and GNU Pascal Compiler (GPC) allow asm-blocks. While GPC only accepts AT&T-syntax, FPC can work with both, and allows a direct pass-through to the assembler. The following two examples are written to work with FPC (regarding compiler directives). program asmDemo(input, output, stderr); // The $asmMode directive informs the compiler // which syntax is used in asm-blocks. // Alternatives are 'att' (AT&T syntax) and 'direct'. {$asmMode intel} var n, m: longint; begin n := 42; m := -7; writeLn('n = ', n, '; m = ', m); // instead of declaring another temporary variable // and writing "tmp := n; n := m; m := tmp;": asm mov rax, n // rax := n // xchg can only operate at most on one memory address xchg rax, m // swaps values in rax and at m mov n, rax // n := rax (holding the former m value) // an array of strings after the asm-block closing 'end' // tells the compiler which registers have changed // (you don't wanna mess with the compiler's notion // which registers mean what) end ['rax']; writeLn('n = ', n, '; m = ', m); end. In FreePascal you can also write whole functions in assembly language. Also note, that if you use labels, you have to declare them beforehand (FPC requirement): // the 'assembler' modifier allows us // to implement the whole function in assembly language function iterativeSquare(const n: longint): qword; assembler; // you have to familiarize the compiler with symbols // which are meant to be jump targets {$goto on} label iterativeSquare_iterate, iterativeSquare_done; // note, the 'asm'-keyword instead of 'begin' {$asmMode intel} asm // ecx is used as counter by loop instruction mov ecx, n // ecx := n mov rax, 0 // rax := 0 mov r8, 1 // r8 := 1 cmp ecx, rax // ecx = rax [n = 0] je iterativeSquare_done // n = 0 // ensure ecx is positive // so we'll run against zero while decrementing jg iterativeSquare_iterate // if n > 0 then goto iterate neg ecx // ecx := ecx * -1 // n^2 = sum over first abs(n) odd integers iterativeSquare_iterate: add rax, r8 // rax := rax + r8 inc r8 // inc(r8) twice inc r8 // to get next odd integer loop iterativeSquare_iterate // dec(ecx) // if ecx <> 0 then goto iterate iterativeSquare_done: // the @result macro represents the functions return value mov @result, rax // result := rax // note, a list of modified registers (here ['rax', 'ecx', 'r8']) // is ignored for pure assembler routines end; Further Reading For an in depth discussion as to how high-level programming constructs are translated into assembly language, see Reverse Engineering. Subject:C programming language Subject:C++ programming language x86 Disassembly/Calling Conventions x86 Disassembly/Calling Convention Examples <|fim▁end|> | programmer can specify that |
<|fim▁begin|> A fully functional and useful example There are two programs that can be found inside the conglomerate package: print_volume_value and print_world_value. To use them you specify a minc volume and xyz coordinates in either voxel (volume) or world space, and it returns the real value at that location. Here we will combine that functionality into a single minc2 program. The code is presented in its entirety below, with commentary at the end of this page. The usage is the following: > minc2_tutorial3 input.mnc v|w c1 c2 c3 Where v or w specify whether world or voxel coordinates are specified inside c1 c2 c3. #include <minc2.h> #include <stdio.h> #include <stdlib.h> #include <assert.h> #include <string.h> int main(int argc, char **argv) { mihandle_t minc_volume; midimhandle_t dimensions[3]; double voxel; int result, i; double world_location[3]; double dvoxel_location[3]; unsigned long voxel_location[3]; unsigned int sizes[3]; char *usage; char voxel_or_world; usage = "minc2_tutorial3 input.mnc v|w x y z"; if (argc != 6) { fprintf(stderr, "USAGE: %s\n", usage); return(1); } /* open the volume - first command line argument */ result = miopen_volume(argv[1], MI2_OPEN_READ, &minc_volume); /* check for error on opening */ if (result != MI_NOERROR) { fprintf(stderr, "Error opening input file: %d.\n", result); fprintf(stderr, "%s", usage); return(1); } /* check for whether voxel or world coordinates are specified */ voxel_or_world = argv[2][0]; /* handle the case of world coordinates */ if (strcmp(&voxel_or_world, "w") == 0) { /* get the world coordinates from the command line */ world_location[0] = atof(argv[3]); world_location[1] = atof(argv[4]); world_location[2] = atof(argv[5]); /* convert world coordinates to voxel coordinates */ result = miconvert_world_to_voxel(minc_volume, world_location, dvoxel_location); if (result != MI_NOERROR) { fprintf(stderr, "Error converting world coordinates to voxel coordinates\n"); fprintf(stderr, "%s", usage); return(1); } } /* handle the case of voxel coordinates */ else if (strcmp(&voxel_or_world, "v") == 0) { dvoxel_location[0] = atof(argv[3]); dvoxel_location[1] = atof(argv[4]); dvoxel_location[2] = atof(argv[5]); /* convert the voxel coordinates to world coordinates */ miconvert_voxel_to_world(minc_volume, dvoxel_location, world_location); } /* only v and <|fim▁hole|> */ else { fprintf(stderr, "Must specify v or w for voxel or world\n"); return(1); } /* miconvert_world_to_voxel needs an array of doubles * * but miget_real_value needs unsigned longs - so we cast */ for (i=0; i<3; i++) { voxel_location[i] = (unsigned long) dvoxel_location[i]; } /* get the dimension sizes and make sure that * * we are using legal coordinates */ miget_volume_dimensions(minc_volume, MI_DIMCLASS_SPATIAL, MI_DIMATTR_ALL, MI_DIMORDER_FILE, 3, dimensions); result = miget_dimension_sizes(dimensions, 3, sizes); printf("Volume sizes: %u %u %u\n", sizes[0], sizes[1], sizes[2]); /* die with an error if voxel coordinates are out of bounds */ for(i=0; i<3; i++) { assert(voxel_location[i] >= 0 && voxel_location[i] < sizes[i]); } /* print the world to voxel mapping */ printf("Voxel location of xyz %f %f %f: %lu %lu %lu\n", world_location[0], world_location[1], world_location[2], voxel_location[0], voxel_location[1], voxel_location[2]); /* print the value at that location */ miget_real_value(minc_volume, voxel_location, 3, &voxel); printf("Voxel at xyz %f %f %f was: %f\n", world_location[0], world_location[1], world_location[2], voxel); return(0); } Most of this code you've seen in the two previous examples. There are a few additional minc library calls - the first is miconvert_voxel_to_world, which does the reverse of miconvert_world_to_voxel. There are also two functions that deal with dimensions. The first, miget_volume_dimensions, places the dimensions associated with the specified minc volume into a midimhandle_t variable. There are several arguments to this function; for the moment it is sufficient to note that the defaults used above will be fine for most cases (and the details will be discussed in a later tutorial). The next function is crucial - miget_dimension_sizes returns the number of elements in each dimension. This is crucial information for looping over voxels as will be illustrated later. As stated above this code reproduces functionality that exists in print_volume_value and print_world_value. It does, however, illustrate one advantage of minc2 over volume_io (the older library used by those two programs): it is much faster, by as much as an order of magnitude for this example. <|fim▁end|> | w are allowed for this argument |
<|fim▁begin|> Contents 1 Introduction 1.1 Product 2 Knightscope Rhetoric 2.1 Appeals to Patriotism 2.2 Appeals to Monetary Interest 2.3 Appeals to a Sense of Control 3 Privacy 3.1 Homeless Groups 3.2 Expectation of Privacy 3.3 Data Privacy 4 Risk of Bias 4.1 Ubiquity and Fairness 4.2 Sense of Security 4.3 The Human Aspect 5 Public Perception 5.1 Opposition 5.2 Support 6 Parallels with Other Controversies 7 References Introduction Founded in 2013, Knightscope is a privately-held Silicon Valley startup in the security industry. It targets both the private and public sectors, with its primary product being various models of Autonomous Data Machines (ADMs). Product There are several models of ADM, including stationary, mobile (indoor and outdoor), and an all-terrain version under development. [1] (left to right): K3 Indoor, K5 Outdoor, K1 Stationary and K7 Multi-Terrain Autonomous Data Machines (Photo: Business Wire) These ADMs can be rented for $7//hour and are deployed in 15 states. Customers must rent ADMs 24 hours a day for the time period over which they have it. [2] ADMs have various features, including eye-level 360 degree video streaming and recording, people detection, license plate recognition, thermal anomaly detection, signal detection, live audio broadcast, two-way intercom, and pre-recorded messages. Customers can monitor live through their ADMs using the Knightscope Security Operations Center, a monitoring application provided with any ADM. [3] Importantly, ADMs are "not armed and never will be," according to CEO William Santana Li. He says they "provide both a physical deterrence and generate 90+ terabytes of data per machine per year." [4] According to Santana Li, the data they generate is to help security personnel do their jobs, not replace them.[5] Knightscope is currently developing "visible and concealed weapon detection" to be able to identify suspicious bulges as weapons. [6] Knightscope Rhetoric Knightscope's executives acknowledge that their success will "depend largely on [their] customers' acceptance" of their robots.[7] Evaluating their rhetoric with this in mind lends insight into its authenticity. Appeals to Patriotism Knightscope's stated mission is to "make the United States of America the safest country in the world, changing everything for everyone."[8] CEO William Santana Li claims the events of 9/11 inspired him, a New Yorker, to innovate in the security space.[9] He says he grew up "believing in [New York City's] skyline" representing "the American dream," and that on 9/11 "freedom was attacked."[10] He believes citizens have a "fundamental right to be safe from crime, safe from violence, and safe from terrorism." [11] These calls on patriotism and national tragedy can be found elsewhere. Santana Li has said that Knightscope was founded "after what happened at Sandy Hook" because our country is "never going to have an armed officer in every school."[12] Each Knightscope default model also has an American flag on it, and one of their taglines is "Join Us and Be A Force for Good."[13] Appeals to Monetary Interest The Knightscope website states "crime has a $1+ trillion Negative Economic Impact on the US Annually." [14] CEO Santana Li says if their machines could "cut the trillion-dollar problem in half," they would "change everything." [15] He speaks about these machines cutting theft from major corporations thus "lowering prices for everyone."[16] He says these machines could "increase the value of your home because you now live in a safer neighborhood."[17] One of Knightscope's website testimonials highlights "more than $125,000" saved in costs associated with "traditional security services."[18] Appeals to a Sense of Control In spite of appeals to patriotism or monetary interest, people might have concerns about security personnel unemployment, AI bias, or failure of the technology where humans would succeed. Knightscope addresses these concerns by appealing to a sense of human control. One website testimonial highlights that "robots... add" to existing security forces, and "dispatchers are able to see what the robots are seeing."[19] This testimonial portrays the robots as tools rather than decision makers. CEO Santana Li calls Knightscope's approach "decidedly 'Software + Hardware + Humans'," with his goal being "machines [doing] monotonous and computationally heavy work and... humans [doing] the strategic and decision making work."[20] Santana Li's rhetoric places humans in the driver's seat with robots only doing boring or mindless work and humans calling the shots. His rhetoric distracts from the 'autonomous' in 'autonomous data machine.' Despite the fact that these machines are deliberately priced below minimum wage and have resulted in reduction of security forces,[21] Santana Li is "infuriated" that 2 million plus "law enforcment and private security professionals who... are willing to take a bullet for you and your family" are provided with technology that is "beneath the dignity of this nation."[22] Knightscope paints a picture of their machines as tools to aid the noble security professional in spite of the many cases where ADMs replace these professionals. Privacy Homeless Groups The robots constantly collect data as they survey their surroundings so it is no surprise that they angered the homeless who live in public areas. As Jennifer Friedenbach, the Executive Director of San Francisco’s Coalition on Homelessness, said “when you’re living outdoors, the lack of privacy is really dehumanizing after awhile.” [23] The homeless are subjected to people walking around during the day, and the addition of autonomous data machines leaves them with no semblance of privacy. This response is mostly due to the use of an ADM by a San Francisco SPCA in late 2017.[24] Expectation of Privacy The machines do not just affect the homeless, they affect anyone who uses public space. Anything that occurs in the presence of one of their robots can be recorded. While some would say that this lack of privacy is unreasonable, Santana Li says that this expectation is unfounded. “Privacy in a public area is a little bit odd. You have no expectation of privacy… where all these machines are operating.”[25] This quote has some truth to it as most people have a camera in their pocket in the form of a phone, however the machines do more than constantly take videos. They can also track network data, thermal detection, and other features that phones do not have.[26] While Knightscope does provide extra security, it takes away any remaining privacy that the public might expect in public spaces, especially for the homeless. Whether the added security is worth the lack of privacy will be decided by business owners and regulators. Data Privacy Each Knightscope machine generates 90+ Terabytes of data per year.[27] While Knightscope says they will only use <|fim▁hole|> purposes, recent privacy scandals have shown that companies may not always follow their word.[28] And they do not state what they do with this data, despite making some statements about what they will not do. Knightscope has stated: "Eventually, we will be able to predict and prevent crime."[29] So it is likely they are using that data for this goal. Risk of Bias Ubiquity and Fairness Knightscope's goal is to make everyone feel safer. However, the technology they utilize could be contrary to this goal. One feature of the ADM is People Detection.[30] But facial detection and human detection is inherently biased, as the technology has not developed enough to allow for fairness.[31]. Someone who knows they are more likely to be mis-identified or labeled as "high-risk" cannot feel safer. Sense of Security A future feature that Knightscope would like to add to the ADM is a detection system for suspicious bulges. But there are two scenarios in which this system fails to meet this goal. Person 1, someone with a legally acquired weapon, concealing that weapon legally, is targeted by these systems and labeled as high risk, while posing no danger to the area. Person 2, someone with bulky or oddly shaped clothing or body, is targeted and labeled as high risk. It is easy to think that this system would primarily serve its goal of catching criminals. However, the success of this system depends on human judgment to supersede the ADM's judgment in the case of false alarms. The Human Aspect Preventing displacement of human judgment by machine judgment is difficult. Each ADM generates roughly 250 GB of data per day. It is unlikely that a human will pay attention to anything that is not "interesting". And examples where this lead to serious consequences are plentiful. Uber entrusts a human driver to “check” on the vehicle, leading to the death of Elaine Herzberg.[32] Police officers take the results of facial recognition, pardon my pun, at face value, and people are wrongly arrested or worse because of it.[33] It is not ethical to offload the responsibility onto the user while knowing the reality of how people interact with intelligent systems. Public Perception Opposition The rise or fall of autonomous data machines depends on public perception. The CEO, Santana Li, believes that the machines will take human jobs, resulting in public resistance.[34] The improved efficiency and cost effectiveness will need to outweigh this cost. The machines are already facing attacks by the public including a couple of physical attacks. In one incident, a drunk man began punching a K5.[35] When asked why, he said that it “looked at him funny”.[36] In another instance, homeless people covered a K5 with a tarp and smeared it in barbecue sauce.[37] For those who are homeless, the public space is their home and the constant intrusion of a robot is an understandable nuisance. While the homeless are a group that are directly affected by the K5s, other groups fear the development of robots themselves. Aristotle Georgeson is a comedian who stated some of his most popular posts attacked and made fun of robots. Some of his fans say that they should be doing it so robots can never rise up.[38] They fear the development of artificial intelligence that can control humanity, as many science fiction media has portrayed. As Wykowsa puts it, humans dislike robots because they are not human and they are not a part of our “group”.[39] Support However, many people have begun humanizing the Knightscope robots. In an incident where a Knightscope robot fell into a fountain, one Twitter user joked about how the K5 robot must have been stressed out from work.[40] The CEO of Knightscope also stated that most clients end up naming the machines.[41] While this may not indicate an acceptance of the knightscope robots as “human”, it may indicate that clients are beginning to consider them as part of our “group”. When students were asked how they felt about the knightscope robots, most said that they should not be attacked because they are property.[42] They don’t deserve rights, but they should not be harmed.[43] As these different views clash, the prevailing view will determine the success of the Knightscope agenda. Parallels with Other Controversies In 2012, the surveillance device "Stringray" began to be used by Los Angeles Police Department. Stingrays are capable of intercepting significant amounts of cell phone traffic by mimicking a cell tower. The goal is to discover criminal information by parsing this data. Within a four-month period, the device was utilized for twenty-one investigations that included both violent and non-violent crime. [44] These uses are significantly broader than the use cases cited as necessitating the Stingray, such as investigation of terrorism and violent crime. Many organizations have called out the use of the Stingray as a breach of privacy. The FBI has used similar devices since 1995, but it is becoming a more visible issue due to more wide use by local authorities.[45] The device is now in use in Baltimore, Tallahassee, and Milwaukee. [46] While the Stingray is utilized by federal enforcement agencies, the Knightscope ADMs are utilized by private organizations. Additionally, ADMs openly patrol the spaces they monitor, while Stingrays are used quietly by law enforcement agencies. The most alarming parallel is the handling of data. The Stingray casts a wide net of data collection, and captures more data from innocent civilians than criminals. It is unclear what is done with this data after collection, and some police departments are actively concealing their use. [47] This use of the Stingray parallels the ADM because of their questionable breaches of privacy in public spaces. While the Stingray explicitly invades the privacy of cellular traffic, the ADM is a visible patrolling element. This does not change the fact that "public" spaces are rapidly becoming places of unknown observation. References ↑ https://www.knightscope.com ↑ https://www.sec.gov/Archives/edgar/data/1600983/000114420416141283/v455625_253g2.htm ↑ https://www.knightscope.com ↑ https://www.knightscope.com/invest ↑ https://medium.com/@WSantanaLi/what-if-a-robot-could-save-your-life-88632a76cb3f ↑ https://www.sec.gov/Archives/edgar/data/1600983/000114420416141283/v455625_253g2.htm ↑ https://www.sec.gov/Archives/edgar/data/1600983/000114420416141283/v455625_253g2.htm ↑ https://www.knightscope.com ↑ https://medium.com/@WSantanaLi/what-if-a-robot-could-save-your-life-88632a76cb3f ↑ https://medium.com/@WSantanaLi/what-if-a-robot-could-save-your-life-88632a76cb3f ↑ https://medium.com/@WSantanaLi/what-if-a-robot-could-save-your-life-88632a76cb3f ↑ https://www.mysecuritysign.com/blog/knightscope-k5-robot-replace-security-guards/ ↑ https://www.knightscope.com/ ↑ https://www.knightscope.com ↑ https://medium.com/@WSantanaLi/what-if-a-robot-could-save-your-life-88632a76cb3f ↑ https://medium.com/@WSantanaLi/what-if-a-robot-could-save-your-life-88632a76cb3f ↑ https://medium.com/@WSantanaLi/what-if-a-robot-could-save-your-life-88632a76cb3f ↑ https://www.knightscope.com ↑ https://www.knightscope.com ↑ https://medium.com/@WSantanaLi/what-if-a-robot-could-save-your-life-88632a76cb3f ↑ https://www.knightscope.com/ ↑ https://medium.com/@WSantanaLi/what-if-a-robot-could-save-your-life-88632a76cb3f ↑ https://www.wired.com/story/the-tricky-ethics-of-knightscopes-crime-fighting-robots/ ↑ https://www.theverge.com/2017/12/13/16771148/robot-security-guard-scares-homeless-san-francisco ↑ https://www.wired.com/story/the-tricky-ethics-of-knightscopes-crime-fighting-robots/ ↑ https://www.knightscope.com/ ↑ https://www.knightscope.com/invest ↑ https://www.nytimes.com/2018/09/28/technology/facebook-hack-data-breach.html ↑ https://www.youtube.com/watch?v=89ok1fla1ks&feature=youtu.be ↑ https://www.knightscope.com/knightscope-k5 ↑ https://www.wired.com/story/amazon-facial-recognition-congress-bias-law-enforcement/ ↑ w:Death of Elaine Herzberg ↑ https://www.wired.com/story/amazon-facial-recognition-congress-bias-law-enforcement/ ↑ https://www.sec.gov/Archives/edgar/data/1600983/000114420416141283/v455625_253g2.htm ↑ https://abc7news.com/technology/police-say-drunk-man-knocked-down-robot-in-mountain-view/1915713/ ↑ https://abc7news.com/technology/police-say-drunk-man-knocked-down-robot-in-mountain-view/1915713/ ↑ https://daily.jstor.org/do-security-robots-signal-the-death-of-public-space/ ↑ https://www.nytimes.com/2019/01/19/style/why-do-people-hurt-robots.html ↑ https://www.nytimes.com/2019/01/19/style/why-do-people-hurt-robots.html ↑ https://twitter.com/SparkleOps/status/887038957262786560/photo/1 ↑ https://www.nytimes.com/2019/01/19/style/why-do-people-hurt-robots.html ↑ https://www.nytimes.com/2019/01/31/learning/what-students-are-saying-about-how-to-treat-robots-being-resilient-and-ghosting.html ↑ https://www.nytimes.com/2019/01/31/learning/what-students-are-saying-about-how-to-treat-robots-being-resilient-and-ghosting.html ↑ https://www.eff.org/deeplinks/2013/02/secretive-stingray-surveillance-tool-becomes-more-pervasive-questions-over-its ↑ https://epic.org/foia/fbi/stingray/ ↑ https://www.citylab.com/equity/2016/10/racial-disparities-in-police-stingray-surveillance-mapped/502715/ ↑ https://www.citylab.com/equity/2016/10/racial-disparities-in-police-stingray-surveillance-mapped/502715/ <|fim▁end|> | the data for security |
<|fim▁begin|> Muggles' Guide to Harry Potter - Character Gregorovitch Gender Male Hair color White Eye color Unknown Related Family Unknown Loyalty Wandlore Contents 1 Overview 2 Role in the Books 2.1 Goblet of Fire 2.2 Deathly Hallows 3 Strengths 4 Weaknesses 5 Relationships with Other Characters 6 Analysis 7 Questions 8 Greater Picture Overview Gregorovitch is a wand-maker, possibly equal in ability to Mr. Ollivander, who apparently set up shop in the northern part of Eastern Europe. Role in the Books Beginner warning: Details follow which you may not wish to read at your current level. Goblet of Fire At the Weighing of the Wands ceremony, prior to the First Task of the Triwizard Tournament, Mr. Ollivander is called in to check that the Champions' wands are functioning correctly and up to full power. He recognizes Viktor Krum's wand instantly as a "Gregorovitch creation". Deathly Hallows After his escape from Privet Drive, Harry Potter has "dreams" in which he shares some of Lord Voldemort's thoughts. Voldemort is looking for one Gregorovitch. Harry does not immediately remember this name, though it rings faint bells. It is at the wedding of Bill and Fleur, when a disguised Harry is talking to Viktor Krum, that he remembers that Krum's wand was made by Gregorovitch. Krum says that it was one of the last ones made by him, as he had retired. Harry continues to have dreams about Voldemort's quest for Gregorovitch, including one in which Voldemort questions, and then kills, a woman who dares to say she doesn't know where he went. Finally, Voldemort reaches Gregorovitch, and questions him regarding some item which he supposedly had. Gregorovitch denies having had it, but Voldemort uses Legilimency to read Gregorovitch's memory of a blond thief <|fim▁hole|> from his workshop. We do not see the item that had been stolen. Harry, seeing this memory, believes it must be very small. Having retrieved this memory, Voldemort then kills Gregorovitch. At the end of the book, it is revealed that the object that Gregorovitch had owned and which had been stolen from him was the Elder Wand or the Deathstick, a legendary wand that could not be defeated in a duel. Ollivander tells Harry that Gregorovitch had spread the rumour that he owned this wand and was examining it to determine its secrets, probably in order to enhance his reputation as a wandmaker. The wand was stolen from him by Gellert Grindelwald. Strengths Weaknesses Relationships with Other Characters Analysis It is telling that Ollivander so quickly recognizes Gregorovitch's work, and that he is so well acquainted with Gregorovitch's history. Hagrid makes a comment in Harry Potter and the Philosopher's Stone that leads us to believe that Ollivander is not the only wandmaker, but certainly the best, though we don't ever learn whether this means the best in the world, the best in Britain, or the best in Diagon Alley. It is true that Ron and Neville both seem to take some pride in having received wands from Ollivander's. Based on that analysis, we can guess that Ollivander is likely at the top of his profession, in London at the very least, and thus his ready knowledge of Gregorovitch and his efforts would indicate that Gregorovitch equally is a master wandmaker for Eastern Europe. Questions Study questions are meant to be left for each student to answer; please don't answer them here. Greater Picture Intermediate warning: Details follow which you may not wish to read at your current level. <|fim▁end|> | who had stolen it |
<|fim▁begin|> McDonaldization and Opposition to Rationalized Irrationality Our focus here is on the utilitarian organization, that which people go to for some type of reward, whether they're employees working for a paycheck or customers looking for products with the best value, quality, and consistency - or even students like us at universities. The idea behind “free markets”, chock full of this type of organization, is that we should have freedom to choose within and between them. Still, our degree of freedom in this choice is severely limited by the nature of the organizations dominating the market. We have seen the rise, fall, and rise again of huge corporations from the robber barons at the turn of the century to McDonalds and Wal-Mart today. The question remains: How can we simultaneously promote citizens' freedom to choose while optimizing production efficiency? • There are a growing number of groups opposing the expansion of fast food restaurants and big box retailers • However, these are by no means the only organizations to be looking at, they are just the most visible today • The ideas behind these organizations is so widespread and popular because it is so effective - their tactics are drawn from highly rationalized economic decisions combined with marketing images playing on different individuals' conceptions of themselves and their needs – diverse, highly targeted, and well orchestrated • Some examples from popular media as well as from citizen groups fighting to keep them out of their cities: - Fast Food Nation , How Wal-Mart is Ruining America , Super Size Me , Store Wars against Wal-Mart - Voters across CA derailed Wal-Mart's planned 40 new superstores, notably in Inglewood April 2004 - Gainesville's city commission took similar action this year by refusing to grant Wal-Mart a supercenter - In response to these threats, public relations within these companies has begun to try to favorably reshape their images - McDonalds has added healthier foods to their menu and reportedly is phasing out their supersize option - Wal-Mart's new customized propaganda brochures advertise their economic/environmental benefits • Still, it seems that these companies are underestimating the diversity of ideological angles the opposition may take - in fact, I submit to the reader that the opposition to these big, flashy, cultural icon companies are but easy initial targets, that is, early casualties of a quickly consolidating cultural/political aesthetic whose main characteristic is its anti-corporate ethics. • Let's listen to what the opposition is saying about the pitfalls of these large, highly efficient corporations, that is, the beast in general, because it will teach us lots about the nature of the organizational structure itself that you might not otherwise hear or think too much about… - environmentally unsound = MDs large scale cattle ranching operations in the West is extremely destructive to topsoil; what's worse is that they are now exporting cattle operations to Brazil, particularly in cheap, recently deforested parts of the Amazon Basin; they also lots of genetically modified agricultural products (wheat/potatoes); both MDs and WM are major component implicated in suburban sprawl (destruction of farmland and countryside); WM sells lots of “cheap plastic crap”, generating more consumer purchases and quicker throw-away product turnover - poor labor practices = most of MDs and WM employees are young, unskilled, economically/ethnically disadvantaged women. In fact, WM has recently been cited and fined several times for using undocumented illegal alien cleaning crews; they are also facing a class action lawsuit for sex discrimination in wage, benefits, and promotions. All these things help make their workforce cheaper and easier to control. These jobs are largely alienating and dehumanizing, more like industrial revolution style service jobs than the information age occupations the future is supposed to be offering. Unions are upset because MDs and WM blatantly violate state/federal labor laws and do everything in their power to keep their workers unorganized; employees have incredibly high turnover and most try to keep their employees at just below full time hours so they don't have to provide benefits; fast food is dangerous work due to high accident and violent crime rates (stickups); working conditions are even worse for MDs immigrant meatpackers and farmworkers in the Midwest who hold the most dangerous jobs in America. Even worse off are the people supplying WM with cheap goods - sweatshop workers in 19th century style factories throughout poor nations overseas. - local/national concerns = big chains like MDs and WM are a huge threat to local businesses who often can't compete with companies that own their suppliers and thus can offer much cheaper prices at much higher profit margins; WM often breaks anti-trust laws by selling its products at priced illegally under wholesale value; most profits from WM and MDs franchises don't get recycled back into the local community as the case with small business owners, instead, they are put into the hands of far away executives/administrators and into chain expansion plans, something most small businesses never consider. The chains dominance erodes local sense of community and ownership. Also, it would seem that <|fim▁hole|> companies who move operations and profits transnationally at will with little loyalty - anti-corporate globalization = critics of these institutions are diverse including farmers, leftists, anarchists, local businesses, nationalists, consumer advocates, educators, health officials, labor rights activists, and animal rights activists are converging on this issue. MDs are the favorite target for destruction overseas when American policy turns unfavorable; people dislike the homogenization of their national culture and find America best to blame – WM will be next on the list as it is even bigger threat. • But still, these companies are highly efficient and convenient – fast, cheap, wide selection, consistent service... This is why we utilize them so much, because they seem very effective to us in the short run. However, when we make our basic purchasing decisions, we certainly aren't taking all the social costs (what economists call externalities) into account… • How can smaller operations without the “Fordist” method of production and distribution be able to compete? Do we want the smaller forms of business to simply fade away? Do we have any use for them anymore? Consumers continue to demonstrate a passion for localized, decentralized niche products – this growing “anti-corporate” preference. This is not to say that the idea is so important or widespread that most consumers (even highly educated ones) even take such an idea into account in their purchasing decisions. However, when we look at other manifestations of consumer ethics that many of us are aware of, it becomes clear that these ideas hold at least a bit of the unified anti-corporate ethic within their rhetoric as well. Take for instance some most famous instances of consumer ethics distinctions… Agricultural Products: Vegetarian/vegan vs. meat and other animal related products Factory Farmed vs. Small-Scale animal agriculture (local farmers and free range animals) Organic foods vs. non-organic foods (Silk soymilk vs. Publix soymilk) Healthy vs. Non-Healthy foods (high levels of fat, sugar, preservatives associated with big name brands) Large Food Companies vs. local agricultural produce (Dole fruit vs. farmers' market fruit) Fast food vs. Slow food (dinner on the go vs. cooking and eating homemade meals) Labor Disputes: Farmworker/Employee Strikes (Taco Bell tomato pickers/CA supermarkets Safeway and Ralph's strike) Sweatshop vs. Non-Sweatshop Labor (Nike vs. Doc Marten) Fair vs. Free Trade (coffee) Foreign vs. Domestic (Japanese vs. American automobiles) Other: Animal testing vs. non-animal testing (alternative standards of ethics) Fur vs. Synthetic SUVs vs. compact vehicles (Explorer vs. Geo) Local vs. Chain/Franchised Businesses (Mom & Pop vs. Wal-Mart) Corporate vs. Alternative Media (Network News vs. Indymedia or The Onion) • Will this anti-corporate movement be discredited and co-opted like the environmental and labor movements? • Maybe, but this is a different kind of movement, one that depends almost solely on people's decision to buy or not to buy… • There isn't anything particularly inevitable about the forms of utilitarian organizations today dominating the marketplace – sure, those who have the most resources already have the greatest advantage – but that doesn't give them the eternal scepter of power - creativity and worldly awareness has the power to change everything • In fact, one of the only ways these organizations have been sustained over the past few decades or so is through different government subsidies to these types of industries, starting with the construction of the interstate highway system that facilitated mass transit by auto and suburban sprawl and extending to generous tax cuts/exemptions given out to these companies by officials at different levels of government. • The point is that the free market doesn't really reflect the true, unadulterated nature of customer demand… it never has and it probably never will – so the inevitability argument falls flat on its face – there are more dimensions to consumer choice besides supply/demand and more people are taking them into account • The primary question that liberal democracies like our own have been charged with answering for the last two centuries is how to balance the efficiency and amorality of market tendencies – but they will only see fit to do it if there is pressure placed on them by citizen consumers who are serious about change • This question has historically been left up to the appropriate governmental authorities (congress more or less) but don't expect them to come to the rescue to set things right anytime soon – their constituencies are fairly well distracted at the moment with other (mostly irrational) fears they see on TV. As long as this keeps us entertained, the biggest special interest lobbies in world history will still hold unopposed sway. • Ask yourself: what is your viable alternative to the McDonaldization and “Wal-Mart-ization” of our world? • Keep in mind that these organizations, just like the ones you are planning, sell lifestyles these days… that's how image is crafted and sold – all you need to know is how you and a significant number of people around you want to live… and of course, how you all want to be perceived by others… craft your representations wisely... <|fim▁end|> | national interests aren't served by these |
<|fim▁begin|> Unlike instruments like the flute, clarinet, piano, etc., accordions come in all shapes and sizes, with different tunings, sizes, reed configurations, and other varying specifications, so it can be challenging to determine what accordion is best for you. Here is a list of the most important aspects of a new accordion you should ask yourself. (This page is concerned with the piano accordion only, not diatonic or chromatic button instruments, although much of this text is applicable to them as well.) Contents 1 Comfort 2 Musical range 3 Tunings and reed setups 4 New vs. used 5 Price 6 Other tips Comfort Unlike a piano, an accordion is an instrument that you wear. Furthermore, accordions can be heavy! Playing an accordion that fits you well will be more enjoyable than one that's too big for you. It's not uncommon for accordionists with full-sized accordions to later buy a smaller one and find they play it more often. This might also help to avoid health issues like back or shoulder strain. This doesn't mean you should judge accordions solely by weight, since a somewhat heavier instrument might fit you better. The height of the instrument (determined by the length of the keyboard) might be as important as weight for shorter people. Much like with clothing, the best way to judge what's comfortable for you is to visit a store and try a few different models. Some features can be traded for lighter weight. In particular, having four sets of treble reeds isn't necessary. It's more important that you like the sound of the reeds you have for the music you like to play. Musical range A 41-key, 120-bass accordion will work with all instruction books; otherwise you'll want to make sure you have enough range for the music you want to play. On the treble side: (TODO). Omitting bass buttons saves very little weight, but smaller accordions often have fewer bass buttons, so you'll still have to think about what you need. On the bass side, 60-80 basses lets you play popular music and will get you pretty far in accordion instruction books. An instrument with five vertical columns of bass buttons instead of six will usually be missing the diminished chords. As a beginner you won't be needing them anytime soon, but they're useful for some kinds of music (jazz and classical). When an accordion has more than 12 rows of buttons on the bass side, it has duplicate buttons that don't add more sounds, but help with fingering. This is useful for being able to play music in any key; otherwise, you might have to transpose some music so you can play it in an easier key. Being able to play in all 12 keys is not something beginners will be learning right away, but could eventually be useful for accompanying a vocalist or playing in a band. Tunings and reed setups If you intend to mostly play folk, dance, and light classical music, you could get a musette tuned accordion, which has two or three reed blocks tuned slightly differently from each other for a pleasingly off-tune, vibrating "French" cafe accordionist sound (this is a "chorus" effect). The "musette" sound is not appropriate for every kind of music, though. If you want to eventually play serious classical pieces or jazz, an accordion where all the reeds are tuned to the same pitch is preferred - that's called dry tuning. (Reed blocks and tunings are covered in further detail in another section of this book.) The "musette" sound is also less useful for playing in a band, because in a group, you want to blend. New vs. used Decide whether you want a new or used accordion. New instruments usually have improved, more efficient mechanisms, tighter bellows, and in general will need less repair as time goes on; used instruments, however, cost a good deal less as a rule. Depending on how well it was kept, however, a used accordion can be almost in as good overall condition as a new one. (Even if a used accordion has some problems, they can usually be repaired fully.) Many people consider older models from the '60s and '70s to have a more mellow, pleasant sound, but a lot depends on personal taste. Try playing both a new and old instrument if you have the opportunity, and compare to see which sound you enjoy better. When you are buying used, there are a range of ootions of where to buy, from an online ad from a private seller to a music store. The best prices are buying from a private seller, because there is no "middleman" taking a percentage and the selker has no overhead (as a store owner has). The downside is that there are no warranties or returns with a private sale. If you are buying privately, it is important to check the condition carefully. Do all the keys, bass buttons and chord buttons work? Do the different register switches work? Is the instrument <|fim▁hole|> may lead you to not get an instrument (e.g., the instrument needing a $1,000 overhaul). But a tuning issue, as it is a standard maintenance task that a repair shop can fix, could be OK if the price were to be reduced to take this into account. If you buy a used instrument from a reputable music store, there may be some type of warantee against defects. As well, a good music store will clean and repair used accordions they buy. In contrast, a private seller's instrument may not have been taken out of its case in 10 years and may have problems. You can find used accordions at pawnshops, but remember that there may be no warranty in this type of store and it is probably in unrepaired, "as-is" condition, as pawnshops are unlikely to have an accordion repairer on staff. For used accordions, judging its playing condition by the blemishes and scratches can be misleading. For example, a showroom-mint looking accordion that has sat in a damp basement for 12 years may look beautiful, but its internal components may be badly damaged by moisture. On the other hand, an accordion used by a touring professional for the last 12 years may be covered in nicks and scuffs, but if the owner had professionally-trained maintenance done yearly, it might be in great playing condition. Price Good full-sized accordions are in general not cheap. Both price and reed quality vary considerably and there are masses of manufacturers. Bottom-of-the-barrel, machine-made models can cost as little as $400 but have a miserable, painfully abrasive sound. Student-level instruments start at about $700 to $1200. A good quality new accordion costs about $2,000. Some new top-of-the-line, hand-made European models, meanwhile, have an incredibly rich, organ-like quality and a huge range of sound options but come with a price tag of $25,000 or more. Keep in mind, though, that price does not always equate to quality; you may find a cheaper model of one brand to be better than a more expensive model of another brand. As well, in some cases, an instrment's price might be higher because costly finishes have been used. As mentioned above, used instruments usually cost a good deal less than new ones; it may be the deciding factor if price is an issue for you. As a beginner, you don't need a state-of-the-art model, but you need something with a sound that you can at least live with. Nothing will deter you from playing the accordion more than practicing on an awful, raspy model. Depending on where you live, a decent full-sized accordion will usually come with a price of about US$2,000; it can be half that price or less if used. (Even if you buy a used instrument with some minor problems, the cost of it and the repairs that need to be made to it will usually be much less than a new accordion by itself.) If you take an interest in the accordion and take it up seriously, you'll probably want to eventually buy a better accordion that will complement your ability better as you improve your skills. A new digital accordion will cost from $3,000 to $8,000. Digital accordions have MIDI (musical instrument digital interface) systems, electronic sensors on the buttons, keys, switches and bellows, and a synthesizer that recreates accordion sounds. As well, digital accordions can play other sounds, such as pipe organ, piano, or bass guitar. Other tips Find a reputable dealer. Play the accordion before purchasing it if possible to hear if it has a sound you can live with. Buying an accordion over the internet (like on eBay) can yield some excellent deals if you're lucky, but is also very risky since quality is not readily apparent through a photograph. Here are a few things to check for, especially for a used instrument: Make sure the notes are more or less in tune and that all the keys and bass buttons are working (i.e. not caved in, missing, or otherwise damaged). Find out in what conditions the instrument has been stored. If it's been kept in a damp environment, or where there are extreme temperatures (i.e. near a ventilator, heater, near a cold wall, etc.) there might be problems with the accordion, even if not immediately apparent to you. Examine the bellows. Put the accordion on and let the bellows fall open in your lap without playing a key. If you hear a "whoosh" or the bellows fall open very quickly, the instrument has a leak - a common problem which severely affects playability. (If the bellows slowly creep out but without noise, that's okay. Almost all accordions - and especially older ones, even if well-maintained - will let out a small amount of air.) Smell the accordion for mold. Mold is bad for the reeds and may subtly damage internal mechanisms and reeds, even if you can't hear or see it immediately. If you see problems after any of the above checks, consider looking elsewhere. <|fim▁end|> | tuned well? Some defects |
<|fim▁begin|> Insects NatureGeneral ConferenceSee also Insects - Advanced Skill Level 1 Year of Introduction: 1933 Contents Contents 1 1. Do one of the following 1.1 a. Mount a collection of 20 species of insects representing at least six different orders. (no moths or butterflies and no carelessly mounted or broken specimens will be acceptable.) 1.1.1 (1) Place under each specimen a label showing the locality where caught, the date caught, and the collector's name. Labels should not be larger than 1/4 x 3/4 inches (6 mm x 20 mm). 1.1.2 (2) Identify insects with common names and genus or species level on second labels to be mounted below the first. 1.1.3 (3) Arrange all specimens neatly in an insect box according to orders and families. Orders should be pinned to the box rather than attached to the individual insect pins. 1.2 b. Make colored drawings or paintings of 20 species of insects, representing at least six different orders. Drawings or paintings need to be life size or larger, to show the details of small insects, and in natural coloring. Label the drawings with common names and genus or species level names. 1.3 c. Take color photographs of 20 species of insects, representing at least six different orders. All pictures should be in focus, close-ups and properly labeled, showing where photographed, the date photographed, common names and genus or species level names. 2 Hymenoptera 3 Odonata 4 Orthoptera 5 Phasmatodea 6 Blattodea 7 Isoptera 8 Mantodea 9 Psocoptera 10 Thysanoptera 11 Phthiraptera 12 Coleoptera 13 Strepsiptera 14 Raphidioptera 15 Megaloptera 16 Neuroptera 17 Mecoptera 18 Siphonaptera 19 Diptera 20 Lepidoptera 21 2. What are the distinguishing characteristics of an insect? 22 3. Name five species of injurious insects and tell how to control them. 23 4. Name five species of useful insects. 24 5. Tell two Bible stories in which insects played an important part. 25 References The Insects Honor is an optional component of the Naturalist Master Award . The Insects Honor is a core component of the Zoology Master Award (available only in the South Pacific Division) . 1. Do one of the following a. Mount a collection of 20 species of insects representing at least six different orders. (no moths or butterflies and no carelessly mounted or broken specimens will be acceptable.) (1) Place under each specimen a label showing the locality where caught, the date caught, and the collector's name. Labels should not be larger than 1/4 x 3/4 inches (6 mm x 20 mm). (2) Identify insects with common names and genus or species level on second labels to be mounted below the first. (3) Arrange all specimens neatly in an insect box according to orders and families. Orders should be pinned to the box rather than attached to the individual insect pins. b. Make colored drawings or paintings of 20 species of insects, representing at least six different orders. Drawings or paintings need to be life size or larger, to show the details of small insects, and in natural coloring. Label the drawings with common names and genus or species level names. c. Take color photographs of 20 species of insects, representing at least six different orders. All pictures should be in focus, close-ups and properly labeled, showing where photographed, the date photographed, common names and genus or species level names. Photographing insects can be challenging, but with a few tips, success is within reach. Perhaps the most important feature of your camera for insect photography is the "macro mode." This feature allows the camera to focus on subjects less than 50cm away. It is often marked on the camera body with a small flower icon (since flower photography is also mostly close-up). If you cannot find how to enable this feature on your camera, consult the user's manual. If you cannot find that, search for one on the Internet. Once you find an insect, you may discover that it moves far too quickly for you to be able to take a decent picture. One trick you can use in this case is to capture the insect and pop it in a refrigerator for about an hour. This will not harm the insect, but it will certainly slow it down. After taking a few pictures, release the insect into the wild again. You can also try placing the insect in a drinking glass, and covering the top with the camera lens and body. Use a transparent glass for this so that light can illuminate the insect. Once it settles down, take the picture. This requirement can really be divided into two phases: field work, and lab work. The field work comes first, and it consists of going out into the wild and finding as many insects as you can. Do not worry about identifying them. Photograph as many as you can. If they are too difficult to photograph, capture them and bring them back to the "lab" where you can refrigerate them as described previously. The "lab work" is when you sit down and attempt to identify the insects you have captured, either photographically, or physically. We present a crude identification guide below, but if you want to identify the insects you find, you will very likely need a good field guide. You can try various on-line identification aids as well, including Bug Guide. Hymenoptera Apis (Honey Bee) Order: Hymenoptera Where found: Worldwide Description: Honey bees (or honeybees) are a subset of bees which represent a far smaller fraction of bee diversity than most people suspect; of the approximately 20,000 known species of bees, there are only seven presently-recognized species with a total of 44 subspecies (Engel, 1999; historically, anywhere from six to eleven species have been recognized). These bees are the only living members of the tribe Apini, all in the genus Apis, and all of which produce and store liquified sugar ("honey") to some degree, and construct colonial nests out of wax secreted by the workers in the colony. Other types of related bee produce and store honey, but only members of the genus Apis are considered true honey bees. Odonata Anax junius (Green Darner) Order: Odonata Where found: North America Description: is one of the biggest and fastest-flying dragonflies, able to reach speeds of 85 km/h (55 mph). This species has several nicknames, including "Darning Needle" for its speed, "Mosquito Hawk" for its predatory habits, and "Lord of June" for its abundance during the summer season. It is also Washington State's state insect. Libellula lydia (Common Whitetail) Where found: The Common Whitetail or Long-tailed Skimmer is a common dragonfly across much of North America. Description: The male's chunky white body (about 5 cm long), combined with the brownish-black bands on its otherwise translucent wings, give it a checkered look. Females have a brown body, and are less noticeable, though they have a similar wing pattern. The Common Whitetail can be seen hawking for mosquitoes and other small flying insects over ponds, marshes, and slow-moving rivers in most regions except the higher mountain regions. Orthoptera Romalea guttata (Eastern lubber grasshopper) Where found: Found in the southeastern and south central portion of the United States. Description: The Eastern lubber grasshopper is the most distinctive grasshopper species within the southeastern United States, and is well known both for its size and its unique coloration. Phasmatodea Phasmatodea (Walking Sticks) Order: Phasmatodea Description: The Phasmatodea are an order of insects, whose members are variously known as stick insects (in Europe), walking sticks (in the United States of America), ghost insects and leaf insects (generally the family Phyliidae). The ordinal name is derived from the Greek "phasma" meaning an apparition or phantom, and refers to the resemblance of many species to sticks or leaves. Some species (e.g. Anisomorpha) are capable of secreting a substance from glands on the metathorax that can cause an intense burning irritation of the eyes (and in some cases temporary blindness) and mouth of potential predators on contact. Blattodea Blattodea (Cockroach) Order: Blattodea Description: Cockroaches (or simply "roaches") are insects of the order Blattodea. This name derives from the Latin word for "cockroach", blatta. Among the most well-known species are the American cockroach, Periplaneta americana, which is about 30 mm (1 inch) long, the German cockroach, Blattella germanica, about 15 mm (1/2 inch) long, the Asian cockroach, Blattella asahinai, also about 15 mm (1/2 inch) in length, and the Oriental cockroach, Blatta orientalis, about 25 mm (3/4 inch). Tropical cockroaches are often much bigger, and extinct cockroach relatives such as the Carboniferous Archimylacris and the Permian Apthoroblattina were several times as large as these. Cockroaches are generally considered pests; however, only about 30 species (less than 1%) infest urban habitats. Isoptera Isoptera (Termite) Order: Isoptera Description: Termites mostly feed on dead plant material, generally in the form of wood, leaf litter, soil, or animal dung, and about 10% of the estimated 4,000 species (about 2,600 taxonomically known) are economically significant as pests that can cause serious structural damage to buildings, crops or plantation forests. Termites are major detrivores, particularly in the subtropical and tropical regions, and their recycling of wood and other plant matter is of considerable ecological importance. As social insects, termites live in colonies that, at maturity, number from several hundred to several million individuals. They are a prime example of decentralised, self-organised systems using swarm intelligence and use this cooperation to exploit food sources and environments that could not be available to any single insect acting alone. A typical colony contains nymphs (semi-mature young), workers, soldiers, and reproductive individuals of both genders, sometimes containing several egg-laying queens. Mantodea Mantodea (Mantis) Order: Mantodea Description: Mantises are notable for their hunting abilities. They are exclusively predatory, and their diet usually consists of living insects, including flies and aphids; larger species have been known to prey on small lizards, frogs, birds, snakes, and even rodents. Most mantises are ambush predators, waiting for prey to stray too near. The mantis then lashes out at remarkable speed. Some ground and bark species, however, pursue their prey rather quickly. Prey are caught and held securely with grasping, spiked forelegs ("raptorial legs"); the first thoracic segment, the prothorax, is commonly elongated and flexibly articulated, allowing for greater range of movement of the front limbs while the remainder of the body remains more or less immobile. Psocoptera Psocoptera (Booklice) Order: Psocoptera Description: Psocoptera are an order of insects that are commonly known as booklice, barklice or barkflies. They range in size from 1–10mm in length. The species known as booklice received their common name because they are commonly found amongst old books — they feed upon the paste used in binding. The barklice are found harmlessly on trees, feeding on algae and lichen. Thysanoptera Thysanoptera (Thrips) Description: Thrips (Order Thysanoptera) are tiny, slender insects with fringed wings (thus the scientific name, from the Greek thysanos (fringe) + pteron (wing)). Other common names for thrips include thunderflies, thunderbugs, storm flies, and corn lice. Thrips species feed on a large variety of sources both plant and animal by puncturing them and sucking up the contents. A large number of thrips species are considered pests, because they feed on plants with commercial value. Some species of thrips feed on other insects or mites and are considered beneficial, while some feed on fungal spores or pollen. So far around 5,000 species have been described. Thrips <|fim▁hole|> mm long or less) and are not good flyers, although they can be carried long distances by the wind. In the right conditions, many species can explode in population and swarm everywhere, making them an irritation to humans. Phthiraptera Phthiraptera (Lice) Order: Phthiraptera Description: As lice spend their whole life on the host they have developed adaptations which enable them to maintain close contact with the host. These adaptations are reflected in their size (0.5–8 mm), stout legs, and claws which are adapted to cling tightly to hair, fur and feathers, and that they are wingless and flattened. Lice feed on skin (epidermal) debris, feather parts, sebaceous secretions and blood. A louse's color varies from pale beige to dark grey; however, if feeding on blood, it may become considerably darker. A louse egg is commonly called a nit. Lice attach their eggs to their host's hair with specialized saliva which results in a bond that is very difficult to separate without specialized products. Living lice eggs tend to be pale white. Dead lice eggs are orangeish. Coleoptera Coleoptera (Beetles) Order: Coleoptera Description: Beetles are a group of insects which have the largest number of species. They are placed in the order Coleoptera, which means "sheathed wing" and contains more described species than in any other order in the animal kingdom, constituting about twenty-five percent of all known life-forms. Forty percent of all described insect species are beetles (about 350,000 species), and new species are frequently discovered. Estimates put the total number of species, described and undescribed, at between 5 and 8 million. Beetles can be found in almost all habitats, but are not known to occur in the sea or in the polar regions. They interact with their ecosystems in several ways. They often feed on plants and fungi, break down animal and plant debris, and eat other invertebrates. Some species are prey of various animals including birds and mammals. Certain species are agricultural pests, such as the Colorado potato beetle Leptinotarsa decemlineata, the boll weevil Anthonomus grandis, the red flour beetle Tribolium castaneum, and the mungbean or cowpea beetle Callosobruchus maculatus, while other species of beetles are important controls of agricultural pests. For example, coccinellidae ("ladybirds" or "ladybugs") consume aphids, scale insects, thrips, and other plant-sucking insects that damage crops. Strepsiptera Strepsiptera (Twisted-winged Parasites) Order: Strepsiptera Description: The Strepsiptera (known in older literature as twisted-winged parasites) are an order of parasitic insects with nine families making up about 600 species. Their hosts include bees, wasps, leafhoppers, silverfish, and cockroaches. Male Strepsiptera have wings, legs, eyes, and antennae, and look like flies, though they generally have no useful mouthparts. Females, in all families except the Mengenillidae, never leave their host and lack wings and legs. Males have a very short adult lifetime (usually less than five hours) and do not feed as adults. Many of their mouth parts are modified into sensory structures. Raphidioptera Raphidioptera (Snakefly) Order: Raphidioptera Description: Raphidioptera are characterized by having an elongate prothorax but no modification of the forelegs (as in Mantispidae). Females typically have a long ovipositor. The two extant families of snakeflies are the Raphidiidae and Inocelliidae. They are all predatory, both as adults and larvae, and in North America occur exclusively in the Western United States, but also occur throughout temperate Europe and Asia. They can be quite common. Megaloptera Megaloptera (Alderflies, Dobsonflies, and Fishflies) Order: Megaloptera Megaloptera, from the Greek words mega, meaning large, and ptera, meaning wing, undergo the most rudimentary form of complete metamorphosis among the insects (there are fewer differences between the larval and adult forms of Megaloptera than in any other order of insects), and their aquatic larvae dwell in fresh water, around which the adults also live. Females lay their eggs in large masses on vegetation that is proximate to water. The larvae are carnivorous, possessing strong jaws that they use to capture other aquatic insects. They grow slowly, taking several years to reach the last larval stage. When they reach maturity, the larvae crawl out onto land to pupate in damp soil or under logs. The short-lived adults emerge later to mate - many species never feed as adults, living only a few days or hours. The most well-known of the Megaloptera is probably the dobsonfly, in which males have tusk-like mandibles - but while formidable in appearance, they are relatively harmless to humans, as well as all other organisms. These huge mandibles, much like a peacock's feathers, serve no purpose other than to attract mates. Hellgrammites, which are dobsonfly larvae, are often used for bait. There are about 300 known species. Neuroptera Neuroptera (Net-winged insects) Order: Neuroptera Description: The insect order Neuroptera, or net-winged insects, includes the lacewings, mantidflies, antlions, and their relatives. The adults of this order possess four membranous wings, with the forewings and hindwings about the same size, and with many veins. They have chewing mouthparts, and undergo complete metamorphosis. The larvae of most families are predators. Many chrysopids eat aphids and other pest insects, and have been used for biological control (either from commercial distributors but also abundant and widespread in nature). Larvae in various families cover themselves in debris (sometimes including dead prey insects) as camouflage, taken to an extreme in the ant lions, which bury themselves completely out of sight and ambush prey from "pits" in the soil. Larvae of some Ithonidae are root feeders, and larvae of Sisyridae are aquatic, and feed on freshwater sponges. A few mantispids are parasites of spider egg sacs. As in other orders, there is a pupal stage, generally enclosed in some form of cocoon composed of silk and soil or other debris. Adults of many groups are also predatory, but some do not feed, or consume only nectar. Mecoptera Mecoptera (Scorpionflies) Order: Mecoptera Description: Mecoptera (from the Greek: meco- = "long", ptera- = "wings") are an order of insects with about 550 species in nine families worldwide. The Bittacidae, or hangingflies, are a prominent family of elongate insects known for their elaborate mating rituals, in which females choose mates based on the quality of gift prey offered by various males. Siphonaptera Siphonaptera (Flea) Order: Siphonaptera Description: Fleas are external parasites, living off the blood of mammals and birds. Fleas are small (1/16 to 1/8-inch (1.5 to 3.3 mm) long), agile, usually dark colored (for example, the reddish-brown of the cat flea), wingless insects with tube-like mouthparts adapted to feeding on the blood of their hosts. Their bodies are flattened side to side, permitting easy movement through the hairs or feathers on the host's body. Their legs are long, the hind pair well adapted for jumping (vertically up to seven inches (18 cm); horizontally thirteen inches (33 cm) - around 200 times their own body length, making the flea the best jumper out of all animals (in comparison to body size). The flea body is hard, polished, and covered with many hairs and short spines directed backward, allowing the flea a smooth passage through the hairs of its host. Fleas attack a wide variety of warm-blooded vertebrates including dogs, cats, humans, chickens, rabbits, squirrels, rats and mice. Fleas are a nuisance to their hosts, causing an itching sensation which in turn may result in the host attempting to remove the pest by biting, pecking, scratching etc the vicinity of the parasite. Fleas are not simply a source of annoyance, however. Some people and animals suffer allergic reactions to flea saliva resulting in rashes. Flea bites generally result in the formation of a slightly-raised swollen itching spot with a single puncture point at the center. The bites often appear in clusters or lines, and can remain itchy and inflamed for up to several weeks afterwards. Fleas can also lead to hair loss as a result of frequent scratching and biting by the animal, and can cause anemia in extreme cases. Besides the problems posed by the creature itself, fleas can also act as a vector for disease. For example, fleas transmitted the bubonic plague between rodents and humans by carrying Yersinia pestis bacteria. Diptera Diptera (Flies) Order: Diptera Description: The presence of a single pair of wings distinguishes true flies from other insects with "fly" in their name, such as mayflies, dragonflies, damselflies, butterflies, etc. It is a large order, containing an estimated 240,000 species of mosquitoes, gnats, midges and others, although under half of these (about 120,000 species) have been described. It is one of the major insect orders both in terms of ecological and human (medical and economic) importance. The Diptera, in particular the mosquitoes (Culicidae), are of great importance as disease transmitters, acting as vectors for malaria, dengue, West Nile virus, yellow fever and other infectious diseases. Lepidoptera Lepidoptera (Butterflies, Moths and Skippers) Order: Lepidoptera Description: Lepidopterans undergo complete metamorphosis, going through a four-stage life cycle: egg larva/caterpillar pupa/chrysalis imago/adult. The larvae, caterpillars, have a toughened head capsule, chewing mouthparts, and a soft body, that may have hair-like or other projections, 3 pairs of true legs, and additional prolegs (up to 5 pairs). Adults have two pairs of membranous wings covered, usually completely, by minute scales. In some species, wings are reduced or absent (often in the female but not the male). Antennae are prominent. In moths, males frequently have more feathery antennae than females, for detecting the female pheromones at a distance. 2. What are the distinguishing characteristics of an insect? Insects possess segmented bodies supported by an exoskeleton, a hard outer covering made mostly of chitin. The body is divided into a head, a thorax, and an abdomen. The head supports a pair of sensory antennae, a pair of compound eyes, and mouth parts. The thorax has six legs (one pair per segment) and wings (if present in the species). The abdomen (made up of eleven segments some of which may be reduced or fused) has respiratory, excretory and reproductive structures. 3. Name five species of injurious insects and tell how to control them. Many insects are considered pests by humans. Insects commonly regarded as pests include those that are parasitic (mosquitoes, lice, bedbugs), transmit diseases (mosquitos, flies), damage structures (termites), or destroy agricultural goods (locusts, weevils). Many entomologists are involved in various forms of pest control, often using insecticides, but more and more relying on methods of biocontrol. 4. Name five species of useful insects. Although pest insects attract the most attention, many insects are beneficial to the environment and to humans. Some pollinate flowering plants (for example wasps, bees, butterflies, ants). The silkworm has greatly affected human history, as silk-driven trade established relationships between China and the rest of the world. Fly larvae (maggots) were formerly used to treat wounds to prevent or stop gangrene, as they would only consume dead flesh. This treatment is finding modern usage in some hospitals. Adult insects such as crickets, and insect larvae of various kinds are also commonly used as fishing bait. 5. Tell two Bible stories in which insects played an important part. Exodus 8:21-31: God sent a plague of flies on Egypt. Exodus 10:1-18: God sent a plague of locusts on Egypt. Proverbs 6:6-8: The ant "stores its provisions in summer and gathers its food at harvest." Jonah 4:5-11: God used a worm (possibly an insect larva) to teach Jonah about His concern for people. Acts 12:20-23: King Herod was eaten by worms and died. References Wikipedia article on Insects <|fim▁end|> | are generally tiny (1 |
<|fim▁begin|> Miskitu Aisas! Miskito Language Course Lesson 7 8 Anira auma ki? > Next Contents Where are you going? Contents 1 Go, come, know and want 2 The negative 3 Past forms 4 Vocabulary and review Go, come, know and want Study What do they mean? KARLA: Where are you going? MARIA: I am going to the village. KARLA: I am going there too. Are you coming with me to the shop? MARIA: Yes, I'm coming with you. KARLA: What do you want from the shop? Do you know? MARIA: I don't know... I want food. My mother is coming to the house today. Do you know my mother? KARLA: Yes, I know your mother well! KARLA: Anira auma ki? MARIA: Tawan ra auna. KARLA: Yang sin bahara auna. Yang wal sap ra aulma? MARIA: Au, man wal aulna. KARLA: Sap wina dia want sma? Nu sma ki? MARIA: Nu apia sna... Plun want sna. Naiwa yaptiki utla ra aula. Yaptiki ra nu sma ki? KARLA: Au, yaptikam ra pain nu sna! Practice Fill in the blank using the correct form of the verb given: Yang Bilwi ra __________. (waia) Man yang wal __________ ki? (balaia) Man dia muni __________? (waia) Yang sap kum ra __________. (waia) Sap ra man dia __________? (want kaia) Yang diara __________. (want kaia - negative) Tuktiki buk kum kum __________. (want kaia) Yang tuktikam ra pain __________. (nu kaia) Witin buk nani __________. (laik pali kaia - like a lot) Answers Yang Bilwi ra auna. Man yang wal aulma ki? Man dia muni auma? Yang sap kum ra auna. Sap ra man dia want sma? Yang diara want apia sna. Tuktiki buk kum kum want sa. Yang tuktikam ra pain nu sna. Witin buk nani laik pali sa. Present tense forms of the irregular verbs waia go and balaia come: waia to go balaia to come 1 auna aulna 2 auma aulma 3, yawan auya aula A few common compound verbs have kaia to be as their second component, the first component being an English loan word. The present tense of three of these are shown here: nu kaia to know want kaia to want laik kaia to like 1 nu sna want sna laik sna 2 nu sma want sma laik sma 3, yawan nu sa want sa laik sa The negative Study What do they mean? KARLA: Is your father coming too? MARIA: No, he isn't coming. He is going to stay at home. KARLA: What are you going to buy in the shop? Do you want fish? MARIA: I'm not buying fish. My mother doesn't like fish. She doesn't eat fish. She only eats chicken. KARLA: Do you have any chickens at home? MARIA: No, I haven't got any chickens. KARLA: Aisikam sin aula ki? MARIA: Apia, witin balras sa. Witin utla ra takaskaisa. KARLA: Man sap ra dia atkaisma? Inska want sma ki? MARIA: Inska atkras sna. Yaptiki inska laik apia sa. Witin inska piras. Kalila wîna baman pisa. KARLA: Utla ra kalila kum kum brisma ki? MARIA: Apia, yang kalila kum sin briras. Practice Make negative: Yaptiki ra kaikisna. Buk kum plikisma. Witin kalila nani atkisa. Utla kum brisna. Naha want sna. Answers Yaptiki ra kaikras sna. Buk kum plikras sma. Witin kalila nani atkras sa. Utla kum briras sna. Naha want apia sna. As we saw earlier, the form of verbs in -ras is a negative participle. The various tenses and persons can be expressed in the negative by placing the corresponding form of kaia after -ras, so for example the negative present tense of daukaia to do (next to the affirmative for comparison) is: AFFIRMATIVE NEGATIVE 1 daukisna daukras sna 2 daukisma daukras sma 3, yawan daukisa daukras sa We can also use other tenses of kaia to form the corresponding negative tenses. However, the auxiliary kaia may be omitted leaving just the -ras-form; the intended person and tense must then be inferred from the context. Remember: kaia itself has no <|fim▁hole|> front of the affirmative forms to make them negative: apia sna/sma/sa. The same holds for compounds with kaia such as want kaia, nu kaia etc.: want apia sna and so on. The verbs piaia eat and briaia have belong to a special class: present pisna, brisna etc., negative priras, briras. Past forms Study What do they mean? The child played in the house. The child was playing in the house. The child didn't play/wasn't playing in the house. The child didn't/doesn't play in the house. This woman bought fish. This woman was buying fish. This woman didn't buy/wasn't buying fish. This woman didn't/doesn't buy fish. John saw some chickens. John could see (literally "was seeing") some chickens. John didn't/couldn't see any chickens. John didn't/doesn't see any chickens. Tuktan ba utla ra pulan. Tuktan ba utla ra puli kan. Tuktan ba utla ra pulras kan. Tuktan ba utla ra pulras. Mairin na inska atkan. Mairin na inska atki kan. Mairin na inska atkras kan. Mairin na inska atkras. Jan kalila kum kum kaikan. Jan kalila kum kum kaiki kan. Jan kalila kum sin kaikras kan. Jan kalila kum sin kaikras. Practice Put in the past tense, using the imperfect if possible: Tuktan ba utla ra pulisa. Witin kalila kum kum brisa. Aisiki inska want sa. Yaptiki inska atkras sa. Witin inska want apia sa. Witin tuktan ra kaikisa. Witin tuktan ra kaikras sa. Answers Tuktan ba utla ra puli kan. Witin kalila kum kum bri kan. Aisiki inska want kan. Yaptiki inska atkras kan. Witin inska want apia kan. Witin tuktan ra kaiki kan. Witin tuktan ra kaikras kan. As for the past tense, for now we shall limit ourselves to the third person, which as we know ends in -an in most verbs: pulan, atkan, kaikan etc. This may be called the simple past. There is also a compound past tense, the imperfect, formed by placing the past tense of kaia (kan in the third person) after the i-participle: puli kan, atki kan, kaiki kan. The i-form of verbs is already familiar to you as the base of the present tense of regular verbs, so if you remove the ending -sa from the present pulisa what you are left with is the verb's i-form: puli. The imperfect can often be translated by was playing, was buying etc. (or by the imperfect tense in Spanish, French etc., if you know a Romance language: thus puli kan is equivalent to jugaba, jouait and so on). The imperfect usually expresses an ongoing activity whereas the simple past expresses a specific act. The negative past is formed as you would now expect: the verb's -ras-form plus the past of kaia (kan in the third person): pulras kan. But once again, the auxiliary may be omitted: pulras. Compound kaia-verbs (want kaia, nu kaia etc.) form the past, as we would expect, using the past of kaia, e.g. want kan wanted, nu kan knew, want apia kan didn't want etc. Vocabulary and review Vocabulary Miskito vocabulary · English vocabulary · Abbreviations · Subject index briaia v have inska n fish kalila n chicken kalila wîna cpd n chicken meat laik kaia cpd v like naiwa adv today nu kaia cpd v know piaia v eat takaskaia v stay want kaia cpd v want Say in Miskito: Review I am not going to school today. (Yang) naiwa skul ra waras (sna). Today I am staying at home with my mother. Naiwa utla ra yaptiki wal takaskisna. The children went to school yesterday. Tuktan nani skul ra nahwala wan. I am going to town. Tawan ra auna. What do you want from the shop? Sap wina dia want sma? My father knew your father. Aisiki aisikam ra nu kan. Do you like chicken? (Man) kalila wîna laik sma? Where are you going to cook the food? Plun ba anira piakaisma ki? I don't know. Nu apia sna. He didn't eat the fish. Inska ba priras kan. Lesson 7 > Next Contents <|fim▁end|> | -ras-form; apia is placed in |
<|fim▁begin|> The Concept of Blended Learning The definition of blended learning With the advent of digital technology blended learning takes on new dimensions and merges the best features of conventional face-to-face instruction and online learning (Graham, 2006). Today’s framework of blended learning replete with various blends and models that makes it difficult for educators to concur with a single definition of blended learning (Graham, 2006; Procter, 2003). The most common definition of blended learning is a combination of face-to-face instruction combined with computer-mediated instruction to facilitate interactive and reflective higher-order learning (Graham, 2006). The types of blends Blended learning is about a mixture of instructional modalities, delivery media, instructional methods, and web-based technologies (Graham, 2006). Blends of instructional modalities usually include a balanced mixture of onsite, web-based, and self-paced learning (Martyn, 2004; Picciano, 2006; Rossett, Douglis, & Frazee, 2003). To make blended learning more powerful, educators can blend various media delivery types, for instance, classroom trainings, seminars, web-based courses, CD-ROMs, video, computer simulations, books, study guides, the Internet, PowerPoint slides, etc. (Bersin, 2003). In most cases, blended learning is designed with the use of synchronous and asynchronous web-based technologies, such as chat rooms, wikis, threaded discussions, virtual classrooms, instant messaging, conferencing tools, bulletin boards, computer conferencing, blogs, etc. (Graham, 2006). Some researchers believe that incorporation of new pedagogies, learning theories, and instructional methods transform conceptually models of teaching and learning in blended learning environments (Carman, 2005). The choice of a blend is usually determined by several factors: the nature of the course content and instructional goals, student characteristics and learning preferences, instructor experience and teaching style, online resources and others (Dziuban, Hartman, Moskal, 2005). The principles of blended learning methodology Through the literature review, four main principles of educational design for blended learning are identified: (a) a thoughtful integration of face-to-face and fully online instructional components; (b) innovative use of technology; (c) reconceptualization of the learning paradigm; and (d) sustained assessment and evaluation of blended learning . The first principle is intended to maximize the advantages of both environments and better address the diverse students’ needs and preferences (Carman, 2005; Martyn, 2003). The innovative use of technology means that any technology should be applied in a pedagogically appropriate way and used for creating and maintaining socially situated and highly interactive learning (Vaughan, 2007). A reconceptualization of the learning paradigm entails the incorporation of new pedagogies and learning theories (e.g., student-centered, social constructivism), the development of new understandings and knowledge through students’ social interactions with a community of peers, and new roles of students (e.g., active author of content, self-paced learner) and teachers (e.g., mentors, coaches) (Dziuban, Moskal, & Hartman, 2004). And, the fourth principle of sustained assessment and evaluation of blended learning solutions is aimed to ensure the quality of education (Graham, 2006). Benefits and challenges posed by blended learning Potential benefits of blended learning include pedagogical richness (shifting from a presentational format to active learning); greater access to personalized learning, to resources and experts; greater flexibility and persona agency; greater accommodation for learners and teachers of diverse backgrounds; increased interaction and sense of community; and increased cost-effectiveness (e.g., reduced seat time, decreased costs)(Albrecht, 2006; Dziuban, Moskal, & Hartman, 2004; Moore, 2004; Owston, Wideman, & Murphy, 2008; Picciano, 2006; Vaughan, 2007) Most universities face challenges to transform their instruction into a blended learning format. The four main barriers are identified: administrative challenges (lack of awareness, policies, plans, goals, support related to blended learning), re-designing courses and/or programs, faculty preparedness, and quality assurance (Cook, Owston, & Garrison, 2004; Dziuban, Moskal, & Hartman, 2004). In conclusion, it needs to be stressed that blended learning is not just a mixture of strategies and technologies, but a holistic didactical method that combines “the effectiveness and socialization opportunities of the classroom with the technologically enhanced active learning possibilities of the online environment, rather than ratio of delivery modalities” (Dziuban, Hartman, Moskal, 2004). References Albrecht, B. (2006). Enriching student experience through blended learning. ECAR Research Bulletin, 12. Bersin, J. (2003). What works in blended learning. Retrieved April 27, 2008 from http://www.learningcircuits.org/2003/jul2003/bersin.htm Carman, J. M. (2005). Blended learning design: Five key ingredients. Retrieved April 27, 2008 from http://www.agilantlearning.com/pdf/Blended%20Learning%20Design.pdf Cook, K., Owston, R. D., & Garrison, D. R. (2004). Blended Learning Practices at COHERE Universities. (Institute for Research on Learning Technologies Technical Report No. 2004-5). Toronto, ON: York University. Dziuban, C. D., Hartman, J. L., & Moskal, P. D. (2004). Blended learning. ECAR Research Bulletin, 7. Retrieved April 27, 2008 from http://net.educause.edu/ir/library/pdf/erb0407.pdf Dziuban, C. D., Hartman, J. L., & Moskal, P. D. (2005). Higher education, blended learning and the generations: Knowledge is power – no more. In J. Bourne and J. C. Moore (Eds.), Elements of Quality Online Education: Engaging Communities. Needham, MA: Sloan Center for Online Education. Graham, C. R. (2006). Blended learning systems: Definition, current trends, and future directions. In C. J. Bonk and C. R. Graham (Eds.), Handbook of Blended Learning: Global Perspectives, Local Designs. San Francisco, CA: Pfeiffer Publishing. Martyn, M. (2003). The hybrid online model: Good practice. Educause Quartely, 1, 18-23. Moore, J. C. (2004). ALN principles for blended environments: A collaboration. The Sloan Consortium. Retrieved April 27, 2008 from http://www.sloan-c.org/publications/books/alnprinciples2.pdf Picciano, A. G. (2006). Blended learning: Implications for growth and access. Journal of Asynchronous Learning Networks, 10(3). Procter, C. (2003). Blended learning in practice. Proceedings of Conference on Education in a Changing Environment 2003. Salford, UK: The University of Salford. Rossett, A., Douglis, F., & Frazee, R. V. (2003). Strategies for building blended learning. Retrieved April 27, 2008 from http://www.learningcircuits.org/2003/jul2003/rossett.htm Vaughan, N. (2007). Perspectives on blended learning in higher education. International Journal on E-Learning, 6(1), 81-94. Blended Learning in the Workplace Adult Learning Theories Adult learners in the workplace have very specific learning needs. Knowles, the father of adult learning, posited that adults preferred learning when learning is relevant, self-directed, experienced based, problem based (rather than subject based) and delivered in a social context. (Knowles, 1990) Experiential learning theorist Kolb, postulated that adult learning occurs in a cyclical pattern, where the learning takes place through the steps of experience, reflection, conceptualization and then application in the workplace. (Kolb, 1984) Finally, research by Wenger on learning as social participation, suggests that the social context of learning is important to adults. (Wenger, 1998) These three theories establish the backbone of workplace course design today and are the basis for the interest in blended learning. Organizational Drivers and Needs for Blended Learning Workplace training evolves as employers continuously seek ways to optimize their training investments. In the development of his Learning Management Maturity Model, Moore noted that companies mature through the stages of the learning management process. Least mature companies are at an ad hoc level, and develop through managed-learning, competency-driven learning, integrated-performance and end at the highest level of maturity, an optimized-workforce. He explained that organizations have various degrees of sophistication in how they plan, direct, and account for resources, participants and outcomes of learning activities within their learning management systems.(Moore, 2003) Because organizations are at different maturity levels they require different learning solutions. Workforce size, budget, geographical location, organizational performance objectives, learning content and learners’ individual needs dictate learning design.(Singh and Reed, 2001) Benefits of Blended Learning Adult learning principles, organizational maturity and advances in technology collectively point to blended learning as in increasingly optimal method for workplace learning. Numerous studies have demonstrated that blended learning can outperformed instructor-led and e-learning programs in accuracy and speed of job performance. (Thompson Job Impact Study, 2003) Blended learning can capitalize on adult learning needs and workplace maturity by providing self-directed, relevant experiential learning, social interaction, and access to knowledge, at the same time as being cost effective and efficient. For the organization, blended learning can also extend the reach of the program, optimize development costs and time and accelerate the dissemination to knowledge to vital channels.(Singh and Reed, 2001) Basically, blended learning can deliver workplace learning to the organization and the learner in a highly flexible and customized manner. Strategic Blending: A conceptual framework In the context of optimizing organizational performance while engaging the learner, Yoon and Lim redefine blended learning as Strategic Blended-Learning and Performance Solutions. They suggest that this type of blended learning is: “…a purposeful mix of delivery media (particularly face-to-face and various forms of technologies) to improve learning/performance solutions which are derived from the goals and needs of an organization.” (Yoon and Lim, 2007) Yoon and Lim design a conceptual framework that considers five interrelated phases that form a strategic connection between the goals and needs of an organization, performance solutions and delivery methods (instructional and non-instructional). The five procedural phases include: 1) Strategy and needs analysis - In this phase long term business and human resource strategies are reviewed, along with tasks, employee needs, work systems, costs and benefits and existing technology infrastructure. 2) Performance solutions – Both instructional and non-instructions modes of learning reinforcement are considered at this phase. Non-instructional techniques might include feedback, reward systems, resources or institutional support. Based on the performance objectives of the organization; learning theories and component display theory point to the balance of face-to-face vs technology that should be employed in the blended learning strategy. 3) Delivery media – It is at this point of the process that the specific e-learning technologies and face-to- face learning design techniques are identified. The authors use the e-learning structures identified by Driscoll (Driscoll, 2002) and Rossett (Rossett et al., 2003) to determine the right mix of approaches. 4) Strategic blending - Instructional effectiveness, budget, frequency of need, and learner expectations are considered at this phase in the context of the organization’s performance goals. 5) Evaluation and improvement – In this phase, the inputs and outputs of the strategic blended learning activity are evaluated. The solution would be evaluated on efficiency, effectiveness, cost and the ultimate achievement of the performance outcomes. (Yoon and Lim, 2007) Practical Application According to a 2003 survey of “Blended Learning Best Practices” by The Learning Guild, over 85% of organizations are using blended learning for the creation and/or delivery of educational content. The experience of respondents has been positive, with more than 76% saying blended learning was more effective than classroom training, and 73% suggesting that blended learning had a higher learner value/impact than non-blended processes. Over 36% of the respondents used 6 to 10 different components in their blended program. The top five components were classroom instruction, interactive web-based training, email communication, self-paced content, and threaded discussion. (The Learning Guild, 2003) Conversely, survey respondents indicated that their top five obstacles to implementing blended learning were lack of budget, choosing the right strategy, lack of senior management buy-in, inability of developers and/or trainers, and inadequate technical infrastructure. Summary Blended learning is a widely used and effective method of workplace training in companies with mature learning management systems. It is more effective than classroom training and meets the needs of adult learning styles. To optimize its impact it should be tied to the organization’s strategic performance goals. Over time, as costs decrease and awareness of these systems increase, it is likely that blended learning will become the mainstay for workplace training. Bibliography Driscoll, M. (2002). Web-based training: Creating e-learning experiences. 2nd Edition. San Francisco: Jossey-Bass. Kolb, D. (1984). Experiential learning: experience as the source of learning and development. Eaglewood Cliffs, NJ: Prentice Hall. Knowles, M.S. (1990). The adult learner. A neglected species. 4th edition. Houston, Texas:Gulf Publishing. Moore, C. (2004). Using models to manage strategic learning investmens. Retrieved May 19, 2008 from http://www.clomedia.com/content/templates/clo_feature.asp?articleid=579&zoneid=31 Rossett, A., Douglis, F., & Frazee, R. (2003). Strategies for building blended learning. ASTD Learning Circuits Retrieved May 5, 2008, from http://www.learningcircuits.org/2003/jul2003/rossett.htm The Learning Guild (2003). The Blended Learning Best Practices Survey. Retrieved May 19, 2008 from http://www.elearningguild.com/research/archives/index.cfm?action=viewonly2&id=10&referer=http%3A%2F%2Fwww%2Eelearningguild%2Ecom%2Fsearch%2Ecfm Thomson Job Impact Study (2003). The next generation of corporate learning. Training and Development, 57 (6), 47. Singh, H. and Reed, C. (2001). A White Paper: Achieving Success with Blended Learning. Centra Software White Paper Series. Retrieved May 19, 2008 from www.centra.com/download/whitepapers/blendedlearning.pdf Wenger, E. (1998). Communities of practice: learning, meaning and identity. Cambridge, UK: Cambridge University Press. Yoon, S-W and Lim, D.H. (2007). Strategic blending: a conceptual framework to improve learning and performance International Journal on E-Learning, 6(3), 475-489. Blended Learning in the EFL Setting Blended Learning Definitions for EFL Blended learning is a relatively new ‘pedagogical’ approach to instruction. In the English as a foreign language (EFL) setting blended learning (BL) is only just beginning to take stride. There are many definitions of BL but at the core of all the BL definitions implies a combination of face-to-face and online as components of the pedagogy (Graham, 2006). In the EFL setting social interaction is needed to facilitate language outcomes (Vygotsky, 1987). Therefore, blended learning in the EFL setting can be defined as a pedagogical approach that combines the effectiveness and socialization opportunities of the classroom with the technologically enhanced active learning possibilities of the online environment (Dziuban, Hartman, Moskal, 2004). What are the learners’ needs teachers should be aware of when implementing BL in the EFL setting? What are some constraints of BL that teachers need to understanding? How does the methodology enhance the learning and thus facilitate the students overcoming the constraints of the EFL setting? The Needs of the EFL Setting The EFL setting differs from the ESL setting in that most EFL countries the students have little or no access to the target language community (Cummins, 2001; Baker, 2000; Graddol, 2006). This means understanding of socio-pragmatic discourse, cultural understanding (Duff, P. & Uchida, Y. 1997) which affects literacy, speaking and listening, and exposure to literacy genres is limited or non-existent (Al-Jarf, 2006). Therefore, students’ who may be grammatically correct when speaking lacks experience with the proper meaning and context of the language. The EFL learner differs from the ESL learner in three important aspects: a) a lack of socio-cultural exposure b) the lack of chance to practice meaningfully (Oxford, 1990; Spada & Lightbown, 1996) c) the lack of high frequency exposure of English (Lee, K., 2000, O’Donnell, T.). As we will see later BL can eliminate or at least diminish many of these constraints. First, teacher awareness within this new pedagogy will be examined. Constraints for the Learners There are three areas that can constrain the learner and they are; the design and content of the program, the teacher training, and awareness of how the student is processing the new language learning environment. When designing a program the teacher should remember that the context of learning might not always be culturally appropriate for the students (Duff, P. & Uchida, Y., 1997). Another factor in the design of the program that needs consideration is for the standardizing of content and testing. The teacher needs to upgrade and learn technology skills. This is so they are aware of how to properly utilize the tolls so <|fim▁hole|> of the learning content and technology. A big mistake teachers should avoid is using technology for non-target reasons (das Neves Seesink, T., Dissertation, 2007). Finally teacher must become aware to check in with the students feelings about the programs (das Neves Seesink, T., Dissertation, 2007). Research has shown that sometimes e-learning produces anxiety in students (das Neves Seesink, T., Dissertation, 2007). Language learning is ultimately about communication therefore the teachers need to balance face-to-face with online so to avoid anxiety (Al-Jarf, 2006). Benefits of Blended Learning for the EFL learner One thing absent in the EFL setting is the target language culture. E-learning can allow access to target language culture through the use of YouTube videos, meaningful situational interacting videos, blogs, chat rooms etc. (Duff, P. & Uchida, Y. 1997). These ‘tools’ enable the EFL student to have more access to native speakers. Using tools such as blogging, wiki pages, and brainstorming aid the student with overcoming academic literacy issues (Al-Jarf, 2006).Not only can blended learning provide safe way to practice chatting without the fear of the native speaker presence. The distance created from the online atmosphere helps to relax the student’s research has found (Al-Jarf, 2006). This real life online exposure can enables strategy use in the process of reading and writing (Al-Jarf, 2006). Strategy use to solve a problem facilitates the increase in self-direct learning (Barenfanger, O., 2007). The 24 access nature of online learning coupled with the reality practice of face-to-face allows for more practice (O’Donnell, 2006). Researchers have found that the e-learning component of the blended course gives the student a chance to revisit lectures (Graham, C.,). Overall blended learning offers more affordances than constraints. Pitfalls of Blended learning that EFL Teachers Should Avoid When designing a blended learning program the needs of the students must be balanced with the outcomes expected by the institution. Teachers as good as they may be in the traditional classroom need further training so that implementation of the course is not hampered by a mismatch of content and technology. Finally the teacher and the students need to understand the collaborative nature of the new learning endeavor so that a balance will be struck and motivation to learn will remain. References: Al-Jarf, R. (2006) Impact of Blended Learning on EFL College, Riyadh: Readers, King Saud University. Baker, C. (1991). Foundations of Bilingual Education. Clevedon: Multilingual Matters. Barenfanger, O. (2005) Learning management: A new approach to sturcturing hybrid learning arrangements. Electronic Journal of Foreign Language Teaching, 14-35. Cook, K., Owston, R. D., & Garrison, D. R. (2004). Blended Learning Practices at COHERE Universities. (Institute for Research on Learning Technologies Technical Report No. 2004-5). Toronto, ON: York University. Cummins, J. (2001). An Introductory Reader to the Writings of Jim Cummins (C.Baker & N. Hornberger, eds) Clevedon: Multilingual Matters. Das Neves Seesink, T. (2007), Using Blended Instruction to Teach Academic Vocabulary Collocation: A Case Study. Dissertation submitted to College of Education University of West Virginia. Dziuban, C. D., Hartman, J. L., & Moskal, P. D. (2004). Blended learning. Research Bulletin, 7. Retrieved April 27, 2008 from http://net.educause.edu/ir/library/pdf/erb0407.pdf Graddol, D. (2007). English Next- Why Global English may mean the end of 'English as a Foreign Language'. London: British Council. Heinze, A. & Procter, C. (2008) ; Reflections On The Use Of Blended Learning. Lightbown, P. & Spada, N. (1996) How Languages are Learned. Oxford: Oxford University Press. Martyn, M. (2003). The hybrid online model: Good practice. Educause Quartely, 1, 18-23. O'Donnell, T. (2004)Learning English as a Foreign Language in Korea: Does CALL have a place?, Asian EFL Journal,1-27 Lee, K. (2000). English Teachers’ Barriers to the Use of Computer-assisted Language Learning. The Internet TESL Journal, 6(12). Retrieved May 23, 2005 from http://iteslj.org/Articles/Lee-CALLbarriers.html. Lee, S. (2000). Teaching writing using a bulletin board on the Internet: A preliminary study. English Teaching, 55(3), 171-191. Oxford, R. & Shearin, J. (1994). Language learning motivation: Expanding the theoretical framework. The Modern Language Journal, 78, 12-28. Duff, P.A.& Uchida, Y. (1997) The Negotiation of Teachers' Sociocultural Identities and Practices in Postsecondary EFL Classrooms TESOL Quarterly, 451-486 Vygotsky, L. (1978). Mind in Society. Cambridge, Mass: Harvard University Press. Vygotsky, L. (1962). Thought and Language. Cambridge: The M.I.T. Press. External links "Autonomous Language Learning" A European Union, government funded, education project to build blended learning language courses in European less taught languages (Turkish, Romanian, Bulgarian and Lithuanian). "Tool for Online and Offline Language Learning" A European Union, government funded, education project to build blended learning language courses in European less taught languages (Dutch, Estonian, Hungarian, Maltese, Slovene). Common European Framework for Languages Blackboard Systems-Does The System Meet the Seven Principles of Good Practice in Education? Recently university EFL programs have been using blended learning to enhance the language learning experience. The majority of the university programs use course management systems. The most widely used of which is Blackboard (based on marketshare). Many have criticized these types of systems as being too mechanistic in their approaches to learning (Owston, 2008). Chickering,and Gamson,(1987) created an excellent list of principles with which to guide educators. In designing or revising a course, faculties are faced with at least three crucial decisions: what to teach, how to teach it, and how to ensure that students are learning what is being taught. Often, the most difficult step in preparing or revising a course is deciding which topics must be excluded if the whole is to be manageable (Davis, B. 1993, Tools for Teaching, San Francisco: Jossey-Bass Publishers, p. 1). This paper will not evaluate whether or not these course management systems are well constructed as this author doesn’t have sufficient technical knowledge. Rather, this paper will critique how the Blackboard management system can be used when applying the seven principles for the EFL University setting. First, a quick evaluation of the specific needs of the EFL situation while occur. EFL University Needs Language is essentially about communication therefore learning alone in a vacuum is not an ideal learning situation. Students who learn outside of the target language community are referred to as English as a foreign language learners (EFL). The greatest constraint in learning a language outside of the target language community is the lack of exposure to that community. It is difficult for the student if the only access to the target language community is the classroom teacher who is seen once a day or in some cases only once a week. Research has shown that, the student needs a high frequency of exposure. Learning a new item without being able to go back and practice in a meaningful way is not effective manner of teaching. This leads to the issue of practice in the EFL setting. It has been stated that a student needs 15,000 hours of exposure to meet the basic level or proficiency. Finally the last constraint the EFL learner must deal with is learning to solve their own problems through learning strategies. These are the major needs of the EFL setting. These constraints, when implemented properly by the teacher, may be assisted by blended learning. Blended learning provides various tools that can compensate for the various deficiencies in the EFL setting. Next there will be an examination based on the seven principles for good practice examination as to whether the teacher can utilize Black board so that all the EFL learners needs are met. One thing that is important for educators to remember is not how to use the tools but rather what teachers need to do to choose the most effective tools to bring out the learning outcomes desired. Contact The first principle is to encourage contact. In the past it has been discussed that even though blackboard is designed for communication there is no consistency as Proctor (2004) states: Lecturers and the way they interpreted blended learning on the individual modules. Simply using Blackboard instead of web pages to deliver the handouts and presentations and combining it with discussion boards resulted in some staff stating that we were not really doing any e-learning on the course which is a communication and support tool, it is not a learning tool.” (Reflections on the Use of Blended Learning, Education in A Changing Environment, 14th Conference Proceedings, p.6). Recently Blackboard training has tried to overcome this by including in the training section discussion rubics (see Appendix A). Handing this out to students will allow them to understand the importance of using the discussion boards as it is not just for fun. Chat groups and virtual chats can be defined and facilitated by the lecturer so that there is a meaningful outcome to using these features. For example one can assign students into chat groups. Within these groups there are specific topics to explore. Moreover the instructor could monitor and add components to guide the direction the conversation flows. This same technique is used during the conversation section of an ESL/EFL class. Later the information can be discussed in the F-2-F section of the class. This ensures people are processing the information chatted about as the student needs to relay again later. This also enhances the practice component by reusing the vocabulary learned or shared during the chat. Reciprocity and Cooperation How can the use of blackboard allow for the fostering of reciprocity and cooperation? On blackboard not only can you set up students as moderators but also grade their postings. For the EFL setting this allows the instructor to have the students work together. This is done by having the students take turns to moderate discussions. Also giving them netiquette allows them to understand the parameters of using the system (see appendix b). As stated in the netiquette page: “Facilitators should remind students that others may interpret their email, messages, and discussion posts differently due to the lack of physical contact during their communication. As a result, online communities have developed tools to assist members in sharing their facial expressions, emotional reactions, and other feelings” (Netiquette taken from Blackboard training session June, 6th, 2008) Teachers need to relay to students that the tools in communication should mirror human interaction and not to hide be hide the mechanistic framework of the tools. Active Learning Active learning is important. Teachers perceive Blackboard to encourage active learning with functional student centered flexibility. The problem with using digital technology is the lack of transparency of student effort. As discussed in Proctor (2004) they also believed that students abused the flexibility issue: I asked them to read things… they weren’t doing it. … Well that is then the nub of the course, it is the expectation of the student of what they [students] are expected to do [by a student centered course]. If they [students] think by coming in half as many hours a week as a traditional part-time course it is to do half as much work, we haven’t really achieved what we were initially trying to achieve. What we are expecting them to do is quite a bit more on their own, aren’t we? Using whatever resources we provide them. (p. 7) Yet a way to overcome this is to make learning not just giving activities but to discuss them in a group in the F-2-F setting. Facilitating discussion as to how the student felt, what they learned, what confused or frustrated them and informing the students that the activities will be assessed is important. Feedback Research has shown that feedback is essential in language learning (Spade & Lightbown, 1996). Therefore, EFL lecturers must remember to use this function effectively and consistently. Every time a student posts in a discussion correction by the teacher of content, structure, and form of the language is essential in aiding the students learning. After the posting the teacher is able to e-mail back the postee and discuss the necessary corrections needed. Emphasis on task Diligence in forcing students to spend the needed time for an activity is crucial in the success of blended learning. Blackboard has all types of functions that can allow the teacher to assign language activities. Teachers must be cognitive of implementing guidelines and parameters such as there must be 3 posting a week, group discussions must each contain at least written lines, and all on-line activities will be discussed in the F-2-F class. These parameters set up specific time to spend on a task. High Expectations For the EFL student this is important because practice and spending time communicating allows students to acquire language.Often students and teachers have preconceived expectations of what blended learning can accomplish. Teachers need to state what is expected of them upfront. Also in the face to face first meeting teachers should collaborate with the students to set up a contract of what is expected of the teacher and what is expected of the learner. This process eliminates misunderstandings created both by instructors and students of what and how blended learning works. Respect for ways of learning The final principle of encouraging respect of diverse ways of learning is hallmark in EFL pedagogy. This is a major component in language learning. Conclusion The black board program was analyzed for two things; first to see if teachers can instruct following the good practices framework, and also does blackboard have the ability to enable the teacher to facilitate students overcoming the constraints inherent in the EFL setting. My experience is that the technical tools do so but it is up to the teacher to become aware of the constraints hidden in technology and use good practices to avoid these pitfalls. For the EFL setting blended learning can be defined as a pedagogical approach that combines the effectiveness and socialization opportunities of the classroom with the technologically enhanced active learning possibilities of the online environment (Dziuban, Hartman, Moskal, 2004). This interactive socialization needs to be kept in mind when implementing a blended learning program. Relying just on the structure of a course management system such as blackboard would be a pedagogical mistake. Bibliography Chickering, A., & Gamson, Z. (1987). Seven Principles for Good Practice in Undergraduate Education. The American Association for Higher Education Bulletin. Cummins, J. (2001). An Introductory Reader to the Writings of Jim Cummins. (C. &. Baker, Ed.) Clevedon: Multilingual Matters Ltd. Dziuban, C. D. (2004). Blended learning. Toronto: from http://net.educause.edu/ir/library/pdf/erb0407.pdf. Graddol, D. (2007). English Next- Why Global English may mean the end of 'English as a Foreign Language'. London: British Council. Lightbown, P. a. (1996). How Languages are Learned. Oxford: Oxford University Press. Owston, R. conversation on May, 11th, 2008. Oxford, R. &. (1994). Language learning motivation: Expanding the theoretical framework. The Modern Language Journal, 78, 12-28. Procter, C. ( 2003). Blended Learning in Practice. Inaugural Education in a Changing Environment conference. Salford: University of Salford. Proctor, C. (2004). Reflections on the Use of Blended Learning. Education in A Changing Environment, 14th Conference Proceedings. Salford: University of Salford. <|fim▁end|> | to avoid a mismatch |
<|fim▁begin|> In Tamil, there are 30 characters. The Tamil alphabet has 12 vowels and 18 consonants. (The practise of taking the cartesian product of the vowels and consonants is widely seen. Their supporting argument is that when a consonant is used with a vowel it is a separate letter. But one cannot of course use any consonant without suffixing it with vowel!) The vowels are divided into short and long (five of each type) and two dipthongs. The consonants are classified into three categories with 6 in each category: vallinam - hard, mellinam - soft or nasal, and idayinam - medium. Unlike Devanagari, Tamil has neither conjunct consonants nor aspirated and voiced stops. Some scholars have suggested that in Sentamil (which refers to Tamil as it existed before Sanskrit words were borrowed), stops were voiceless when at the start of a word and unvoiced otherwise. However, no such distinction is observed by modern Tamil speakers. The script is sometimes called Vattezhuthu, literally "round writing". This characterstic has partly to do with the fact that in ancient times, writing involved carving with a sharp point on palm leaves (olaichuvadi) and it was apparently easier to produce curves than straight lines by this method. The script is syllabic, in the sense that each letter is a syllable. However, the signs for the syllables are derived from that of the inherent consonant; thus it is of the abugida type. Some syllables are written by modifying the shape of the consonant in a way that is inherent to the vowel, others are written by adding vowel-inherent suffix to the consonant, yet others a prefix, and finally some vowels require adding both a prefix and a suffix to the consonant. In every case the vowel symbol is different from the vowel standing alone. An overdot (see image) - equivalent to Devanagari sign virama - suppresses the inherent trailing a sound of the consonant sign - that is, it is a pure consonant. There are some lexical rules for formation of words. Some examples: a word cannot end in certain consonants, and cannot begin with some consonants including 'r' 'l' and 'll'; there are two consonants for the dental 'n' - which one should be used depends on whether the 'n' occurs at the start of the word and on the letters around it. Contents 1 The Tamil letters 1.1 Basic Consonants 1.2 Borrowed consonants 1.3 Vowels 1.3.1 Isolated Form 1.3.2 Compound Form 2 Tamil in Unicode 3 See also 4 References The Tamil letters Basic Consonants Consonants are also called the 'body' letters. Consonant Sound Category க ka vallinam ங nga mellinam ச cha vallinam ஞ nja mellinam ட tta vallinam ண nnna mellinam த tha vallinam ந na mellinam ப pa vallinam ம ma mellinam ய ya idaiyinam ர ra idaiyinam ல la idaiyinam வ va idaiyinam ழ zha idaiyinam ள lla idaiyinam ற rra vallinam ன nna mellinam Borrowed consonants Also called Grantha letters, these are used exclusively for writing words borrowed from Sanskrit, English, and other languages. Of course, not all such words include these letters. Consonant Sound ஜ ja ஷ sha <|fim▁hole|> are also called the 'life' or 'soul' letters. Together with the consonants (which are called 'body' letters, they form compound, syllabic (abugida) letters that are called 'living' letters (ie. letters that have both 'body' and 'soul'). Isolated Form Vowel Sound அ Short a or a ஆ Long a or aa இ Short i or e ஈ Long i or ee உ Short u or u ஊ Long u or uu எ Short e or ae ஏ Long e or aee ஐ Diphthong ai(considered as long too) ஒ Short o or o ஓ Long o or oo ஔ Diphthong au (considered as long too) Compound Form Using the consonant 'k' as an example. Compound Transliteration க் k க ka கா kaa கி ki கீ kii கு ku கூ kuu கெ ke கே kē கை kai கொ ko கோ koo கௌ kau Special letter ஃ (pronounced 'akh') is rarely used by itself - normally serves purely grammatical function as independent vowel form of the dot on consonants that suppresses the inherent 'a' sound in plain consonants. The long ('nedil') vowels are about twice as long as the short ('kuRil') vowels. The diphthongs are usually pronounced about 1.5 times as long as the short vowels, though some grammatical texts place them with the long ('nedil') vowels. As can be seen in the compound form, the vowel sign can be added to the right, left or both sides of the consonants. It can also form a ligature. These rules are evolving and older use has more ligatures than modern use. What you actually see on this page depends on your font selection. 'Code 2000' will show more ligatures than 'Latha'. There are proponents of script reform who want to eliminate all ligatures and let all vowel signs appear on the right side. Unicode encodes the character in logical order (always the consonant first), whereas legacy 8-bit encodings (like TSCII) prefer the written order. This is a problem in trans-coding these. Tamil in Unicode The Unicode range for Tamil is U+0B80 ... U+0BFF. 0 1 2 3 4 5 6 7 8 9 A B C D E F B80 ஂ ஃ அ ஆ இ ஈ உ ஊ எ ஏ B90 ஐ ஒ ஓ ஔ க ங ச ஜ ஞ ட BA0 ண த ந ன ப ம ய BB0 ர ற ல ள ழ வ ஶ ஷ ஸ ஹ ா ி BC0 ீ ு ூ ெ ே ை ொ ோ ௌ ் BD0 ௐ ௗ BE0 ௦ ௧ ௨ ௩ ௪ ௫ ௬ ௭ ௮ ௯ BF0 ௰ ௱ ௲ ௳ ௴ ௵ ௶ ௷ ௸ ௹ ௺ See also Brahmic family References Phonetics of spoken Tamil The Unicode book - South and Southeast Asian scripts (pdf file) Todo: list the vowels and consonants and describe them <|fim▁end|> | ஸ sa ஹ ha Vowels Vowels |
<|fim▁begin|> A file system is a way of organizing information on a physical drive or other media (e.g, RAM) for access. In general, file systems can be divided into several groups: Local file systems ‒ ext2/3, FAT32, NTFS Distributed file systems ‒ NFS, AFS Parrallel or cluster file systems ‒ GFS, PVFS, Lustre Some current file systems: File Allocation Table (FAT) NTFS ext4 JFS BFS HFS ReiserFS NTFS and FAT are used under Windows, while ext4 and ReiserFS tend to be used by Linux. A file system may be described by a set of characteristics: Ability to work with huge number of files/directories in a directory (e.g ReiserFS). Large files support ‒ some file <|fim▁hole|> Switching to 64-bits addressing solves the problem. Fragmentation ‒ NTFS quickly becomes fragmented, while ext4 doesn't. Fault tolerance ‒ compare e2fsck runs on dirty ext2 vs logging facilities of ext3 or ReiserFS. Scalability ‒ some file systems have limits on their disk sizes. Use of encryption/compression Charsets support ‒ for example, FAT does not allow use of some symbols in file names, while NTFS does. Long file names ‒ for ext4, 256 chars; FAT16 8+3 chars max This section discusses the key components to a file system and common problems that an operating system must deal with. It concludes with a discussion about some of the more popular file systems in use today. <|fim▁end|> | systems have 2-4G limit for this. |
<|fim▁begin|> English Transliteration Kannada Relatives nentaru ನೆಂಟರು Mother amma, taayi ಅಮ್ಮ, ತಾಯಿ Father appa, tande ಅಪ್ಪ, ತಂದೆ Son maga ಮಗ Daughter magalu ಮಗಳು Elder Brother anna ಅಣ್ಣ Younger Brother tamma ತಮ್ಮ Elder Sister akka ಅಕ್ಕ Younger Sister tangi ತಂಗಿ Grandfather ajja, taata ಅಜ್ಜ, ತಾತ Grandmother ajji ಅಜ್ಜಿ Husband ganda ಗಂಡ Wife hendathi ಹೆಂಡತಿ Maternal Uncle, Father In Law, Paternal Aunt's Husband maava ಮಾವ Paternal Aunt, Mother In Law, Meternal Uncle's Wife atte ಅತ್ತೆ Son In Law aliya ಅಳಿಯ Daughter In Law sose ಸೊಸೆ Father’s Younger Brother, Mother’s Younger Sister’s Husband chikkappa ಚಿಕ್ಕಪ್ಪ Mother’s Younger Sister, Father’s Younger Brother’s Wife chikkamma ಚಿಕ್ಕಮ್ಮ Father’s Elder Brother, Mother’s Elder Sister’s <|fim▁hole|> Father’s Elder Brother’s Wife doDDamma ದೊಡ್ಡಮ್ಮ Spouse’s elder brother, Elder sister's husband bhaava ಭಾವ Children makkalu ಮಕ್ಕಳು Spouse’s elder sister, Elder brother's wife attige ಅತ್ತಿಗೆ Husband’s Younger Brother maiduna ಮೈದುನ Spouse’s younger sister Naadini ನಾದಿನಿ Friend(Male), Friend(Female) geLeya, geLathi ಗೆಳೆಯ, ಗೆಳತಿ Friend(Male), Friend(Female) snehitha, snehithe ಸ್ನೇಹಿತ, ಸ್ನೇಹಿತೆ Friendship geLethana ಗೆಳೆತನ Orphan Anatha ಅನಾಥ Wife’s Sister's Husband. Shadka ಶಡ್ಕ Husband's Brother's wife. Vaaragitti ವಾರಗಿತ್ತಿ Wife's Brother. Baamaida, ಬಾಮೈದ, Great grand mother Muthajji ಮುತ್ತಜ್ಜಿ great grand father muttajja/muthaata ಮುತ್ತಜ್ಜ/ಮುತ್ತಾತ great grand daughter Mari-mommagalu ಮರಿ ಮೊಮ್ಮಗಳು great grand son Mari-mommaga ಮರಿ ಮೊಮ್ಮಗ grand son Mommaga ಮೊಮ್ಮಗ grand daughter Mommagalu ಮೊಮ್ಮಗಳು Husband's another wife Savati ಸವತಿ Younger brother’s wife ? ? <|fim▁end|> | Husband doDDappa ದೊಡ್ಡಪ್ಪ Mother’s Elder Sister, |
<|fim▁begin|> The thorax (commonly referred to as the chest) is superior to the abdomen and pelvis and anterior to the back. The Bones of the Thorax The thorax is made up of 12 ribs (on each side) and the sternum (the breast bone). Ribs The parts of the rib. The ribs are numbered I-XII starting at the top. They all attach to the thoracic vertebrae of the same number. The ribs slant down as they progress from the posterior to the anterior of the body with their respective cartilages slanting up to meet up with the sternum. Costa is the word used to refer to a rib and its cartilage together. The first seven ribs are called true ribs because they connect directly to the sternum. Ribs VIII through X are false ribs; they only indirectly attach to the sternum through the 7th rib's cartilage. The last two ribs are not associated with the sternum at all and are called floating ribs. The cartilage that attaches the ribs to the sternum is called costal cartilage and is composed of hyaline cartilage. Ribs articulate with an intervertebral disk and body of the cervical vertebrae. The section of the rib which articulates is called the head. After the head of the rib comes the neck, tubercle, angle, and body (sometimes referred to as the shaft) of the rib. The under side of the rib has a costal groove which provides space <|fim▁hole|> blood vessels. The space between ribs is knows as the intercostal space. This space (along with the costal cartilage) gives the rib cage enough flexibility to allow for breathing. The space also provides room for the intracostal muscles which aide in breathing. Sternum The sternum. The sternum is a flat, spear-shaped bone in the midline of thorax. It is found on the anterior of the body. The sternum is composed of the manubrium (superior), body, and xiphoid process (inferior). The manubrium is roughly half the length of the body of the sternum. The superior aspect of the manubrium has a slight curvature called the suprasternal notch. The clavicles (of the upper appendicular skeleton) attach laterally to the manubrium. This joint is called the sternoclavicular joint. It is also the only point where the pectoral girdle attachs to the axial skeleton. The inferior aspect of the manubrium has the manubriosternal joint, a movable joint that joins the manubrium to the body of the sternum. The xiphoid process attaches to the sternum via the xiphisternal joint. It is the smallest part of the sternum and can vary in shape and size depending on the individual. Because it is so small, it is fragile and can easily be broke during chest compressions if they are not done correctly. In most people, the xiphoid process remains cartilaginous until the middle ages. It serves as a point of insertion for abdominal muscles and ligaments. <|fim▁end|> | and protection for intercostal nerves and |
<|fim▁begin|> Blended Learning in K-12 ← General Comparisons in Blended Learning Self-paced and live Structured and Unstructured Learning → In blended learning, instructors use facets of self-paced instruction and live, collaborative learning to moderate the offline setting. Self-paced learning is an instructional tool where the learner is in control and manages the pace of learning. (Singh, 2001) The on-demand nature of self-paced learning makes it optimal for the offline atmosphere of blended learning. Here, learners not only control the pace of instructional information, but they also do not face the time restrictions of a face-to-face classroom. The use of the Internet and the World Wide Web allows learners to have access to information at all times. Generally, the responsibilities of self-paced learning are consistent with the instruction of a face-to-face traditional classroom. The instructor is responsible for supplying the instructional material, and the learner is responsible for reading, comprehending, and familiarizing him/herself with the material. Self-paced instruction will often come in the form of asynchronous formats including: Documents & <|fim▁hole|> Assessments Surveys Simulations Recorded lectures, discussions, or live events Online Learning Communities and Discussion Forums (Singh, 2001) Collaborative learning is a process where learning takes place through group or cooperative efforts. (Hiltz, 1999) A live, collaborative learning environment depends on dynamic communication between learners that fosters knowledge sharing. (Singh, 2001) In live, collaborative learning atmospheres the communication process between learners is just as meaningful and vital as an educational end product. Collaborative learning emphasizes the following factors: active participation and interaction among learners knowledge viewed as a social construct environments that facilitate peer interaction, evaluation, and cooperation learners who benefit from self explanation when more experienced or knowledgeable learners contribute learners who benefit from internalization by verbalizing in a conversation (Hiltz, 1999) Hiltz, Starr. "Impacts of College-Level Courses via Asynchronous Learning Networks: Some Preliminary Results". Journal of Asynchronous Learning Networks. Volume 1, Issue 2. August 1997. <www.sloan-c.org/publications/jaln/v1n2/v1n2_hiltz.asp> Singh, Harvi and Chris Reed. “A White Paper: Achieving Success with Blended Learning.” Centra White Paper. October 2, 2005. 2001. <http://www.centra.com/download/whitepapers/blendedlearning.pdf > <|fim▁end|> | Web Pages Web/Computer Based Training Modules |
<|fim▁begin|> center|Image attribution About Introduction Prehistoric times Stone Age Bronze Age Imperial years Qin to Southern Dynasty Tang and Southern Han Song and Yuan Ming and Qing Colonial days Early days 1860–1898 New Territories taken The Revolution Modern age Educational reforms Political reforms Epilogue Appendices →Index ← Glossary Bibliography This is an index of terms, people, events, etc., that were mentioned in the book. Term Chapter Alexander the Great Prehistoric times (1, 2) Baiyue culture Prehistoric times > Stone Age Big Wave Bay Prehistoric times > Stone Age Caesar, Julius Prehistoric times Cheung Chau Prehistoric times > Stone Age Eastern Jin Imperial years Fuklos, the Imperial years Five Dynasties and Ten Kingdoms Imperial years Hakkas, the Imperial years Han Dynasty Imperial years Hoklos, the Imperial years historic times Prehistoric times Lamma Island Prehistoric times > Stone Age Legislative Council Introduction Ma Wan Prehistoric times > Stone Age Ma Wan people Prehistoric times > Stone Age mesolithic Prehistoric times Metal Ages Prehistoric times Middle Stone Age, the Prehistoric times Mind Dynasty Imperial years neolithic Prehistoric times <|fim▁hole|> times Northern and Southern Dynasties Imperial years Northern Song Dynasty Imperial years Old Stone Age, the Prehistoric times Opium Wars Introduction (1, 2) paleolithic Prehistoric times Patten, Chris Introduction prehistoric times, the Prehistoric times Po Toi Island Prehistoric times > Stone Age primary source Introduction Puntis, the Imperial years Qujiang Prehistoric times > Stone Age Qing Dynasty Imperial years Qin Shihuangdi Prehistoric times rock carvings Prehistoric times > Stone Age Sai Kung Prehistoric times > Stone Age Sha Ha Prehistoric times > Stone Age Sham Wan Prehistoric times > Stone Age secondary source Introduction Shang Dynasty Prehistoric times Song Dynasty Imperial years Southern Song Dynasty Imperial years Stone Age, the Prehistoric times Sui Dynasty Imperial years Tang Dynasty Imperial years Tang of Shang Prehistoric times Tankas, the Imperial years Three Kingdoms Imperial years Tuen Mun Imperial years Tung Lung Island Prehistoric times > Stone Age Western Jin Dynasty Imperial years Yang Jian Imperial years Yuan Dynasty Imperial years Zhu Jiang Prehistoric times > Stone Age Zhu Jiang Delta, the Prehistoric times > Stone Age <|fim▁end|> | New Stone Age, the Prehistoric |
<|fim▁begin|> Spinal stenosis is a medical condition in which the spinal canal narrows and compresses the spinal cord and nerves. This is usually due to the common occurrence of spinal degeneration that occurs with aging. It can also sometimes be caused by spinal disc herniation, osteoporosis or a tumor. In the cervical (neck) and lumbar (low back) region it can be a congenital condition to varying degrees. Spinal stenosis may affect the cervical, thoracic or lumbar spine. In some cases, it may be present in all three places in the same patient. Lumbar spinal stenosis results in low back pain as well as pain or abnormal sensations in the legs, thighs, feet or buttocks, or loss of bladder and bowel control. Contents 1 Diagnosis of stenosis 1.1 Bicycle test of van Gelderen 1.2 MRI (magnetic resonance imaging) 2 Stenosis of the cervical spine 2.1 Case 1: Undiagnosed cervical stenosis 2.2 Klippel-Feil syndrome 2.3 Stingers and cervical stenosis 2.4 Case 2: Athlete with stingers 3 Thoracic spine 3.1 Thoracic stenosis 3.2 Thoracic disc herniation 3.3 Case 3: Thoracic disc, college student 3.4 Case 4: Thoracic disc, lawyer 4 Degenerative spondylolisthesis with spinal stenosis 4.1 Case 5: Stenosis in spondylolisthesis 5 Spinal stenosis in ankylosing spondylitis 5.1 Case 6: Stenosis in ankylosing spondylitis 6 Surgical procedures 7 Results of treatment 7.1 Non-operative use of salmon calcitonin 7.2 Depression and surgery 7.3 Case 7: Depression 7.4 Results of surgery 7.5 Decompression without fusion 7.6 Case 8: Multiple surgeries 7.7 Decompression with lateral fusion 7.8 Case 9: Stenosis and vascular disease 7.9 Anterior interbody fusion 7.10 Case 10: Anterior interbody fusion 7.11 Decompression with instrumentation 7.12 Dartmouth study 7.13 Steroid epidural injections 7.14 Case 11: Steroid epidural injection 7.15 Case 12: Steroid injection in failed back syndrome 8 Failed surgery 8.1 Failure to return to work 8.2 Failure to relieve symptoms 8.3 Post op infection 8.4 Case 13: Post op infection 8.5 Recurrence of stenosis 8.6 Neuro-modulation techniques 9 Social Security Disability 10 References 11 See also 12 External links Diagnosis of stenosis Normal lumbar vertebra showing large, round spinal canal. Spinal stenosis began to be recognized as an impairing condition in the 1960s and 1970s. Porter et al. discovered that individuals who experience back pain and other symptoms are likely to have smaller spinal canals than those who are asymptomatic.[1] Rothman reported that a normal sized lumbar canal is rarely encountered in persons with either disc disease or those requiring a de-roofing (laminectomy) procedure.[2] The natural evolution of disc disease and degeneration lead to stiffening of the intervertebral joint. This leads to osteophyte formation -a bony overgrowth about the joint. This process is called spondylosis, and is part of the normal aging of the spine. This has been seen in studies of normal and diseased spines. Degenerative changes begin to occur without symptoms as early as 25–30 years. It is not uncommon for people to experience at least one severe case of low back pain by the age of 35 years. This can be expected to improve and become less prevalent as the individual develops osteophyte formation around the discs.[3] Lumbar vertebra showing central stenosis and lateral recess stenosis. A certain minority of patients will go on to develop spinal stenosis by the age of 60 years.[4] Plain x-rays of the lumbar or cervical spine may or may not show spinal stenosis. The definitive diagnosis is established by either CT (computerized tomography) or MRI scanning. Identifying the presence of a narrowed canal makes the diagnosis of spinal stenosis.[5][6][7][8] However, the diagnosis is based on clinical findings. Some patients can have a narrowed canal without symptoms, and do not require therapy. Stenosis can occur as either central stenosis - the narrowing of the entire canal, or foraminal stenosis - the narrowing of the foramen through which the nerve root exits the spinal canal. Severe narrowing of the lateral portion of the canal is called “lateral recess stenosis". The ligamentum flavum (yellow ligament), an important structural component intimately adjacent to the posterior portion of the dural sac (nerve sac) can become thickened and cause stenosis. The articular facets, also in the posterior portion of the bony spine can become thickened and enlarged causing stenosis. These changes are often called “trophic changes” or “facet trophism” in radiology reports. As the canal becomes smaller and resembles a triangular shape, it is called a "trefoil" canal. The normal lumbar central canal has a midsagittal diameter (front to back) greater than 13 mm., with an area of 1.45 square cm. Relative stenosis is said to exist when the anterior-posterior canal diameter between 10 and 13 mm. Absolute stenosis of the lumbar canal exists anatomically when the anterior-posterior measurement is 10 mm. or less.[9][10][11] The first symptoms of stenosis are bouts of low back or neck pain. After a few months or years, this may progress to pain that is described as claudicant pain or claudication. This is a sensation of not getting enough blood to the arms or legs. It occurs more frequently in the legs. The pain may also be radicular in nature, following the classic neurologic pathways. This occurs as the spinal nerves or spinal cord becomes increasing trapped in a smaller space within the canal. It can be difficult to determine whether pain in the elderly is caused by lack of blood supply or stenosis. Modern testing can usually differentiate between them.Sometimes, patients will have both vascular disease in the legs and spinal stenosis.[12][13][14][15] Bicycle test of van Gelderen In 1977, Dyck and Boyd[16] reported on the bicycle test of van Gelderen. The test has been intermittently reported in various places since then. It is a simple procedure in which the patient is placed upon a stationary bicycle, and asked to pedal. If the symptoms are caused by peripheral vascular disease, the patient will experience claudication (def: limping; experienced as a sensation of not getting enough blood to the legs), by pedaling the bicycle in any position. If the symptoms are caused by lumbar stenosis, symptoms will be relieved when the patient is leaning forward while bicycling. Despite the fact that diagnostic progress has been made with newer technical advances, the bicycle test remains a cheap and easy way to distinguish between claudication caused by vascular disease and spinal stenosis. Dyck and Boyd wrote in their 1977 article: The authors describe a simple clinical adjunct to the routine neurological examination of patients with intermittent cauda equina compression syndrome. The "bicycle test" helps exclude intermittent claudication due to vascular insufficiency and frequently confirms the relationship of posture to radicular pain. MRI (magnetic resonance imaging) MRI image showing stenosis of the lumbar spine. MRI findings of spinal stenosis failed to correlate with ability of patients to walk distances.[17] Despite this, MRI remains the best method of diagnosing and evaluating spinal stenosis of all areas of the spine, including cervical, thoracic and lumbar. Newer enhanced MRI techniques have been recently introduced which lead to improved visualization of cervical spondylotic myelopathy (degenerative arthritis of the cervical spine with associated damage to the spinal cord).[18][19][20][21][22][23][24][25][26] The finding of degeneration of the cervical spinal cord on MRI can be ominous. The condition is called myelomalacia or cord degeneration. It is seen as an increased signal on the MRI. In myelopathy (pathology of the spinal cord) from degenerative changes, the findings are usually permanent and decompressive laminectomy will not reverse the pathology. Surgery can stop the progression of the condition. In cases where the MRI changes are due to Vitamin B-12 deficiency, a brighter prospect for recovery can be expected.[27][28][29] The detection of spinal stenosis in the cervical, thoracic or lumbar spine confirms only the anatomic presence of a stenotic condition. This may or may not correlate with the diagnosis of spinal stenosis which is based on clinical findings of radiculopathy, neurogenic claudication, weakness, bowel and bladder dysfunction, spasticity, motor weakness, hyperreflexia and muscular atrophy. These findings, taken from the history and physical examination of the patient, along with the anatomic demonstration of stenosis with an MRI or CT scan establish the diagnosis. Stenosis of the cervical spine Anterior and posterior fusion of C4 to C6 of the cervical spine with metal implants (right). Although this was done for a C5 fracture (left), fusion for stenosis would be similar in appearance. The developmental anatomy and biomechanics of the upper cervical spine are unique in children. Congenital osseous anomalies in this region may be associated with an increased risk for subsequent neurological compromise from instability and/or spinal cord encroachment. In a review of the medical records and imaging studies of all children with anomalies of the upper cervical spine seen at his institution between 1988 and 2003, Holsalker found multiple bony and neurologic abnormalities in 79% of the patients. Many of these had been identified as having a named syndrome. The most common findings were spinal stenosis of the bony cervical canal, segmental instability and central nervous system abnormalities. Thorough examination and MRI exam of the cervical spine are recommended in such patients.[30] The sagittal (front to back) diameter of the cervical spinal canal is of clinical importance in traumatic, degenerative and inflammatory conditions. A small canal diameter has been associated with an increased risk of injury. More than 400 specimens from the Hamann-Todd Collection in the Cleveland Museum of Natural History were examined. From C3 to C7, the average diameter of the canal was 14.1 ± 1.6 mm. Stenosis was defined as <12 mm. Men had significantly larger cervical canals than women at all levels. Specimens from donors older than 60 years of age had significantly narrower canals than younger patients. There was no difference observed between black and white groups. The authors concluded that spinal stenosis of the cervical spine is common and usually is not diagnosed during life.[31] In a review of 108 patients with cervical spondylotic myelopathy who had been managed with anterior decompression and arthrodesis (fusion), it was noted that anterior cervical fusion was fairly reliable in providing relief of symptoms in the cervical spine. Operative treatment consisted of anterior discectomy, partial corpectomy (removal of part of the cervical vertebral body), or subtotal corpectomy at one or more levels, followed by placement of autogenous bone graft from the iliac crest or the fibula. Of 87 patients who had a pre-operative motor deficit, 54 had a complete recovery. A pseudoarthrosis (failure of fusion) developed in 16 patients. Recurrent myelopathy was rare, but when it occurred, it was related to a failure of the fusion and recurrence of stenosis at another level.[32] Case 1: Undiagnosed cervical stenosis The patient was a 46-year-old man referred to physical therapy for the treatment of low back pain that was present for the previous 10 months. Neurologic findings were significant, with upper and lower extremity hyperreflexia bilaterally and positive Romberg's test, Lhermitte's sign, and Hoffmann's sign. Due to the strong suspicion of spinal cord involvement, the physical therapist contacted the referring physician and recommended expedited cervical spine magnetic resonance imaging, which revealed severe central canal stenosis at C3-4 and C5-6, secondary to spondylotic changes, and altered spinal cord intensity consistent with myelomalacia (permanent damage to the cervical spinal cord). Despite a neurosurgeon's recommendations, the patient denied surgical intervention. It is recommended that physical therapists utilize screening questions regarding changes in sensation, strength, gait, and bowel and bladder function during the patient interview. A positive response to any of these questions should prompt the completion of a thorough neurological examination, including assessment and interpretation of pathological reflexes.[33] Klippel-Feil syndrome Klippel-Feil syndrome is associated with stenosis of the cervical spine. Mutations of the homeobox genes may be responsible for congenital osseous anomalies of the cervical spine. The findings of Klippel-Feil syndrome is associated with central cord syndrome in the participants of winter sports.[34] Congenital osseous anomalies of the cervical spine may herald congenital malformations of other organ systems, such as those of the kidney and heart. Most congenital anomalies of the cervical spine are innocuous and may go undetected throughout life. Translational instability of adjacent vertebral bodies in a congenitally stenotic cervical spinal canal has serious implications. No existing prognostic classification system can predict which patients with a congenital osseous anomaly of the cervical spine are at risk for future neurologic injury.[35] Stingers and cervical stenosis A “stinger” is a traumatic condition seen in American football players. It usually follows a severe blow to the head or neck in the course of play. The player experiences immediate pain, numbness and weakness in the upper extremities. Most are not permanent and will resolve in a matter of a few days or weeks. A study looked prospectively at American college football players to determine the risk of an initial stinger while considering the presence of cervical canal stenosis and each player’s position, playing time and body type. The data revealed a 7.7% incidence of initial stinger in the group. In these players, the seventh cervical vertebral level was the narrowest. The presence of spinal stenosis on an anatomic basis was not predictive of who would experience a stinger. Initial stingers were dependent on body habitus and position. Players who experienced multiple stingers did have a higher incidence of cervical stenosis.[36] Case 2: Athlete with stingers An 18-year-old male high school student showed great promise to obtain a college scholarship because of his sporting ability. During his senior year, while playing linebacker for the school football team, he experienced a vicious hit to the head. He immediately noticed marked pain in his right arm, followed by numbness. He continued to play, but the pain became so great that he was pulled in the second half. After two weeks, his pain had subsided to the point he could again play. It did not recur. When he attended college the next year, the stingers returned and were worse. He was referred to a spinal surgeon who ordered an MRI of the cervical spine. He was noted to have a small canal between C4 and C7. It was recommended that he not pursue a career in football, and that he should not continue to play college ball.[37] Thoracic spine Thoracic stenosis A report of the surgical treatment results for 7 patients (4 men, 3 women; mean age, 49 years) who presented with myelopathy caused exclusively by primary thoracic spinal stenosis, predominantly in the lower thoracic spine was submitted by Dimar, et al.,[38] (patients with concurrent ascending lumbosacral degenerative disease were excluded). All patients received extensive nonoperative treatment before referral to their center. Surgical treatment consisted of wide posterior decompression and instrumented fusion (5 cases), anterior vertebrectomy and fusion (1), and anterior vertebrectomy with autograft strut followed by wide posterior decompression and instrumented fusion (1). Five patients had significant improvement in myelopathy and were ambulating normally, 1 had modest improvement in ambulation, and 1 remained wheelchair-bound. All patients achieved solid radiographic fusions. Primary thoracic spinal stenosis should be considered in patients who present with isolated lower extremity myelopathy, particularly when no significant pathologic findings are identified in the cervical or lumbosacral spine. Expedient wide decompression with concurrent instrumented fusion is recommended to prevent late development of spinal instability and recurrent spinal stenosis. Thoracic disc herniation Drawing of a lumbar disc herniation which can cause a localized stenosis. Thoracic discs though rare are similar. Thoracic disc herniation is rare, while cervical and lumbar herniations are common. While most cervical and lumbar discs can be safely observed, a true thoracic disc herniation which produces symptoms is a neurosurgical emergency. Laminectomy with removal of the offending disc material is essential, and must be carried out as quickly as possible. Fusion of the segment involved remains controversial. Thoracic disc disease may be accompanied by arthritic symptoms in the lumbar and thoracic spine. A herniated disc can produce radicular pain in the intercostal region, or can present as a Horner syndrome. A true disc herniation can also present as an immediate onset of paralysis of the legs or loss of bowel and bladder function. The diagnosis is confirmed by CT or MRI of the involved spinal area. Often, disc herniations are found incidentally while looking for other pathology. If the disc is not producing any neurologic symptoms, it can be observed and does not need treatment.[39][40][41][42][43] Case 3: Thoracic disc, college student An 18-year-old male college student experienced the onset of paralysis while shooting pool in a local bar. He was 6 foot 3 inches tall and weighed 320 pounds. He was attending college on a football scholarship. The nurse-practitioner at the university was not sure what was wrong with him. He could not walk and was moved about in a wheelchair. He went back to his apartment where he stayed for three days. After that, he was referred to a neurosurgeon. An MRI showed a blockage of the mid-thoracic canal. The diagnosis was not obvious, but it appeared to possibly be a spinal tumor. He was taken to surgery where the spinal canal was opened and a large amount of swelling was found. Biopsy was sent for frozen section, which the pathologist reported was most likely a glioblastoma or astrocytoma. The wound was closed. Paralysis was complete below T6 by this time. The patient was referred to a cancer center. There, two weeks after the onset of paralysis, a second MRI was performed. Now the diagnosis of herniated thoracic disc was made. He was taken to surgery a second time where a disc was removed one level above the first surgery. The patient remained paralyzed below the level of T6 permanently.[44][45][46][47][48] Case 4: Thoracic disc, lawyer A 38 year old lawyer had been experiencing mid-thoracic pain and some numbness in the legs for several months. At first she thought it was due to stress and long hours. It became worse. Her family physician thought it might be due to diabetes mellitus, however work-up for this showed no such disease. She tried to ignore the problem. She was not obese, although she was about 20 pounds overweight. She decided her symptoms were due to this condition, so she joined a gym in an effort to lose weight. Her symptoms worsened. She awoke one morning completely numb in the legs. Her physician referred her to a spinal surgeon who diagnosed a herniated thoracic disc at T6 after an MRI of the thoracic spine. He recommended a discectomy with associated fusion. She decided to wait to see if her symptoms would get better, which they did. Two months later, during a jury trial, she experienced complete numbness in the legs, perineum and completely lost bladder function. At this time, she was rushed into surgery where the offending disc was removed and a fusion with metal rods was completed. She completely regained neurologic function within two weeks.[49][50][51][52][53] Degenerative spondylolisthesis with spinal stenosis L5 S1 Spondylolisthesis Grade II with forward slipping of L5 on S1 <50%. Forward displacement of a proximal vertebra in relation to its adjacent vertebra in association with an intact neural arch, and in the presence of degenerative changes is known as degenerative spondylolisthesis.[54][55] The term is derived from the Greek word spondylous for vertebra, and olisthesis meaning to slip or slide down a slippery incline. Degenerative spondylolisthesis narrows the spinal canal and symptoms of spinal stenosis is common. Of these, neural claudication is most common. Any forward slipping of one vertebra on another can cause spinal stenosis by narrowing the canal. If this forward slipping narrows the canal sufficiently, and impinges on the contents of the spinal column, it is spinal stenosis by definition. If there are associated symptoms of narrowing, the diagnosis of spinal stenosis is confirmed. With increasing age, the occurrence of degenerative spondylolisthesis becomes more common. The most common spondylolisthesis occurs with slipping of L4 on L5. Frymoyer showed that spondylolisthesis with canal stenosis is more common in diabetic women who have undergone oophorectomy (removal of ovaries). The cause of symptoms in the legs can be difficult to determine. A peripheral neuropathy secondary to diabetes can have the same symptoms as spinal stenosis.[56] Case 5: Stenosis in spondylolisthesis A 47-year-old salesman drove a car for more than 200 miles a day in the course of making his sales calls. He began to notice a sensation that he thought was related to lack of blood in his legs around 10 AM several days a week. After six months of increasing symptoms, he was referred to a spinal surgeon who diagnosed a Grade II spondylolisthesis at L5 S1. His symptoms had reached the point that he could no longer work. He underwent a decompressive laminectomy, reduction of the spondylolisthesis with a fusion and metal fixation. After six months, he was able to resume his activities as a salesman. After two years, he was no longer able to take long car trips, and found a job in an office. He filed a worker’s compensation claim, and after a long litigation, his spondylolisthesis was adjudged to have been caused or aggravated by his employment. The insurance carrier argued that the condition of spinal stenosis and spondylolisthesis were preexisting conditions, hence not compensable. The judge determined the company must “take the claimant worker as he is found.”[57][58][59] Spinal stenosis in ankylosing spondylitis Lumbar spine showing advanced ankylosing spondylitis which can lead to spinal stenosis. In a retrospective analysis of vertebral fractures in patients with ankylosing spondylitis, it was shown that 74% experienced some form of trauma. Of these, greater than 60% revealed vertebral fractures with some neurologic symptoms. Of these, a significant number went on to develop spinal stenosis. Paravertebral hematomas (blood clots) were accompanied by a higher incidence of other complications. Females were at greater risk of death from the complications.[60] Case 6: Stenosis in ankylosing spondylitis A 32-year-old teacher with ankylosing spondylitis developed intermittent pain and numbness in the legs after she delivered a child. At first, she ignored the problem, thinking it was a side effect of an epidural anesthetic administered during childbirth. The problem continued to worsen over the next year. A spinal surgeon examined her and found from the old medical records that she was positive for HLA-B27 antigen. During the previous year, she had a flare up of her condition with a sed rate of 80 mm/hour and an elevated C-reactive protein titer. Rheumatoid factor (RF) and anti-nuclear antibody (ANA) were negative. Blood sugar was normal, and there was no evidence of diabetes mellitus. She had been placed on anti tumor necrosis factor-alpha (anti-TNF-alpha) therapy of infliximab and etanercept about six months earlier, with a general decrease in symptoms. Recently, the problems with her legs had recurred. An x-ray of the pelvis demonstrated fused sacro-iliac joint (SI joints). Exam showed a diffuse patchy loss of sensation in the legs and perineum. There was not a radicular pattern in the loss. She kept rubbing her legs during the exam, stating there was not enough blood getting to them. Good peripheral pulses were noted with Doppler exam. MRI of the lumbar spine demonstrated marked stenosis of L2-3 and L5-S1. She underwent a successful decompressive laminectomy with resolution of her symptoms.[61][62][63][64][65][66][67] Surgical procedures Surgical versus non-surgical treatment of all spinal disorders remains controversial in most areas. Certain distinct schools of thought with their own studies, literature and justifications have developed concerning most areas of spinal disease. The treatment of spinal stenosis is less controversial than other conditions of the spine. Severe, impairing stenosis of the cervical or lumbar spine should be treated with surgery, although there is often considerable room for expectant and observant therapy for those who do not wish to undergo a surgical procedure. Surgical treatment revolves around a laminectomy of the involved area. This operation is sometimes called a “de-roofing” procedure because the overlying lamina (the “roof”) of the spinal canal is removed, thus relieving the stenosis. The idea is to give the contents of the spinal canal and the dural sac more room, thus relieving the stenosis.[68][69][70][71] Surgical failures most notably occur when scar tissue grows into the laminectomy area causing a “dural scar” or a “stenotic scar” which then can cause the same problem as the original stenosis. The other complication of the surgery is “destabilization” of the spine. In other words, the spine becomes unstable because some of its supporting ligaments have been removed by surgery in treating the underlying stenosis. To counter this problem, many different fusion procedures have been tried. These include: anterior fusion posterior fusion posterior lateral fusion combination of anterior and posterior fusion metal implants consisting of plates, screws, titanium cages and the like All these are variations on a theme which are intended to restore a stable spine. Results of treatment Non-operative use of salmon calcitonin Several investigators have examined the use of salmon calcitonin in non-operative treatment of spinal stenosis.[72][73][74][75][76][77][78][79][80][81][82] Many problems have been encountered in this modality. Bioavailability of calcitonin delivered by nasal spray has been difficult to test, and of high variability. If nasal calcitonin cannot be sufficiently delivered into the body, it tends to reinforce the general conclusion that calcitonin does not appear to have a role in conservative treatment of lumbar spinal stenosis. It has been observed that studies of calcitonin for treatment of stenosis have methodologic flaws.[83] Podichetty has recommended that it will be necessary to investigate the variation of the effect via different administration routes (subcutaneous or intra-nasally) and with a longer follow-up. Randomized trials are lacking and necessary to properly evaluate calcitonin in spinal stenosis.[84] Depression and surgery A study in Finland found that patients with spinal stenosis and depression had significantly less post-operative success and perception of improvement than patients without depression.[85] Case 7: Depression A 37-year-old male with a history of several major depressive episodes, requiring hospitalization for suicide attempts, had long standing complaints of back and leg pain. He had seen several spinal surgeons, who had diagnosed spinal stenosis, but none had recommended surgical intervention. He became obsessed that if he had surgery, he would become cured of his problems. Finally, a surgeon performed a decompressive laminectomy with fusion consisting of bone graft and metal implants. Instead of relieving his symptoms, the surgery did not help him and he only became worse. He experienced another major depressive disorder in the post operative course. His depression became all-consuming and he died from an overdose of narcotics six months after the surgery.[86] Results of surgery Lumbar spine stenosis is a common cause of radicular leg pain and neurogenic claudication in older adults. In a multicenter US Study, investigators compared surgical and nonsurgical care in patients who had experienced at least twelve weeks of symptomatic lumbar spinal stenosis without degenerative spondylolisthesis. The cohort of the study was randomized and included 289 patients who were assigned to either the surgical or non-surgical group. Of those who were assigned to the surgery group, only 67% eventually underwent surgery. The others declined. 43% of the non-surgical group opted to cross over into the surgery category. Over a period of two years, both groups reported a decrease in pain. The surgery group reported less pain, overall. Physical function and disability scores did not differ significantly in the two groups. Other studies have had similar results. The findings of these studies are not clear cut, but suggest that surgery offers more relief in some patients.[87] Surgery may not be optimal for all patients with spinal stenosis.[88] Dr. Sohail K. Mirza, M.D., Assoc. Professor at the University of Washington School of Medicine, remarked, 12–14 minutes into a downloadable video on a 17% complication rate and a 14% failure rate in lumbar fusions from one Swedish study.[89] In a study of spinal surgery for herniated nucleus pulposus (slipped disc), chronic low back pain, and spinal stenosis, it was found that the best results were found in stenosis patients. Disc surgery for a herniated nucleus pulposus gave marginal results. Surgery for chronic low back pain with no specific identifiable pathology is marginal at best. Spinal surgery in spinal stenosis, spondylolisthesis and instability had in comparison to other types of elective orthopedic surgery an outstanding better ability to improve the operated subject’s health-related quality of life than other types of elective orthopedic surgery.[90] Decompression without fusion L4-5 Spondylolisthesis Grade I with forward slipping of L4 on L5 <25%. Newer laminectomy techniques preserving the posterior elements do not lead to further progression. The reported success rates for decompressive surgery for stenosis vary greatly in the literature. Good to excellent results are noted in the immediate post op period up to about six months after the surgery. These results tend to deteriorate after about one year post op.[91][92][93][94][95][96] In a report of the outcome of 50 patients with degenerative lumbar spinal stenosis who were treated surgically by spinal decompression without fusion between 1984 and 1995, it was found that the length of pre-operative symptoms could predict the satisfaction of patients postoperatively. The longer the symptoms had existed pre-op, the worse the general result of the surgery. The mean age at the time of surgery was 59.9 years (45–77 years) and the mean follow-up was 11.6 years (6.1-17.2 years). Five patients had a concomitant spinal fusion. The outcome was rated as excellent in 23 patients, good in 13 patients, fair in 9 patients and poor in 5 patients. Patients with concomitant fusion had good to excellent results and were more satisfied, whereas patients with long-standing preoperative symptoms had poor to fair result and were less satisfied.[97] In 1992, Turner et al.[98] published a survey of 74 articles on the results after decompression for spinal stenosis. Good to excellent results were on average reported by 64% of the patients. There was, however, a wide variation in outcomes reported. There was a better result in patients who had a degenerative spondylolishesis. A similarly desigined study by Mardjekto et al.[99] found that a concomitant spinal arthrodesis (fusion) had a greater success rate. Herron and Trippi[100] evaluated 24 patients, all with degenerative spondylolisthesis treated with laminectomy alone. At follow-up varying between 18 to 71 months after surgery, 20 out of 24 (83%) patients reported a good result. Epstein[101] reported on 290 patients treated over a 25 year period. Excellent results were obtained in 69% and good results in 13%. Johnsson et al.[102] studied postoperative slipping after lumbar decompression without fusion. In the group with degenerative spondylolisthesis, progression of the slip occurred in 65% of the patients. However, this progression did not appear to influence the result of the surgery. At that time, a wide decompression with removal of the facets (facetectomy) was common. More recent studies have shown that preservation of the posterior elements in the spine does not lead to further progression of the spondylolisthesis in the majority of cases.[103][104][105][106] There is still no consensus regarding treatment of patients with stenosis.[107][108] Case 8: Multiple surgeries A 34-year-old female was involved in a motor vehicle accident with resultant low back and leg pain. She was diagnosed with lumbar stenosis by MRI. After nine months of expectant therapy, she did not improve. She underwent a decompressive laminectomy with excellent results for about two years. After that, her symptoms of leg and back pain returned. At three years after her first surgery, she underwent a second surgery to remove the scar tissue that had formed over the previous laminectomy area, and fusion. The second surgery was complicated by an undetected tear of the dural. This required a third surgery to repair the leak. By the time she was dismissed from the hospital from the second and third surgeries, she was taking morphine sulfate 80 mg. per day. She had recurrence of her symptoms at one month post op and remained significantly impaired and unable to resume employment.[109][110][111] Decompression with lateral fusion Patients with spinal stenosis and degenerative spondylosis (degenerative disc disease) or degenerative spondylolisthesis (degenerative disc disease with forward or backward slipping of one vertebra on another) may be candidates for a decompression and lateral fusion. This technique represents its own school of thought and has an extensive surgical literature. It involves placement of bone graft over the lateral vertebral processes (transverse processes), and may comprise some kind of internal fixation with metal implants.[112][113][114][115][116][117] In general, any patient who has a spinal stenosis can also be fused. Most patients with lumbar stenosis do not show signs of spinal instability. The lateral fusion may be combined with instrumentation such as pedicle screws or metal rods. Internal fixation with metal devices has been found to increase fusion rates[118][119][120][121] Decompression and lateral fusion is thought to be a safe procedure with a low complication rate. Decompression alone, or with fusion can be complicated by a dural tear, motor or sensory loss and infection.[122][123][124] Case 9: Stenosis and vascular disease A 72-year-old man had noticed he was unable to play nine holes of golf without developing severe pain in the legs. After about a year, he was unable to play, even if he rode in a golf cart. On exam, he was noted to have markedly advanced atherosclerotic vascular disease in his legs as well as a severe L4-5 stenosis of the lumbar spine. It was decided to perform a decompressive laminectomy. He had some improvement in his symptoms for about six months. Then his pain in the legs returned. At this time it was determined that his <|fim▁hole|> He underwent a vascular bypass on the left leg. This was successful in relieving his symptoms for about three years, although he continued to experience some element of pain in the right leg. This case demonstrates a situation in which both stenosis and peripheral vascular disease occurred concurrently in the same patient. Anterior interbody fusion The most extensive experience with anterior interbody fusion has been accumulated in the Japanese surgical literature. The anterior interbody fusion involves placement of bone graft into the anterior portion of the disc from a retroperitoneal approach. This requires surgery from the front of the abdomen or the flank. Adhesion of the peritoneum is a relative contraindication. It has been reported that patients can expect a satisfactory result up to about 65 years of age.[125][126][127] Anterior interbody fusion should be reserved for younger patients (those under 50).[128][129][130] Patients with osteoporosis have a poorer result. Degeneration of an adjacent segment can lead to greater degeneration after surgery. (This is a phenomenon noted in all fusions.) [131] Anterior fusion is not indicated for patients with multilevel involvement. Patients with single level involvement are the best candidates.[132][133] Satisfactory results have been reported in the range of 76% to 60% depending on the length of followup. A strict postoperative course is recommended, including up to three weeks in bed.[134] Case 10: Anterior interbody fusion 40 year old Japanese business man had severe pain and numbness in the legs. He was diagnosed with spinal stenosis of the lumbar spine. After he failed conservative therapy, an anterior spinal fusion was carried out at L4-5 and L5-S1 combined with a decompression. He was kept at strict bed rest for three weeks, then allowed slow progression of ambulation. At two years post op, he reported his symptoms were 95% improved. He continued to pursue his business career.[135][136][137] Decompression with instrumentation Spinal instrumentation can increase the fusion rate. Arguably, inclusion of a fusion procedure along with decompression has become accepted. Usage of metal instrumentation has remained controversial. Also correction of the slippage with reduction of the spondylolisthesis remains controversial. Such a reduction can be done only with some kind of metal fixation. Some authors recommend metal placement in recurrent surgery for failed stenosis procedures.[138] Instrumentation certainly improves the successful fusion rate, but there is no conclusive evidence that it improves the clinical outcome. Several studies have compared the role of instrumentation in improving fusion rates. Several of these have found an increased fusion rate with internal fixation.[139][140] In general, those with a higher fusion rate also report a greater functional capacity after the surgery. The potential complications of decompression and pedicle screw fixation include wound infection, dural tear and misplacement of the screws. Adjacent stenosis has been reported to occur in 42% of lumbar fusion patients treated with decompression and fusion.[141] Whitecloud found a similarly high rate of adjacent stenosis which was also associated with a pseudarthrosis (failure of fusion). Use of metal fixation reduced the rate of fusion failrue.[142] Patel found that adjacent stenosis occurred with greater frequency and earlier in patients with instrumental fixation.[143] Bony regrowth around the laminectomy may occur in up to 88% of cases with or without associated fusion. This can lead to failure of the surgery and recurrence of the stenotic condition.[144] Dartmouth study A large study under the auspices of Dartmouth Medical School found that surgery for stenosis was effective, but may not be justified based on cost. The Spine Patient Outcomes Research Trial (known by the acronym "SPORT”) done under the auspices of Dartmouth Medical School, but involving other institutions, reported favorable surgery outcomes over two years among patients with stenosis and without degenerative spondylolisthesis. The economic value of these surgeries is uncertain. Among 634 patients with stenosis, 394 (62%) had surgery. Most often this was a decompressive laminectomy without fusion. Stenosis surgeries improved health to a greater extent than nonoperative care. Among 601 patients with degenerative spondylolisthesis, 368 (61%) had surgery. Of this group, most had decompression with fusion (93%). The majority had instrumentation (78%). Degenerative spondylolistheiss surgeries significantly improved health versus nonoperative care. Costs for both decompressive laminectomy ($77,600 average; range $49,600 to $120,000) and laminectomy with fusion (average $115,600; range $90,800 to $144,900) were considered to be a hindrance in the total care of stenosis patients. The expenditure per patient may be difficult to justify, despite the apparent improvement of stenosis patients with surgery. In other words, the economic value of these surgeries is uncertain.[145][146] In another closely related study, 289 stenosis patients were enrolled in a randomized cohort, and 365 were enrolled in an observational cohort. At two years, 67% of the patients in the randomized cohort had undergone surgery, whereas 43% of those who were randomly assigned to receive non-surgical care had also undergone surgery. In the combined group, patients who inderwent surgery showed significantly more improvement in all primary outcomes than did patients who were treated non-surgically.[147] In a preliminary report to the one cited supra, the authors noted that management of degnerative spondylolisthesis with spinal stenosis is controversial. Surgery is widely used, but its effectiveness in comparison with that of non-surgical treatment has not been demonstrated in controlled trials. Surgical candidates from 13 centers in 11 US States who had at least 12 weeks of symptoms and image confirmed degenerative spondylolisthesis were offered enrollment in a randomized cohort or an observational cohort. Treatment was standard decompressive laminectomy with or without fusion, or usual non-surgical care. 304 patients were enrolled in the randomized cohort and 303 in the observational cohort. They concluded that in non-randomized as-treated comparisons with careful control for potentially confounding baseline factors, patients with degenerative spondylolisthesis and spinal stenosis treated surgically showed substantially greater improvement in pain and function during the two years than patients treated non-surgically.[148] In the four year follow-up of the SPORT/Dartmouth study, patients who underwent surgery for a lumbar disc herniation achieved greater improvement than nonoperatively treated patients in all primary and secondary outcomes except work status.[149] Steroid epidural injections In a study of steroid epidural injections, the authors noted that spinal stenosis is one of the three most common diagnoses of low back and leg symptoms which also include disc herniation and degenerative spondylolisthesis. Spinal stenosis is a narrowing of the spinal canal with encroachment on the neural structures by surrounding the bone and soft tissue. In the United States, one of the most commonly performed interventions for managing chronic low back pain are epidurual injections, including their use for spinal stenosis. However, there have been no randomized trials and evidence is limited with regards to the effectiveness of epidural injections in managing chronic function limiting low back and lower extremity pain secondary to lumbar spinal stenosis. The study found caudal epidural injections with or without steroids may be effective in patients with chronic function-limiting low back and leg pain with associated spinal stenosis in approximately 60% of patients.[150] Case 11: Steroid epidural injection 42 year old with spinal stenosis was injured on the job. He was lifting boxes while sorting inventory at a store. The boxes weighed about 30 pounds each. He experienced low back pain which then became a diffuse numbness in the legs. It persisted for two months. He was referred to a spinal surgeon who diagnosed multilevel stenosis between L2 and S1. He was given a series of steroid epidural injections over a three month period. These provided relief for about six months, but then his symptoms returned, when it was decided he should undergo an extensive decompression from L2 to S1.[151] Case 12: Steroid injection in failed back syndrome 38 year old male truck driver was injured when his truck inadvertently drove over a large pot hole which was about two feet deep. He experienced a jarring sensation in his back. This progressed to generalized leg pain. He was diagnosed with a stenotic segment at L3-4. After six months he underwent a surgical decompression. This relieved his symptoms for about six months. He returned to truck driving, when his symptoms returned. He underwent another surgical procedure with removal of scar from the previous laminectomy and posterior fusion with metal placement. He was never able to return to work, and developed a chronic pain syndrome with consumption of large amounts of prescribed narcotics on a daily basis. At three years post op, he was diagnosed with arachnoiditis of the lumbar spine. He was given a series of steroid epidural injections, but without any lasting benefit. Finally, he had a third surgery for placement of a spinal cord stimulator. This reduced his perception of pain by about 25%, but he continued with the same consumption of narcotics as before surgery. He was now diagnosed as a Failed Back Syndrome.[152][153][154] Failed surgery (See main article: Failed back syndrome or WikiBooks Neurology and Neurosurgery/Incomplete Spinal Cord Injuries/Failed Back Syndrome) Failure to return to work In a landmark Canadian study, Waddell et al. found that in the worker’s compensation system, once the threshold of two major spinal surgeries is reached, the vast majority of workers will never return to any form of gainful employment. Beyond two spinal surgeries, any more are likely to make the patient worse, not better. Very few studies in the worldwide surgical literature actually document return to work after spinal surgery, or lack thereof.[155] Failure to relieve symptoms The biggest risk of spinal stenosis surgery is that it might not be effective in relieving the symptoms. Compared to surgery for disc herniation and radiculopathy, spinal stenosis surgery has a greater effectiveness. The beneficial results of the surgical decompression may deteriorate with time. This can lead to a recurrence of symptoms, or the development of new ones. In the most common forms of degenerative stenosis, the pathology is characterized pathologically by degenerative hypertrophy of the facet joints, the vertebral body margins, thickening of the ligamentum flavum and narrowing of the discs with osteophyte formation.[156] The combined effect of these changes is a narrowing of the canal with leg pain, paresthesias, varying degree of back pain and limitation of walking distance with a good peripheral circulation. The lower limb pain is increased by bending forward. The incidence of unsatisfactory results after surgery for lumbar stenosis is not known. Despite studies which describe a “good” or “excellent” result, the parameters are not the same for different studies. Many studies rely upon a third party filling out a questionnaire. Some patients are lost to follow-up. Most studies never look at such important factors as “return to previous work”, “use of narcotics” or “ability to reenter the competitive work force”. Therefore, there is no correlation between reported results and ability to return to work.[157] Post op infection Post operative infection in the site of the dural canal is relatively infrequent, reported in the surgical literature to be 1% to less than 12%.[158][159][160][161][162][163][164][165][166][167][168][169][170][171][172][173] The longer the surgical procedure, and the more complicated, the greater the risk of infection. When it occurs, it is usually a devastating complication, if the space around the dural canal is involved, and will leave the patient with significant permanent impairment. Previous wound infection should be considered as a contraindication to any further spinal surgery, since the likelihood of improving such patients with more surgery is small.[174][175][176][177][178][179] Antimicrobial prophylaxis (giving antibiotics during or after surgery before an infection begins) reduces the rate of surgical site infection in lumbar spine surgery, but a great deal of variation exists regarding its use. In a Japanese study, utilizing the Center for Disease Control recommendations for antibiotic prophylaxis, an overall rate of 0.7% infection was noted, with a single dose antibiotic group having 0.4% infection rate and multiple dosage antibiotic infection rate of 0.8%. The authors had previously used prophylactic antibiotics for five to seven postoperative days. Based on the Center for Disease Control guidelines, their antibiotic prophylaxis was changed to the day of surgery only. It was concluded there was no statistical difference in the rate of infection between the two different antibiotic protocols. Based on the CDC guideline, a single dose of prophylactic antibiotic was proven to be efficacious for the prevention of infection in lumbar spine surgeries.[180] Case 13: Post op infection MRI showing localized stenosis at L2-3, L3-4 and L4-5. A 41-year-old welder fell approximately eight feet onto a concrete surface at a construction site where he was working. He landed on his back and buttocks. He immediately experienced low back pain and leg pain. He ignored it for the rest of the day. He tried to continue working, but over the next two weeks, his pain in the back became worse, and his legs began to go numb for several hours at a time. He filed a comp claim and was sent to the company doctor who referred him to a spinal surgeon. There, he was diagnosed with L2-3, L3-4 and L4-5 spinal stenosis. It was felt this had been a previously undiagnosed and asymptomatic condition which had been aggravated by the fall. Since his symptoms were not improving after a few months, a decompressive laminectomy was advised. He underwent the surgery. On the fourth post-op day, he spiked a fever of 102 degrees F. His white count was 13,500. He appeared in some distress. His sed rate was 110 mm/hour. His wound in the lumbar spine was red and draining pus. It had a foul, fecal odor to it. A diagnosis of wound infection was made, and he was returned to surgery where the wound was opened, drained and irrigated. Cultures grew methicillin sensitive staphylococcus aureus and streptopeptcoccus. Two more surgeries were necessary, along with a two month course of intravenous antibiotics. He was cured of the infection after two months. He continued to have sharp and unrelenting pain in his back and radiating into his legs. Severely impaired from his pain, at two years he was still unemployed and maintained on the oral narcotics morphine sulphate, 80 mg. per day supplemented with OxyContin and Percocet for breakthrough pain. He was now diagnosed as a Failed Back Syndrome.[181][182][183][184][185][186][187][188] Recurrence of stenosis Drawing of lumbar vertebra after decompressive laminectomy with scar covering the dural canal which can cause a new stenosis. It has been recognized for many years that spinal surgery can be complicated by recurrence of the same symptoms which originally provided the indications for the initial surgery. Decompressive laminectomy remains the mainstay of operative treatment for stenosis of the spine, whether it is combined with fusion or not. Failure of fusion can lead to a condition called pseudoarthosis. Repeat surgery to repair a pseudarthrosis has been documented in the surgical literature to be futile for decades. Despite this, there remains a school of thought which continues to recommend repeat surgery for repair of failed fusion.[189][190] There has never been an established link between pseudarthrosis and recurrent back pain.[191] Scar tissue frequently fills in the area of laminectomy creating a new stenotic condition. The nerve roots can become encased in scar tissue, causing new, painful symptoms. It has been long recognized that neurolysis (a surgery to remove the scar tissue from the dura and nerve roots) is futile, and will only lead to more scar tissue.[192][193][194][195][196][197] Recurrent or multiple surgeries in the lumbar spine quickly lead to successively worsening results. When surgery is carried out in the worker’s compensation system, it is even worse. [198] The development of arachnoiditis, a chronic and often non-specific inflammation of the epidural space can be particularly vexing to the treating physician. Recent studies have shown that cigarette smokers will routinely fail all spinal surgery, if the goal of that surgery is the decrease of pain and impairment. Many surgeons consider smoking to be an absolute contraindication to spinal surgery.[199][200][201][202][203][204][205] Nicotine appears to interfere with bone metabolism through induced calcitonin resistance and decreased osteoblastic function. It may also restrict small blood vessel diameter leading to increased scar formation.[206][207][208][209][210][211][212][213] Most Failed Back Syndrome patients who have had two or more surgeries will become chronic pain patients, addicted or habituated to heavy narcotics, unemployed and experiencing a limited social existence.[214][215][216][217][218] Neuro-modulation techniques A Spanish study noted that following lumbar disc surgery, or lumbar spine surgery in general, several chronic pain syndromes can result, either in the lumbar region or the lower limbs. The current indication for spinal surgery is to relieve chronic pain in the degenerative spine (degenerative disc disease and lumbar stenosis) which causes symptoms of pain in the legs. A review of the methodology of evidence based medicine shows that the use of spinal fusion, instrumentation, and decompression laminectomy have not answered the problem of chronic pain, despite more than 20 years experience. Neuro-modulation techniques described as spinal electronic stimulation techniques or injections in the dural sac. These may be of benefit in the chronic pain patient, as an alternative to more surgery, in the face of failed surgery.[219] Once the patient is deemed to need the placement of a neurostimulator, or a transcutaneous nerve stimulator (TENS), the condition is quite poor and highly impaired. The outlook for such patients is usually quite guarded.[220] Success rates for implanted neurostimulation has been reported to be 25% to 55%. Success is defined as a relative decrease in pain.[221] Social Security Disability Under rules promulgated by Titles II and XVI of the United States Social Security Act, spinal stenosis is recognized as a disabling condition under Listing 1.04 C. The listing states: "Lumbar pseudoclaudication, established by findings on appropriate medically acceptable imaging, manifested by chronic nonradicular pain and weakness, and resulting in inability to ambulate effectively, as defined in 1.00B2b." 1.00B2b states, "b. What we mean by Inability to Ambulate Effectively. (1) Definition. Inability to ambulate effectively means an extreme limitation of the ability to walk; i.e., an impairment(s) that interferes very seriously with the individual's ability to independently initiate, sustain, or complete activities. Ineffective ambulation is defined generally as having insufficient lower extremity functioning (see 1.00J) to permit independent ambulation without the use of a hand-held assistive device(s) that limits the functioning of both upper extremities. (2) To ambulate effectively, individuals must be capable of sustaining a reasonable walking pace over a sufficient distance to be able to carry out activities of daily living. They must have the ability to travel without companion assistance to and from a place of employment or school. Therefore, examples of ineffective ambulation include, but are not limited to, the inability to walk without the use of a walker, two crutches or two canes, the inability to walk a block at a reasonable pace on rough or uneven surfaces, the inability carry out routine ambulatory activities, such as shopping and banking, and the inability to climb a few steps at a reasonable pace with the use of a single hand rail. The ability to walk independently about one's home without the use of assistive devices does not, in and of itself, constitute effective ambulation." Note that the regulation is written specifically for lumbar stenosis. Inclusion of cervical stenosis requires either a meet or equal depending on the idiosyncrasy of the trier of fact in federal disability hearings.[222][223] References ↑ Porter, P. W., et al., J. Bone Joint Surg. 60 B:485-87, 1978 ↑ Rothman, R., and Simeone, F., p. 518, “The Spine”, W. B. Saunders Co., Philadelphia, 1982 ↑ Rothman, p. 518 ibid ↑ Kirkaldy-Willis, W. H., et al., Spine 3:319-28 ↑ Kirkaldy-Willis, W. H., et al., Clin Orthop. Rel. Res. 99:30-50, 1974 ↑ Lane, J. M., et al., Eur. Spine J. 12: (suppl 2):S147-54, 2003 ↑ Benoist, M., Eur Spine J., 12 (suppl 2):S86-89, 2003 ↑ Szapalski, M., Gunzburg, R., Eur. Spine. J. 12 (suppl 2):S170-75, 2003 ↑ Ullrich, C. G., et al., Radiology 134:137-43, 1980 ↑ Verbiest, H., Orthop. Clin. North Am. 6:177-96, 1966 ↑ Eisenstein, S., J. Bone Joint Surg. 59 B:173-80, 1977 ↑ Macnab, I., J. Bone Joint Surg. 53 A:663-70, 1971 ↑ Macnab, I., J. Bone Joint Surg. 53 A: 891-903, 1971 ↑ Falconer, M. A., et al., J. Neurol. Neurosurg. Psychiatry 11:13-26, 1948 ↑ Ball, J., Ann. Rheum. Dis., 30:213-23, 1971 ↑ Dyck, P., and Boyd, J. B., J. Neurosurg. 1977; May, 46 (5) 667-70 ↑ Zeifang, F., et al., BCM Musculoskeletal Disord. 2008, 9:89 ↑ Demir, A., et al., Radiology, Oct. 1, 2003; 229(1):37-43 ↑ Ellingson, B. M., el al, Am J. Neuroradiol. Nov. 1, 2008; 29(10):1976-82 ↑ Ellingson, B. M., et al., Am. J. Neuroradiol. Aug 1, 2008; 29(7):1279-84 ↑ Lee, J. W., et al., Am. J. Roentgenol. Aug 1, 2008; 191(2):W52-W57 ↑ Seidenwurm, D. J., et al., Am. J. Neuroradiol. May 1, 2008; 29(5):1032-34 ↑ Shanmuganathan, R. P., et al., Am. J. Neuroradiol., Apr 1, 2008; 29(4): 655-59 ↑ Ozanne, A., et al., Am. J. Neuroradiol. Aug 1, 2007: 28(7):1271-79 ↑ Renoux, D., et al., Am. J. Neuroradiol. Oct. 1, 2006: 27(9):1947-51 ↑ Facon, D., et al., Am. J. Neuroradiol., Jun 1, 2005; 26(6):1587-94 ↑ Kiers, L., Desmons, P., J. Clin. Neurosci. 1999, Jan; 6(1) 49-50 ↑ Rimbot, A., et al., J. Radiol. 2004; Mar; 85(3) 326-28 ↑ Srilanth, S. G., Neurol. India, 2002; Sept; 50(3):310-2 ↑ Holsalker, H., J. Bone Joint Surg.90 A; 333-48, 2008 ↑ Lee, M. J., et al., J. Bone Joint Surg. 89 A:376-80, 2007 ↑ Emery, S. E., et al., J. Bone Joint Surg., 80 A: 941-51, 1998 ↑ Lee, L., and Elliott, R. L. J. Orthop Sports Phys Ther. 2008;38(12):798-98 ↑ Matsumoto, K., et a., Am. J. Sports Med., Oct 1, 2006:34(10):1685-89 ↑ Guille, J., et al., J. Bone Joint Surg. 84A: 277-88, 2002 ↑ Castro, F. P., et al., The American Journal of Sports Medicine 25:603-08, 1997 ↑ Castro, F. P., et al., The American Journal of Sports Medicine 25:603-08, 1997 ↑ Dimar, J. R., et al., Am. J. Orthop. 2008; Nov: 37(11):564-68 ↑ Arce, C. A., et al., Neurol. Clin. 1985; 3:383 ↑ Alvarez, O., et al.,J. Comput, Assist. Tomogr., 1988; 12:649 ↑ Benson, M. K., Byrnes, D. P., J. Bone Joint Surg. 57 B: 471, 1975 ↑ Otani, K., et al., Spine 1988; 13: 1262 ↑ Wood, K. B., et al., J. Bone Joint Surg., 77 A; 1631, 1995 ↑ Arce, C. A., et al., Neurol. Clin. 1985; 3:383 ↑ Alvarez, O., et al.,J. Comput, Assist. Tomogr., 1988; 12:649 ↑ Benson, M. K., Byrnes, D. P., J. Bone Joint Surg. 57 B: 471, 1975 ↑ Otani, K., et al., Spine 1988; 13: 1262 ↑ Wood, K. B., et al., J. Bone Joint Surg., 77 A; 1631, 1995 ↑ Arce, C. A., et al., Neurol. Clin. 1985; 3:383 ↑ Alvarez, O., et al.,J. Comput, Assist. Tomogr., 1988; 12:649 ↑ Benson, M. K., Byrnes, D. P., J. Bone Joint Surg. 57 B: 471, 1975 ↑ Otani, K., et al., Spine 1988; 13: 1262 ↑ Wood, K. B., et al., J. Bone Joint Surg., 77 A; 1631, 1995 ↑ Takahashi, K., et al., Spine 1990; 15, 1211-15 ↑ Wiltse, L. L., et al. Clin Orthop Rel Res. 1976, 117; 23-29 ↑ Frymoyer, J. W., J. Am. Acad. Orthop. Surg. 1994; 2:9-15 ↑ Colonial Ins. Co. V, Industrial Accident Comm., (1946), 29 Cal. 2d 79, 172 P.2d 884,887 ↑ C. Finbeiner, Inc. v. Flowers (1971) 251 Ark. 241, 471, S. W. 2d 772 ↑ Ingalls Shipbuilding Corp. v. Cahela (1948) 251 Ala. 163, 36 So.2d 531 ↑ Altenbernd, J., et al., Rofo 2008, Dec 11 ↑ Gorman, J. D., et al., N. Engl. J. Med. 346:1439:2002 ↑ Braun, J., et al., Lancet 359:1187, 2002 ↑ Brandt, J., et al., J. Rheumatol. 29:118, 2002 ↑ Bowness, P, Rheumatology (Oxford) 41:857, 2002 ↑ Brown, M. A., Curr. Opin. Rheumatol. 14:354, 2002 ↑ Dougados, M., et al., Arthritis Rhem. 34:1218, 1991 ↑ Gladman, D. D., Curr. Opin. Rheumatol. 14:361, 2002 ↑ Postachinni, F., Spine 1999; 10:1043-47 ↑ Katz, J. N., Spine 1996; 1:92-96 ↑ Sato, k., et al., Spine 1989; 11:1265-1271 ↑ downloadable UWTV videos on spinal surgery ↑ Eskola, A., Alaranta H., Pohjohainen, T., et al., (1989) Calcif. Tissue Int. 45:372-72 ↑ Eskola, A., Pohjolainen, T., Alaranta, H., et al., (1992) Calcif. Tissue Int. 50:400-03 ↑ Garfin, S., Herkowitz, H., Mirkovic, S. (2000) Spinal Stenosis. AAOS Instr. Course Lect 49:361-74 ↑ Huth, E. J. (1986) Ann. Intern. Med. 104:257-59 ↑ Jerrells, T. R., 2001 J. Subst. Abuse Treat. 20:111-13 ↑ Katz J., Dalgas, M., Stucki, G., Lispon, S., (1994) Rheum. Dis. Clin. North Am. 20: 471-83 ↑ Onel, D., Sari, H., Donmez, C., Spine 18:291-98 ↑ Podichetty, V. K., Segal, A. M., et al. 2004, Spine 29(21): 2343-43 ↑ Porter, R. W., Hibbert, C., Spine 5:90-93,1983, ↑ Streifler, J., et al., J. Neuro. Neurosurg. Psychiatry 52:543-44, 1989 ↑ Porter, R. W., Miller, C. G., Spine 13:1061-64, 1988 ↑ Podichetty, Vinod, K., Eur. Spine J. 2007, June; 16(6): 851-52 ↑ Podichetty, Vinod, K., Eur. Spine J. 2007, June; 16 (6):851-52 ↑ Sinikallio, S., et al. Eur. Spine J. 2007 July; 16(7): 905-12 ↑ Sinikallio, S., et al. Eur. Spine J. 2007 July; 16(7): 905-12 ↑ Hansson, T., et al., Spine Dec 1, 2008; 33 (25):2819-30 ↑ Journal Watch 2008; 7 (2). ↑ "Spine: Indications for Lumbar Fusions (2003)", referring to the 2001 Volvo Award winner in Clinical Studies, 'Lumbar Fusion Versus Nonsurgical Treatment for Chronic Low Back Pain', a multicenter randomized-control Swedish study involving 310 patients, published in by Fritzell, et al. Spine 26:2521-32, 2001 ↑ Hansson, T., et al., Spine Dec 1, 2008; 33 (25):2819-30 ↑ Atlas, S. J., et al., Spine, 25:556-62; 2000 ↑ Sanderson, P. L., J. Bone Joint Surg., 75 B 75: 393-97, 1993 ↑ Ganz, J. C., J. Neurosurg. 72:71-74, 1990 ↑ Herron, L. D., Mangelsdorf, C., J. Spinal Disord., 4:26-33, 1991 ↑ Atlas, S. J., et al., Spine, 21:92-98, 1996 ↑ Katz, J. N., et al., Spine 21:92-98, 1992 ↑ Gelalis, Ioannis D., et al., Int. Orthop. 2006 February; 30(1):59-63 ↑ Turner, J., et al., Spine 1992; 17:1-8 ↑ Mardjetko, S. M., et al. Spine 1994; 20S:2256S-65S ↑ Herron, L. D., and Trippi, A. C., Spine 1989; 14:534-38 ↑ Epstein, N. E., J. Spinal Disorder. 1998; 11(2): 116-22 ↑ Johnsson, K. E., et al., Spine 1986; 11:107-10 ↑ Jonsson, B., et al., Spine 1997; 24:2938-44 ↑ Jonsson, B., et al., Eur. Spine J. 1992; 1:90-94 ↑ Kinoshita, T., et al., J. Neurosurg. 2001; 95:11-16 ↑ Kleeman, T. J., et al., Spine 2000; 25:865-70 ↑ Bassewitz, H., Herkowitz, H., Clin Orth. 2001; 384:54-60 ↑ Postachinni, F., Spine 1999; 10:1043-47 ↑ Mardjetko, S. M., et al., Spine 1994; 19:S2256-65 ↑ Banwart, J. C., et al., Spine 1995; 20:1055-60 ↑ Colterjohn, N. R., and Bednar, D. A., J. Bone Joint Surg. [Am] 1997; 79:756-59 ↑ Feffer, H. L., et al., Spine 1985; 10:287-89 ↑ Fox., M. W., et al., J. Neurosurg. 1996; 85:793-802 ↑ Herkowitz, H. N., and Kurz, L. T., J. Bone Joint Surg [Am] 1991; 73:802-08 ↑ DePalma, A., and Rothman, R., Clin Orth., 59:113-18, 1968 ↑ DePalma, A., and Rothman, R., Clin Orth., 63:162-70, 1969 ↑ Hirsch, C., J. Bone Joint Surg. 47 A:991, 1965 ↑ Bridwell, K. H., et al., J. Spinal Disord. 1993: 6:461-72 ↑ Fischgrund, J. S., Spine 1997; 22:2807-12 ↑ Yuan, H. A., Spine 1994; 20 S 2279S-96S ↑ Zbelick, T. A., Spine 1993, 18:983-91 ↑ Mardjetko, S. M., et al., Spine 1994; 19:S2256-65 ↑ Banwart, J. C., et al., Spine 1995; 20:1055-60 ↑ Colterjohn, N. R., and Bednar, D. A., J. Bone Joint Surg. [Am] 1997; 79:756-59 ↑ Takahashi, K., et al. Spine 1990; 15:1211-15 ↑ Satomi, K., Rinshoseikeigeka 1990;25:399-406 [Japanese] ↑ Takahashi, K., et al., Rinshoseikeigeka 1990; 25:473-78 [Japanese] ↑ Fujimura, Y., Kansetsugeka 1997; 16:1520-26 [Japanese] ↑ Hirofuji E., et al., Cent. Jpn. J. Orthop Surg. Traum. 1996; 39-87-88 [Japanese] ↑ Nakai, O., et al., Kansetsugeka 1997;16:1527-33 [Japanese] ↑ Tokioka, T., et al., Seikei Saigaigeka 1991; 34:471-79 [Japanese] ↑ Abe, E., East Jpn. J. Clin. Orthop. 1990; 2:18-21 [Japanese] ↑ Tanaka, M., Seikeigeka 1999;50:1384-88 [Japanese] ↑ Nishizawa, T., et al., Sekitsuisekizui 2000; 13:709-14 [Japanese] ↑ Takahashi, K., et al. Spine 1990; 15:1211-15 ↑ Satomi, K., Rinshoseikeigeka 1990;25:399-406 [Japanese] ↑ Takahashi, K., et al., Rinshoseikeigeka 1990; 25:473-78 [Japanese] ↑ Yuan, H. A., et al., Spine 1994; 19{20 Suppl]:2279S-96S ↑ Zbedlick, T. A., Spine 1993; 18(8):983-91 ↑ Bridwell, K. H., et al., J. Spinal Disord. 1993 6(6):461-72 ↑ Lehmann, T. R., et al., Spine 1987; 12(2):97-104 ↑ Whitecloud, T. S., Spine 1994; 19(5):31-536 ↑ Patel, C., et al., Spine J. 2002;2(5S):54S ↑ Postacchini, F., and Cinotti, G., J. Bone Joint Surg. [Br] 1992; 74(6):862-69 ↑ Tosteson, A. N., Ann. Intern. Med. 2008 Dec. 16; 149(12): 845-53 ↑ Tosteson, A. N., et al., Spine 2008, Sept. 1:33 (19); 2108-15 ↑ Weinstein, J. N., Tosteson, T. D., et al., N. Engl. J. Med., Feb. 21, 2008; 358 (8): 794-810 ↑ Weinstein, J. N., Tosteson, T. D., N. Engl, J. Med. May 31: 2007; 356 (22): 2257-70 ↑ Weinstein, J. N., et al. Spine 33:2789-2800, 2008 ↑ Manchulunati, L., et al., Pain Physician, 2008, Nov-Dec; 11(6):833-48 ↑ Manchulunati, L., et al., Pain Physician, 2008, Nov-Dec; 11(6):833-48 ↑ Mardjetko, S. M., et al., Spine 1994; 19:S2256-65 ↑ Banwart, J. C., et al., Spine 1995; 20:1055-60 ↑ Colterjohn, N. R., and Bednar, D. A., J. Bone Joint Surg. [Am] 1997; 79:756-59 ↑ Waddell, G., et a., J. Bone Joint Surgery, 61 A, 201-06, 1979 ↑ Hilibrand, A. S., Rand, N., J. Am. Acad. Orthop. Surg. 1999; 7:239-49 ↑ Waddell, G., et al., J. Bone Joint Surg., 61A, 201-06, 1979 ↑ Sponseller, P. D., et al., Spine 25:2461-66, 2000 ↑ Weinstein, M. A., et al., J. Spinal Disord. 13:422-26, 2000 ↑ Massie, J. B., et al., Clin. Orthop. Rel. Res. 284:99-108, 1992 ↑ Rechtine, G. R., et al., J. Ortho. Trauma 15:566-69, 2001 ↑ Eck, K. R., et al., Spine 26::E182-E191, 201 ↑ Capen, D. A., et al., Orthop. Clin. North. Am. 27:83-86, 1996 ↑ Hee, H. T., et al., J. Spinal Disord. 14:533-540, 2001 ↑ Aydinli, U., et al., Acta Orthop. Belg. 65:182-87, 1999 ↑ Wimmer, C., et al. J. Spinal Disord. 11:498-500, 1998 ↑ Wimmer, C., et al., J. Spinal Disoder. 11:124-28, 1998 ↑ Hodges, S. D., et al., South. Med. J. 91:1132-35, 1998 ↑ Perry, J. W., et al., Clin. Infect. Dis. 24:558-61, 1997 ↑ Abbey, D. M., et al., J. Spinal. Disord. 8:278-83, 1995 ↑ West, J. L., et al., Spine 16:576-79, 1991 ↑ Esses, S. I., et al., Spine 18:2238-39, 1993 ↑ Dave, S. H., and Meyers, D. L., Spine 17: (6 Suppl): S184-89, 1992 ↑ Bertrand, G., Orthop. Clin. North America, 6:305-10, 1975 ↑ Depalma and Rothman, “The Intervertebral Disc”, Philadelphia, W. B. Saunders, 1970 ↑ Finnegan, W., Rothman, R., et al., J. Bone Joint Surg., 57A:1034, 1975 ↑ Ghormley, R. K., Instructional Course Lecture, The American Academy of Orthopedic Surgeons, Vol. 14, pp. 56-63, Ann Arbor, J. W. Edwards, 1957 ↑ Greenwood, J., et al., J. Neurosurg. :15-20, 1952 ↑ Hirsch, C., J. Bone Joint Surg. 47 A: 991-1004, 1965 ↑ Kanayama, M., et al. J. Neurosurg. Spine 6:327-29, 2007 ↑ Sponseller, P. D., et al., Spine 25:2461-66, 2000 ↑ Weinstein, M. A., et al., J. Spinal Disord. 13:422-26, 2000 ↑ Massie, J. B., et al., Clin. Orthop. Rel. Res. 284:99-108, 1992 ↑ Rechtine, G. R., et al., J. Ortho. Trauma 15:566-69, 2001 ↑ Eck, K. R., et al., Spine 26::E182-E91, 201 ↑ Capen, D. A., et al., Orthop. Clin. North. Am. 27:83-86, 1996 ↑ Hee, H. T., et al., J. Spinal Disord. 14:533-40, 2001 ↑ Aydinli, U., et al., Acta Orthop. Belg. 65:182-87, 1999 ↑ DePalma, and Rothman, ibid. ↑ Macnab, I “Backache”, Baltimore, Williams and Wilkins, 1977 ↑ Barr, J. S., et al., J. Bone Joint Surg., 45A:1553, 1963 ↑ Bertrand, G., ibid ↑ Depalma and Rothman, ibid ↑ Finnigan, Rothman, ibid ↑ Ghormley, ibid, ↑ Greenwood, J., et al., ibid ↑ Hirsch, C., ibid ↑ Waddell, G., et al., ibid ↑ Frymoyer, J. W., et al., J. Bone Joint Surg., 65 A; 13-218; 1983 ↑ Deyo, R. A., Bass, J. E., Spine, 14:501-06, 1989 ↑ Svensson, H. O., et al., Spine, 8;77-285, 1983 ↑ de Vernejoul, M.C., et al., Clin. Orthop., 179:107-15, 1989 ↑ An, H. S., et al., J. Spinal Disord., 7:369-73, 1994 ↑ Hollo, I., et al., JAMA, 237; 2470, 1977 ↑ Iwahashi, M., et al., Spine, 27:1396-1401, 2002 ↑ Frymoyer, J. W., et al., J. Bone Joint Surg., 65 A; 213-18; 1983 ↑ Deyo, R. A., Bass, J. E., Spine, 14:501-06, 1989 ↑ Svensson, H. O., et al., Spine, 8;277-85, 1983 ↑ de Vernejoul, M.C., et al., Clin. Orthop., 179:107-15, 1989 ↑ An, H. S., et al., J. Spinal Disord., 7:369-373, 1994 ↑ Hollo, I., et al., JAMA, 237; 2470, 1977 ↑ Iwahashi, M., et al., Spine, 27:1396-1401, 2002 ↑ Glassman, S. D., et al., Spine 25:2608-15, 2000 ↑ Biering-Sorensen, F., Thomsen, C., Spine 11:720-25, 1986 ↑ Boshuizen, H., et al., Spine 18:35-40, 1993 ↑ Deyo, R. A., et al., Spine 14:501-06, 1989 ↑ Heliovaara, M., et a., Spine 16:608-14, 1991 ↑ Heliovaara, M., et al., Ann. Med., 21:257-64, 1989 ↑ Ribaina Padron F. J., Neurocirurgia (Astur) 2008, Feb.19(1):35-44 ↑ Wang, J. K., Mayo Clinic Proc. 51:28-30, 1976 ↑ Laporte, de C, Siegfried, J., Spine 18:593-603, 1983 ↑ Social Security; "Disability Evaluation Under Social Security", June 2006 ↑ http://www.ssa.gov/disability/professionals/bluebook/adultlistings.pdf See also Failed back syndrome Failed Back Syndrome External links "Diseases and conditions:Spinal Stenosis". The Mayo Clinic. 2008-03-11. http://www.mayoclinic.com/health/spinal-stenosis/DS00515. Retrieved 2008-11-12. <|fim▁end|> | vascular situation had worsened. |
<|fim▁begin|> In this article, we shall take a look back at the methods of absolute dating, and see how we know that they can be relied on. Contents 1 Basis of the methods 2 Sea-floor spreading 3 Marine sediment 4 Radiometric dating and paleomagnetism 5 Comparison with historical dates 6 Radiocarbon dating, varves, and dendrochronology 7 Radiometric dating, sclerochronology and rhythmites 8 Agreement with relative dating 9 Internal consistency of radiometric dates 10 Mutual consistency of radiometric dates 11 Summary Basis of the methods One argument in favor of the absolute dating methods presented in the preceding articles is that they should work in principle. If they don't, then it's not just a question of geologists being wrong about geology, but of physicists being wrong about physics and chemists being wrong about chemistry; if the geologists are wrong, entire laws of nature will have to be rewritten. Science, since it concerns just one universe with one set of laws, constitutes a seamless whole; we cannot unpick the single thread of absolute dating without the whole thing beginning to unravel. Still, it has happened in the past that scientists have thought they'd got hold of a law of nature and then found out it was false. There is no particular reason to suspect that this will turn out to be the case when it comes to the laws underlying absolute dating; nonetheless, an argument from principle alone can never be entirely convincing. Let us therefore turn to the evidence. Sea-floor spreading You will recall from our discussion of sea floor spreading that the sea floor spreads out from mid-ocean rifts, and so ought to be younger nearer the rifts and progressively older further away from them. What is more, we can measure the rate of spreading directly by GPS, SLR, and VLBI. This means that if we didn't have any other way of doing absolute dating, we would as a first approximation take the age of basalt on a spreading sea floor to be the distance from the rift divided by the rate of spreading. Now if we estimate the age of the sea floor like that, then we get a good agreement with the dates produced by radiometric methods. It is hard to think that this is a coincidence; it is also hard to think of any mechanism that could produce this agreement other than that the rocks are as old as radiometric methods tell us. Marine sediment We began our discussion of absolute dating by saying that sedimentation rates could not be relied on for absolute dating. If there is one possible exception to this, it would be the deposition of marine sediment, since it is not subject to erosion, and since we would expect the rates of deposition of the various sediments to be, if not actually constant, then not subject to such a degree of variation as (for example) glacial till. Based on the known rates of deposition, we may therefore at least say that the depths of marine sediment found on the sea floor are consistent with the ages of the igneous rocks beneath them as produced by radiometric dating. Radiometric dating and paleomagnetism The polarity of the Earth's magnetic field is a global phenomenon: at any given time it will either be normal everywhere or reversed everywhere. So if our methods of radiometric dating are correct, then we would predict that rocks dated to the same age would have the same polarity, which they do. If this does not completely prove that radiometric dating is correct, it does at least show that (barring a wildly improbable coincidence) there is at least a one-to-one relationship between the dates produced by radiometric methods and the true dates, and so it must be taken as an argument in favor of these methods. Comparison with historical dates It is possible to test radiocarbon dating by using it to put a date on historical artifacts of known date, and to show that it is usually very accurate. It has also been possible to test Ar-Ar dating against the historical record, since it is sufficiently sensitive to date rocks formed since the inception of the historical record. For example, Ar-Ar dating has been used to give an accurate date for the eruption of Vesuvius in 79 A.D, as recorded by Roman historians at the time. (See Lanphere et al., 40Ar/39Ar ages of the AD 79 eruption of Vesuvius, Italy, Bulletin of Volcanology, 69, 259–263.) Radiocarbon dating, varves, and dendrochronology Because varves contain organic material, it is possible to compare the dates from varves with the dates produced by radiocarbon dating, and see that they are in good agreement. We also see close agreement between dendrochronology and uncalibrated radiocarbon dates. (I specify uncalibrated dates because as radiocarbon dating is calibrated against dendrochronology, the agreement of calibrated radiocarbon dates with dendrochronology is inevitable.) Now, each of these three methods relies on a different underlying physical process: radioactive decay, outwash from glaciers, and the growth of trees. We can hardly suppose that there is some single mechanism which would interfere with all three of these very different processes in such a way as to leave the dates derived from them still concordant. But it is equally far-fetched to imagine that three different mechanisms interfered with the three processes in such a way as to leave the dates concordant; that would require either a preposterous coincidence, or for natural processes to be actually conspiring to deceive us: an idea which is, if anything, even more preposterous. Now, preposterous things do happen occasionally. But in this case there is a perfectly reasonable and straightforward explanation for why the dates are concordant, namely that they are correct. Radiometric dating, sclerochronology and rhythmites Similar remarks may be made about the agreement between radiometric dating of rocks, sclerochronology, and dating by rhythmites. Are we to believe that one single mechanism interfered with the decay of radioactive isotopes, the secretion of calcium carbonate by molluscs, and the action of the tide? Absurd. But are we instead to believe that three separate mechanisms interfered with these processes in such a way as to leave all the dates concordant? That would be equally absurd. The straightforward explanation for the concordance of the dates is that they are in fact correct. Consider the following analogy: a clockmaker sells us an electric clock, a pendulum clock, and a <|fim▁hole|> are shockproof. Skeptical of the clockmaker's claim, we subject the clocks to shock: we shake them, drop them, hit them with hammers and shoot them out of a cannon. Throughout this process, they all go on showing exactly the same time. Is it plausible that we have damaged their very different internal mechanisms in such a way that they are all running fast or slow but still in perfect synchrony? Or is it more likely that they are synchronized because nothing that's happened to them has affected their working? Agreement with relative dating Relative dating by definition does not produce actual dates, but it does allow us to put an order on the rocks, and so if absolute dating is to be trusted, it should agree with this order, telling us, for example, that Ordovician rocks are older than Triassic rocks; and it does. It is hard to see this as a coincidence; it is equally hard to think of some alternate explanation of why we can correlate isotope ratios or sclerochronological data with the relative order of rocks as deduced from stratigraphic methods — other than the straightforward explanation that absolute dating is producing the right dates. Internal consistency of radiometric dates In our discussion of radiometric dating, we have seen that many, indeed most, radiometric methods are self-checking. So in the U-Pb method, we check that the two uranium isotopes produce concordant dates. In the Ar-Ar method, we check that step heating yields the same date at every step. In Rb-Sr, Sm-Nd, Lu-Hf, Re-Os, La-Be, La-Ce and K-Ca dating, we check that the points we plot on the isochron diagram lie on a straight line. These precautions allow us to throw out most data that have been produced by confounding factors such as atmospheric contamination, weathering, hydrothermal events, metamorphism, metasomatism, etc. It is, as we have explained, possible for the occasional incorrect date to slip through this filter, since it is possible for some of these confounding factors to accidentally change the isotope ratios in such a way as to produce something that looks like a good date: apparently concordant dates for Ar-Ar or U-Pb, or a false isochron for the various isochron methods. It would indeed be remarkable if this never happened, since one-in-a-thousand chances do in fact occur one time in a thousand. But by the same token, the other 999 times they don't, and so although any particular date produced by these methods might be called into question, it must be the case that the vast majority of dates that pass through these filters must be good; for we can hardly suppose that the confounding factors are actively conspiring to deceive us, and so these long-shot events must be as rare as statistical considerations would lead us to expect. Mutual consistency of radiometric dates You might perhaps suggest that if some unknown factor, contrary to our present understanding of physics existed that sped up or slowed down radioactive decay in the past, then we would expect the radiometric dates to be concordant whether they were right or wrong. This is, as I say, contrary to our present understanding of physics, and so is mere unfounded speculation. What is more, the reader should recollect that "radioactive decay" is not the name of one process; it is the name of any process that rearranges the nucleus. So to leave dates produced by different radiometric methods still concordant, nature would somehow have to conspire to fool us by changing the rates of alpha decay, of beta decay, and of electron capture, in such a way that the different dating methods based on these different modes of decay come up with the same dates. Another point to bear in mind is that a change in the rate of radioactive decay, even if it was carefully coordinated in this way, would still not change every radiometric date in the same direction: if, for example, radioactive decay sped up at some time in the past then this would make U-Pb or Ar-Ar dates older than they should be, but it would make the dates produced by cosmogenic surface dating younger than they should be. Summary It is possible to doubt any particular date obtained by absolute dating methods. But it would be bizarre to doubt the general picture they paint. For what we see is a massive agreement between the different radiometric methods, varves, dendrochronology, sclerochronology, rhythmites, paleomagnetic data, deposition rates, sea floor spreading, and relative dating methods. For the dates obtained by absolute dating to be wrong in general and yet wrong in such a way as to be in agreement with one another and with other observations, we would have to suppose either that we are looking at an inconceivably massive coincidence, or that the whole Earth is a fraud designed to deceive us. Ideas to the latter effect have actually been proposed from time to time; most notably by the nineteenth century religious zealot Philip Gosse, whose eccentric work Omphalos proposed that the Earth was a mere few thousand years old, but that God had created it to look much older. To this the Reverend Charles Kingsley memorably answered: "I cannot believe that God has written on the rocks one enormous and superfluous lie for all mankind". That of course would be a theological rather than a geological question, and so is outside the scope of this textbook. What can be said is that geology is a science, and that in science it is necessary to proceed on the basis that the universe is not a lie; because if we believed that, we could believe that anything at all was the case and disregard all evidence to the contrary. The scientific method compels us, then, to disregard the possibility of divine malice; and mere natural processes, being mindless, cannot be actually malevolent. What, then, of coincidence? Well, there are limits to the degree of coincidence we can believe in, otherwise again we could believe nearly anything. The scientific method requires us to discard such remote possibilities unless there is at least a hint of a shred of evidence for them. We are left with the conclusion that the great majority of the dates produced by absolute dating methods must be reasonably accurate. ← Fossils and absolute dating · Paleoclimatology: introduction →← Fossils and absolute dating · Historical Geology · Paleoclimatology: introduction → <|fim▁end|> | spring-driven clock, and guarantees that they |
<|fim▁begin|> B.1.6 Can hierarchy be ended? Faced with the fact that hierarchy, in its many distinctive forms, has been with us such a long time and so negatively shapes those subject to it, some may conclude that the anarchist hope of ending it, or even reducing it, is little more than a utopian dream. Surely, it will be argued, as anarchists acknowledge that those subject to a hierarchy adapt to it this automatically excludes the creation of people able to free themselves from it? Anarchists disagree. Hierarchy can be ended, both in specific forms and in general. A quick look at the history of the human species shows that this is the case. People who have been subject to monarchy have ended it, creating republics where before absolutism reigned. Slavery and serfdom have been abolished. Alexander Berkman simply stated the obvious when he pointed out that "many ideas, once held to be true, have come to be regarded as wrong and evil. Thus the ideas of divine right of kings, of slavery and serfdom. There was a time when the whole world believed those institutions to be right, just, and unchangeable." However, they became "discredited and lost their hold upon the people, and finally the institutions that incorporated those ideas were abolished" as "they were useful only to the master class" and "were done away with by popular uprisings and revolutions." [1] It is unlikely, therefore, that current forms of hierarchy are exceptions to this process. Today, we can see that this is the case. Malatesta's comments of over one hundred years ago are still valid: "the oppressed masses . . . have never completely resigned themselves to oppression and poverty . . . [and] show themselves thirsting for justice, freedom and wellbeing." [2] Those at the bottom are constantly resisting both hierarchy and its the negative effects and, equally important, creating non-hierarchical ways of living and fighting. This constant process of self-activity and self-liberation can be seen from the labour, women's and other movements—in which, to some degree, people create their own alternatives based upon their own dreams and hopes. Anarchism is based upon, and grew out of, this process of resistance, hope and direct action. In other words, the libertarian elements that the oppressed continually produce in their struggles within and against hierarchical systems are extrapolated and generalised into what is called anarchism. It is these struggles and the anarchistic elements they produce which make the end of all forms of hierarchy not only desirable, but possible. So while the negative impact of hierarchy is not surprising, neither is the resistance to it. This is because the individual "is not a blank sheet of paper on which culture can write its text; he [or she] is an entity charged with energy and structured in specific ways, which, while adapting itself, reacts in specific and ascertainable ways to external conditions." In this "process of adaptation," people develop "definite mental and emotional reactions which follow from specific properties" of our nature.[3] For example: "Man can adapt himself to slavery, but he reacts to it by lowering his intellectual and moral qualities . . . Man can adapt himself to cultural conditions which demand the repression of sexual strivings, but in achieving this adaptation he develops . . . neurotic symptoms. He can adapt to almost any culture pattern, but in so far as these are contradictory to his nature he develops mental and emotional disturbances which force him eventually change these conditions since he cannot change his nature. . . . If . . . man could adapt himself to all conditions without fighting those which are against his nature, he would have no history. Human evolution is rooted in man's adaptability and in certain indestructible qualities of his nature which compel him to search for conditions better adjusted to his intrinsic needs." [4] So as well as adaptation to hierarchy, there is resistance. This means that modern society (capitalism), like any hierarchical society, faces a direct contradiction. On the one hand, such systems divide society into a narrow stratum of order givers and the vast majority of the population who are (officially) excluded from decision making, who are reduced to carrying out (executing) the decisions made by the few. As a result, most people suffer feelings of alienation and unhappiness. However, in practice, people try and overcome this position of powerlessness and so hierarchy produces a struggle against itself by those subjected to it. This process goes on all the time, to a greater or lesser degree, and is an essential aspect in creating the possibility of political consciousness, social change and revolution. People refuse to be treated like objects (as required by hierarchical society) and by so doing hierarchy creates the possibility for its own destruction. For the inequality in wealth and power produced by hierarchies, between the powerful and the powerless, between the rich and the poor, has not been ordained by god, nature or some other superhuman force. It has been created by a specific social system, its institutions and workings -- a system based upon authoritarian social relationships which effect us both physically and mentally. So there is hope. Just as authoritarian traits are learned, so can they be unlearned. As Carole Pateman summarises, the evidence supports the argument "that we do learn to participate by participating" and that a participatory environment "might also be effective in diminishing tendencies toward non-democratic attitudes in the individual." [5] So oppression reproduces resistance and the seeds of its own destruction. It is for this reason anarchists stress the importance of self-liberation (see section A.2.7) and "support all struggles for partial freedom, because we are convinced that one learns through struggle, and that once one begins to enjoy a little freedom one ends by wanting it all." [6] By means of direct action (see section J.2), people exert themselves and stand up for themselves. This breaks the conditioning of hierarchy, breaks the submissiveness which hierarchical social relationships both need and produce. Thus the daily struggles against oppression "serve as a training camp to develop" a person's "understanding of [their] proper role in life, to cultivate [their] self-reliance and independence, teach him [or her] mutual help and co-operation, and make him [or her] conscious of [their] responsibility. [They] will learn to decide and act on [their] own behalf, not leaving it to leaders or politicians to attend to [their] affairs and look out for [their] welfare. It will be [them] who will determine, together with [their] fellows . . . , what they want and what methods will best serve their aims." [7] In other words, struggle encourages all the traits hierarchy erodes and, consequently, develop the abilities not only to question and resist authority but, ultimately, end it once and for all. This means that any struggle changes those who take part in it, politicising them and transforming their personalities by shaking off the servile traits produced and required by hierarchy. As an example, after the sit-down strikes in Flint, Michigan, in 1937 one eye-witness saw how "the auto worker became a different human being. The women that had participated actively became a different type of women . . . They carried themselves with a different walk, their heads were high, and they had confidence in themselves." [8] Such changes happen in all struggles (also see section J.4.2). Anarchists are not surprised for, as discussed in section J.1 and J.2.1, we have long recognised the liberating aspects of social struggle and the key role it plays in creating free people and the other preconditions for needed for an anarchist society (like the initial social structure -- see section I.2.3). Needless to say, a hierarchical system like capitalism cannot survive with a non-submissive working class and the bosses spend a considerable amount of time, energy and resources trying to break the spirits of the working class so they will submit to authority (either unwillingly, by fear of being fired, or willingly, by fooling them into believing that hierarchy is natural or by rewarding subservient behaviour). Unsurprisingly, this never completely succeeds and so capitalism is marked by constant struggles between the oppressed and oppressor. Some of these struggles succeed, some do not. Some are defensive, some are not. Some, like strikes, are visible, other less so (such a working slowly and less efficiently than management desires). And these struggles are waged by both sides of the hierarchical divide. Those subject to hierarchy fight to limit it and increase their autonomy and those who exercise authority fight to increase their power over others. Who wins varies. The 1960s and 1970s saw a marked increase in victories for the oppressed all throughout capitalism but, unfortunately, since the 1980s, as we discuss in section C.8.3, there has been a relentless class war conducted by the powerful which has succeeded in inflicting a series of defeats on working class people. Unsurprisingly, the rich have got richer and more powerful since. So anarchists take part in the on-going social struggle in society in an attempt to end it in the only way possible, the victory of the oppressed. A key part of this is to fight for partial freedoms, for minor or major reforms, as this strengthens the spirit of revolt and starts the process towards the final end of hierarchy. In such struggles we stress the autonomy of those involved and see them not only as the means of getting more justice and freedom <|fim▁hole|> system but also as a means of ending the hierarchies they are fighting once and for all. Thus, for example, in the class struggle we argue for "[o]rganisation from the bottom up, beginning with the shop and factory, on the foundation of the joint interests of the workers everywhere, irrespective of trade, race, or country." [9] Such an organisation, as we discuss in section J.5.2, would be run via workplace assemblies and would be the ideal means of replacing capitalist hierarchy in industry by genuine economic freedom, i.e. worker's self-management of production (see section I.3). Similarly, in the community we argue for popular assemblies (see section J.5.1) as a means of not only combating the power of the state but also replaced it with by free, self-managed, communities (see section I.5). Thus the current struggle itself creates the bridge between what is and what could be: "Assembly and community must arise from within the revolutionary process itself; indeed, the revolutionary process must be the formation of assembly and community, and with it, the destruction of power. Assembly and community must become 'fighting words,' not distant panaceas. They must be created as modes of struggle against the existing society, not as theoretical or programmatic abstractions." [10] This is not all. As well as fighting the state and capitalism, we also need fight all other forms of oppression. This means that anarchists argue that we need to combat social hierarchies like racism and sexism as well as workplace hierarchy and economic class, that we need to oppose homophobia and religious hatred as well as the political state. Such oppressions and struggles are not diversions from the struggle against class oppression or capitalism but part and parcel of the struggle for human freedom and cannot be ignored without fatally harming it. As part of that process, anarchists encourage and support all sections of the population to stand up for their humanity and individuality by resisting racist, sexist and anti-gay activity and challenging such views in their everyday lives, everywhere (as Carole Pateman points out, "sexual domination structures the workplace as well as the conjugal home" [11]). It means a struggle of all working class people against the internal and external tyrannies we face—we must fight against own our prejudices while supporting those in struggle against our common enemies, no matter their sex, skin colour or sexuality. Lorenzo Kom'boa Ervin words on fighting racism are applicable to all forms of oppression: "Racism must be fought vigorously wherever it is found, even if in our own ranks, and even in ones own breast. Accordingly, we must end the system of white skin privilege which the bosses use to split the class, and subject racially oppressed workers to super-exploitation. White workers, especially those in the Western world, must resist the attempt to use one section of the working class to help them advance, while holding back the gains of another segment based on race or nationality. This kind of class opportunism and capitulationism on the part of white labour must be directly challenged and defeated. There can be no workers unity until the system of super-exploitation and world White Supremacy is brought to an end." [12] Progress towards equality can and has been made. While it is still true that (in the words of Emma Goldman) "[n]owhere is woman treated according to the merit of her work, but rather as a sex" [13] and that education is still patriarchal, with young women still often steered away from traditionally "male" courses of study and work (which teaches children that men and women are assigned different roles in society and sets them up to accept these limitations as they grow up) it is also true that the position of women, like that of blacks and gays, has improved. This is due to the various self-organised, self-liberation movements that have continually developed throughout history and these are the key to fighting oppression in the short term (and creating the potential for the long term solution of dismantling capitalism and the state). Emma Goldman argued that emancipation begins "in [a] woman's soul." Only by a process of internal emancipation, in which the oppressed get to know their own value, respect themselves and their culture, can they be in a position to effectively combat (and overcome) external oppression and attitudes. Only when you respect yourself can you be in a position to get others to respect you. Those men, whites and heterosexuals who are opposed to bigotry, inequality and injustice, must support oppressed groups and refuse to condone racist, sexist or homophobic attitudes and actions by others or themselves. For anarchists, "not a single member of the Labour movement may with impunity be discriminated against, suppressed or ignored. . . Labour [and other] organisations must be built on the principle of equal liberty of all its members. This equality means that only if each worker is a free and independent unit, co-operating with the others from his or her mutual interests, can the whole labour organisation work successfully and become powerful." [14] We must all treat people as equals, while at the same time respecting their differences. Diversity is a strength and a source of joy, and anarchists reject the idea that equality means conformity. By these methods, of internal self-liberation and solidarity against external oppression, we can fight against bigotry. Racism, sexism and homophobia can be reduced, perhaps almost eliminated, before a social revolution has occurred by those subject to them organising themselves, fighting back autonomously and refusing to be subjected to racial, sexual or anti-gay abuse or to allowing others to get away with it (which plays an essential role in making others aware of their own attitudes and actions, attitudes they may even be blind to!). The example of the Mujeres Libres (Free Women) in Spain during the 1930s shows what is possible. Women anarchists involved in the C.N.T. and F.A.I. organised themselves autonomously to raise the issue of sexism in the wider libertarian movement, to increase women's involvement in libertarian organisations and help the process of women's self-liberation against male oppression. Along the way they also had to combat the (all too common) sexist attitudes of their "revolutionary" male fellow anarchists. Martha A. Ackelsberg's book Free Women of Spain is an excellent account of this movement and the issues it raises for all people concerned about freedom. Decades latter, the women's movement of the 1960s and 1970s did much the same thing, aiming to challenge the traditional sexism and patriarchy of capitalist society. They, too, formed their own organisations to fight for their own needs as a group. Individuals worked together and drew strength for their own personal battles in the home and in wider society. Another essential part of this process is for such autonomous groups to actively support others in struggle (including members of the dominant race/sex/sexuality). Such practical solidarity and communication can, when combined with the radicalising effects of the struggle itself on those involved, help break down prejudice and bigotry, undermining the social hierarchies that oppress us all. For example, gay and lesbian groups supporting the 1984/5 UK miners' strike resulted in such groups being given pride of place in many miners' marches. Another example is the great strike by Jewish immigrant workers in 1912 in London which occurred at the same time as a big London Dock Strike. "The common struggle brought Jewish and non-Jewish workers together. Joint strike meetings were held, and the same speakers spoke at huge joint demonstrations." The Jewish strike was a success, dealing a "death-blow to the sweatshop system. The English workers looked at the Jewish workers with quite different eyes after this victory." Yet the London dock strike continued and many dockers' families were suffering real wants. The successful Jewish strikers started a campaign "to take some of the dockers' children into their homes." This practical support "did a great deal to strengthen the friendship between Jewish and non-Jewish workers." [15] This solidarity was repaid in October 1936, when the dockers were at the forefront in stopping Mosley's fascist blackshirts marching through Jewish areas (the famous battle of Cable street). For whites, males and heterosexuals, the only anarchistic approach is to support others in struggle, refuse to tolerate bigotry in others and to root out their own fears and prejudices (while refusing to be uncritical of self-liberation struggles—solidarity does not imply switching your brain off!). This obviously involves taking the issue of social oppression into all working class organisations and activity, ensuring that no oppressed group is marginalised within them. Only in this way can the hold of these social diseases be weakened and a better, non-hierarchical system be created. An injury to one is an injury to all. References ↑ What is Anarchism?, p. 178 ↑ Anarchy, p. 33 ↑ Eric Fromm, Man for Himself, p. 23 and p. 22 ↑ Op. Cit., pp. 22-23 ↑ Participaton and Democratic Theory, p. 105 ↑ Malatesta, Errico Malatesta: His Life and Ideas, p. 195 ↑ Berkman, Op. Cit., p. 206 ↑ Genora (Johnson) Dollinger, contained in Voices of a People's History of the United States, Howard Zinn and Anthony Arnove (eds.), p. 349 ↑ Alexander Berkman, Op. Cit., p. 207 ↑ Murray Bookchin, Post-Scarcity Anarchism, p. 104 ↑ The Sexual Contract, p. 142 ↑ Anarchism and the Black Revolution, p. 128 ↑ Red Emma Speaks, p. 177 ↑ Lorenzo Kom'boa Ervin, Op. Cit., pp. 127-8 ↑ Rudolf Rocker, London Years, p. 129 and p. 131 <|fim▁end|> | in the current unfree |
<|fim▁begin|> Agelaius phoeniceus (Red-winged Blackbird) Male Female Description Bird callThe Red-winged Blackbird, Agelaius phoeniceus, is a passerine bird found in most of North and much of Central America. It breeds from Alaska and Newfoundland south to Florida, the Gulf of Mexico, Mexico and Guatemala, with isolated populations in western El Salvador, northwestern Honduras and northwestern Costa Rica. It may winter as far north as Pennsylvania and British Columbia, but northern populations are generally bird migration, moving south to Mexico and the southern United States. The common name for this species is taken from the mainly black adult male's distinctive red shoulder patches, or "epaulets", which are visible when the bird is flying or displaying. At rest, the male also shows a pale yellow wingbar. The female is blackish-brown and paler below. The female is considerably smaller than the male, at 17-18 cm (7 inches) length and 36 g weight, against his 22-24 cm (9.5 inches) and 64 g. Young birds resemble the female, but are paler below and have buff feather fringes. Both sexes have a sharply pointed bill. The Red-winged Blackbird feeds primarily on plant seeds, including weeds and waste grain, but about a quarter of its diet consists of insects, spiders, mollusks and other small animals, considerably more so during breeding season (Srygley & Kingsolver 1998). In season, it eats blueberries, blackberries, and other fruit. These birds can be lured to backyard bird feeders by bread and seed mixtures. When migrating north, these birds travel in single-sex flocks, and the males usually <|fim▁hole|> females. Once they have reached the location where they plan to breed, the males stake out territories by singing. They defend their territory aggressively, both against other male Red-winged Blackbirds and against birds they perceive as threatening, including crows, Ospreys, hawks, and even humans. The call of this species is a throaty check, and the male's song is scratchy oak-a-lee (see below). Red-winged Blackbirds prefer marshes, but will nest near any body of water. Pairs raise two or three clutches per season, in a new nest for each clutch. The nests are cups of vegetation, and are either built in shrubs or attached to marsh grass. A clutch comprises three to five eggs. These are incubated by the female and hatch in 11-12 days. Red-winged Blackbirds are hatched blind and naked, but are ready to leave the nest ten days after hatching. Red-winged Blackbirds are polygynous, with territorial males defending up to 10 females. However, females frequently copulate with males other than their social mate and often lay clutches of mixed paternity. When the breeding season is over, Red-winged Blackbirds gather in huge flocks, sometimes numbering in the millions. In some parts of the United States, they are considered to be pests because these flocks can consume large amounts of cultivated grain or rice. This bird's numbers are declining due to habitat loss and the use of poison to prevent this loss of crops. Despite the similar names, the Red-winged Blackbird is not related to the European Redwing or the Old World Blackbirdthrushes (Turdidae). <|fim▁end|> | arrive a few days before the |
<|fim▁begin|> Contents 1 Lesson Objectives 2 Formation from Magma and Lava 2.1 Rocks from Magma 2.2 Minerals from Lava 3 Formation from Solutions 3.1 Minerals from Salt Water 3.2 Minerals from Hot Underground Water 4 Lesson Summary 5 Review Questions 6 Vocabulary 7 Points to Consider Minerals are all around you. They are used to make your house, your computer, even the buttons on your jeans. But, where do minerals come from? There are many types of minerals, and they do not all form in the same way. Some minerals form when salt water on Earth's surface evaporates. Others form from water mixtures that are seeping through rocks far below your feet. Still others form when mixtures of really hot molten rock cool. Lesson Objectives Describe how melted rock produces minerals. Explain how minerals form from solutions. Formation from Magma and Lava You are on vacation at the beach. You take your flip-flops off to go swimming because it is one of the hottest days of the summer. The sand is so hot it hurts your feet, so you have to run to the water. Imagine if it were hot enough for the sand to melt. Some minerals start out in liquids that are that hot. There are places inside Earth where rock will melt. Melted rock inside the Earth is also called molten rock, or magma. Magma is a molten mixture of substances that can be hotter than 1,000°C. Magma moves up through Earth's crust, but it does not always reach the surface. When magma erupts onto Earth’s surface, it is known as lava. As lava flows from volcanoes it starts to cool, as Figure 3.19 shows. Minerals form when magma and lava cool. Figure 3.19: Lava is melted rock that erupts onto Earth's surface. Rocks from Magma Magma cools slowly as it rises towards Earth’s surface. It can take thousands to millions of years to become solid when it is trapped inside Earth. As the magma cools, solid rocks form. Rocks are mixtures of minerals. Granite, shown in Figure 3.20, is a common rock that forms when magma cools. Granite contains the minerals quartz, plagioclase feldspar, and potassium feldspar. The different colored speckles in the granite are the crystals of the different minerals. The mineral crystals are large enough to see because the magma cools slowly, which gives the crystals time to grow. Figure 3.20: Granite is a type of rock that forms from magma. It contains the minerals quartz (clear), plagioclase feldspar (shiny white), potassium feldspar (pink), and other minerals. The magma mixture changes over time as different minerals crystallize out of the magma. A very small amount of water is mixed in with the magma. The last part of the magma to solidify contains more water than the magma that first formed rocks. It also contains rare chemical elements. The minerals formed from this type of magma are often valuable because they have concentrations of rare chemical elements. When magma cools very slowly, very large crystals can grow. These mineral deposits are good sources of crystals that are used to make jewelry. For example, magma can form large topaz crystals. Minerals from Lava Lava is on the Earth's surface so it cools quickly compared to magma in Earth. As a result, rocks form quickly and mineral crystals are very small. Rhyolite is one type of rock that is formed when lava cools. It contains similar minerals to granite. However, as you can see in Figure 3.21, the mineral crystals are much smaller than the crystals in the granite shown in Figure 3.20. Sometimes, lava cools so fast that crystals cannot form at all, forming a black glass called obsidian. Because obsidian is not crystalline, it is not <|fim▁hole|> contain minerals that are similar to granite, but the crystal size is much smaller. Formation from Solutions Minerals also form when minerals are mixed in water. Most water on Earth, like the water in the oceans, contains minerals. The minerals are mixed evenly throughout the water to make a solution. The mineral particles in water are so small that they will not come out when you filter the water. But, there are ways to get the minerals in water to form solid mineral deposits. Minerals are smaller than sand particles and germs. Minerals from Salt Water Tap water and bottled water contain small amounts of dissolved minerals. For minerals to crystallize, the water needs to contain a large amount of dissolved minerals. Seawater and the water in some lakes, such as Mono Lake in California or Utah's Great Salt Lake, are salty enough for minerals to "precipitate out" as solids. When water evaporates, it leaves behind a solid "precipitate" of minerals, which do not evaporate, as the Figure 3.22 shows. After the water evaporates, the amount of mineral left is the same as was in the water. Figure 3.22: When the water in glass A evaporates, the dissolved mineral particles are left behind. Water can only hold a certain amount of dissolved minerals and salts. When the amount is too great to stay dissolved in the water, the particles come together to form mineral solids and sink to the bottom. Salt (halite) easily precipitates out of water, as does calcite, as the Figure 3.23 shows. Figure 3.23: The limestone towers are made mostly of calcite deposited in the salty and alkaline water of Mono Lake, in California. These rocks formed under water when calcium-rich spring water at the bottom of the lake bubbled up into the alkaline lake, forming these calcite "tufa" towers. If the lake level drops, the tufa towers appear in interesting formations. Minerals from Hot Underground Water Cooling magma is not the only source for underground mineral formations. When magma heats nearby underground water, the heated water moves through cracks below Earth's surface. Hot water can hold more dissolved particles than cold water. The hot, salty solution reacts with the rocks around it and picks up more dissolved particles. As it flows through open spaces in rocks, it deposits solid minerals. The mineral deposits that form when a mineral fills cracks in rocks are called veins. Figure 3.24 shows white quartz veins. When the minerals are deposited in open spaces, large crystals can form. These special rocks are called geodes. Figure 3.25 shows a geode that was formed when amethyst crystals grew in an open space in a rock. Figure 3.24: Quartz veins formed in this rock. Figure 3.25: An amethyst geode that formed when large crystals grew in open spaces inside the rock. Lesson Summary Mineral crystals that form when magma cools are usually larger than crystals that form when lava cools. Minerals are deposited from salty water solutions on Earth's surface and underground. Review Questions How does magma differ from lava? What are two differences between granite and rhyolite? What happens to the mineral particles in salt water when the water evaporates? Explain how mineral veins form. Vocabulary lava Molten rock that has reached the Earth's surface. magma Molten rock deep inside the Earth. rocks Mixtures of minerals. Points to Consider When most minerals form, they combine with other minerals to form rocks. How can these minerals be used? The same mineral can be formed by different processes. How can the way a mineral forms affect how the mineral is used? ← Identification of Minerals · Mining and Using Minerals →← Identification of Minerals · High School Earth Science · Mining and Using Minerals → <|fim▁end|> | a mineral. Figure 3.21: Rhyolite rocks |
<|fim▁begin|> Mr. Jones Series NED-0001 Tea bag Name : Black Beauty Brand Group : Serie Name : Bag number : Tea Type : Organic Black Tea Flavours : Black Tea Flap : Bag (no flap) Front Texts : One Teabag Organic Black Tea Back Texts : This teebag contains 100% organic black tea from India.If you would like to know more about ... www.mrjones.org Enjoy your Tea! Flap Texts : Material : Glossy Paper Form : Rectangular Colours : Black, White, Green Size : Weight : Country : Netherlands Year : Notes : NED-0002 Tea bag Name : Cape Farewell Brand Group : Serie Name : Bag number : Tea Type : Organic Rooibos Flavours : Rooibos Flap : Bag (no flap) Front Texts : One Teabag Organic Rooibos Back Texts : This teebag contains 100% organic rooibos from South Africa.If you would like to know more about ... www.mrjones.org Enjoy your Tea! Flap Texts : Material : Glossy Paper Form : Rectangular Colours : Black, Brown, White, Blue Size : Weight : Country : Netherlands Year : Notes : NED-0003 Tea bag Name : Chef Chaoun Brand Group : Serie Name : Bag number : Tea Type : Organic Mint Tea Flavours : Green Tea, Mint Flap : Bag (no flap) Front Texts : One Teabag Organic Mint Tea Back Texts : This teebag contains organic green Tea and organic mint leaves.If you would like to know more about ... www.mrjones.org Enjoy your Tea! Flap Texts : Material : Glossy Paper Form : Rectangular Colours : Black, Green, White, Red Size : Weight : Country : Netherlands Year : Notes : NED-0004 Tea bag Name : Hotel D'Amour Brand Group : Serie Name : Bag number : Tea Type : Herbal Tea Flavours : Rose Flap : Bag (no flap) Front Texts : One Teabag Natural rose tea Back Texts : This teebag contains 100% natural rose tea produced in a traditional Chinese way.If you would like to know more about ... www.mrjones.org Enjoy your Tea! Flap Texts : Material : Glossy Paper Form : Rectangular Colours : Black, Pink, White, Blue Size : Weight : Country : Netherlands Year : Notes : NED-0005 160px 160px Tea bag Name : Instant Karma Brand Group : Serie Name : Bag number : Tea Type : Organic Flavours : Cinnamon, Liquorice, Ginger Flap : Bag (no flap) Front Texts : One Teabag Organic spices and Herbs Back Texts : This teebag contains 100% natural rose tea produced in a traditional Chinese way.If you would like to know more about ... www.mrjones.org Enjoy your Tea! Flap Texts : Material : Glossy Paper Form : Rectangular Colours : Size : Weight : Country : Netherlands Year : Notes : NED-0006 Tea bag Name : Little Green Bag Brand Group : Serie Name : Bag number : Tea Type : Organic Green Tea Flavours : Green Tea Flap : Bag (no flap) Front Texts : One Teabag Organic Green Tea Back Texts : This teebag contains 100% organic green tea from India.If you would like to know more about ... www.mrjones.org Enjoy your Tea! Flap Texts : Material : Glossy Paper Form : Rectangular Colours : Black, Green, White Size : Weight : Country : Netherlands Year : Notes : NED-0007 Tea bag Name : Lulu's Garden Brand Group : Serie Name : Bag number : <|fim▁hole|> Flavours : Lychee Flap : Bag (no flap) Front Texts : One Teabag Natural Lychee Tea Back Texts : This teebag contains 100% natural lychee tea, produced in a traditional Chinese way.If you would like to know more about ... www.mrjones.org Enjoy your Tea! Flap Texts : Material : Glossy Paper Form : Rectangular Colours : Black, Green, White, Red, Blue Size : Weight : Country : Netherlands Year : Notes : NED-0008 Tea bag Name : Monkey's Wedding Brand Group : Serie Name : Bag number : Tea Type : Organic Tea Flavours : Earl Grey, Bergamot Flap : Bag (no flap) Front Texts : One Teabag Organic Earl Grey Back Texts : This teebag contains 100% organic tea from India flavoured with natural bergamot oil.If you would like to know more about ... www.mrjones.org Enjoy your Tea! Flap Texts : Material : Glossy Paper Form : Rectangular Colours : Black, Red, White, Orange Size : Weight : Country : Netherlands Year : Notes : NED-0009 Tea bag Name : Natural High Brand Group : Serie Name : Bag number : Tea Type : Organic Tea Flavours : Camomile Flap : Bag (no flap) Front Texts : One Teabag Organic Camomile Back Texts : This teebag contains 100% organic Camomile.If you would like to know more about ... www.mrjones.org Enjoy your Tea! Flap Texts : Material : Glossy Paper Form : Rectangular Colours : Black, Orange, White, Violet Size : Weight : Country : Netherlands Year : Notes : NED-0010 160px 160px Tea bag Name : Nice Nancy Brand Group : Serie Name : Bag number : Tea Type : Organic Tea Flavours : Lemon Flap : Bag (no flap) Front Texts : One Teabag Organic Camomile Back Texts : Enjoy your Tea! Flap Texts : Material : Glossy Paper Form : Rectangular Colours : Size : Weight : Country : Netherlands Year : Notes : NED-0011 Tea bag Name : Smoking Joe Brand Group : Serie Name : Bag number : Tea Type : Flavours : Camomile Flap : Bag (no flap) Front Texts : One Teabag Smoked Black Tea Back Texts : This teebag contains 100% smoked black tea, produced in a traditional Chinese way.If you would like to know more about ... www.mrjones.org Enjoy your Tea! Flap Texts : Material : Glossy Paper Form : Rectangular Colours : Black, Brown, White, Violet Size : Weight : Country : Netherlands Year : Notes : NED-00012 Tea bag Name : Stunning Sofia Brand Group : Serie Name : Bag number : Tea Type : Herbal Tea Flavours : Jasmine Flap : Bag (no flap) Front Texts : One Teabag Natural Jasmine Tea Back Texts : This teebag contains 100% natural jasmine tea, produced in a traditional Chinese way.If you would like to know more about ... www.mrjones.org Enjoy your Tea! Flap Texts : Material : Glossy Paper Form : Rectangular Colours : Black, Blue, White, Red Size : Weight : Country : Netherlands Year : Notes : Search Tea Bags by Brands : A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0-9 Search Tea Bags by Countries : A B C D E F G H I J K L M N O P R S T U V Y Z <|fim▁end|> | Tea Type : Herb Tea |
<|fim▁begin|> This is intended to be a hands on first look at Clojure. If you wish to try the examples as you go, then you may wish to have already set up a working environment as per http://en.wikibooks.org/wiki/Clojure_Programming/Getting_Started so you can see the results of the example code. Clojure programs are written in forms. Forms enclosed in parenthesis indicate function calls: (+ 1 2 3) calls the '+' function with arguments 1 2 3 and returns the value 6, the sum of arguments. New functions can be defined using defn: (defn average [x y] (/ (+ x y) 2)) Here x and y are symbols representing the input arguments. Function '/' is called to divide the sum of x and y by 2. Note that forms are always in prefix notation, with function followed by subsequent arguments. Now average can be invoked as (average 3 5) and will return 4. In this example, 'average' is a symbol, whose value is a function. (refer to http://clojure.org/reader for a detailed explanation of forms) Clojure provides easy access to the JVM: (.show (javax.swing.JFrame.)) This calls the show method on the result of (javax.swing.JFrame.) which constructs a new Jframe. Note the full stop before the method call and the full stop after the construction. (refer to http://clojure.org/java_interop) Functions can be passed to other functions: (map + [1 2 3] [4 5 6]) ;; Equivalent to (list (+ 1 4) (+ 2 5) (+ 3 6)) returns (5 7 9). Map is a function which takes another function and calls it with arguments taken from following collections. In our case we have provided the function '+' and two vectors of integers. The result is a list of the results of calling '+' with arguments taken from the vectors. Using functions as arguments to other functions is very powerful. We can use our previously defined average function with map like so: (map average [1 2 3] [4 5 6]) ;; Equivalent to (list (average 1 4) (average 2 5) (average 3 6)) returns (5/2 7/2 9/2) We see here that Clojure supports ratios as a data types. (refer to http://clojure.org/data_structures for a full list) Functions can also return other functions: (defn addx [x] (fn [y] (+ x y))) Here addx will return a new function that takes 1 argument and adds x to it. (addx 5) returns a function that can be called with 1 argument and will add 5 to it. (map (addx 5) [1 2 3 4 5]) returns (6 7 8 9 10) We called map with a the result of addx, which was a function that takes an argument and adds 5. That function was called on the list of numbers we supplied. There is a shorthand way to create an unnamed function: #(+ %1 %2) Will create a function that calls '+' with two arguments %1 and %2. (map #(+ %1 5) [1 2 3 4 5]) Will add 5 to the list of numbers we supplied. The ability to pass and create functions dynamically is referred to as first-class functions. Functional Programming treats computation as the evaluation of mathematical functions and avoids state and mutable data. In an imperative language you would typically create variables and change their value regularly. In Clojure you return new results without modifying what was there before. Contents 1 Functions without side-effects 2 Immutable data 2.1 You want to accumulate some changes 2.2 You want to iterate, instead use the loop/recur construct 2.3 You need to save a result and use it multiple times 2.4 You want to make multiple method calls on the same object 3 Mutating permanent state variables 3.1 Refs 3.2 Agents 3.3 Atoms 3.4 Vars Functions without side-effects Function side effects can be changing the values of inputs, changing global data, or performing IO. Imperative: void moveplayer( p, x, y ) updates a player object with a new location Object Oriented: class player { void move( x, y ) } again, mutates an existing object Functional: (moveplayer oldp x y) a completely new player is returned, the old player is unaffected In imperative you only know that p has changed because the function name hints it. And it might have changed other things such as some world data as well. In FP oldp is preserved (you don't need to worry about what happened to it or the world - nothing can change) and it is explicit that a new player is returned as a result of moving. The main advantages here are reasoning, testability, and concurrency. The language enforces that there are no side effects so you can infer behaviour. Inputs directly map to outputs which makes it easier to construct and think about test cases. Two threads can operate simultaneously on the same data with no risk of them corrupting each other, as the data will not be changed. Immutable data Consider removing an item from a list. The imperative solution would modify the list in place. A functional solution would return a completely new list, leaving the original in place. This sounds on the surface to be wasteful, but there are many ways that this is optimized by the compiler to be very efficient. Code without variables for someone used to imperative programming can take a little getting used to. Here is a quick guide to converting variable style code into functional code: You want to accumulate some changes // sum odds int x = 0; for (int i=1; i<100; i+=2) { x+=i; } Rearrange these sort of things into a form that requires no variables (reduce + (range 1 100 2)) (range 1 100 2) creates a lazy sequence of numbers 1 3 5 7 ... 99. 1 is the starting point, 100 is the end point, 2 is the step. reduce calls the + function. First it calls + with two arguments, the first two numbers supplied by range. Then it calls + again with the previous result and the next number, until all the numbers are exhausted. Clojure has lots of support for sequences, collections and high level operations. As you learn them, you will find very expressive ways to write tasks such as this. You want to iterate, instead use the loop/recur construct (loop [i 5 acc 1] (if (zero? i) acc (recur (dec i) (* acc i)))) computes the factorial of 5. The loop special form establishes bindings followed by expressions to be evaluated. In this example 5 is bound to i and 1 is bound to acc. The if special form then tests whether i is equal to zero. Since, it is not equal to 0, recur rebinds new values to i and acc before returning control back to the top of the loop in order to reevaluate the body of its expressions. A decremented i (dec i) is rebound to i and the product of acc and i (* acc i) is rebound to acc. This loop is recursively called until i equals 0; acc stores the result of multiplying each value i took. Note that a binding behaves like a variable. Also, recur can target either a loop or function definition: (defn factorial ([n] (factorial n 1)) ([n acc] (if (= n 0) acc (recur (dec n) (* acc n))))) In the above example, the factorial function can take either 1 argument [n], which results in the evaluation of: (factorial n 1) . Or supplying 2 arguments results in evaluation of: (if (= n 0) acc (recur (dec n) (* acc n))) recur is important because it rebinds the function's inputs instead of adding a recursive call to the stack. Had we instead used (factorial (dec n) (* acc n)) we would have similar behavior, but for large values of n, you may cause a stack overflow. Note also that we introduced two definitions for factorial, one with one argument, and another with two arguments. The user calls the one argument version, which gets translated into the two argument form for evaluation. The arity of a function is the number of arguments that the function takes. Of course we could have written an even simpler definition similar to the previous sum odd example: (defn factorial [n] (reduce * (range 2 (inc n)))) You need to save a result and use it multiple times There is a useful macro let which binds a symbol to a value for local use, (let [g (+ 0.2 (rand 0.8))] (Color3f. g g g)) in this let form a random number between 0 and 0.8 is generated, 0.2 is added, and the result is bound to the symbol g. A color is constructed with red green blue values of g, which will be a grey scale of intensity ranging from 0.2 to 1 You want to make multiple method calls on the same object Using java libraries often puts you into a situation where you want to use a local variable. Keep in mind doto. The great thing about doto is that it returns the object after applying several calls: (doto (javax.swing.JFrame.) (.setLayout (java.awt.GridLayout. 2 2 3 3)) (.add (javax.swing.JTextField.)) (.add (javax.swing.JLabel. "Enter some text")) (.setSize 300 80) (.setVisible true)) Mutating permanent state variables Clojure supports many mutable types, however it is important to know the difference between them and how they behave. The provided types are refs, agents, atoms and vars. Refs Refs are like ref cells in ML, boxes in Scheme, or pointers in other languages. It is a "box", that you can change the contents of. But unlike the other languages, the twist is that you can only make the change inside of a transaction. This ensures that two threads cannot have a conflict when updating or accessing what is stored inside the ref. (def r (ref nil)) declares r to be a ref with initial value of nil. (dosync (ref-set r 5)) sets r to 5 in a transaction. @r gets the value of r, which is 5. Note that @r is shorthand for (deref r), and works with all of Clojures mutable types. r itself is a ref, not a value. Agents Agents are modified by functions asynchronously. You send a function to the agent, which will later apply that function to its current value. It is asynchronous because the call to send returns immediately. The function is queued in a thread pool for execution, providing a convenient access to multi-threading. (def a (agent 1)) (send a inc) (await a) @a In this example we defined an agent with initial value 1. We sent the agent a function inc, which increments its argument. Now send queues that function for execution by a thread pool. await will block until all functions outstanding on an agent have completed. @a returns the value of our agent, which is now 2, because 1 was incremented. Atoms Atoms are modified by functions synchronously. <|fim▁hole|> you supply is applied to the value of the atom before swap! returns. (def a (atom 1)) (swap! a inc) Note that swap! returns the result of the function having been applied to the current atom value. Refs are 'coordinated' while agents and atoms are 'uncoordinated'. This means that in a multi-threaded environment, refs are modified in a transaction which ensures that only one thread can modify the value at a time. Whereas atoms and agents queue up change functions to ensure that the changes occur atomically. All of them are 'safe', they just use different strategies to provide this 'safety'. Vars Vars are like global variables in other languages. The "root binding" is an initial default value that is shared by all threads. The "binding" construct acts as if the var has been altered, but it is automatically restored to its previous value upon exiting the scope of the binding construct. (def something 5) Establishes a Var something with the value 5. Declaring functions actually establishes them as Vars. You should avoid using def, and especially avoid setting already declared bindings with def. Subsequently calling (def something 6) is not a thread-safe operation. “Why doesn't Clojure have local variables?” is an often raised question. Mutation locally is just as hard to reason about as mutation globally, independent of concurrency. See for example a typical Java for loop that sets other local vars and contains breaks/returns. If it takes more thought initially to construct solutions that don't need variables, please try to expend the effort - it will repay you many times over. However to support direct translation of imperative algorithms, there is a useful macro called with-local-vars which declares local vars which can be changed with var-set and read with var-get or @ for shorthand. (defn factorial [x] (with-local-vars [acc 1, cnt x] (while (> @cnt 0) (var-set acc (* @acc @cnt)) (var-set cnt (dec @cnt))) @acc)) This is a version of factorial using variables. As you can see it is not as nice as the versions described earlier, and is purely to demonstrate a local Var binding. This function is completely safe to call in a multi-threaded environment as the variables are local. However local variables cannot be allowed to leak out of their scope: (def f (with-local-vars [a 2] #(+ 2 @a))) (var user/f) (f) causes java.lang.IllegalStateException: Var null is unbound. The reason is that f returns a new function that adds 2 to a local variable defined in f. So the function returned is trying to hold onto a local variable of f. Now local variables are subject to change, but if change were to occur in a multi-threaded environment, and that variable had leaked outside its original scope, the change would not be local any more. Closure is a term used when symbols are retained outside their definition: (let [secret (ref "nothing")] (defn read-secret [] @secret) (defn write-secret [s] (dosync (ref-set secret s)))) Here we created two functions which both access a ref secret. We created them inside a let, so secret is not visible in our current scope anymore: secret causes java.lang.Exception: Unable to resolve symbol: secret in this context However the functions themselves have retained secret and can use it to communicate: (read-secret) results in "nothing" (write-secret "hi") results in "hi" (read-secret) results in "hi". Note that these functions might be passed to different threads but will still be valid because secret is a ref, so access to it is controlled via transaction. So let's write a multi-threaded program. But first we need some more helper functions: (defn random-word [] (nth ["hello" "bye" "foo" "bar" "baz"] (rand 5))) nth selects a value from the vector of words we supplied, in this case we called rand to get a number between 0 (inclusive) and 5 (exclusive). You can use (doc rand) to look up information about the rand function. (defn secret-modifier [id] (let [after (int (rand 10000))] (Thread/sleep after) (write-secret (str id " whispered " (random-word) " after " after " ms"))) id) Note that sleep is a static method of the java class Thread. Static methods and members must be accessed using a slash as shown. This function is going to be "sent" to an agent, so it must take an input argument (which is the current agent value) and returns a new value. In our case we don't want to change the value of the agent so we'll just return the input argument. Now the multi-threaded part: (def agents (map agent (range 4))) (doseq [a agents] (send-off a secret-modifier)) We declared four agents with initial values 0 1 2 3, and used send-off to get them to execute secret-modifier. If you are really quick and type (read-secret) you will see that the secret is being updated by the various threads. After 10 seconds all the threads will be finished, because they sleep for a random period between 0 and 10 seconds before modifying the secret. So after 10 seconds the secret is no longer changing, and will be something like this: "1 whispered hello after 9591 ms" Now we could have done something very similar just using java Threads: (dotimes [i 5] (.start (Thread. (fn [] (write-secret (str i " whispered " (random-word))))))) But agents have some handy advantages. You can check if an agent has raised an exception: (agent-errors (first agents)) Or wait until all the agents have finished executing: (apply await agents) Functions can be passed to agent via send or send-off, which places the function on a queue. The send queue is serviced by a thread-pool which is of the same size as the number of CPUs available. The send-off queue is serviced by a thread-pool which grows in order to provide a new thread immediately. In the above example we just wanted to see things happening on different threads, so we used send-off. However if our goal was computational throughput we would use send to perform calculation tasks as that would make best use of our processors. If a function is likely to block (like ours which sleeps for a random period), then it should not be dispatched with send, as it would tie up the 'computation' queue. So let's write a multi-threaded dumb shuffler: (dotimes [i 100000] (doseq [a agents] (send a #(+ %1 (- 2 (int (rand 5))))))) (apply await agents) (map deref agents) Returns something like (245 -549 -87 -97). In this example we are actually modifying the value of the agent, i.e.: using it to store state. Also we are using send to take advantage of a thread-pool which suits our system. Note however that one agent will only ever execute in one thread at a time, because the calls are queued to ensure that the value of the agent is correctly modified. As you can see, agents can be used to coordinate state changes and provide convenient access to two useful thread-pools. Clojure provides hash-maps which are very useful in many programming tasks. Maps are written between {} just like vectors are written between [] and lists are written between (). {:name "Tim", :occupation "Programmer"} Is a map which associates the keyword :name with "Tim" and :occupation with "Programmer". Note that the comma is treated as whitespace by Clojure but may be optionally supplied to help visually group things that go together. Keywords are preceded by : and provide a convenient way to name fields, however keys don't have to be keywords. (defn map-count [map key] (assoc map key (inc (get map key 0)))) This function takes a map as input, looks up a key and increments how many times that key has been counted. (get map key 0) just looks up key in map and returns its value if found, else 0. inc adds one to that value. (assoc map key value) will return a new map with key associated to value. So as you can see the map is not modified in any way. A new map is returned with a new value associated to the key supplied. (reduce map-count {} ["hi" "mum" "hi" "dad" "hi"]) Results in {"dad" 1, "mum" 1, "hi" 3} because reduce starts with an empty map which is used as the input to the first function call, then the resulting map is used for the next and so forth. The strings are used as keys. Now we can write a more useful function which takes a string and counts the words in it: (defn count-words [s] (reduce map-count {} (re-seq #"\w+" (.toLowerCase s)))) (count-words "hi mum hi dad hi") Gives the same result. Note that re-seq here splits the input string into words based upon the regular expression provided. One thing you will come across is that "maps are functions of their keys" which means: user=> ({:a 1, :b 2, :c 3} :a) 1 Here we created a map {:a 1, :b 2, :c 3}, can then called it like a function with the argument :a and it finds the value associated with that key, which is 1. Maps and keys do this trick by delegating to get, which is a function that looks up stuff: user=> (get {:a 1, :b 2} :a) 1 get also accepts an optional third argument, which is returned if key is not found in map: user=> (get {:a 1, :b 2} :e 0) 0 But you don't need to call get, you can just call the map: user=> ({:a 1, :b 2, :c 3} :e 0) 0 Keys can be called in the same way (reverse of what we did above): user=> (:e {:a 1, :b 2} 99) 99 user=> (:b {:a 1, :b 2} 99) 2 assoc returns a new map with a value associated to a key: user=> (assoc {:a 1, :b 2} :b 3) {:a 1, :b 3} Using this knowledge you should be able to decipher the following more cryptic version of count-words which does exactly the same thing: (defn count-words [s] (reduce #(assoc %1 %2 (inc (%1 %2 0))) {} (re-seq #"\w+" (.toLowerCase s)))) Here is an example of using a map as the value of an agent: (defn action [mdl key val] (assoc mdl key val)) (def ag (agent {:a 1 :b 2})) @ag (send ag action :b 3) ; send automatically supplies ag as the first argument to action (await ag) @ag The function we send updates the map setting the value at 'key' to 'val'. It is obvious in retrospect but you might get confused initially when writing the function, the first parameter is always the value held by the agent and this does not have to be dereferenced in the function. Lazy evaluation also warrants attention, I suggest reading http://blog.thinkrelevance.com/2008/12/1/living-lazy-without-variables If you enjoy learning by example, please also keep in mind http://en.wikibooks.org/wiki/Clojure_Programming/Examples/API_Examples which is a useful resource for looking up how the various core functions can be used. <|fim▁end|> | You call swap! and the function |
<|fim▁begin|> Ba Zi | Heavenly Stems | Earthly Branches | Hsia Calendar (Xia Calendar) | Hour Pillar | Luck Pillar | Life Cycle | Hidden Stems | Seasonal Cycle | Symbolic Stars | Aspects Of Life | Date Selection | List Of Ba Zi Contents 1 Year 1921 2 January 3 February 4 March 5 April 6 May 7 June 8 July 9 August 10 September 11 October 12 November 13 December Year 1921 The Ba Zi of anyone born in Year 1921. The Hour Pillar and Luck Pillars are obtained by clicking the items under the respective column. January S/N Year Month Day SS Hour Pillar Day Pillar Month Pillar Year Pillar Male Luck Pillar Female Luck Pillar 1 1921 1 1 11 Time of H1 H1_E1 H5_E1 H7_E9 Age 2 (H6E2f) Age 9 (H4E12r) 2 1921 1 2 11 Time of H2 H2_E2 H5_E1 H7_E9 Age 1 (H6E2f) Age 9 (H4E12r) 3 1921 1 3 11 Time of H3 H3_E3 H5_E1 H7_E9 Age 1 (H6E2f) Age 9 (H4E12r) 4 1921 1 4 11 Time of H4 H4_E4 H5_E1 H7_E9 Age 1 (H6E2f) Age 10 (H4E12r) 5 1921 1 5 11 Time of H5 H5_E5 H5_E1 H7_E9 Age 0 (H6E2f) Age 10 (H4E12r) 6 1921 1 6 12 Time of H6 H6_E6 H6_E2 H7_E9 Age 10 (H7E3f) Age 0 (H5E1r) 7 1921 1 7 12 Time of H7 H7_E7 H6_E2 H7_E9 Age 9 (H7E3f) Age 1 (H5E1r) 8 1921 1 8 12 Time of H8 H8_E8 H6_E2 H7_E9 Age 9 (H7E3f) Age 1 (H5E1r) 9 1921 1 9 12 Time of H9 H9_E9 H6_E2 H7_E9 Age 9 (H7E3f) Age 1 (H5E1r) 10 1921 1 10 12 Time of H10 H10_E10 H6_E2 H7_E9 Age 8 (H7E3f) Age 2 (H5E1r) 11 1921 1 11 12 Time of H1 H1_E11 H6_E2 H7_E9 Age 8 (H7E3f) Age 2 (H5E1r) 12 1921 1 12 12 Time of H2 H2_E12 H6_E2 H7_E9 Age 8 (H7E3f) Age 2 (H5E1r) 13 1921 1 13 12 Time of H3 H3_E1 H6_E2 H7_E9 Age 7 (H7E3f) Age 3 (H5E1r) 14 1921 1 14 12 Time of H4 H4_E2 H6_E2 H7_E9 Age 7 (H7E3f) Age 3 (H5E1r) 15 1921 1 15 12 Time of H5 H5_E3 H6_E2 H7_E9 Age 7 (H7E3f) Age 3 (H5E1r) 16 1921 1 16 12 Time of H6 H6_E4 H6_E2 H7_E9 Age 6 (H7E3f) Age 4 (H5E1r) 17 1921 1 17 12 Time of H7 H7_E5 H6_E2 H7_E9 Age 6 (H7E3f) Age 4 (H5E1r) 18 1921 1 18 12 Time of H8 H8_E6 H6_E2 H7_E9 Age 6 (H7E3f) Age 4 (H5E1r) 19 1921 1 19 12 Time of H9 H9_E7 H6_E2 H7_E9 Age 5 (H7E3f) Age 5 (H5E1r) 20 1921 1 20 12 Time of H10 H10_E8 H6_E2 H7_E9 Age 5 (H7E3f) Age 5 (H5E1r) 21 1921 1 21 12 Time of H1 H1_E9 H6_E2 H7_E9 Age 5 (H7E3f) Age 5 (H5E1r) 22 1921 1 22 12 Time of H2 H2_E10 H6_E2 H7_E9 Age 4 (H7E3f) Age 6 (H5E1r) 23 1921 1 23 12 Time of H3 H3_E11 H6_E2 H7_E9 Age 4 (H7E3f) Age 6 (H5E1r) 24 1921 1 24 12 Time of H4 H4_E12 H6_E2 H7_E9 Age 4 (H7E3f) Age 6 (H5E1r) 25 1921 1 25 12 Time of H5 H5_E1 H6_E2 H7_E9 Age 3 (H7E3f) Age 7 (H5E1r) 26 1921 1 26 12 Time of H6 H6_E2 H6_E2 H7_E9 Age 3 (H7E3f) Age 7 (H5E1r) 27 1921 1 27 12 Time of H7 H7_E3 H6_E2 H7_E9 Age 3 (H7E3f) Age 7 (H5E1r) 28 1921 1 28 12 Time of H8 H8_E4 H6_E2 H7_E9 Age 2 (H7E3f) Age 8 (H5E1r) 29 1921 1 29 12 Time of H9 H9_E5 H6_E2 H7_E9 Age 2 (H7E3f) Age 8 (H5E1r) 30 1921 1 30 12 Time of H10 H10_E6 H6_E2 H7_E9 Age 2 (H7E3f) Age 8 (H5E1r) 31 1921 1 31 12 Time of H1 H1_E7 H6_E2 H7_E9 Age 1 (H7E3f) Age 9 (H5E1r) Ba Zi | Luck Pillar | Jan | Feb | Mar | Apr | May | Jun | Jul | Aug | Sep | Oct | Nov | Dec February S/N Year Month Day SS Hour Pillar Day Pillar Month Pillar Year Pillar Male Luck Pillar Female Luck Pillar 32 1921 2 1 12 Time of H2 H2_E8 H6_E2 H7_E9 Age 1 (H7E3f) Age 9 (H5E1r) 33 1921 2 2 12 Time of H3 H3_E9 H6_E2 H7_E9 Age 1 (H7E3f) Age 9 (H5E1r) 34 1921 2 3 12 Time of H4 H4_E10 H6_E2 H7_E9 Age 0 (H7E3f) Age 10 (H5E1r) 35 1921 2 4 1 Time of H5 H5_E11 H7_E3 H8_E10 Age 0 (H6E2r) Age 10 (H8E4f) 36 1921 2 5 1 Time of H6 H6_E12 H7_E3 H8_E10 Age 1 (H6E2r) Age 10 (H8E4f) 37 1921 2 6 1 Time of H7 H7_E1 H7_E3 H8_E10 Age 1 (H6E2r) Age 9 (H8E4f) 38 1921 2 7 1 Time of H8 H8_E2 H7_E3 H8_E10 Age 1 (H6E2r) Age 9 (H8E4f) 39 1921 2 8 1 Time of H9 H9_E3 H7_E3 H8_E10 Age 2 (H6E2r) Age 9 (H8E4f) 40 1921 2 9 1 Time of H10 H10_E4 H7_E3 H8_E10 Age 2 (H6E2r) Age 8 (H8E4f) 41 1921 2 10 1 Time of H1 H1_E5 H7_E3 H8_E10 Age 2 (H6E2r) Age 8 (H8E4f) 42 1921 2 11 1 Time of H2 H2_E6 H7_E3 H8_E10 Age 3 (H6E2r) Age 8 (H8E4f) 43 1921 2 12 1 Time of H3 H3_E7 H7_E3 H8_E10 Age 3 (H6E2r) Age 7 (H8E4f) 44 1921 2 13 1 Time of H4 H4_E8 H7_E3 H8_E10 Age 3 (H6E2r) Age 7 (H8E4f) 45 1921 2 14 1 Time of H5 H5_E9 H7_E3 H8_E10 Age 4 (H6E2r) Age 7 (H8E4f) 46 1921 2 15 1 Time of H6 H6_E10 H7_E3 H8_E10 Age 4 (H6E2r) Age 6 (H8E4f) 47 1921 2 16 1 Time of H7 H7_E11 H7_E3 H8_E10 Age 4 (H6E2r) Age 6 (H8E4f) 48 1921 2 17 1 Time of H8 H8_E12 H7_E3 H8_E10 Age 5 (H6E2r) Age 6 (H8E4f) 49 1921 2 18 1 Time of H9 H9_E1 H7_E3 H8_E10 Age 5 (H6E2r) Age 5 (H8E4f) 50 1921 2 19 1 Time of H10 H10_E2 H7_E3 H8_E10 Age 5 (H6E2r) Age 5 (H8E4f) 51 1921 2 20 1 Time of H1 H1_E3 H7_E3 H8_E10 Age 6 (H6E2r) Age 5 (H8E4f) 52 1921 2 21 1 Time of H2 H2_E4 H7_E3 H8_E10 Age 6 (H6E2r) Age 4 (H8E4f) 53 1921 2 22 1 Time of H3 H3_E5 H7_E3 H8_E10 Age 6 (H6E2r) Age 4 (H8E4f) 54 1921 2 23 1 Time of H4 H4_E6 H7_E3 H8_E10 Age 7 (H6E2r) Age 4 (H8E4f) 55 1921 2 24 1 Time of H5 H5_E7 H7_E3 H8_E10 Age 7 (H6E2r) Age 3 (H8E4f) 56 1921 2 25 1 Time of H6 H6_E8 H7_E3 H8_E10 Age 7 (H6E2r) Age 3 (H8E4f) 57 1921 2 26 1 Time of H7 H7_E9 H7_E3 H8_E10 Age 8 (H6E2r) Age 3 (H8E4f) 58 1921 2 27 1 Time of H8 H8_E10 H7_E3 H8_E10 Age 8 (H6E2r) Age 2 (H8E4f) 59 1921 2 28 1 Time of H9 H9_E11 H7_E3 H8_E10 Age 8 (H6E2r) Age 2 (H8E4f) Ba Zi | Luck Pillar | Jan | Feb | Mar | Apr | May | Jun | Jul | Aug | Sep | Oct | Nov | Dec March S/N Year Month Day SS Hour Pillar Day Pillar Month Pillar Year Pillar Male Luck Pillar Female Luck Pillar 60 1921 3 1 1 Time of H10 H10_E12 H7_E3 H8_E10 Age 9 (H6E2r) Age 2 (H8E4f) 61 1921 3 2 1 Time of H1 H1_E1 H7_E3 H8_E10 Age 9 (H6E2r) Age 1 (H8E4f) 62 1921 3 3 1 Time of H2 H2_E2 H7_E3 H8_E10 Age 9 (H6E2r) Age 1 (H8E4f) 63 1921 3 4 1 Time of H3 H3_E3 H7_E3 H8_E10 Age 10 (H6E2r) Age 1 (H8E4f) 64 1921 3 5 1 Time of H4 H4_E4 H7_E3 H8_E10 Age 10 (H6E2r) Age 0 (H8E4f) 65 1921 3 6 2 Time of H5 H5_E5 H8_E4 H8_E10 Age 0 (H7E3r) Age 10 (H9E5f) 66 1921 3 7 2 Time of H6 H6_E6 H8_E4 H8_E10 Age 1 (H7E3r) Age 10 (H9E5f) 67 1921 3 8 2 Time of H7 H7_E7 H8_E4 H8_E10 Age 1 (H7E3r) Age 9 (H9E5f) 68 1921 3 9 2 Time of H8 H8_E8 H8_E4 H8_E10 Age 1 (H7E3r) Age 9 (H9E5f) 69 1921 3 10 2 Time of H9 H9_E9 H8_E4 H8_E10 Age 2 (H7E3r) Age 9 (H9E5f) 70 1921 3 11 2 Time of H10 H10_E10 H8_E4 H8_E10 Age 2 (H7E3r) Age 8 (H9E5f) 71 1921 3 12 2 Time of H1 H1_E11 H8_E4 H8_E10 Age 2 (H7E3r) Age 8 (H9E5f) 72 1921 3 13 2 Time of H2 H2_E12 H8_E4 H8_E10 Age 3 (H7E3r) Age 8 (H9E5f) 73 1921 3 14 2 Time of H3 H3_E1 H8_E4 H8_E10 Age 3 (H7E3r) Age 7 (H9E5f) 74 1921 3 15 2 Time of H4 H4_E2 H8_E4 H8_E10 Age 3 (H7E3r) Age 7 (H9E5f) 75 1921 3 16 2 Time of H5 H5_E3 H8_E4 H8_E10 Age 4 (H7E3r) Age 7 (H9E5f) 76 1921 3 17 2 Time of H6 H6_E4 H8_E4 H8_E10 Age 4 (H7E3r) Age 6 (H9E5f) 77 1921 3 18 2 Time of H7 H7_E5 H8_E4 H8_E10 Age 4 (H7E3r) Age 6 (H9E5f) 78 1921 3 19 2 Time of H8 H8_E6 H8_E4 H8_E10 Age 5 (H7E3r) Age 6 (H9E5f) 79 1921 3 20 2 Time of H9 H9_E7 H8_E4 H8_E10 Age 5 (H7E3r) Age 5 (H9E5f) 80 1921 3 21 2 Time of H10 H10_E8 H8_E4 H8_E10 Age 5 (H7E3r) Age 5 (H9E5f) 81 1921 3 22 2 Time of H1 H1_E9 H8_E4 H8_E10 Age 6 (H7E3r) Age 5 (H9E5f) 82 1921 3 23 2 Time of H2 H2_E10 H8_E4 H8_E10 Age 6 (H7E3r) Age 4 (H9E5f) 83 1921 3 24 2 Time of H3 H3_E11 H8_E4 H8_E10 Age 6 (H7E3r) Age 4 (H9E5f) 84 1921 3 25 2 Time of H4 H4_E12 H8_E4 H8_E10 Age 7 (H7E3r) Age 4 (H9E5f) 85 1921 3 26 2 Time of H5 H5_E1 H8_E4 H8_E10 Age 7 (H7E3r) Age 3 (H9E5f) 86 1921 3 27 2 Time of H6 H6_E2 H8_E4 H8_E10 Age 7 (H7E3r) Age 3 (H9E5f) 87 1921 3 28 2 Time of H7 H7_E3 H8_E4 H8_E10 Age 8 (H7E3r) Age 3 (H9E5f) 88 1921 3 29 2 Time of H8 H8_E4 H8_E4 H8_E10 Age 8 (H7E3r) Age 2 (H9E5f) 89 1921 3 30 2 Time of H9 H9_E5 H8_E4 H8_E10 Age 8 (H7E3r) Age 2 (H9E5f) 90 1921 3 31 2 Time of H10 H10_E6 H8_E4 H8_E10 Age 9 (H7E3r) Age 2 (H9E5f) Ba Zi | Luck Pillar | Jan | Feb | Mar | Apr | May | Jun | Jul | Aug | Sep | Oct | Nov | Dec April S/N Year Month Day SS Hour Pillar Day Pillar Month Pillar Year Pillar Male Luck Pillar Female Luck Pillar 91 1921 4 1 2 Time of H1 H1_E7 H8_E4 H8_E10 Age 9 (H7E3r) Age 1 (H9E5f) 92 1921 4 2 2 Time of H2 H2_E8 H8_E4 H8_E10 Age 9 (H7E3r) Age 1 (H9E5f) 93 1921 4 3 2 Time of H3 H3_E9 H8_E4 H8_E10 Age 10 (H7E3r) Age 1 (H9E5f) 94 1921 4 4 2 Time of H4 H4_E10 H8_E4 H8_E10 Age 10 (H7E3r) Age 0 (H9E5f) 95 1921 4 5 3 Time of H5 H5_E11 H9_E5 H8_E10 Age 0 (H8E4r) Age 10 (H10E6f) 96 1921 4 6 3 Time of H6 H6_E12 H9_E5 H8_E10 Age 1 (H8E4r) Age 10 (H10E6f) 97 1921 4 7 3 Time of H7 H7_E1 H9_E5 H8_E10 Age 1 (H8E4r) Age 10 (H10E6f) 98 1921 4 8 3 Time of H8 H8_E2 H9_E5 H8_E10 Age 1 (H8E4r) Age 9 (H10E6f) 99 1921 4 9 3 Time of H9 H9_E3 H9_E5 H8_E10 Age 2 (H8E4r) Age 9 (H10E6f) 100 1921 4 10 3 Time of H10 H10_E4 H9_E5 H8_E10 Age 2 (H8E4r) Age 9 (H10E6f) 101 1921 4 11 3 Time of H1 H1_E5 H9_E5 H8_E10 Age 2 (H8E4r) Age 8 (H10E6f) 102 1921 4 12 3 Time of H2 H2_E6 H9_E5 H8_E10 Age 3 (H8E4r) Age 8 (H10E6f) 103 1921 4 13 3 Time of H3 H3_E7 H9_E5 H8_E10 Age 3 (H8E4r) Age 8 (H10E6f) 104 1921 4 14 3 Time of H4 H4_E8 H9_E5 H8_E10 Age 3 (H8E4r) Age 7 (H10E6f) 105 1921 4 15 3 Time of H5 H5_E9 H9_E5 H8_E10 Age 4 (H8E4r) Age 7 (H10E6f) 106 1921 4 16 3 Time of H6 H6_E10 H9_E5 H8_E10 Age 4 (H8E4r) Age 7 (H10E6f) 107 1921 4 17 3 Time of H7 H7_E11 H9_E5 H8_E10 Age 4 (H8E4r) Age 6 (H10E6f) 108 1921 4 18 3 Time of H8 H8_E12 H9_E5 H8_E10 Age 5 (H8E4r) Age 6 (H10E6f) 109 1921 4 19 3 Time of H9 H9_E1 H9_E5 H8_E10 Age 5 (H8E4r) Age 6 (H10E6f) 110 1921 4 20 3 Time of H10 H10_E2 H9_E5 H8_E10 Age 5 (H8E4r) Age 5 (H10E6f) 111 1921 4 21 3 Time of H1 H1_E3 H9_E5 H8_E10 Age 6 (H8E4r) Age 5 (H10E6f) 112 1921 4 22 3 Time of H2 H2_E4 H9_E5 H8_E10 Age 6 (H8E4r) Age 5 (H10E6f) 113 1921 4 23 3 Time of H3 H3_E5 H9_E5 H8_E10 Age 6 (H8E4r) Age 4 (H10E6f) 114 1921 4 24 3 Time of H4 H4_E6 H9_E5 H8_E10 Age 7 (H8E4r) Age 4 (H10E6f) 115 1921 4 25 3 Time of H5 H5_E7 H9_E5 H8_E10 Age 7 (H8E4r) Age 4 (H10E6f) 116 1921 4 26 3 Time of H6 H6_E8 H9_E5 H8_E10 Age 7 (H8E4r) Age 3 (H10E6f) 117 1921 4 27 3 Time of H7 H7_E9 H9_E5 H8_E10 Age 8 (H8E4r) Age 3 (H10E6f) 118 1921 4 28 3 Time of H8 H8_E10 H9_E5 H8_E10 Age 8 (H8E4r) Age 3 (H10E6f) 119 1921 4 29 3 Time of H9 H9_E11 H9_E5 H8_E10 Age 8 (H8E4r) Age 2 (H10E6f) 120 1921 4 30 3 Time of H10 H10_E12 H9_E5 H8_E10 Age 9 (H8E4r) Age 2 (H10E6f) Ba Zi | Luck Pillar | Jan | Feb | Mar | Apr | May | Jun | Jul | Aug | Sep | Oct | Nov | Dec May S/N Year Month Day SS Hour Pillar Day Pillar Month Pillar Year Pillar Male Luck Pillar Female Luck Pillar 121 1921 5 1 3 Time of H1 H1_E1 H9_E5 H8_E10 Age 9 (H8E4r) Age 2 (H10E6f) 122 1921 5 2 3 Time of H2 H2_E2 H9_E5 H8_E10 Age 9 (H8E4r) Age 1 (H10E6f) 123 1921 5 3 3 Time of H3 H3_E3 H9_E5 H8_E10 Age 10 (H8E4r) Age 1 (H10E6f) 124 1921 5 4 3 Time of H4 H4_E4 H9_E5 H8_E10 Age 10 (H8E4r) Age 1 (H10E6f) 125 1921 5 5 3 Time of H5 H5_E5 H9_E5 H8_E10 Age 10 (H8E4r) Age 0 (H10E6f) 126 1921 5 6 4 Time of H6 H6_E6 H10_E6 H8_E10 Age 0 (H9E5r) Age 10 (H1E7f) 127 1921 5 7 4 Time of H7 H7_E7 H10_E6 H8_E10 Age 1 (H9E5r) Age 10 (H1E7f) 128 1921 5 8 4 Time of H8 H8_E8 H10_E6 H8_E10 Age 1 (H9E5r) Age 10 (H1E7f) 129 1921 5 9 4 Time of H9 H9_E9 H10_E6 H8_E10 Age 1 (H9E5r) Age 9 (H1E7f) 130 1921 5 10 4 Time of H10 H10_E10 H10_E6 H8_E10 Age 2 (H9E5r) Age 9 (H1E7f) 131 1921 5 11 4 Time of H1 H1_E11 H10_E6 H8_E10 Age 2 (H9E5r) Age 9 (H1E7f) 132 1921 5 12 4 Time of H2 H2_E12 H10_E6 H8_E10 Age 2 (H9E5r) Age 8 (H1E7f) 133 1921 5 13 4 Time of H3 H3_E1 H10_E6 H8_E10 Age 3 (H9E5r) Age 8 (H1E7f) 134 1921 5 14 4 Time of H4 H4_E2 H10_E6 H8_E10 Age 3 (H9E5r) Age 8 (H1E7f) 135 1921 5 15 4 Time of H5 H5_E3 H10_E6 H8_E10 Age 3 (H9E5r) Age 7 (H1E7f) 136 1921 5 16 4 Time of H6 H6_E4 H10_E6 H8_E10 Age 4 (H9E5r) Age 7 (H1E7f) 137 1921 5 17 4 Time of H7 H7_E5 H10_E6 H8_E10 Age 4 (H9E5r) Age 7 (H1E7f) 138 1921 5 18 4 Time of H8 H8_E6 H10_E6 H8_E10 Age 4 (H9E5r) Age 6 (H1E7f) 139 1921 5 19 4 Time of H9 H9_E7 H10_E6 H8_E10 Age 5 (H9E5r) Age 6 (H1E7f) 140 1921 5 20 4 Time of H10 H10_E8 H10_E6 H8_E10 Age 5 (H9E5r) Age 6 (H1E7f) 141 1921 5 21 4 Time of H1 H1_E9 H10_E6 H8_E10 Age 5 (H9E5r) Age 5 (H1E7f) 142 1921 5 22 4 Time of H2 H2_E10 H10_E6 H8_E10 Age 6 (H9E5r) Age 5 (H1E7f) 143 1921 5 23 4 Time of H3 H3_E11 H10_E6 H8_E10 Age 6 (H9E5r) Age 5 (H1E7f) 144 1921 5 24 4 Time of H4 H4_E12 H10_E6 H8_E10 Age 6 (H9E5r) Age 4 (H1E7f) 145 1921 5 25 4 Time of H5 H5_E1 H10_E6 H8_E10 Age 7 (H9E5r) Age 4 (H1E7f) 146 1921 5 26 4 Time of H6 H6_E2 H10_E6 H8_E10 Age 7 (H9E5r) Age 4 (H1E7f) 147 1921 5 27 4 Time of H7 H7_E3 H10_E6 H8_E10 Age 7 (H9E5r) Age 3 (H1E7f) 148 1921 5 28 4 Time of H8 H8_E4 H10_E6 H8_E10 Age 8 (H9E5r) Age 3 (H1E7f) 149 1921 5 29 4 Time of H9 H9_E5 H10_E6 H8_E10 Age 8 (H9E5r) Age 3 (H1E7f) 150 1921 5 30 4 Time of H10 H10_E6 H10_E6 H8_E10 Age 8 (H9E5r) Age 2 (H1E7f) 151 1921 5 31 4 Time of H1 H1_E7 H10_E6 H8_E10 Age 9 (H9E5r) Age 2 (H1E7f) Ba Zi | Luck Pillar | Jan | Feb | Mar | Apr | May | Jun | Jul | Aug | Sep | Oct | Nov | Dec June S/N Year Month Day SS Hour Pillar Day Pillar Month Pillar Year Pillar Male Luck Pillar Female Luck Pillar 152 1921 6 1 4 Time of H2 H2_E8 H10_E6 H8_E10 Age 9 (H9E5r) Age 2 (H1E7f) 153 1921 6 2 4 Time of H3 H3_E9 H10_E6 H8_E10 Age 9 (H9E5r) Age 1 (H1E7f) 154 1921 6 3 4 Time of H4 H4_E10 H10_E6 H8_E10 Age 10 (H9E5r) Age 1 (H1E7f) 155 1921 6 4 4 Time of H5 H5_E11 H10_E6 H8_E10 Age 10 (H9E5r) Age 1 (H1E7f) 156 1921 6 5 4 Time of H6 H6_E12 H10_E6 H8_E10 Age 10 (H9E5r) Age 0 (H1E7f) 157 1921 6 6 5 Time of H7 H7_E1 H1_E7 H8_E10 Age 0 (H10E6r) Age 11 (H2E8f) 158 1921 6 7 5 Time of H8 H8_E2 H1_E7 H8_E10 Age 1 (H10E6r) Age 10 (H2E8f) 159 1921 6 8 5 Time of H9 H9_E3 H1_E7 H8_E10 Age 1 (H10E6r) Age 10 (H2E8f) 160 1921 6 9 5 Time of H10 H10_E4 H1_E7 H8_E10 Age 1 (H10E6r) Age 10 (H2E8f) 161 1921 6 10 5 Time of H1 H1_E5 H1_E7 H8_E10 Age 2 (H10E6r) Age 9 (H2E8f) 162 1921 6 11 5 Time of H2 H2_E6 H1_E7 H8_E10 Age 2 (H10E6r) Age 9 (H2E8f) 163 1921 6 12 5 Time of H3 H3_E7 H1_E7 H8_E10 Age 2 (H10E6r) Age 9 (H2E8f) 164 1921 6 13 5 Time of H4 H4_E8 H1_E7 H8_E10 Age 3 (H10E6r) Age 8 (H2E8f) 165 1921 6 14 5 Time of H5 H5_E9 H1_E7 H8_E10 Age 3 (H10E6r) Age 8 (H2E8f) 166 1921 6 15 5 Time of H6 H6_E10 H1_E7 H8_E10 Age 3 (H10E6r) Age 8 (H2E8f) 167 1921 6 16 5 Time of H7 H7_E11 H1_E7 H8_E10 Age 4 (H10E6r) Age 7 (H2E8f) 168 1921 6 17 5 Time of H8 H8_E12 H1_E7 H8_E10 Age 4 (H10E6r) Age 7 (H2E8f) 169 1921 6 18 5 Time of H9 H9_E1 H1_E7 H8_E10 Age 4 (H10E6r) Age 7 (H2E8f) 170 1921 6 19 5 Time of H10 H10_E2 H1_E7 H8_E10 Age 5 (H10E6r) Age 6 (H2E8f) 171 1921 6 20 5 Time of H1 H1_E3 H1_E7 H8_E10 Age 5 (H10E6r) Age 6 (H2E8f) 172 1921 6 21 5 Time of H2 H2_E4 H1_E7 H8_E10 Age 5 (H10E6r) Age 6 (H2E8f) 173 1921 6 22 5 Time of H3 H3_E5 H1_E7 H8_E10 Age 6 (H10E6r) Age 5 (H2E8f) 174 1921 6 23 5 Time of H4 H4_E6 H1_E7 H8_E10 Age 6 (H10E6r) Age 5 (H2E8f) 175 1921 6 24 5 Time of H5 H5_E7 H1_E7 H8_E10 Age 6 (H10E6r) Age 5 (H2E8f) 176 1921 6 25 5 Time of H6 H6_E8 H1_E7 H8_E10 Age 7 (H10E6r) Age 4 (H2E8f) 177 1921 6 26 5 Time of H7 H7_E9 H1_E7 H8_E10 Age 7 (H10E6r) Age 4 (H2E8f) 178 1921 6 27 5 Time of H8 H8_E10 H1_E7 H8_E10 Age 7 (H10E6r) Age 4 (H2E8f) 179 1921 6 28 5 Time of H9 H9_E11 H1_E7 H8_E10 Age 8 (H10E6r) Age 3 (H2E8f) 180 1921 6 29 5 Time of H10 H10_E12 H1_E7 H8_E10 Age 8 (H10E6r) Age 3 (H2E8f) 181 1921 6 30 5 Time of H1 H1_E1 H1_E7 H8_E10 Age 8 (H10E6r) Age 3 (H2E8f) Ba Zi | Luck Pillar | Jan | Feb | Mar | Apr | May | Jun | Jul | Aug | Sep | Oct | Nov | Dec July S/N Year Month Day SS Hour Pillar Day Pillar Month Pillar Year Pillar Male Luck Pillar Female Luck Pillar 182 1921 7 1 5 Time of H2 H2_E2 H1_E7 H8_E10 Age 9 (H10E6r) Age 2 (H2E8f) 183 1921 7 2 5 Time of H3 H3_E3 H1_E7 H8_E10 Age 9 (H10E6r) Age 2 (H2E8f) 184 1921 7 3 5 Time of H4 H4_E4 H1_E7 H8_E10 Age 9 (H10E6r) Age 2 (H2E8f) 185 1921 7 4 5 Time of H5 H5_E5 H1_E7 H8_E10 Age 10 (H10E6r) Age 1 <|fim▁hole|> 5 Time of H6 H6_E6 H1_E7 H8_E10 Age 10 (H10E6r) Age 1 (H2E8f) 187 1921 7 6 5 Time of H7 H7_E7 H1_E7 H8_E10 Age 10 (H10E6r) Age 1 (H2E8f) 188 1921 7 7 5 Time of H8 H8_E8 H1_E7 H8_E10 Age 11 (H10E6r) Age 0 (H2E8f) 189 1921 7 8 6 Time of H9 H9_E9 H2_E8 H8_E10 Age 0 (H1E7r) Age 9 (H3E9f) 190 1921 7 9 6 Time of H10 H10_E10 H2_E8 H8_E10 Age 1 (H1E7r) Age 9 (H3E9f) 191 1921 7 10 6 Time of H1 H1_E11 H2_E8 H8_E10 Age 1 (H1E7r) Age 8 (H3E9f) 192 1921 7 11 6 Time of H2 H2_E12 H2_E8 H8_E10 Age 1 (H1E7r) Age 8 (H3E9f) 193 1921 7 12 6 Time of H3 H3_E1 H2_E8 H8_E10 Age 2 (H1E7r) Age 8 (H3E9f) 194 1921 7 13 6 Time of H4 H4_E2 H2_E8 H8_E10 Age 2 (H1E7r) Age 7 (H3E9f) 195 1921 7 14 6 Time of H5 H5_E3 H2_E8 H8_E10 Age 2 (H1E7r) Age 7 (H3E9f) 196 1921 7 15 6 Time of H6 H6_E4 H2_E8 H8_E10 Age 3 (H1E7r) Age 7 (H3E9f) 197 1921 7 16 6 Time of H7 H7_E5 H2_E8 H8_E10 Age 3 (H1E7r) Age 6 (H3E9f) 198 1921 7 17 6 Time of H8 H8_E6 H2_E8 H8_E10 Age 3 (H1E7r) Age 6 (H3E9f) 199 1921 7 18 6 Time of H9 H9_E7 H2_E8 H8_E10 Age 4 (H1E7r) Age 6 (H3E9f) 200 1921 7 19 6 Time of H10 H10_E8 H2_E8 H8_E10 Age 4 (H1E7r) Age 5 (H3E9f) 201 1921 7 20 6 Time of H1 H1_E9 H2_E8 H8_E10 Age 4 (H1E7r) Age 5 (H3E9f) 202 1921 7 21 6 Time of H2 H2_E10 H2_E8 H8_E10 Age 5 (H1E7r) Age 5 (H3E9f) 203 1921 7 22 6 Time of H3 H3_E11 H2_E8 H8_E10 Age 5 (H1E7r) Age 4 (H3E9f) 204 1921 7 23 6 Time of H4 H4_E12 H2_E8 H8_E10 Age 5 (H1E7r) Age 4 (H3E9f) 205 1921 7 24 6 Time of H5 H5_E1 H2_E8 H8_E10 Age 6 (H1E7r) Age 4 (H3E9f) 206 1921 7 25 6 Time of H6 H6_E2 H2_E8 H8_E10 Age 6 (H1E7r) Age 3 (H3E9f) 207 1921 7 26 6 Time of H7 H7_E3 H2_E8 H8_E10 Age 6 (H1E7r) Age 3 (H3E9f) 208 1921 7 27 6 Time of H8 H8_E4 H2_E8 H8_E10 Age 7 (H1E7r) Age 3 (H3E9f) 209 1921 7 28 6 Time of H9 H9_E5 H2_E8 H8_E10 Age 7 (H1E7r) Age 2 (H3E9f) 210 1921 7 29 6 Time of H10 H10_E6 H2_E8 H8_E10 Age 7 (H1E7r) Age 2 (H3E9f) 211 1921 7 30 6 Time of H1 H1_E7 H2_E8 H8_E10 Age 8 (H1E7r) Age 2 (H3E9f) 212 1921 7 31 6 Time of H2 H2_E8 H2_E8 H8_E10 Age 8 (H1E7r) Age 1 (H3E9f) Ba Zi | Luck Pillar | Jan | Feb | Mar | Apr | May | Jun | Jul | Aug | Sep | Oct | Nov | Dec August S/N Year Month Day SS Hour Pillar Day Pillar Month Pillar Year Pillar Male Luck Pillar Female Luck Pillar 213 1921 8 1 6 Time of H3 H3_E9 H2_E8 H8_E10 Age 8 (H1E7r) Age 1 (H3E9f) 214 1921 8 2 6 Time of H4 H4_E10 H2_E8 H8_E10 Age 9 (H1E7r) Age 1 (H3E9f) 215 1921 8 3 6 Time of H5 H5_E11 H2_E8 H8_E10 Age 9 (H1E7r) Age 0 (H3E9f) 216 1921 8 4 7 Time of H6 H6_E12 H3_E9 H8_E10 Age 0 (H2E8r) Age 11 (H4E10f) 217 1921 8 5 7 Time of H7 H7_E1 H3_E9 H8_E10 Age 1 (H2E8r) Age 11 (H4E10f) 218 1921 8 6 7 Time of H8 H8_E2 H3_E9 H8_E10 Age 1 (H2E8r) Age 11 (H4E10f) 219 1921 8 7 7 Time of H9 H9_E3 H3_E9 H8_E10 Age 1 (H2E8r) Age 11 (H4E10f) 220 1921 8 8 7 Time of H10 H10_E4 H3_E9 H8_E10 Age 2 (H2E8r) Age 10 (H4E10f) 221 1921 8 9 7 Time of H1 H1_E5 H3_E9 H8_E10 Age 2 (H2E8r) Age 10 (H4E10f) 222 1921 8 10 7 Time of H2 H2_E6 H3_E9 H8_E10 Age 2 (H2E8r) Age 10 (H4E10f) 223 1921 8 11 7 Time of H3 H3_E7 H3_E9 H8_E10 Age 3 (H2E8r) Age 9 (H4E10f) 224 1921 8 12 7 Time of H4 H4_E8 H3_E9 H8_E10 Age 3 (H2E8r) Age 9 (H4E10f) 225 1921 8 13 7 Time of H5 H5_E9 H3_E9 H8_E10 Age 3 (H2E8r) Age 9 (H4E10f) 226 1921 8 14 7 Time of H6 H6_E10 H3_E9 H8_E10 Age 4 (H2E8r) Age 8 (H4E10f) 227 1921 8 15 7 Time of H7 H7_E11 H3_E9 H8_E10 Age 4 (H2E8r) Age 8 (H4E10f) 228 1921 8 16 7 Time of H8 H8_E12 H3_E9 H8_E10 Age 4 (H2E8r) Age 8 (H4E10f) 229 1921 8 17 7 Time of H9 H9_E1 H3_E9 H8_E10 Age 5 (H2E8r) Age 7 (H4E10f) 230 1921 8 18 7 Time of H10 H10_E2 H3_E9 H8_E10 Age 5 (H2E8r) Age 7 (H4E10f) 231 1921 8 19 7 Time of H1 H1_E3 H3_E9 H8_E10 Age 5 (H2E8r) Age 7 (H4E10f) 232 1921 8 20 7 Time of H2 H2_E4 H3_E9 H8_E10 Age 6 (H2E8r) Age 6 (H4E10f) 233 1921 8 21 7 Time of H3 H3_E5 H3_E9 H8_E10 Age 6 (H2E8r) Age 6 (H4E10f) 234 1921 8 22 7 Time of H4 H4_E6 H3_E9 H8_E10 Age 6 (H2E8r) Age 6 (H4E10f) 235 1921 8 23 7 Time of H5 H5_E7 H3_E9 H8_E10 Age 7 (H2E8r) Age 5 (H4E10f) 236 1921 8 24 7 Time of H6 H6_E8 H3_E9 H8_E10 Age 7 (H2E8r) Age 5 (H4E10f) 237 1921 8 25 7 Time of H7 H7_E9 H3_E9 H8_E10 Age 7 (H2E8r) Age 5 (H4E10f) 238 1921 8 26 7 Time of H8 H8_E10 H3_E9 H8_E10 Age 8 (H2E8r) Age 4 (H4E10f) 239 1921 8 27 7 Time of H9 H9_E11 H3_E9 H8_E10 Age 8 (H2E8r) Age 4 (H4E10f) 240 1921 8 28 7 Time of H10 H10_E12 H3_E9 H8_E10 Age 8 (H2E8r) Age 4 (H4E10f) 241 1921 8 29 7 Time of H1 H1_E1 H3_E9 H8_E10 Age 9 (H2E8r) Age 3 (H4E10f) 242 1921 8 30 7 Time of H2 H2_E2 H3_E9 H8_E10 Age 9 (H2E8r) Age 3 (H4E10f) 243 1921 8 31 7 Time of H3 H3_E3 H3_E9 H8_E10 Age 9 (H2E8r) Age 3 (H4E10f) Ba Zi | Luck Pillar | Jan | Feb | Mar | Apr | May | Jun | Jul | Aug | Sep | Oct | Nov | Dec September S/N Year Month Day SS Hour Pillar Day Pillar Month Pillar Year Pillar Male Luck Pillar Female Luck Pillar 244 1921 9 1 7 Time of H4 H4_E4 H3_E9 H8_E10 Age 10 (H2E8r) Age 2 (H4E10f) 245 1921 9 2 7 Time of H5 H5_E5 H3_E9 H8_E10 Age 10 (H2E8r) Age 2 (H4E10f) 246 1921 9 3 7 Time of H6 H6_E6 H3_E9 H8_E10 Age 10 (H2E8r) Age 2 (H4E10f) 247 1921 9 4 7 Time of H7 H7_E7 H3_E9 H8_E10 Age 11 (H2E8r) Age 1 (H4E10f) 248 1921 9 5 7 Time of H8 H8_E8 H3_E9 H8_E10 Age 11 (H2E8r) Age 1 (H4E10f) 249 1921 9 6 7 Time of H9 H9_E9 H3_E9 H8_E10 Age 11 (H2E8r) Age 1 (H4E10f) 250 1921 9 7 7 Time of H10 H10_E10 H3_E9 H8_E10 Age 11 (H2E8r) Age 0 (H4E10f) 251 1921 9 8 8 Time of H1 H1_E11 H4_E10 H8_E10 Age 0 (H3E9r) Age 10 (H5E11f) 252 1921 9 9 8 Time of H2 H2_E12 H4_E10 H8_E10 Age 1 (H3E9r) Age 10 (H5E11f) 253 1921 9 10 8 Time of H3 H3_E1 H4_E10 H8_E10 Age 1 (H3E9r) Age 10 (H5E11f) 254 1921 9 11 8 Time of H4 H4_E2 H4_E10 H8_E10 Age 1 (H3E9r) Age 9 (H5E11f) 255 1921 9 12 8 Time of H5 H5_E3 H4_E10 H8_E10 Age 2 (H3E9r) Age 9 (H5E11f) 256 1921 9 13 8 Time of H6 H6_E4 H4_E10 H8_E10 Age 2 (H3E9r) Age 9 (H5E11f) 257 1921 9 14 8 Time of H7 H7_E5 H4_E10 H8_E10 Age 2 (H3E9r) Age 8 (H5E11f) 258 1921 9 15 8 Time of H8 H8_E6 H4_E10 H8_E10 Age 3 (H3E9r) Age 8 (H5E11f) 259 1921 9 16 8 Time of H9 H9_E7 H4_E10 H8_E10 Age 3 (H3E9r) Age 8 (H5E11f) 260 1921 9 17 8 Time of H10 H10_E8 H4_E10 H8_E10 Age 3 (H3E9r) Age 7 (H5E11f) 261 1921 9 18 8 Time of H1 H1_E9 H4_E10 H8_E10 Age 4 (H3E9r) Age 7 (H5E11f) 262 1921 9 19 8 Time of H2 H2_E10 H4_E10 H8_E10 Age 4 (H3E9r) Age 7 (H5E11f) 263 1921 9 20 8 Time of H3 H3_E11 H4_E10 H8_E10 Age 4 (H3E9r) Age 6 (H5E11f) 264 1921 9 21 8 Time of H4 H4_E12 H4_E10 H8_E10 Age 5 (H3E9r) Age 6 (H5E11f) 265 1921 9 22 8 Time of H5 H5_E1 H4_E10 H8_E10 Age 5 (H3E9r) Age 6 (H5E11f) 266 1921 9 23 8 Time of H6 H6_E2 H4_E10 H8_E10 Age 5 (H3E9r) Age 5 (H5E11f) 267 1921 9 24 8 Time of H7 H7_E3 H4_E10 H8_E10 Age 6 (H3E9r) Age 5 (H5E11f) 268 1921 9 25 8 Time of H8 H8_E4 H4_E10 H8_E10 Age 6 (H3E9r) Age 5 (H5E11f) 269 1921 9 26 8 Time of H9 H9_E5 H4_E10 H8_E10 Age 6 (H3E9r) Age 4 (H5E11f) 270 1921 9 27 8 Time of H10 H10_E6 H4_E10 H8_E10 Age 7 (H3E9r) Age 4 (H5E11f) 271 1921 9 28 8 Time of H1 H1_E7 H4_E10 H8_E10 Age 7 (H3E9r) Age 4 (H5E11f) 272 1921 9 29 8 Time of H2 H2_E8 H4_E10 H8_E10 Age 7 (H3E9r) Age 3 (H5E11f) 273 1921 9 30 8 Time of H3 H3_E9 H4_E10 H8_E10 Age 8 (H3E9r) Age 3 (H5E11f) Ba Zi | Luck Pillar | Jan | Feb | Mar | Apr | May | Jun | Jul | Aug | Sep | Oct | Nov | Dec October S/N Year Month Day SS Hour Pillar Day Pillar Month Pillar Year Pillar Male Luck Pillar Female Luck Pillar 274 1921 10 1 8 Time of H4 H4_E10 H4_E10 H8_E10 Age 8 (H3E9r) Age 3 (H5E11f) 275 1921 10 2 8 Time of H5 H5_E11 H4_E10 H8_E10 Age 8 (H3E9r) Age 2 (H5E11f) 276 1921 10 3 8 Time of H6 H6_E12 H4_E10 H8_E10 Age 9 (H3E9r) Age 2 (H5E11f) 277 1921 10 4 8 Time of H7 H7_E1 H4_E10 H8_E10 Age 9 (H3E9r) Age 2 (H5E11f) 278 1921 10 5 8 Time of H8 H8_E2 H4_E10 H8_E10 Age 9 (H3E9r) Age 1 (H5E11f) 279 1921 10 6 8 Time of H9 H9_E3 H4_E10 H8_E10 Age 10 (H3E9r) Age 1 (H5E11f) 280 1921 10 7 8 Time of H10 H10_E4 H4_E10 H8_E10 Age 10 (H3E9r) Age 1 (H5E11f) 281 1921 10 8 8 Time of H1 H1_E5 H4_E10 H8_E10 Age 10 (H3E9r) Age 0 (H5E11f) 282 1921 10 9 9 Time of H2 H2_E6 H5_E11 H8_E10 Age 0 (H4E10r) Age 10 (H6E12f) 283 1921 10 10 9 Time of H3 H3_E7 H5_E11 H8_E10 Age 1 (H4E10r) Age 10 (H6E12f) 284 1921 10 11 9 Time of H4 H4_E8 H5_E11 H8_E10 Age 1 (H4E10r) Age 9 (H6E12f) 285 1921 10 12 9 Time of H5 H5_E9 H5_E11 H8_E10 Age 1 (H4E10r) Age 9 (H6E12f) 286 1921 10 13 9 Time of H6 H6_E10 H5_E11 H8_E10 Age 2 (H4E10r) Age 9 (H6E12f) 287 1921 10 14 9 Time of H7 H7_E11 H5_E11 H8_E10 Age 2 (H4E10r) Age 8 (H6E12f) 288 1921 10 15 9 Time of H8 H8_E12 H5_E11 H8_E10 Age 2 (H4E10r) Age 8 (H6E12f) 289 1921 10 16 9 Time of H9 H9_E1 H5_E11 H8_E10 Age 3 (H4E10r) Age 8 (H6E12f) 290 1921 10 17 9 Time of H10 H10_E2 H5_E11 H8_E10 Age 3 (H4E10r) Age 7 (H6E12f) 291 1921 10 18 9 Time of H1 H1_E3 H5_E11 H8_E10 Age 3 (H4E10r) Age 7 (H6E12f) 292 1921 10 19 9 Time of H2 H2_E4 H5_E11 H8_E10 Age 4 (H4E10r) Age 7 (H6E12f) 293 1921 10 20 9 Time of H3 H3_E5 H5_E11 H8_E10 Age 4 (H4E10r) Age 6 (H6E12f) 294 1921 10 21 9 Time of H4 H4_E6 H5_E11 H8_E10 Age 4 (H4E10r) Age 6 (H6E12f) 295 1921 10 22 9 Time of H5 H5_E7 H5_E11 H8_E10 Age 5 (H4E10r) Age 6 (H6E12f) 296 1921 10 23 9 Time of H6 H6_E8 H5_E11 H8_E10 Age 5 (H4E10r) Age 5 (H6E12f) 297 1921 10 24 9 Time of H7 H7_E9 H5_E11 H8_E10 Age 5 (H4E10r) Age 5 (H6E12f) 298 1921 10 25 9 Time of H8 H8_E10 H5_E11 H8_E10 Age 6 (H4E10r) Age 5 (H6E12f) 299 1921 10 26 9 Time of H9 H9_E11 H5_E11 H8_E10 Age 6 (H4E10r) Age 4 (H6E12f) 300 1921 10 27 9 Time of H10 H10_E12 H5_E11 H8_E10 Age 6 (H4E10r) Age 4 (H6E12f) 301 1921 10 28 9 Time of H1 H1_E1 H5_E11 H8_E10 Age 7 (H4E10r) Age 4 (H6E12f) 302 1921 10 29 9 Time of H2 H2_E2 H5_E11 H8_E10 Age 7 (H4E10r) Age 3 (H6E12f) 303 1921 10 30 9 Time of H3 H3_E3 H5_E11 H8_E10 Age 7 (H4E10r) Age 3 (H6E12f) 304 1921 10 31 9 Time of H4 H4_E4 H5_E11 H8_E10 Age 8 (H4E10r) Age 3 (H6E12f) Ba Zi | Luck Pillar | Jan | Feb | Mar | Apr | May | Jun | Jul | Aug | Sep | Oct | Nov | Dec November S/N Year Month Day SS Hour Pillar Day Pillar Month Pillar Year Pillar Male Luck Pillar Female Luck Pillar 305 1921 11 1 9 Time of H5 H5_E5 H5_E11 H8_E10 Age 8 (H4E10r) Age 2 (H6E12f) 306 1921 11 2 9 Time of H6 H6_E6 H5_E11 H8_E10 Age 8 (H4E10r) Age 2 (H6E12f) 307 1921 11 3 9 Time of H7 H7_E7 H5_E11 H8_E10 Age 9 (H4E10r) Age 2 (H6E12f) 308 1921 11 4 9 Time of H8 H8_E8 H5_E11 H8_E10 Age 9 (H4E10r) Age 1 (H6E12f) 309 1921 11 5 9 Time of H9 H9_E9 H5_E11 H8_E10 Age 9 (H4E10r) Age 1 (H6E12f) 310 1921 11 6 9 Time of H10 H10_E10 H5_E11 H8_E10 Age 10 (H4E10r) Age 1 (H6E12f) 311 1921 11 7 9 Time of H1 H1_E11 H5_E11 H8_E10 Age 10 (H4E10r) Age 0 (H6E12f) 312 1921 11 8 10 Time of H2 H2_E12 H6_E12 H8_E10 Age 0 (H5E11r) Age 10 (H7E1f) 313 1921 11 9 10 Time of H3 H3_E1 H6_E12 H8_E10 Age 1 (H5E11r) Age 9 (H7E1f) 314 1921 11 10 10 Time of H4 H4_E2 H6_E12 H8_E10 Age 1 (H5E11r) Age 9 (H7E1f) 315 1921 11 11 10 Time of H5 H5_E3 H6_E12 H8_E10 Age 1 (H5E11r) Age 9 (H7E1f) 316 1921 11 12 10 Time of H6 H6_E4 H6_E12 H8_E10 Age 2 (H5E11r) Age 8 (H7E1f) 317 1921 11 13 10 Time of H7 H7_E5 H6_E12 H8_E10 Age 2 (H5E11r) Age 8 (H7E1f) 318 1921 11 14 10 Time of H8 H8_E6 H6_E12 H8_E10 Age 2 (H5E11r) Age 8 (H7E1f) 319 1921 11 15 10 Time of H9 H9_E7 H6_E12 H8_E10 Age 3 (H5E11r) Age 7 (H7E1f) 320 1921 11 16 10 Time of H10 H10_E8 H6_E12 H8_E10 Age 3 (H5E11r) Age 7 (H7E1f) 321 1921 11 17 10 Time of H1 H1_E9 H6_E12 H8_E10 Age 3 (H5E11r) Age 7 (H7E1f) 322 1921 11 18 10 Time of H2 H2_E10 H6_E12 H8_E10 Age 4 (H5E11r) Age 6 (H7E1f) 323 1921 11 19 10 Time of H3 H3_E11 H6_E12 H8_E10 Age 4 (H5E11r) Age 6 (H7E1f) 324 1921 11 20 10 Time of H4 H4_E12 H6_E12 H8_E10 Age 4 (H5E11r) Age 6 (H7E1f) 325 1921 11 21 10 Time of H5 H5_E1 H6_E12 H8_E10 Age 5 (H5E11r) Age 5 (H7E1f) 326 1921 11 22 10 Time of H6 H6_E2 H6_E12 H8_E10 Age 5 (H5E11r) Age 5 (H7E1f) 327 1921 11 23 10 Time of H7 H7_E3 H6_E12 H8_E10 Age 5 (H5E11r) Age 5 (H7E1f) 328 1921 11 24 10 Time of H8 H8_E4 H6_E12 H8_E10 Age 6 (H5E11r) Age 4 (H7E1f) 329 1921 11 25 10 Time of H9 H9_E5 H6_E12 H8_E10 Age 6 (H5E11r) Age 4 (H7E1f) 330 1921 11 26 10 Time of H10 H10_E6 H6_E12 H8_E10 Age 6 (H5E11r) Age 4 (H7E1f) 331 1921 11 27 10 Time of H1 H1_E7 H6_E12 H8_E10 Age 7 (H5E11r) Age 3 (H7E1f) 332 1921 11 28 10 Time of H2 H2_E8 H6_E12 H8_E10 Age 7 (H5E11r) Age 3 (H7E1f) 333 1921 11 29 10 Time of H3 H3_E9 H6_E12 H8_E10 Age 7 (H5E11r) Age 3 (H7E1f) 334 1921 11 30 10 Time of H4 H4_E10 H6_E12 H8_E10 Age 8 (H5E11r) Age 2 (H7E1f) Ba Zi | Luck Pillar | Jan | Feb | Mar | Apr | May | Jun | Jul | Aug | Sep | Oct | Nov | Dec December S/N Year Month Day SS Hour Pillar Day Pillar Month Pillar Year Pillar Male Luck Pillar Female Luck Pillar 335 1921 12 1 10 Time of H5 H5_E11 H6_E12 H8_E10 Age 8 (H5E11r) Age 2 (H7E1f) 336 1921 12 2 10 Time of H6 H6_E12 H6_E12 H8_E10 Age 8 (H5E11r) Age 2 (H7E1f) 337 1921 12 3 10 Time of H7 H7_E1 H6_E12 H8_E10 Age 9 (H5E11r) Age 1 (H7E1f) 338 1921 12 4 10 Time of H8 H8_E2 H6_E12 H8_E10 Age 9 (H5E11r) Age 1 (H7E1f) 339 1921 12 5 10 Time of H9 H9_E3 H6_E12 H8_E10 Age 9 (H5E11r) Age 1 (H7E1f) 340 1921 12 6 10 Time of H10 H10_E4 H6_E12 H8_E10 Age 10 (H5E11r) Age 0 (H7E1f) 341 1921 12 7 11 Time of H1 H1_E5 H7_E1 H8_E10 Age 0 (H6E12r) Age 10 (H8E2f) 342 1921 12 8 11 Time of H2 H2_E6 H7_E1 H8_E10 Age 1 (H6E12r) Age 10 (H8E2f) 343 1921 12 9 11 Time of H3 H3_E7 H7_E1 H8_E10 Age 1 (H6E12r) Age 9 (H8E2f) 344 1921 12 10 11 Time of H4 H4_E8 H7_E1 H8_E10 Age 1 (H6E12r) Age 9 (H8E2f) 345 1921 12 11 11 Time of H5 H5_E9 H7_E1 H8_E10 Age 2 (H6E12r) Age 9 (H8E2f) 346 1921 12 12 11 Time of H6 H6_E10 H7_E1 H8_E10 Age 2 (H6E12r) Age 8 (H8E2f) 347 1921 12 13 11 Time of H7 H7_E11 H7_E1 H8_E10 Age 2 (H6E12r) Age 8 (H8E2f) 348 1921 12 14 11 Time of H8 H8_E12 H7_E1 H8_E10 Age 3 (H6E12r) Age 8 (H8E2f) 349 1921 12 15 11 Time of H9 H9_E1 H7_E1 H8_E10 Age 3 (H6E12r) Age 7 (H8E2f) 350 1921 12 16 11 Time of H10 H10_E2 H7_E1 H8_E10 Age 3 (H6E12r) Age 7 (H8E2f) 351 1921 12 17 11 Time of H1 H1_E3 H7_E1 H8_E10 Age 4 (H6E12r) Age 7 (H8E2f) 352 1921 12 18 11 Time of H2 H2_E4 H7_E1 H8_E10 Age 4 (H6E12r) Age 6 (H8E2f) 353 1921 12 19 11 Time of H3 H3_E5 H7_E1 H8_E10 Age 4 (H6E12r) Age 6 (H8E2f) 354 1921 12 20 11 Time of H4 H4_E6 H7_E1 H8_E10 Age 5 (H6E12r) Age 6 (H8E2f) 355 1921 12 21 11 Time of H5 H5_E7 H7_E1 H8_E10 Age 5 (H6E12r) Age 5 (H8E2f) 356 1921 12 22 11 Time of H6 H6_E8 H7_E1 H8_E10 Age 5 (H6E12r) Age 5 (H8E2f) 357 1921 12 23 11 Time of H7 H7_E9 H7_E1 H8_E10 Age 6 (H6E12r) Age 5 (H8E2f) 358 1921 12 24 11 Time of H8 H8_E10 H7_E1 H8_E10 Age 6 (H6E12r) Age 4 (H8E2f) 359 1921 12 25 11 Time of H9 H9_E11 H7_E1 H8_E10 Age 6 (H6E12r) Age 4 (H8E2f) 360 1921 12 26 11 Time of H10 H10_E12 H7_E1 H8_E10 Age 7 (H6E12r) Age 4 (H8E2f) 361 1921 12 27 11 Time of H1 H1_E1 H7_E1 H8_E10 Age 7 (H6E12r) Age 3 (H8E2f) 362 1921 12 28 11 Time of H2 H2_E2 H7_E1 H8_E10 Age 7 (H6E12r) Age 3 (H8E2f) 363 1921 12 29 11 Time of H3 H3_E3 H7_E1 H8_E10 Age 8 (H6E12r) Age 3 (H8E2f) 364 1921 12 30 11 Time of H4 H4_E4 H7_E1 H8_E10 Age 8 (H6E12r) Age 2 (H8E2f) 365 1921 12 31 11 Time of H5 H5_E5 H7_E1 H8_E10 Age 8 (H6E12r) Age 2 (H8E2f) Ba Zi | Luck Pillar | Jan | Feb | Mar | Apr | May | Jun | Jul | Aug | Sep | Oct | Nov | Dec Notes: The term "SS" refers to the "Season". The Hour Pillar is derived from the hour of birth. At the page that shows the Hour Pillar, one has to use the time of birth to look up the Hour Pillar. The Luck Pillars depend on whether a person is male or female. By clicking under one of these columns, we can see the respective Luck Pillars, together with the starting Age. An item such as Age 9 (H2E12r) means that the starting Age is 9, the Heavenly Stem is 2, the Earthly Branch is 12 and the Luck Pillars unfold in a 'reverse' direction. An item such as Age 8 (H10E9f) means that the starting Age is 8, the Heavenly Stem is 10, the Earthly Branch is 9 and the Luck Pillars unfold in a 'forward' direction. If the first Luck Pillar is H4E7, then the next pillar (when the Age increases by 10 years) will be H5E8 in the 'forward' direction. In the 'reverse' direction, the next pillar (when the Age increases by 10 years) will be H3E6. In the 'forward' direction, both the Heavenly Stem and the Earthly Branch are incremented by 1, but in the 'reverse' direction, both numbers are decremented by 1, provided that the Heavenly Stems range from H1 to H10, and the Earthly Branches range from E1 to E12. <|fim▁end|> | (H2E8f) 186 1921 7 5 |
<|fim▁begin|> Ruy Lopez:Riga Variation a b c d e f g h 8 8 7 7 6 6 5 5 4 4 3 3 2 2 1 1 a b c d e f g h Position in Forsyth-Edwards Notation (FEN) r1bqkb1r/1pp2ppp/p1n5/3p4/B2Nn3/8/PPP2PPP/RNBQR1K1 Ruy Lopez:Riga Variation Both Nxc6 and f3 are now threatened, and even if Black can meet the first threat there seems to be nothing she can do about the second, unless she can distract White by going after something more valuable than a knight. The departure of the f3-knight, an important defender of the White kingside, along with the strong placement of Blacks own knight on e4, might be a clue... The move is 8...Bd6, and the plan is for Black's bishop, knight and queen to have a chat with the White king. When contributing to this Wikibook, please follow the Conventions for organization. References Wikipedia has related information at Ruy Lopez v • d • e Chess Openings1. e4 e5 Open Game · King's <|fim▁hole|> · Vienna · Petrov · Latvian Gambit · Scotch · Giuoco Piano · Two Knights · Ruy Lopez · Philidor Defence1. e4 c5 Sicilian Defence · Closed Sicilian · Taimanov · Sveshnikov · Kan Sicilian · Sicilian Dragon · Scheveningen · Najdorf · Alapin1. e4 other French Defence · Caro-Kann Defence · Pirc Defence · Alekhine Defence · Modern · Scandinavian · Nimzowitsch 1. d4 Nf6 Indian Defence · King's Indian · Nimzo-Indian · Queen's Indian · Grünfeld · Benoni · Budapest · Catalan1. d4 d5 Closed Game · Queen's Gambit · Queen's Gambit Accepted · Queen's Gambit Declined · Chigorin · Slav · Semi-Slav · Marshall1. d4 other Dutch Defence · Old Benoni Defence · Englund Gambit · English Defence · King's Indian Attack · Réti Opening1. a3 · Na3 · a4 · b3 · b4 · c3 · Nc3 · c4 · d3 · d4 · e3 · e4 · f3 · Nf3 · f4 · g3 · g4 · h3 · Nh3 · h4 <|fim▁end|> | Gambit · Bishop's Opening |
<|fim▁begin|> Muggles' Guide to Harry Potter - Character Bathilda Bagshot Gender Female Hair color Unknown Eye color Unknown Related Family Gellert Grindelwald (great-nephew) Loyalty Unknown Contents 1 Overview 2 Role in the Books 2.1 Philosopher's Stone 2.2 Prisoner of Azkaban 2.3 Deathly Hallows 3 Strengths 4 Weaknesses 5 Relationships with Other Characters 6 Analysis 7 Questions 8 Greater Picture Overview Bathilda Bagshot, author of A History of Magic, one of the textbooks in use throughout Harry's school career, lives in Godric's Hollow. Role in the Books Beginner warning: Details follow which you may not wish to read at your current level. Philosopher's Stone One of the books that Harry must purchase in Diagon Alley is A History of Magic by Bathilda Bagshot. Prisoner of Azkaban The book A History of Magic is mentioned early in the book as Harry has to do homework over the summer and is using this book as reference. Note that some editions of Harry Potter and the Prisoner of Azkaban mistakenly list this book as being written by Adalbert Waffling. Deathly Hallows At Fleur and Bill's wedding, Harry speaks with Elphias Doge and Ron's Auntie Muriel. There, he learns that the source used by Rita Skeeter for her scurrilous book about Albus Dumbledore was most likely Bathilda Bagshot, who is apparently living in Godric's Hollow, where Harry's parents had lived, and to Harry's surprise, where the Dumbledore family had lived. This cements Harry's intention to go to Godric's Hollow. It is mentioned that Bathilda at the time was very nearly senile, and that Rita Skeeter had used Veritaserum to get the recollections of Dumbledore's early life from her. On arriving at Godric's Hollow near Christmas of that year, Harry and Hermione are surprised to find that a resident of the village can apparently perceive them, despite their being under the Invisibility Cloak. The resident responds positively when asked if she is Bathilda Bagshot; she takes them to her house, which is an absolute mess, and Harry notes a strange odor, as of rotten meat. Taking Harry upstairs, Bathilda collapses and a large snake, Nagini, leaves her body and starts attacking Harry. Hermione comes to the rescue, and the two of them Disapparate under Voldemort's nose. Later, Harry hears that Bathilda has been found dead, and Dark magic involvement is suspected. Strengths Bathilda wrote the definitive textbook on the History of Magic, so clearly her understanding of history must have been exceptionally good. Whether she had access to special magic to aid her historical research is unknown, as we never see any such, but it seems somehow likely. Weaknesses By the time we first hear of her, Bathilda is extremely old, and we can expect that apart from the senility that Rita Skeeter mentions, other age-related weakness will have eliminated almost all of her strength, magical and otherwise. Relationships with Other Characters In the letter which Lily Potter writes to Sirius Black, and which Harry sees in Grimmauld Place when he searches Sirius' room, Lily mentions that Bathilda seems <|fim▁hole|> Bathilda as saying that she had tried to be friends with the Dumbledore family but had been rebuffed. One gets the impression that Bathilda is an outgoing person, perhaps one who likes to be the center of a gossip circle. Analysis We never meet Bathilda Bagshot in person; by the time we actually see her, in Harry Potter and the Deathly Hallows, she is apparently a dead body, animated sketchily either by the presence of Nagini within her, or by the same magic that creates and preserves Inferi. Harry detects the odor of spoiled meat in her house, and we come to understand that this is Bathilda herself. There is no indication of how long she has been dead, but it is likely that it has been some time, as it seems that her author's copy of Rita Skeeter's book, presumably sent in August or September, has not been touched. It is possible that Voldemort had set this trap as long as some five months before. We see that Nagini is with him in the first chapter of the book, which occurs in late July. This suggests that Bathilda had died sometime after July, and quite possibly at Voldemort's hand, after which Nagini would have been living within her remains. While the fact that Bathilda's copy of Skeeter's book had been set on the mantel, rather than being left sitting on the doormat, this does not really give us any certainty as to the time of her death. The book having been set on the mantel argues that it was placed there by Bathilda, and then forgotten, putting her death after the August or September release date. It is also possible that Nagini might have moved the book in order to remain inconspicuous, though it seems unlikely that Nagini would have carefully placed it on the mantel, instead just pushing it into an inconspicuous corner. And of course, it is possible that the delivery owl, not finding Bathilda at home, might have dropped the book on the mantel; we have seen, as early as the first book, that delivery owls will enter structures to make deliveries. It is perhaps suggestive, though certainly inconclusive, that we do not see Nagini after the first chapter, until Harry triggers the trap late Christmas Eve or early Christmas morning. Questions Study questions are meant to be left for each student to answer; please don't answer them here. The author has said that Albus Dumbledore was born in 1881, and apparently died in 1997 at age 115 or 116. Remembering that Bathilda Bagshot was already mature enough to be host for Gellert Grindelwald when he and Dumbledore were about 17, how old must Bathilda have been at her death in 1997? Bathilda shouts "Come!" during Deathly Hallows, which both Harry and Hermione seem to be able to understand. Is this Dark magic animating her speech, or Nagini speaking Parseltongue? Greater Picture Intermediate warning: Details follow which you may not wish to read at your current level. <|fim▁end|> | friendly. Rita Skeeter's book quotes |
<|fim▁begin|> Contents 1 The Role of Resource Analysis in Strategy Formulation 2 Taking Stock of Resources and Capabilities 2.1 Tangible Resources 2.2 Intangible Resources 2.3 Human Resources 3 Core Competences 3.1 Benchmarking 3.2 Integration mechanisms 4 Appraising competitive advantage 5 Appraising Resources and Capabilities The Role of Resource Analysis in Strategy Formulation Intangible assets are often overlooked, but they are many times the only source of sustainable competitive advantage (ie. brand, technology, information, culture, etc). Taking the lead from military campaigns in which the goal is to pitch "strength against weakness"(1), business strategy should be defined by resource analysis rather than the inverse. Firms that base their strategy on the development of specific capabilities have shown better adaptability than those that base their strategy on their customers or on how to serve them. One can take Merrill Lynch, American Express and Sears as having examples of failed strategies (being too broad and having an emphasis on customer needs), and Honda and 3M Corporation as having examples of successful strategies (with a focus on the capability of making engines and adhesives respectively). Basically, any element that is traditionally considered to support competitive advantage can be seen as stemming from the correct acquisition and use of resources. For example, barriers to entry can be created by owning a strong brand, patents, or retaliatory capacity. A monopoly is nothing more than ownership of market share. Cost advantages come from process technology, size of plants, and access to low-cost inputs. Finally, Differentiation advantage comes from a brand, product technology, or marketing, distribution, and service capabilities. Taking Stock of Resources and Capabilities Competitive advantage Capabilities Resources Tangible Intangible Physical assets , financial assets Human technology, reputation, skills Tangible Resources Tangible resources are the easiest to evaluate since they are visible and quantifiable. Two key questions underlie this procedure(2): What opportunities exist for economizing on finance, inventories, and fixed assets? What are the possibilities for employing existing assets more profitable? Intangible Resources Much of a company's worth comes from less defined assets such as reputation, technology, or a particular set of cultural attributes within the company. Intel and American Express have successfully protected their intangibles, while Xerox has repeatedly over-looked its core assets. Brand is everything for Coca-Cola, and Gillette, while software and pharmaceutical companies depend mosty on their technology and <|fim▁hole|> companies provide skills, knowledge, intuition, and reasoning (known as human capital). Additionally, the culture inside an organization consists of relationships, values, and routines, and companies that have a strong set of managerial values have a strategic advantage over those that don't- through employees increased identity with corporation, increased stability and consistency as well as a guide for appropriate behaviour. Core Competences Hamel and Prahalad introduced the term "core competences" (3) in 1990 to describe those competences that a) "make a disproportionate contribution to ultimate customer value or to the efficiency with which that value is delivered," and b) "provide a basis for entering new markets." So the question to ask in this case is "What can such and such firm do better than others?" The process of identifying core capabilities can begin in many ways; the two more common ones are through a classification of all capabilities according to function, or through a value chain analysis that separates a firm into small sequential activities. Example of a value chain: Technology (patents) >> Product Design (quality) >> Manufacturing (assembly) >> Marketing (brand) >> Distribution (warehousing) >> Service (warranty) Benchmarking Benchmarking is important because it brings objectivity into the process of identifying competences. It also brings vain imaginations down to the ground. To create a benchmark, one must identify areas of potential improvement; identify world-leading companies in each area; contact the companies (visit, talk to managers, discuss with workers); and define goals based on the learning done at those companies. Integration mechanisms Appraising competitive advantage A source of competitive advantage must be scarce, relevant, durable, immobile, and unreplicable. Appraising Resources and Capabilities Resources and capabilities need to be appraised against two key criteria. First is their importance: which resources and capabilities are most important in conferring sustainable competitive advantage? Second, where are our strengths and weaknesses as compared with competitors? --- 1. B.H. Liddell Hart, _Strategy_ (Praeger, New York, 1954), p.365 2. R.M. Grant, _Contemporary Strategy Analysis_ (Butler & Tanner LTD, Frome and London, 1991), p.102 3. C.K. Prahalad and G. Hamel, "The Core Competences of the Corporation" _Harvard Business Review_ (May-June 1990): 79-91 4. Grant (2008) Contemporary Strategy Analysis 5. V. Kuzevanov, S. Sizykh (2006) [1] "Botanic Gardens Resources:Tangible And Intangible Aspects of Linking Biodiversity and Human Well-Being", Hiroshima Peace Science, 28 (2006), pp.113–134 <|fim▁end|> | patents. Human Resources People in |
<|fim▁begin|> Prev: RAC SQL and PLSQL RAC Backups and Recovery (e) Setup Backups Flashback Database Block Change Tracking Archived Logs Database Backups Database Recovery Next: Home We will configure backups to take full advantage of the cluster by running in parallel. Configure the RMAN default channels and parallelism. RMAN> configure device type disk parallelism 2 backup type to compressed backupset; RMAN> configure channel 1 device type disk connect 'sys/racattack@rac1'; RMAN> configure channel 2 device type disk connect 'sys/racattack@rac2'; RMAN> show all; Take a complete hot backup of the entire database. RMAN> backup database plus archivelog; Starting backup at 04-MAY-09 current log archived channel ORA_DISK_1: starting compressed archived log backup set channel ORA_DISK_2: starting compressed archived log backup set ... Finished backup at 04-MAY-09 Starting backup at 04-MAY-09 channel ORA_DISK_1: starting compressed full datafile backup set channel ORA_DISK_2: starting compressed full datafile backup set ... Finished backup at 04-MAY-09 Starting backup at 04-MAY-09 current log archived channel ORA_DISK_1: starting compressed archived log backup set channel ORA_DISK_2: starting compressed archived log backup set ... Finished backup at 04-MAY-09 <|fim▁hole|> happens and why? RMAN> list backupset summary; Key TY LV S Device Type Completion Time #Pieces #Copies Compressed ------- -- -- - ----------- --------------- ------- ------- ---------- 1 B A A DISK 04-MAY-09 1 1 YES 2 B A A DISK 04-MAY-09 1 1 YES 3 B A A DISK 04-MAY-09 1 1 YES 4 B A A DISK 04-MAY-09 1 1 YES 5 B F A DISK 04-MAY-09 1 1 YES 6 B F A DISK 04-MAY-09 1 1 YES 7 B F A DISK 04-MAY-09 1 1 YES 8 B F A DISK 04-MAY-09 1 1 YES 9 B A A DISK 04-MAY-09 1 1 YES 10 B A A DISK 04-MAY-09 1 1 YES RMAN> allocate channel for maintenance device type disk; released channel: ORA_DISK_1 released channel: ORA_DISK_2 allocated channel: ORA_MAINT_DISK_1 channel ORA_MAINT_DISK_1: SID=111 instance=RAC1 device type=DISK RMAN> crosscheck backup; RMAN> list backupset summary; Try this again, without allocating the maintenance channel. What happens and why? ← Archived Logs · RAC Attack - Oracle Cluster Database at Home · Database Recovery → <|fim▁end|> | Crosscheck the backup. What |
<|fim▁begin|> Contents 1 Overview 2 Drawing tools 2.1 Dry media 2.1.1 Pencils 2.1.2 Charcoals 2.1.3 Metal: Silverpoint, Copperpoint 2.1.4 Chalks 2.1.5 Crayons 2.1.6 Pastels 2.1.7 Erasers 2.1.8 Smudging tools 2.2 Wet media 2.2.1 Dip pens 2.2.2 Disposable and cartridge pens 2.2.3 Markers 2.2.4 Brushes 2.2.5 Inks 2.2.6 Paints 3 Drawing surfaces 3.1 Papers 3.2 Other drawing surfaces 4 Other drawing supplies Overview Drawing can be loosely defined as mark-making on a flat surface. Usually, the mark-making device is a pencil and the flat surface is a sheet of paper, but many other combinations of tools and surfaces are possible. As such, sometimes it is hard to categorize a work as drawing as opposed to some other kind of art, such as painting, printmaking, digital media, or sculpture, which often incorporate mark making. when you draw for your drawing to look like someone else's drawing, then you are not a capable artist,draw for your drawing tp look like your drawing not someone else's. Learning to draw is considered fundamental to learning to produce other forms of visual art. Not only are the skills acquired through drawing useful, but a sketch is frequently the first step in producing new artwork. Drawing is also popular because the necessary materials are cheap and widely available and because the drawing process is fast, direct, and can be done almost anywhere. Drawing is also very revealing as to an artist's ability - his or her understanding of form, grasp of visual poetry, and artistic vision. Master drawings are exquisite, breathtaking, and tell us more about the mind of the artist than a highly polished, fully rendered painting. Drawing tools Dry media Pencils When most people think about drawing tools, they think of the ordinary "number two" pencil, most likely a yellow, hexagonal one, with a pink eraser on the end. Pencils come in many different styles, however. The marking core of the pencil is called the "lead", although these days it doesn't contain any actual lead. Most pencils contain graphite -- a silvery-gray form of carbon -- as their pigment, although other pigments such as charcoal or various colors are possible. Graphite leads are rated in relative hardness. On one side of the scale is "9H", which is the hardest grade of pencil. On the other side of the scale is "9B", which is the softest ("blackest") grade of pencil. In the middle of the scale is the "HB" pencil, which corresponds to the standard "number two" pencil. The "F" grade of pencil is a bit harder than "HB". Hardness is not necessarily consistent between brands of pencils; experiment to find a hardness that you feel comfortable with. Hard lead qualities: Capable of very light strokes. Stays sharp longer. More likely to tear through paper. Brittle -- tends to break under pressure. Soft lead qualities: Gives the darkest strokes. Dulls quickly. Soft -- tends to crumble under pressure. Graphite is by nature somewhat brittle; care must be taken not to drop pencils or leads or the lead might break, even within a wood casing. Pencil leads can be packaged in different ways. The typical packaging is in a wooden casing, which requires a pencil sharpener or a knife to expose the pencil lead for drawing. It is also possible to buy solid graphite sticks, usually wrapped in plastic, which can be used to make strong, bold marks on the page. Mechanical pencils use metal or plastic device instead of a casing, feeding out a thin lead. Lead holders can be thought of a hybrid between mechanical and traditional pencils, since they replace the wooden casing like mechanical pencils but also hold a lead of a thickness comparable to traditional pencils. A property of mechanical pencils is that their thin leads produce a very even line, unlike thick-leaded pencils, which produce lines whose width varies slightly with pressure, allowing for more expressive linework. Another property of thick-leaded pencils is that they can be applied to the paper at a sharp angle to quickly apply graphite in a thick shading stroke. These properties tend to make mechanical pencils more desirable for precise drafting work and thick-leaded pencils more desirable for expressive drawing. Colored pencils contain a pigment instead of graphite. The binding material of colored pencil leads varies among brands, leading to different degrees of waxiness or blendability. Watercolor pencils, a relatively recent development, use a water-soluble binding material which allows the artist to blend colors by brushing water over the artwork. A special variety of blue pencil -- "non-repro" blue -- does not photocopy well; comic book artists typically use these pencils to lay out their artwork before tracing over it with regular graphite pencils. Charcoal and conté pencils are simply pencils that contain a charcoal or conté crayon core instead of a graphite one. See their respective sections below. Grease pencils use a soft wax as a binding agent, wrapped in a rolled paper casing that is peeled away to <|fim▁hole|> they use wax as a binding agent, these pencils are similar to crayons. They produce a bold, dark line which cannot be erased from paper. They can also produce a temporary line on smooth surfaces that can be wiped away with a solvent; this makes them useful for marking glass or plastic before cutting, for example. Pencils with wooden casings can come in a variety of shapes, including round or hexagonal. Oblong or oval casings are also available, which some people find easier to hold and sketch with. On one hand, they offer both thick and thin surfaces for mark-making. On the other hand, they don't work in pencil sharpeners and must thus be sharpened with a knife. For sharpening wood-cased pencils, a variety of mechanical solutions are available, from small, one-piece metal sharpeners, to hand-cranked sharpeners, to electric sharpeners. An alternative to mechanical sharpening is to whittle the wood casing away with a pocket knife; although this gives an irregular shape to the lead, it allows you to choose as sharp or wide an angle of lead as you want. Once the pencil is sharpened, some artists prefer to keep it sharp by shaping the point against a piece of scrap paper or sandpaper. Some art stores sell little pads of sandpaper for this purpose. Charcoals Charcoal is a popular artist's tool because it produces an inky, matte black and can be easily manipulated with the fingers or other smudge tool. Charcoal work tends to smear more easily than graphite work and usually requires a fixative (see below). Charcoal is also harder to erase than graphite Artist's charcoal comes in a variety of forms. The most popular charcoal tools are compressed charcoal sticks. With charcoal sticks, the artist can produce both lines (with the tip) and areas of value (with the side). Charcoal-leaded pencils can also be purchased. Vine charcoal is a piece of plant that has been turned to charcoal but has not been pulverized and compressed. Vine charcoal can be held like a pencil or broken and used like charcoal sticks. Since it has not been compressed, it tends to produce a lighter mark than compressed charcoal. Some artists prefer to use charcoal powder applied directly to the art surface and manipulated with fingers or brush. Charcoal or graphite powder can also be placed in a small fabric bag which is then rubbed against the art surface; this produces a subtle shading effect that can be smoothly varied across the page. Metal: Silverpoint, Copperpoint Chalks Crayons Conté Cray-pas Pastels Erasers Simple rubber erasers ("Pink Pearl"-style) gum (crumbly) erasers plastic (white block or stick) erasers kneaded ("Silly Putty"-like) erasers. A note on using a large, clean brush to wipe away eraser crumbs instead of hands. Smudging tools Smudging tools are used to move pigment around on the drawing surface, blending or smearing it. The simplest smudging tool is the finger, although care should be used not to damage the artwork with the oils from hands. Cheap (lotion-free!) toilet paper, facial tissues, and Q-Tips can all be used as smudging tools. Blending stumps (also known as "tortillons" or "smudge sticks") are lengths of tightly rolled paper that come to a point at one or both ends. Stumps are useful because they allow for precise blending, by using either the flat or tip of the point. After a stump has built up an amount of graphite or charcoal on its point, it can be used as a drawing tool in its own right; the light strokes it produces can be useful when first roughing out a piece. Wet media Dip pens Dip pens are pens with no internal ink reservoir; the ink is held in the nib at the tip of the pen, so the pen needs to be dipped in an external ink supply regularly to refresh the ink supply. Dip pens consist of a nib holder and a nib. Nibs wear out with time and need to be replaced. Different nibs produce different sizes and shapes of pen strokes. The "crow's quill" type of nib is frequently used in illustration, since the width of the line it produces can be varied by altering the pressure applied to the paper during the stroke. Disposable and cartridge pens Disposable pens come with an internal ink reservoir that is non-replaceable, while cartridge pens have a replaceable ink reservoir. Care must be taken in selecting pens for art-making, since many are intended for writing and do not use archival quality ink -- that is, the marks they produce may fade, change color, or alter the paper over time. Most technical pens are of archival quality. Markers pigment liner water color alcohol Brushes Inks Water based Alcohol based Indian/Chinese Ink Paints Water based Acrylic Oil Encaustic Drawing surfaces Papers Newsprint Vellum Bristol board Rag/cotton paper Watercolor paper Charcoal paper Colored paper Rice paper Other drawing surfaces Scratchboards, silverpoint, etc. Other drawing supplies Fixatives? Rulers, triangles, templates, splines? <|fim▁end|> | expose the core. Since |
<|fim▁begin|> Herhaling 5-8 The gender problem revisited As we have seen before the three gender system that Dutch inherited from West-Germanic is evolving into something different. The situation today differs a bit from region to region and is still evolving, the South (Flanders) retaining much of the old system, but let us try to summarize northern usuage. there is a growing rift in how animate (persons) and inanimate (things) nouns are treated for persons natural gender (masc.-fem.) dominates for things grammatical gender (common - neuter) dominates personal, possessive even relative pronouns are increasingly reserved for persons for things demonstrative pronouns and pronominal adverbs dominate Approximately we can summarize <|fim▁hole|> gender natural grammatical contrast masc-fem common - neuter substantivepronoun personal hij,zij, hem, haar,(het,) hen, hun,ze demonstrativedie,dat het, ze adjectivepronoun possessive zijn, haar, hun pronominal adverb ervan Double gender Diminutives of persons are an interesting group of words because they straddle the growing animate-inanimate rift. They often show signs of both natural and grammatical gender: Zij is een mooi meisje. Zij heeft een klein broertje. Hij is ziek. Grammatically meisje and broertje are grammatically neuter as all diminutives. Mooi en klein therefore have no inflections after the indefinite article. These words are however frequently referred to by the feminine and masculine personal pronouns hij and zij, following natural gender. <|fim▁end|> | current usage as follows: persons things |
<|fim▁begin|> The rationale for stating that humans need religions can be summarized as follows. First, the universe has taught us that survival can depend upon thinking and behaving rationally. Second, to make a behavioural choice rationally it must be directed toward achieving some purpose. Third, real-world problems must satisfy criteria found in the real world to be successful. Fourth, moral problems are invented through mental word-play, and a metaphysical environment and valued purpose must be assembled before moral behavioural choices can be rationally made. And last, we invariably do our best to believe in the truth of our constructions, because belief that we are correct eliminates the stress that accompanies doubts about the validity of what we think, say, and do. In <|fim▁hole|> noted that religions grow from the visions of (mainly) one person, a person whose beliefs are particularly strong, clear-cut and convincing. This raises two questions that beg to be investigated. First, what makes these beliefs so convincing to such individuals (and, later, to their followers) that they may willingly endure torture, and even choose to die rather than change their minds? And, second, from where do such beliefs come—could there be a source other than a god? Both of these questions can be answered by returning to the discussion of how the mind works. We begin with a short review of how memories become linked together. Memory Linking Constructs Reformations, Conversions And Revelations Reformations Conversions Revelations The Source Of Revelations Summary <|fim▁end|> | the previous chapter we |
<|fim▁begin|> This page represents a very advanced Lesson 5, with additional vocabulary and further discussion of grammar concepts introduced in the Advanced Lessons 1A through 5A. A portion of a short article in German, along with a vocabulary of words not already introduced in previous lessons (1 through 5 and 1A through 5A) is presented for the student to read and translate. << Lektion 5A | Lektion 5B | Lektion 6 >> Lektion Vier Lesestück 5-1 ~ Eine Geschichte über St. Pölten Karte: St. Pölten in Österreich Niederösterreich ist sowohl flächenmäßig als auch nach Einwohnern das größte der neun österreichischen Bundesländer. Sankt Pölten ist die Landeshauptstadt von Niederösterreich. Der Name St. Pölten geht auf den heiligen Hippolytos zurück, nach dem die Stadt benannt wurde. Die Altstadt befindet sich dort, wo vom 2. bis zum 4. Jahrhundert die Römerstadt Aelium Cetium stand. 799 wurde der Ort als "Treisma" erwähnt. Das Marktrecht erhielt St. Pölten um 1050, zur Stadt erhoben wurde es 1159. Bis 1494 stand St. Pölten im Besitz des Bistums Passau, dann wurde es landesfürstliches Eigentum. Bereits 771 findet sich ein Benediktinerkloster, ab 1081 gab es Augustiner-Chorherren, 1784 wurde deren Kollegiatsstift aufgehoben, das Gebäude dient seit 1785 als Bischofssitz. Zur Landeshauptstadt von Niederösterreich wurde St. Pölten mit Landtagsbeschluss vom 10. Juli 1986, seit 1997 ist es Sitz der Niederösterreichischen Landesregierung. Luftbild von St. Pölten Vokabeln 5B Die Altstadt old town Der Augustiner Augustinian <|fim▁hole|> Das Bistum diocese Der Bischofssitz bishop's see (a seat of a bishop's authority) Die Bundesländer federal states Die Chorherren men's choir Das Eigentum proprietorship Die Einwohner inhabitants Das Gebäude premises Die Geschichte history Das Jahrhundert century Das Kloster monastery, friary Das Kollegiatsstift monastery college Die Landeshauptstadt regional or state capital city Die Landesregierung provincial (state) government Der Landtagsbeschluss day of jurisdictional reorganization Das Marktrecht right to hold markets Der Name name Der Ort place, spot, city Die Römerstadt Roman town Der Sitz official place Bistum Passau a dioecian region in Bavaria sowohl... als auch both... and zurück auf goes back to aufheben (hob auf, aufgehoben) merged in (or turned into?) befinden sich situated, located (befand sich, haben sich befunden) finden sich* found (located) benennen (benannte, benannt) call (as to label) erhalten (erhielt, erhalten) receive erheben (erhob, erhoben) arise, raise erwähnen (erwähnte, erwähnt) mention stehen (stand, gestanden) stand (stood, stood) werden (wurde, [ist]geworden) become ab from auf up bereits already bis until, by, up to flächenmäßig (no direct translation) ~ when measured in surface heilig holy landesfürstlich baronial or princely (holdings) nach in terms of um around (* one short form of anfinden: findet sich (an); in colloquial language you can cut the "an"; but in THIS special case it is the short form of "(be)findet sich (dort)") Pronunciation Guide >> Read more about St. Pölten at the German Wikipedia (source of article above). <|fim▁end|> | Der Besitz possession, holding |
<|fim▁begin|> The .NET Framework is a common environment for building, deploying, and running Web Services, Web Applications, Windows Services and Windows Applications. The .NET Framework contains common class libraries - like ADO.NET, ASP.NET and Windows Forms - to provide advanced standard services that can be integrated into a variety of computer systems. Introduction VB.NET is a language in itself. It can perform mathematical and logical operation, variable assignment and other expected traits of a programming language. This in itself is not flexible enough for more complex applications. At some stage, the developer will want to interact with the host system whether it be reading files or downloading content from the internet. The .NET framework is a toolset developed for the Windows platform to allow the developer to interact with the host <|fim▁hole|> whether it be another process, or another computer. The .NET platform is a Windows platform specific implementation. Other operating systems have their own implementations due to the differences in the operating systems I/O management, security models and interfaces. Background .NET was originally called NGWS(Next Generation Windows Services). .NET does not run IN any browser. It is a RUNTIME language (Common Language Runtime) like the Java runtime. Microsoft Silverlight does run in a browser, but has nothing to do with .NET. .NET is based on the newest Web standards. .NET is built on the following Internet standards HTTP, the communication protocol between Internet Applications XML, the format for exchanging data between Internet Applications SOAP, the standard format for requesting Web Services UDDI, the standard to search and discover Web Services <|fim▁end|> | system or any external entity |
<|fim▁begin|> Contents 1 Semantic Map Overview 2 Review of Other Multimedia Classroom Systems 2.1 University of Texas at Austin "Model Technology Classroom" 2.2 The Sustainable Classroom Technology Integration Model 2.3 Polk County School District "Model Technology Classroom" 3 System Development Cycle for the Ideal Technology Classroom 3.1 Planning 3.2 Analysis 3.3 Design 3.4 Implementation 3.5 Operation, Support, & Security 4 Resources 5 Assessment Semantic Map Overview Review of Other Multimedia Classroom Systems University of Texas at Austin "Model Technology Classroom" After Preliminary Investigation, the Learning Technology Center at the University of Texas made it part of their mission statement to create a state-of-the-art technology facility (UT-Austin, 2008). Detailed Analysis revealed that a class set of twenty-five laptop computers should be available to be reserved in the lab or for delivery and set-up for students and instructors in the Department of Education. Also, it was determined that when the laptops are used in the designated computer lab, there must be access to a wireless network and power connections available on each desktop. Along with the laptops, the analysis revealed that instructors desired a 72" rear-projection screen at the front of the room so they could use digital technologies in all phases of their instructional and research activities. They wanted the system in order to display computer images as well as video from a DVD player and a document camera, while flush-mounted ceiling speakers provide program audio and instructor speech reinforcement. Instructors also required an instructor console, quipped with a desktop computer, laptop connection, front keyboard/mouse drawer, side pull-out drawer for the document camera and a compartment for the DVD player, while the counter allows plenty of space for writing and for other course materials. Upon developing the Physical Design of the system, the system analyst bowed to the request of the users and determined that the twenty-five student desks should be flexible in their arrangement, allowing for various configurations, including rows, clusters of four, and a U-shape. The analyst also acquired two 50" plasma display panels on each side wall to facilitate collaborative group work and presentations. The four displays can show any computer or video source in the room, while the attached side-mounted speakers provide audio to the group independent of the room audio. Finally, a back counter area provides workspace and storage cabinets. A sink, microwave, and refrigerator are available for non-hazardous, technology-enhanced science experiments (UT-Austin, 2008). The Sustainable Classroom Technology Integration Model "The Sustainable Classroom is a classroom technology integration model that utilizes a broad number of highly visual, interactive technologies with a single computer in order to support the nine instructional strategies that are identified in Robert Marzano's book Classroom Instruction That Works (Marzano, Pickering and Pollock, 2001)." (Education Service District 112, 2009). The Planning and Analysis phases of this systems development revealed that as opposed to a 1:1 student-to-computer ratio, a more realistic approach to using technology for many cash-strapped and understaffed schools was needed. So, instead of several desktop or laptop computers, the model puts other, less expensive but highly engaging technologies into the hands of a highly-trained, dynamic teacher to enhance students' learning experiences. The Physical Design includes interactive whiteboards, document cameras, projectors, DVD players with Blue Ray, student response systems, wireless student slates, and mounted audio systems are all technology investments that can make learning a richer, more meaningful experience for students. Although there is no mention of software, it seems prudent to use as many Open Source applications as possible in order to keep costs low. All of these require only a single computer, which reduces upfront, maintenance, and replacement costs. Polk County School District "Model Technology Classroom" This Florida school district saw a need for new information systems in their schools and applied for, and received, the "Enhancing Education through Technology Grant" (EETT) in 2002 and started the "Model Technology Classroom Project." The idea behind the project was that an exemplary teacher would integrate technology into his/her teaching strategies and model for other teachers a learning environment based upon the P21 Framework, (P21 is a leading advocacy organization focused on integrating the use of 21st century technology skills into education.) Upon receiving the grant, the district's Preliminary and Detailed Analyses revealed that the program goals needed to include: "increasing the technology literacy of students in the district, helping teachers provide a 21st century learning environment for students, providing teachers resources and training to integrate technology into their teaching, and assessing the effectiveness of the program." (Richard, 2007.) To accomplish these goals, the department of School Technology Services set forth five action steps, the first of which was the purchase of a model technology classroom for teachers. In this case, the STS department decided to purchase one laptop computer, one LCD projector, three desktop computers, one printer, one screen, several headsets, and an AV cart to create the Physical Design of the district's "Model Technology Classroom." The implementation phase called for additional action steps that provided a framework for technology training for teachers, and developing opportunities for teachers to learn Best Practices for use of technology in the classroom. The idea was to provide an information system in which teachers and students are able to obtain content-related information, save, organize, and display resources, publish new information, and transfer text, audio, graphics, and video to each other and the outside world. In 2003-04, the district entered the Operation, Support, and Security phase of systems development when they evaluated the program and found that the data clearly showed improvement in the ability of teachers to integrate technology in the classroom, and that student technology literacy increased. The program was successful in meeting its goals since teachers received resources which they still actively use and the classroom environment has changed. There are now numerous classrooms that reflect 21st century learning environments, in which students use technology to learn from one another, by collaborating with peers and experts in the different professional fields. They also found areas in which improvement was necessary, including more efficient time and resource management, finding additional outside funding sources, and more opportunities for increased collaboration and support between teachers. System Development Cycle for the Ideal Technology Classroom Planning Upon observing the current information systems in place in our high school, one finds several core area classrooms with human resources consisting of one or two teachers and up to twenty-eight students, technology resources that include one teacher computer, one LCD projector, and one printer, connected to a wireless network <|fim▁hole|> Office 2007 suite of applications. After surveying and interviewing teachers, students, administrators, and parents, there is a strong belief that a need exists to infuse technology into all aspects of teaching and learning. Putting technology into the hands of the learners will allow students to take ownership of their learning by increasing engagement, giving them the opportunity to learn from one another, and to collaborate with students and from experts in various fields of study in all corners of the world. Analysis When the research conducted by the development team (consisting of the Director of Technology, the Assistant to the Director, the Technology Integration Specialist, and members of our teacher technology team) is complete, a system process model and/or a Use Case Diagram (see below) are used to generate the most feasible solution and allow the analyst to make a specific recommendation for the system that best fits the needs of the stakeholders. Preliminary investigations through interviews, document review, and other data-gathering methods will yield a feasibility report. The findings from this report will either lead to nothing (i.e. analysis confirms that the project is not feasible), or to a detailed analysis wherein the development team will build relationships with the users, learning how the current system works and determining what materials our users want, need, and require, to enhance their learning environments. This information is acquired through observation, surveys, interviews, and more document review and is essential to the development process to determine if a need exists, whether the proposed project will meet those needs, whether established deadlines are reasonable, whether it is technically feasible with regard to obtaining hardware, software, and the human resources necessary, and whether the benefits of the system outweigh the costs. In this case, data indicate that the proposed system is operationally, technically, and economically feasible and can be carried out according to the determined schedule (see Planning section.) The model will more closely follow the University of Texas example and include a well-trained, master teacher, a teacher station with PC laptop computer, docking station with keyboard and mouse, document camera, laser printer, scanner, LCD projector, digital camera, and DVD player, a class set of PC laptop computers, a student response system (class set of clickers), an interactive slate system, a mounted audio speaker system and wireless microphone, and wireless Internet capabilities. Design Developing the details of the Physical Design of the system, while working to acquire the necessary hardware and software is the focus of this phase. Here, the systems analyst must define technical specifications, solicit and evaluate vendor proposals, and then make a decision as to the best course of action. Our current computer contract is with HP, so the laptops must originate from there. Bid solicitations will need to come from Promethean and from Smart Technologies for the interactive white board, clickers, and slates. There are multiple avenues for the other items, including local discount stores, office supply companies with which we already do business, and online retailers. Once the vendors and brands are chosen, the following hardware and software need to be acquired: Hardware Requirements: 30 student PC laptop computers, student response system (30 clickers), interactive slate system, 30 pair of headphones, 1 teacher station with PC laptop computer, docking station with keyboard and mouse, document camera, printer, LCD projector, digital camera, scanner, and DVD player, mounted sound system with speakers and wireless microphone, mounted interactive white board, wireless internet access. Software Requirements: Microsoft Office 2007 Suite for Education (Word, PowerPoint, Excel, Outlook), CMaps collaborative semantic mapping tool, Google tools (Gmail, Blogger, Sites, Docs, Calendar, Picasa photo editor), Internet Explorer, Firefox, or GoogleChrome search engines, Audacity (sound recording and editing), iTunes (music sharing & podcasting), Comic Life (comics, stories, photo albums), and Windows Movie Maker. Possible room configurations for the Multimedia Classroom University of Texas at Austin. (2008). Model Technology Classroom, The College of Education Learning Technology Center. Retrieved April 2, 2009 from [1] Implementation The tricky part of systems development in schools is the implementation phase, where the new system needs to be installed and tested, the user(s) need to be trained, and conversion to the new system must take place. A core group of teachers (our "Tech Team") will be trained by the vendors of the hardware to use the equipment, then they will be trained by the Technology Integration Specialist to use the hardware and software in their classrooms to best impact learning. There will be a phased conversion, whereby the Tech Team members integrate the system into their teaching for a period of time and then train the next small group of teachers who will serve as the next wave of the conversion and use the multimedia classroom to energize, motivate, and engage students in learning. Operation, Support, & Security After the system is implemented, three important tasks must follow: perform maintenance activities to fix errors and improve the functioning of the system, monitor system performance to improve efficiency, and assess system security/develop a computer security plan to ensure security risks are identified, and put safeguards into place "to detect, prevent, and recover from a loss." (Shelly, 646). Resources Education Service District 112. (2009). What is the sustainable classroom? Educational Technology Support Center. Retrieved April 2, 2009 from [2] Marzano, Pickering, & Pollack. (2001). Classroom Instruction that Works; Research-Based Strategies for Increasing Student Achievement. Association for Supervision and Curriculum Development, Alexandria, VA. No known author. (2004). ACTIVboard system fills lessons with action—and interaction, eSchool News. Retrieved April 3, 2009 from [3] Richard, V. (2007). The Model of a Modern Technology Classroom, Tech & Learning. Retrieved April 3, 2009 from [4] Shelly G., Cashman T., Vermaat, M.. (2007). Discovering computers: A gateway to information. Boston, MA: Thomson Learning, Inc. University of Texas at Austin. (2008). Model Technology Classroom, The College of Education Learning Technology Center. Retrieved April 2, 2009 from [5] Assessment 1. Put the following steps of the Information System Design process in the correct order by numbering them 1, 2, 3, or 4: ___ Analysis ___ Implementation ___ Planning ___ Design 2. What is the purpose of the feasibility report? 3. Based on the hardware and software requirements of this Multimedia Classroom, list and explain at least two instructional activities students may engage in that will challenge their critical thinking skills. 4. Based on the model above, evaluate the "train the trainer" implementation plan. How well do you think it will work? What might be the pitfalls? What are its strengths? <|fim▁end|> | and able to access the Microsoft |
<|fim▁begin|> Contents 1 Major Instructional Strategies and Their Relationships 1.1 Teacher-Directed Instruction 1.1.1 Lectures and Readings 1.1.1.1 Advance Organizers 1.1.1.2 Recalling and Relating Prior Knowledge 1.1.1.3 Elaborating and Extending Information 1.1.1.4 Organizing New Information 1.1.2 Mastery Learning 2 References Major Instructional Strategies and Their Relationships Because the forms of thinking just described—critical thinking, creativity, and problem solving—are broad and educationally important, it is not surprising that educators have identified a lot of strategies to encourage their development. There are so many possibilities, in fact, that just keeping them all in mind—let alone choosing among them—can be difficult without a framework for organizing them. One such framework is shown in Figure 8-2, which visually classifies thirteen major instructional strategies according to two (somewhat approximate) dimensions. The first dimension is how much an instructional strategy is student-centered as compared to teacher directed. The second is how much a strategy depends on interaction and activity of groups as compared to individuals. The terms in the figure are all discussed in the rest of this chapter, but brief definitions of them are also listed in Table 8-1. As you will see later in this chapter, this two-way classification is not very precise, but it does give a useful overview of the major choices available for planning and carrying out instruction. And as you will also see, the more important of the two dimensions in Figure 8-2 is the first one—the extent to which an instructional strategy is directed by the teacher or initiated by students. We take a closer look at this dimension in the rest of this chapter. Teacher-Directed Instruction As the name implies, teacher-directed instruction is any strategy initiated and guided primarily by the teacher. It includes the classic expository method of lecturing (simply telling or explaining important information to students) and of assigning reading from texts. But teacher-directed instruction also includes strategies that call for more active responses from students, such as encouraging students to relate new information to prior knowledge, or to elaborate on new knowledge. Whatever their precise form, however, teacher-directed instructional methods include a lot of organizing of information on behalf of students, even when they also expect students to do some organizing work of their own. Sometimes teacher-directed methods are therefore thought of as transmitting knowledge from teacher to student—though in ways that are as clear and efficient as possible, and that often also require mental work on the part of the student. Lectures and Readings Lectures and readings are traditional staples of educators, particularly when teaching older students (including university students!). At their best, they are the good examples of pre-organized information, so that the student only has to remember what was said in the lecture or written in the text in order to begin understanding it (Exley & Dennick, 2004).[1] The problem with lectures and readings, however, is the ambiguity of the responses which they require: listening and reading are by nature quiet and stationary, and do not in themselves indicate whether a student is comprehending, or even attending to the material. Educators often describe the problem by saying that “students are too passive” during lectures or when reading. But passivity can just as easily be attributed to the readings themselves or to the teachers who do the lecturing. Books just sit still, after all, unless someone makes an effort to read them, and a person lecturing may sometimes talk too much without noticing students’ responses (or lack thereof). Advance Organizers But in spite of such problems, there are strategies for making lectures and readings effective. Some of them amount to being especially careful about organizing information for students, while others turn some of the organizational task over to students themselves. An example of the first approach is the use of advance organizers—brief overviews or introductions to new material before the material itself is presented (Ausubel, 1978).[2] Textbook authors (including ourselves) often try deliberately to use periodic advance organizers to introduce new sections or chapters in the text. When part of a lecture, advance organizers are usually created by the teacher herself in the form of brief introductory remarks, or possibly as diagrams illustrating relationships among the key ideas about to be explained (Robinson, et al., 2003).[3] Whatever their form, advance organizers partially organize the material on behalf of the students, so that they know where to put it, so to speak, as they learn it in more detail. Recalling and Relating Prior Knowledge Another strategy for improving teacher-directed instruction is to encourage students to relate the new material to prior familiar knowledge. When one of us first learned a foreign language (in his case French), for example, he often noticed similarities between French and English vocabulary. A French word for picture, for example, was image, spelled exactly as it is in English. The French word for splendid was splendide, spelled almost the same as in English, though not quite. Relating the French vocabulary to English vocabulary helped in learning and remembering the French. As children and youth become more experienced as students, they tend of their own accord to relate new information to previously learned information more frequently and automatically (Goodwin, 1999; Oakhill, et al., 2005).[4][5] But teachers can also facilitate students’ use of this strategy. When presenting new concepts or ideas, the teacher can relate them to previously learned ideas deliberately and frequently—essentially modeling the memory strategy that students must eventually use for themselves. In a science class, for example, she can say “This is another example of…, which we studied before”; in social studies she can say “Remember what we found out last time about the growth of the railroads? We <|fim▁hole|> are relatively young or are struggling academically, it helps to remind them explicitly to draw on their prior knowledge. Teachers can periodically ask questions like, “What do you already know about this topic?” or “How will your new knowledge about this topic change what you know already?” Whatever the age or maturity of students, connecting new with prior knowledge is not always easy without help from someone more knowledgeable or expert—usually the teacher. When first learning algorithms for multiplication, for example, students may not spontaneously see how multiplication is related to the addition processes that they probably learned previously. But if a teacher takes time to explain the relationship and to give students time to explore it, then the new skill—multiplication—may be learned more easily. Elaborating and Extending Information Elaborating and extending new information means asking questions about the new material, guessing at ideas that may follow logically from the information given, and thinking of additional, unstated relationships among the new concepts. Such strategies are closely related to the recalling of prior knowledge discussed above: they enrich the new information and connect it to other knowledge. In this sense elaboration and extension make the new learning more meaningful and seem less arbitrary. Teachers can help students to use elaboration and extension by modeling these behaviors themselves. A teacher can interrupt her own explanation of an idea, for example, by asking how it relates to other ideas, or by speculating about where the new concept or idea may lead. A teacher can also encourage students explicitly to do the same, and even give students questions to guide their elaborations. When giving examples of a concept, for example, a teacher hold back from thinking of all of the examples herself, and instead ask students to think of additional examples. Or when a reading includes descriptions of examples, teachers can instruct students to find or make up additional examples of their own. Organizing New Information There are many ways to organize new information, and some of them are especially well to teacher-directed instruction. A common way is to ask students to outline information read in a text or heard in a lecture. Outlining works especially well when the information is already organized hierarchically to some extent into main topics, each with supporting subtopics or subpoints. Outlining is basically a form of the more general strategy of taking notes, or writing down key ideas and terms from a reading or lecture. Research studies find that the precise style or content of notes is less important that the quantity of notes taken: more detail is usually better than less (Ward & Tatsukawa, 2003).[6] Written notes help both by making a student think about the material while writing it down, and by providing permanent clues that help remind a student about the material later. These benefits are especially helpful when students are relatively inexperienced at learning in general (as in the earlier grade levels), or relatively inexperienced about a specific topic or content in particular. By the same token, of course, such students may need more guidance than usual about what and how to write notes. In elementary school, for example, it can be helpful for the teacher to provide a note-taking guide, like the one shown in Table 8-2. In learning expository material, another helpful strategy—one that is more visually oriented—is to make concept maps, or diagrams of the connections among concepts or ideas. Figure 8-3 shows concept maps made by two people that graphically depict how a key idea, child development, relates to learning and education. One of the maps was drawn by a classroom teacher and the other by a university professor of psychology. They suggest possible differences in how the two individuals think about children, learning, and children’s development. Not surprisingly, the teacher gave more prominence to practical concerns (for example, classroom learning and child abuse) and the professor gave more prominence to theoretical ones (for example, Erik Erikson and Piaget). The differences suggest that these two individuals may be thinking about somewhat different ideas when they use the same term, child development. Such a difference has the potential to create misunderstanding between them (Seifert, 1999; Super & Harkness, 2003).[7][8] The concept maps also suggest, however, what each person might need to learn in order to achieve better understanding of the other person’s thinking and ideas. Mastery Learning This term refers to an instructional approach in which all students learn material to an identical, high level, even if some students require more time than others to do so (Gentile, 2004). In mastery learning the teacher directs learning, though sometimes only in the indirect sense of finding, writing, and orchestrating...(read more...) References ↑ Exley, K. & Dennick, R. (2004). Giving a lecture: From presentation to teaching. New York: Routledge-Falmer. ↑ Ausubel, D. (1978). In defense of advance organizers. Review of Educational Research, 48(2), 251-157. ↑ Robinson, D., Corliss, S., Bush, A., Bera, S., & Tomberlin, T. (2003). Optimal presentation of graphic organizers and text. Educational technology research and development, 51(4), 25-41. ↑ Goodwin, L. (1999). Spontaneous comprehension monitoring strategies of college freshmen and college seniors. In B. Palmer (Ed.), College reading: Perspectives and practices. Carrolton, GA: The College Reading Association. ↑ Oakhill, J., Hartt, J., & Samols, D. (2005). Levels of comprehension monitoring in good and poor readers. Reading and Writing, 18(7-9), 657-686. ↑ Ward, N. & Tatsukawa, H. (2003). A tool for taking class notes. International Journal of Human-Computer Studies, 59(6), 959-981. ↑ Seifert, K. (1999). Reflective thinking and professional development: A primer. Boston: Houghton Mifflin Company. ↑ Super, C. & Harkness, S. (2003). Metaphors of development. Human Development, 46(1), 3-23. <|fim▁end|> | saw that…” If students |
<|fim▁begin|> Kim Dotcom Contents 1 Background 1.1 Early Life 1.2 Megaupload 1.3 Megaupload Takedown 2 Professionalism of Dotcom 2.1 Purpose 2.2 Reputation 2.3 Defiance 2.4 Honor vs. Honors 3 Professionalism of Other Participants 3.1 GCSB/Police 3.2 New Zealand High Court 4 Conclusion 5 References Background Early Life Dotcom grew up in a turbulent household with his abusive, alcoholic father. This experience made Dotcom unafraid and unimpressed by authority: “I had all the fear I could handle by the time I was 6...It made me strong.”[1] As a child, Dotcom disdained school, regularly skipping class and sleeping in. According to Gabriele Killig, the former principal of his school: “He was an intelligent student; he just didn’t apply that intelligence in the right places...he didn’t really do anything for the community and rather incited mischief.”[2] Dotcom, indifferent to academics, became interested in technology. As a child, Dotcom became entranced by Commodore 16 in a shop window, believing it was interesting in a way school could never be.[1] A schoolmate showed Dotcom how to copy a computer game by removing one line of code. He later sold these copies to friends.[1][2] As a teenager, Dotcom took up computer hacking: "You find this world as a teenager, 14, 15 years old? You don’t even think about going to school now, man.”[1] Dotcom eventually left high school without a diploma.[2] Megaupload Megaupload Logo In 2003, Dotcom created Data Protect Ltd, a company focused on file-sharing and digital content distribution. In 2005, the company was renamed Megaupload with Megaupload.com being the company's primary website.[3] Megaupload provided cloud storage: users accessed the site to store files on the Internet.[4] At its peak, Megaupload had over 150 employees, $175 million in revenues,[5] was the 13th most visited site on the Internet, and responsible for 4% of all Internet traffic. In 2010 alone, Dotcom made $42 million from the enterprise.[3] Anyone with a computer and basic Internet skills could easily upload content to Megaupload. People worldwide started to store and view unauthorized copies of television shows, feature length films, songs, applications, and other software on the site. The vast number of users made it difficult for the site to keep tabs on all user content. Organizations like the Motion Picture Association of America (MPAA) complained to law enforcement officials that "Megaupload was getting rich by helping millions of people store and distribute pirated films and TV shows."[6] Megaupload Takedown The seized domain name redirects to this joint FBI, DoJ, and NIPRCC notice of U.S. crime charges In January 2012, the United States Department of Justice seized all domains associated with Megaupload.com. New Zealand Police arrested Dotcom in a military-style raid conducted on his Coatesville home. All of Dotcom's assets were frozen. He was accused of endorsing or, at the minimum, giving a blind eye to illegal copyright infringement activity on his site.[3] Dotcom and six others were indicted in Virginia (where their domain in the US was located) for online piracy, racketeering, conspiring to commit copyright infringement, and conspiring to commit money laundering.[6] If found guilty, Dotcom and others could receive a maximum penalty of fifty years for all charges.[7] Dotcom was eventually released on bail and is currently residing back at his New Zealand home. Professionalism of Dotcom Dotcom's actions in this case are evidence for whether he can be called a professional, and if not, how and why he failed. Purpose Commenting on Megaupload's origin, Dotcom stated: “One day I was sending a file to a friend via email and I got a message back saying the file is too large and the mail server has refused to send it. So I thought what I can come up with, what can I do to solve that? So I basically created a server where I could upload a file, and got a unique link and then I would just email that link to my friend and he would then get the file and that’s how Megaupload started"[3] Dotcom was interested in engineering a technical solution to solve people's problems. Dotcom maintained that Megaupload did not violate copyright infringement: “There are so many countless, legitimate uses for Megaupload that the piracy element is really just one that is minute and shouldn’t even be the primary focus.”[8] Dotcom asserted that content providers had access to delete files that infringed on their copyright and that about 15 million links were deleted because of this. Dotcom also stated that similar services like Youtube have the same problem but aren't being scrutinized. However, many criticized Megaupload and Dotcom using copyrighted content to gain money and popularity. The US government claimed that Megaupload.com was a front for illegal content and that Dotcom was aware and in support of this activity. As big as his website was, did Dotcom do all in his power to stop illegal activity, or did he ignore it to gain more money? If the latter, Dotcom's professionalism is severely suspect. Reputation Dotcom has manipulated public opinion to portray himself as an eccentric millionaire whose antics either amaze or amuse the public. In 2000, Dotcom filmed Kimble Goes to Monaco, a documentary chronicling a lavish trip to Monaco.[9] In 2011, Dotcom gifted a huge fireworks show to the city of Auckland, costing roughly NZ$600,000.[10] On December 31, 2011, Dotcom uploaded a Youtube video celebrating his ascension to the #1 world ranking in Call of Duty: Modern Warfare 3.[11] In these examples, Dotcom portrays himself not as a criminal, but as an eccentric, endearing person who loves life. Even after the Megaupload takedown, Dotcom remained relatively popular and influential. In a poll for Time Magazine's 100 most influential people in the world for 2013, Dotcom came in third place.[12] In a 2012 poll, New Zealanders found Dotcom more favorable than Auckland Mayor John Banks.[13] In a 2013 poll, more New Zelanders wanted Dotcom to stay in New Zealand rather than be extradited to the United States.[14] This illustrates how reputation can sway public opinion in ethically vague situations. Defiance Ever since his childhood, Dotcom has defied authority. With Megaupload, Dotcom defied copyright norms, believing he helped the greater good. Commenting on the Megaupload takedown, Dotcom asserted: "In the dark ages... the enemies of progress burned books."[15] Dotcom spins the situation so he looks like the victim: the people hindering his success are hindering progress and want to keep the world in the "Dark Ages." Throughout the Megaupload takedown scandal, Dotcom vehemently denied any wrongdoing: "The allegations against us are wrong, we are innocent and we will prevail."[16] Dotcom does not acknowledge that he is breaking the law, clashing with the belief that professionals who break the law do so knowingly and are more concerned about their career than going to jail. This illustrates how one can be defiant, but in an unprofessional manner. In regards to professionalism, Dotcom's practices of defiance are more inline with Bruce Reynolds, a bugler defying law for personal wealth, than with Philippe Petit, a daredevil who defied law for personal happiness. Honor vs. Honors Dotcom believes his wealth is just a side effect <|fim▁hole|> solution: "...when you create a solution, you’re an innovator and you solve problems for people and they like what you have to offer, of course you automatically make money."[8] However, upon moving his business to Hong Kong, Dotcom stated: "People there leave you alone and they are happy for your success."[17] This quote indicates that Dotcom may be more interested in business success than in integrity. According to Aristotle in the Nicomachean Ethics: "More ambitious people identify happiness with honor or acclaim. But honor is superficial if it depends more on those who bestow it rather than on those who receive it."[18] This indicates that people who associate happiness with material benefits are not acting professionally. Dotcom, who enjoys lavish vacations, flamboyant productions, and excessive wealth, might fall in this category. Professionalism of Other Participants GCSB/Police The Government Communication Security Bureau (GCSB) and New Zealand Police monitored and spied on the employees of Megaupload at request of the FBI leading up to Dotcom's arrest. The agency has a strict rule barring spying on New Zealand residents, making the surveillance of Dotcom illegal. When confronted in court, the GCSB claimed that the police deliberately lied to them, guaranteeing that Dotcom was not a permanent resident of New Zealand. This prompted further investigation, uncovering that the agency was spying on over 80 more New Zealand residents. Similarly, the NSA, the equivalent agency in the United States, has been scrutinized for questionable surveillance methods against United States citizens, as in the AT&T and Trailblazer cases. The GCSB repetitively denied involvement with the United States in the arrest and testified in court accordingly. It was revealed, however, that they had actually relayed live footage of raid to FBI Headquarters, contradicting earlier testimony.[19] It is clear that the GCSB and the police tried to do everything they could—both legally and illegally—to detain Dotcom. These two groups tarnished their image and compromised their integrity by claiming the ends justify the means. This resulted in having a weak case against Dotcom and a permanent mark against their credibility. Repeated professional failures by the police and GCSB have fueled media criticism and mockery, as seen in many political cartoons ridiculing the agencies as incompetent and foolish.[20][21] New Zealand High Court The High Court of New Zealand The High Court of New Zealand denied bail to Dotcom because he could have easily fled and escaped extradition to the US. It then returned assets to Dotcom so that he could provide for his family and keep his affairs in order. It ruled the search warrants used in the raid were invalid because they were general search warrants, lacking the specificity required for what was seized.[22] As a result, all data was obtained illegally and the FBI would be unable to access it for prosecution in the States. Finally, the High Court ruled that Dotcom could sue the GCSB for damages because the agency's director knew they were illegally spying on Dotcom.[19] The High Court remained professional and impartial. While it would have been easier to preserve the image of the New Zealand government and agencies by upholding the search warrants, the Court invalidated the warrants, preventing anything gathered by the national agencies to be used as evidence. By taking this course of action, the High Court has likely guaranteed Dotcom's legal victory, but did not compromise their integrity. The High Court cared more about upholding justice than bringing down a suspected criminal. The same political cartoons that mock the GCSB and police praise the High Court for righting all the wrongs done by the other New Zealand agencies.[21] While the police and the GCSB were doing their best to dig a deeper hole for themselves, the High Court wasn't afraid to challenge their judgment. Conclusion While Dotcom thought he provided a technical solution benefiting the greater good, it is still vague whether he did everything in his power to prevent illegal activity on Megaupload. Dotcom's practices of exercising defiance, chasing honors, and exploiting reputation indicate that Dotcom could potentially not be classified as a professional. Other participants, including the New Zealand Police and GCSB, believed the ends justified the means, making questionable ethical calls involved in Megaupload's takedown. However, others like the High Court of New Zealand exercised impartial ethical judgment. The legal case of Kim Dotcom and Megaupload is still being decided in court. This chapter deserves a thorough revision and expansion as more facts and court decisions become available. The potential for legal action against Mega, Dotcom's latest site, will also offer content for the continuation of this saga, along with attempts to introduce legislation attacking or protecting services like Megaupload. References ↑ a b c d Graeber, C (2012, Oct. 12). "Inside the Mansion—and Mind— of Kim Dotcom, the Most Wanted Man on the Net." Wired. Retrieved from: http://www.wired.com/threatlevel/2012/10/ff-kim-dotcom/4/ ↑ a b c Gruley, B, Fickling, D, & Rahn, C (2012, Feb. 15). "Kim Dotcom, Pirate King." Bloomberg Businessweek. Retrieved from: http://www.businessweek.com/articles/2012-02-15/kim-dotcom-pirate-king ↑ a b c d Breeze, Mez (2002, Dec. 2). "The life and times of Kim Dotcom." Life. Retrieved from: http://thenextweb.com/insider/2012/12/02/the-life-and-times-of-kim-dotcom/ Invalid <ref> tag; name "life" defined multiple times with different content Invalid <ref> tag; name "life" defined multiple times with different content ↑ "10 Facts about the Megaupload scandal." Scandal. Retrieved from: http://kim.com/scandal ↑ Anderson, N.(2012, Jan. 20). "Google cut off Megaupload’s ad money voluntarily back in 2007." Google cutoff. Retrieved from: http://arstechnica.com/tech-policy/2012/01/google-cut-off-megauploads-ad-money-voluntarily-back-in-2007/ ↑ a b Sandoval, Greg(2012, Jan. 19). "FBI charges MegaUpload operators with piracy crimes." Cnet. Retrieved from: http://news.cnet.com/8301-31001_3-57362152-261/fbi-charges-megaupload-operators-with-piracy-crimes/ Invalid <ref> tag; name "cnet" defined multiple times with different content ↑ (2012, Jan. 20) Police pore over Dotcom mansion as accused denied bail" Bail. Retrieved from: http://tvnz.co.nz/national-news/police-pore-over-dotcom-mansion-accused-denied-bail-4694527 ↑ a b Carbone, N (2012, Mar. 3). "Kim Dotcom Gives First Interview: The 5 Best Quotes." Time. Retrieved from http://newsfeed.time.com/2012/03/03/kim-dotcom-gives-first-interview-the-5-best-quotes/ ↑ "Kimble Goes to Monaco." Retrieved from http://www.youtube.com/watch?v=S5ZBZV8hFb4 ↑ "Kim Dotcom's money won him New Zealand residency" (2012, Mar. 14). The Sydney Morning Herald. Retrieved from www.smh.com.au/technology/technology-news/kim-dotcoms-money-won-him-new-zealand-residency-20120314-1uz6q.html ↑ Kim Dotcom #1 in MW3. Retrieved from http://www.youtube.com/watch?v=l-ltcCF_cAQ ↑ "The 2013 TIME 100 Poll" (2013, Mar. 22). Time. Retrieved from http://time100.time.com/2013/03/28/time-100-poll/slide/the-results/ ↑ "Kim Dotcom more popular than John Banks - poll" (2012, Oct. 11). 3 News. http://www.3news.co.nz/Kim-Dotcom-more-popular-than-John-Banks---poll/tabid/1607/articleID/272362/Default.aspx ↑ NZers narrowly want Dotcom to stay: poll (2013, Apr. 30). MSN NZ. Retrieved from http://news.msn.co.nz/nationalnews/8650399/nzers-narrowly-want-dotcom-to-stay-poll ↑ "Wanted tycoon launches new site." (2013, Jan. 20). Independent.ie. Retrieved from http://www.independent.ie/breaking-news/world-news/wanted-tycoon-launches-new-site-28961108.html ↑ "Kim Dotcom: 'Nothing will stop Mega'." (2013, Jan. 20). Russia Today Retrieved from http://rt.com/news/dotcom-mega-launch-internet-316/ ↑ Perry, N (2012, Feb. 26). "Kim Dotcom, Megaupload Founder, Hits Digital Piracy Wall After Wild Online Ride." Huffington Post. Retrieved from http://www.huffingtonpost.com/2012/02/26/kim-dotcom-megaupload-fou_n_1302343.html ↑ Aristotle. "Nicomachean Ethics." Abridged and freely adapted from translations in the public domain, especially that of W.D. Ross (1908) ↑ a b Fisher, D. Dotcom can pursue case against police, GCSB. Retrieved from http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=10852335 ↑ Body, G. Cartoon: Bozos of the Dotcom fiasco. Retrieved from http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=10816713 ↑ a b Emmerson, R. Rod Emmerson's Top 10 Dotcom Cartoons. Retrieved from http://www.nzherald.co.nz/nz/news/image.cfm?c_id=1&gal_objectid=10852335&gallery_id=128188#9786218 ↑ BBC News. BBC News - Megaupload raid warrant 'invalid', New Zealand judge says. Retrieved from http://www.bbc.co.uk/news/technology-18623043 <|fim▁end|> | of engineering a good |
<|fim▁begin|> PBASIC Programming Contents 1 Reusing Code 2 GOSUB and RETURN 3 Subroutines 4 Readability Reusing Code We have seen in our chapters on loops that there are many times that we want to repeat certain blocks of code multiple times. A loop repeats these blocks one after the other, but what if we want to repeat a block of code at different times? We can use a special tool called a subroutine to make a block of code repeatable. We can "call" our subroutine at any point in our program, and when the subroutine ends, the control flow will jump back to where it was. When we move control flow into a subroutine, we say that we "call" the subroutine, or that we "enter" it. Similarly, when the subroutine has completed, we say that we "exit" the subroutine, or that we "return from it". GOSUB and RETURN Subroutines start with a label. Instead of using a GOTO jump, we use the GOSUB instruction to enter the subroutine. The GOSUB does two things: it jumps to the subroutine's label, like a regular GOTO it stores the old value of the instruction pointer, so that after the subroutine the control flow <|fim▁hole|> The second point is important, because it allows us to return to our previous position. The RETURN instruction, at the end of the subroutine, loads the saved value of the instruction pointer. Subroutines A basic subroutine looks like this: MySubroutine: ... 'Do this in the subroutine RETURN Readability One of the big benefits to using subroutines is that they help to make your code much easier to read for other people. Many times the person who writes a program will understand it very well, but it may not be so obvious to other people, such as teammates. For instance, if we have a robot using the BasicStamp, and we want to make that robot walk around in the shape of a square, we can use subroutines to do it easily: GOSUB MoveForward GOSUB TurnRight GOSUB MoveForward GOSUB TurnRight GOSUB MoveForward GOSUB TurnRight GOSUB MoveForward GOSUB TurnRight Or, we can combine our subroutines with a loop to make it even easier: FOR MyCounter = 1 TO 4 GOSUB MoveForward GOSUB TurnRight NEXT The subroutines for MoveForward or TurnRight may be very complicated, but any person can read the small block of code above and understand what the robot will do. <|fim▁end|> | can return to where it was. |
<|fim▁begin|> A knowledge of the basics of biochemistry is important for the understanding of physiology. This section acts as an introduction to biochemistry, and is really the minimum that you need to understand. The four main biochemical groups are Sugars, Fats, Amino Acids, and Nucleotides. We will look briefly at each of these in turn and see how they play their roll in energy storage, energy production, protein synthesis, & cell reproduction. We will also look at how energy is utilized by the cell. Contents 1 Sugars 2 Fats 3 Amino Acids & Proteins 3.1 Overview 3.2 Amino Acid 4 Protein Synthesis 5 Protein Metabolism 6 Nucleic Acids 7 Enzymes Sugars The most important source of energy for cells is the mono-saccharide sugar glucose which has the general formula C6H1206. This is broken down in the presence of oxygen to produce energy, carbon dioxide and water: C6H1206 + 6O2 --->6H20 + 6CO2 + Energy (36-38 mols of ATP from ADP). Glucose is taken into the body as various sugars and complex carbohydrates (starches). The enzymes in the digestive process and various cells produces Glucose. In the body glucose can be built up into a starch Glycogen which can be stored in the liver and in muscle. This is the body's reserve supply of glucose. Energy can be also obtained from Proteins and Fats, but Glucose is particularly important, because it is the only source of energy for the brain cells and if the brain is without glucose for a period of 6-8 minutes, brain death will occur. Here is the structure of Glucose. It is usually represented as the first image, or simply a hexagonal ring. Glucose is broken up in a two step process. First it is broken down into two molecules of pyruvate by a process called glycolosis. This occurs in the cytoplasm of the cell. Then if oxygen is present, the pyruvate is taken into the mitochondria, and is broken down into Acetyl CoA which enters the citric acid cycle, producing high energy hydrogen bonds. The mitochondria will process these bonds into high energy ATP (Adenosine tri-phosphate) from ADP (Adenosine di-phosphate). This ATP is used to power the reactions of the cell. Some 36-38 molecules of ATP are produced for each glucose molecule so processed.This process is shown graphically in the following flow sheet. In the absence of oxygen (such as may occur in severe exercise), the pyruvate will be processed into lactic acid (anaerobic tissue respiration), and only two molecules of ATP will be produced. In mammals this is insufficient for the body's needs, and in the absence of oxygen cell death will occur in most tissues. See Sugars for more details. Fats Fats or lipids are the main way that the body stores excess nutrients. One Gram <|fim▁hole|> Kilocals, as opposed to 4 Kilocals for carbohydrate or protein. Fats consist of 1-3 fatty acids attached to a glycerol molecule. -IMAGE Fatty acids consist of the general formular R-COOH, where R is a carbohydrate chain. -IMAGE Fatty Acids can be metabolized in almost all cells of the body, the notable exception are brain cells, to produce ATP from ADP. They are broken down by a process called beta-oxidation to produce two carbon units which are then fed into the Citric Acid Cycle via Acetyl CoA. Other important lipid related compounds are Cholesterol, important in its own right and essential as a precursor for Steroids, and phospholipids which form the walls of all cell membranes. See Fats for more details. Amino Acids & Proteins Proteins are made from several amino acids strung together as a chain. They are important for the structural elements of the body, either as intracellular components, or as the substrate of body tissues. Most enzymes and hormones are also proteins. Their versatility is due to the many shapes that they can take up. Overview Proteins are made from several amino acids strung together as a chain. They are important for the structural elements of the body, either as intracellular components, or as the substrate of body tissues. Most enzymes and hormones are also proteins. Their versatility is due to the many shapes that they can take up. Amino Acid A typical amino acid consists of a carbon atom attached to a carboxyl group -COOH and an amino -NH2 group. Below is shown the general model, and the isoleucine amino acid as an example. -IMAGE Amino acids are strung together to form peptides - less than 100 amino acids - and proteins - more than 100 amino acids. Peptides are assembled on RNA templates. Protein Synthesis An RNA template is made from the DNA, and after processing this leaves the nucleus and is attached to a ribosome. The following illustrates this process -IMAGE After becoming attached to the ribosome, Transfer RNA molecules will attach to individual amino acids and transfer them on to the RNA template: -IMAGE The attachment is formed by the removal of a molecule of water between the carboxyl and the amino group: -IMAGE As well as being important for structural elements, amino acids are an important source for the manufacture of Glucose in the starvation state. Protein Metabolism If Glycogen supplies are exhausted, glucose can be made from amino acids by a process called gluconeogenesis. The amino acid is de-aminated, and the resulting organic acid will be utilized either in the Glycolosis pathway or the Citric Acid Cycle to make Glucose. -IMAGE See Amino Acids & Proteins for more details. Nucleic Acids See Nucleic Acids for more details. Enzymes See Enzymes for more details. <|fim▁end|> | of fat will produce about 9 |
<|fim▁begin|> The lengths of the months Although the New Year occurs at the start of the month of Tishri (that is the traditional spelling, although increasingly the spelling Tishrei is preferred), the Bible commands that Nissan should be regarded as the first month. ("This month shall be for you the beginning of months: it shall be the first month of the year for you." See Exodus Chapter 12 verse 2.) As a general rule, the months are alternately 30 and 29 days. As will be explained later, two months (Cheshvan and Kislev) are of variable length. Further, in leap years, an extra month called Adar Rishon (First Adar) is inserted before the month of Adar, which is then renamed Adar Sheni (Second Adar). The months are as follows: Nisan, 30 days Iyar, 29 days Sivan, 30 days Tammuz, 29 days Av (or Menachem Av), 30 days Ellul, 29 days Tishri (or Tishrei), 30 days Cheshvan (or Marcheshvan), 29 days; sometimes 30 days Kislev, 30 days; sometimes 29 days Tevet, 29 days Shevat, 30 days [Adar Rishon (only in leap years), 30 days] Adar <|fim▁hole|> 29 days In a regular (כסדרן) year, Cheshvan has 29 days and Kislev has 30 — consistent with the pattern of the lengths of the other months, and there are a total of 354 days (384 in a leap year). If Cheshvan and Kislev both have 30 days, the year is called complete (מלא) and there are 355 days (385 in a leap year). If Cheshvan and Kislev both have 29 days, the year is called deficient (חסר)and there are 353 days (383 in a leap year). Thus an ordinary year can have 353, 354 or 355 days, and a leap year can have 383, 384 or 385 days. No year is allowed to fall outside these limits of length. Note that 385 days is exactly 55 weeks, so that the Rosh Hashana of a year following an abundant leap year always falls on the same day of the week as the Rosh Hashana of that year. This does not happen with other year types. It is possible for six consecutive years to contain all six lengths; for example, 5801-5806 does so. <|fim▁end|> | (called Adar Sheni in leap years), |
<|fim▁begin|> Ba Zi | Heavenly Stems | Earthly Branches | Hsia Calendar (Xia Calendar) | Hour Pillar | Luck Pillar | Life Cycle | Hidden Stems | Seasonal Cycle | Symbolic Stars | Aspects Of Life | Date Selection | List Of Ba Zi Contents 1 Year 2004 2 January 3 February 4 March 5 April 6 May 7 June 8 July 9 August 10 September 11 October 12 November 13 December Year 2004 The Heavenly Stems (HS) and Earthly Branches (EB) of the Year, Month and Day of 2004 in the Hsia Calendar, from January (Month =1) to December (Month=12). January S/N Year Month Day HS of Year EB of Year HS of Month EB of Month HS of Day EB of Day Season 1 2004 1 1 10 8 1 1 6 4 11 2 2004 1 2 10 8 1 1 7 5 11 3 2004 1 3 10 8 1 1 8 6 11 4 2004 1 4 10 8 1 1 9 7 11 5 2004 1 5 10 8 1 1 10 8 11 6 2004 1 6 10 8 2 2 1 9 12 7 2004 1 7 10 8 2 2 2 10 12 8 2004 1 8 10 8 2 2 3 11 12 9 2004 1 9 10 8 2 2 4 12 12 10 2004 1 10 10 8 2 2 5 1 12 11 2004 1 11 10 8 2 2 6 2 12 12 2004 1 12 10 8 2 2 7 3 12 13 2004 1 13 10 8 2 2 8 4 12 14 2004 1 14 10 8 2 2 9 5 12 15 2004 1 15 10 8 2 2 10 6 12 16 2004 1 16 10 8 2 2 1 7 12 17 2004 1 17 10 8 2 2 2 8 12 18 2004 1 18 10 8 2 2 3 9 12 19 2004 1 19 10 8 2 2 4 10 12 20 2004 1 20 10 8 2 2 5 11 12 21 2004 1 21 10 8 2 2 6 12 12 22 2004 1 22 10 8 2 2 7 1 12 23 2004 1 23 10 8 2 2 8 2 12 24 2004 1 24 10 8 2 2 9 3 12 25 2004 1 25 10 8 2 2 10 4 12 26 2004 1 26 10 8 2 2 1 5 12 27 2004 1 27 10 8 2 2 2 6 12 28 2004 1 28 10 8 2 2 3 7 12 29 2004 1 29 10 8 2 2 4 8 12 30 2004 1 30 10 8 2 2 5 9 12 31 2004 1 31 10 8 2 2 6 10 12 February S/N Year Month Day HS of Year EB of Year HS of Month EB of Month HS of Day EB of Day Season 32 2004 2 1 10 8 2 2 7 11 12 33 2004 2 2 10 8 2 2 8 12 12 34 2004 2 3 10 8 2 2 9 1 12 35 2004 2 4 1 9 3 3 10 2 1 36 2004 2 5 1 9 3 3 1 3 1 37 2004 2 6 1 9 3 3 2 4 1 38 2004 2 7 1 9 3 3 3 5 1 39 2004 2 8 1 9 3 3 4 6 1 40 2004 2 9 1 9 3 3 5 7 1 41 2004 2 10 1 9 3 3 6 8 1 42 2004 2 11 1 9 3 3 7 9 1 43 2004 2 12 1 9 3 3 8 10 1 44 2004 2 13 1 9 3 3 9 11 1 45 2004 2 14 1 9 3 3 10 12 1 46 2004 2 15 1 9 3 3 1 1 1 47 2004 2 16 1 9 3 3 2 2 1 48 2004 2 17 1 9 3 3 3 3 1 49 2004 2 18 1 9 3 3 4 4 1 50 2004 2 19 1 9 3 3 5 5 1 51 2004 2 20 1 9 3 3 6 6 1 52 2004 2 21 1 9 3 3 7 7 1 53 2004 2 22 1 9 3 3 8 8 1 54 2004 2 23 1 9 3 3 9 9 1 55 2004 2 24 1 9 3 3 10 10 1 56 2004 2 25 1 9 3 3 1 11 1 57 2004 2 26 1 9 3 3 2 12 1 58 2004 2 27 1 9 3 3 3 1 1 59 2004 2 28 1 9 3 3 4 2 1 60 2004 2 29 1 9 3 3 5 3 1 March S/N Year Month Day HS of Year EB of Year HS of Month EB of Month HS of Day EB of Day Season 61 2004 3 1 1 9 3 3 6 4 1 62 2004 3 2 1 9 3 3 7 5 1 63 2004 3 3 1 9 3 3 8 6 1 64 2004 3 4 1 9 3 3 9 7 1 65 2004 3 5 1 9 4 4 10 8 2 66 2004 3 6 1 9 4 4 1 9 2 67 2004 3 7 1 9 4 4 2 10 2 68 2004 3 8 1 9 4 4 3 11 2 69 2004 3 9 1 9 4 4 4 12 2 70 2004 3 10 1 9 4 4 5 1 2 71 2004 3 11 1 9 4 4 6 2 2 72 2004 3 12 1 9 4 4 7 3 2 73 2004 3 13 1 9 4 4 8 4 2 74 2004 3 14 1 9 4 4 9 5 2 75 2004 3 15 1 9 4 4 10 6 2 76 2004 3 16 1 9 4 4 1 7 2 77 2004 3 17 1 9 4 4 2 8 2 78 2004 3 18 1 9 4 4 3 9 2 79 2004 3 19 1 9 4 4 4 10 2 80 2004 3 20 1 9 4 4 5 11 2 81 2004 3 21 1 9 4 4 6 12 2 82 2004 3 22 1 9 4 4 7 1 2 83 2004 3 23 1 9 4 4 8 2 2 84 2004 3 24 1 9 4 4 9 3 2 85 2004 3 25 1 9 4 4 10 4 2 86 2004 3 26 1 9 4 4 1 5 2 87 2004 3 27 1 9 4 4 2 6 2 88 2004 3 28 1 9 4 4 3 7 2 89 2004 3 29 1 9 4 4 4 8 2 90 2004 3 30 1 9 4 4 5 9 2 91 2004 3 31 1 9 4 4 6 10 2 April S/N Year Month Day HS of Year EB of Year HS of Month EB of Month HS of Day EB of Day Season 92 2004 4 1 1 9 4 4 7 11 2 93 2004 4 2 1 9 4 4 8 12 2 94 2004 4 3 1 9 4 4 9 1 2 95 2004 4 4 1 9 5 5 10 2 3 96 2004 4 5 1 9 5 5 1 3 3 97 2004 4 6 1 9 5 5 2 4 3 98 2004 4 7 1 9 5 5 3 5 3 99 2004 4 8 1 9 5 5 4 6 3 100 2004 4 9 1 9 5 5 5 7 3 101 2004 4 10 1 9 5 5 6 8 3 102 2004 4 11 1 9 5 5 7 9 3 103 2004 4 12 1 9 5 5 8 10 3 104 2004 4 13 1 9 5 5 9 11 3 105 2004 4 14 1 9 5 5 10 12 3 106 2004 4 15 1 9 5 5 1 1 3 107 2004 4 16 1 9 5 5 2 2 3 108 2004 4 17 1 9 5 5 3 3 3 109 2004 4 18 1 9 5 5 4 4 3 110 2004 4 19 1 9 5 5 5 5 3 111 2004 4 20 1 9 5 5 6 6 3 112 2004 4 21 1 9 5 5 7 7 3 113 2004 4 22 1 9 5 5 8 8 3 114 2004 4 23 1 9 5 5 9 9 3 115 2004 4 24 1 9 5 5 10 10 3 116 2004 4 25 1 9 5 5 1 11 3 117 2004 4 26 1 9 5 5 2 12 3 118 2004 4 27 1 9 5 5 3 1 3 119 2004 4 28 1 9 5 5 4 2 3 120 2004 4 29 1 9 5 5 5 3 3 121 2004 4 30 1 9 5 5 6 4 3 May S/N Year Month Day HS of Year EB of Year HS of Month EB of Month HS of Day EB of Day Season 122 2004 5 1 1 9 5 5 7 5 3 123 2004 5 2 1 9 5 5 8 6 3 124 2004 5 3 1 9 5 5 9 7 3 125 2004 5 4 1 9 5 5 10 8 3 126 2004 5 5 1 9 6 6 1 9 4 127 2004 5 6 1 9 6 6 2 10 4 128 2004 5 7 1 9 6 6 3 11 4 129 2004 5 8 1 9 6 6 4 12 4 130 2004 5 9 1 9 6 6 5 1 4 131 2004 5 10 1 9 6 6 6 2 4 132 2004 5 11 1 9 6 6 7 3 4 133 2004 5 12 1 9 6 6 8 4 4 134 2004 5 13 1 9 6 6 9 5 4 135 2004 5 14 1 9 6 6 10 6 4 136 2004 5 15 1 9 6 6 1 7 4 137 2004 5 16 1 9 6 6 2 8 4 138 2004 5 17 1 9 6 6 3 9 4 139 2004 5 18 1 9 6 6 4 10 4 140 2004 5 19 1 9 6 6 5 11 4 141 2004 5 20 1 9 6 6 6 12 4 142 2004 5 21 1 9 6 6 7 1 4 143 2004 5 22 1 9 6 6 8 2 4 144 2004 5 23 1 9 6 6 9 3 4 145 2004 5 24 1 9 6 6 10 4 4 146 2004 5 25 1 9 6 6 1 5 4 147 2004 5 26 1 9 6 6 2 6 4 148 2004 5 27 1 9 6 6 3 7 4 149 2004 5 28 1 9 6 6 4 8 4 150 2004 5 29 1 9 6 6 5 9 4 151 2004 5 30 1 9 6 6 6 10 4 152 2004 5 31 1 9 6 6 7 11 4 June S/N Year Month Day HS of Year EB of Year HS of Month EB of Month HS of Day EB of Day Season 153 2004 6 1 1 9 6 6 8 12 4 154 2004 6 2 1 9 6 6 9 1 4 155 2004 6 3 1 9 6 6 10 2 4 156 2004 6 4 1 9 6 6 1 3 4 157 2004 6 5 1 9 7 7 2 4 5 158 2004 6 6 1 9 7 7 3 5 5 159 2004 6 7 1 9 7 7 4 6 5 160 2004 6 8 1 9 7 7 5 7 5 161 2004 6 9 1 9 7 7 6 8 5 162 2004 6 10 1 9 7 7 7 9 5 163 2004 6 11 1 9 7 7 8 10 5 164 2004 6 12 1 9 7 7 9 11 5 165 2004 6 13 1 9 7 7 10 12 5 166 2004 6 14 1 9 7 7 1 1 5 167 2004 6 15 1 9 7 7 2 2 5 168 2004 6 16 1 9 7 7 3 3 5 169 2004 6 17 1 9 7 7 4 4 5 170 2004 6 18 1 9 7 7 5 5 5 171 2004 6 19 1 9 7 7 6 6 5 172 2004 6 20 1 9 7 7 7 7 5 173 2004 6 21 1 9 7 7 8 8 5 174 2004 6 22 1 9 7 7 9 9 5 175 2004 6 23 1 9 7 7 10 10 5 176 2004 6 24 1 9 7 7 1 11 5 177 2004 6 25 1 9 7 7 2 12 5 178 2004 6 26 1 9 7 7 3 1 5 179 2004 6 27 1 <|fim▁hole|> 5 180 2004 6 28 1 9 7 7 5 3 5 181 2004 6 29 1 9 7 7 6 4 5 182 2004 6 30 1 9 7 7 7 5 5 July S/N Year Month Day HS of Year EB of Year HS of Month EB of Month HS of Day EB of Day Season 183 2004 7 1 1 9 7 7 8 6 5 184 2004 7 2 1 9 7 7 9 7 5 185 2004 7 3 1 9 7 7 10 8 5 186 2004 7 4 1 9 7 7 1 9 5 187 2004 7 5 1 9 7 7 2 10 5 188 2004 7 6 1 9 7 7 3 11 5 189 2004 7 7 1 9 8 8 4 12 6 190 2004 7 8 1 9 8 8 5 1 6 191 2004 7 9 1 9 8 8 6 2 6 192 2004 7 10 1 9 8 8 7 3 6 193 2004 7 11 1 9 8 8 8 4 6 194 2004 7 12 1 9 8 8 9 5 6 195 2004 7 13 1 9 8 8 10 6 6 196 2004 7 14 1 9 8 8 1 7 6 197 2004 7 15 1 9 8 8 2 8 6 198 2004 7 16 1 9 8 8 3 9 6 199 2004 7 17 1 9 8 8 4 10 6 200 2004 7 18 1 9 8 8 5 11 6 201 2004 7 19 1 9 8 8 6 12 6 202 2004 7 20 1 9 8 8 7 1 6 203 2004 7 21 1 9 8 8 8 2 6 204 2004 7 22 1 9 8 8 9 3 6 205 2004 7 23 1 9 8 8 10 4 6 206 2004 7 24 1 9 8 8 1 5 6 207 2004 7 25 1 9 8 8 2 6 6 208 2004 7 26 1 9 8 8 3 7 6 209 2004 7 27 1 9 8 8 4 8 6 210 2004 7 28 1 9 8 8 5 9 6 211 2004 7 29 1 9 8 8 6 10 6 212 2004 7 30 1 9 8 8 7 11 6 213 2004 7 31 1 9 8 8 8 12 6 August S/N Year Month Day HS of Year EB of Year HS of Month EB of Month HS of Day EB of Day Season 214 2004 8 1 1 9 8 8 9 1 6 215 2004 8 2 1 9 8 8 10 2 6 216 2004 8 3 1 9 8 8 1 3 6 217 2004 8 4 1 9 8 8 2 4 6 218 2004 8 5 1 9 8 8 3 5 6 219 2004 8 6 1 9 8 8 4 6 6 220 2004 8 7 1 9 9 9 5 7 7 221 2004 8 8 1 9 9 9 6 8 7 222 2004 8 9 1 9 9 9 7 9 7 223 2004 8 10 1 9 9 9 8 10 7 224 2004 8 11 1 9 9 9 9 11 7 225 2004 8 12 1 9 9 9 10 12 7 226 2004 8 13 1 9 9 9 1 1 7 227 2004 8 14 1 9 9 9 2 2 7 228 2004 8 15 1 9 9 9 3 3 7 229 2004 8 16 1 9 9 9 4 4 7 230 2004 8 17 1 9 9 9 5 5 7 231 2004 8 18 1 9 9 9 6 6 7 232 2004 8 19 1 9 9 9 7 7 7 233 2004 8 20 1 9 9 9 8 8 7 234 2004 8 21 1 9 9 9 9 9 7 235 2004 8 22 1 9 9 9 10 10 7 236 2004 8 23 1 9 9 9 1 11 7 237 2004 8 24 1 9 9 9 2 12 7 238 2004 8 25 1 9 9 9 3 1 7 239 2004 8 26 1 9 9 9 4 2 7 240 2004 8 27 1 9 9 9 5 3 7 241 2004 8 28 1 9 9 9 6 4 7 242 2004 8 29 1 9 9 9 7 5 7 243 2004 8 30 1 9 9 9 8 6 7 244 2004 8 31 1 9 9 9 9 7 7 September S/N Year Month Day HS of Year EB of Year HS of Month EB of Month HS of Day EB of Day Season 245 2004 9 1 1 9 9 9 10 8 7 246 2004 9 2 1 9 9 9 1 9 7 247 2004 9 3 1 9 9 9 2 10 7 248 2004 9 4 1 9 9 9 3 11 7 249 2004 9 5 1 9 9 9 4 12 7 250 2004 9 6 1 9 9 9 5 1 7 251 2004 9 7 1 9 10 10 6 2 8 252 2004 9 8 1 9 10 10 7 3 8 253 2004 9 9 1 9 10 10 8 4 8 254 2004 9 10 1 9 10 10 9 5 8 255 2004 9 11 1 9 10 10 10 6 8 256 2004 9 12 1 9 10 10 1 7 8 257 2004 9 13 1 9 10 10 2 8 8 258 2004 9 14 1 9 10 10 3 9 8 259 2004 9 15 1 9 10 10 4 10 8 260 2004 9 16 1 9 10 10 5 11 8 261 2004 9 17 1 9 10 10 6 12 8 262 2004 9 18 1 9 10 10 7 1 8 263 2004 9 19 1 9 10 10 8 2 8 264 2004 9 20 1 9 10 10 9 3 8 265 2004 9 21 1 9 10 10 10 4 8 266 2004 9 22 1 9 10 10 1 5 8 267 2004 9 23 1 9 10 10 2 6 8 268 2004 9 24 1 9 10 10 3 7 8 269 2004 9 25 1 9 10 10 4 8 8 270 2004 9 26 1 9 10 10 5 9 8 271 2004 9 27 1 9 10 10 6 10 8 272 2004 9 28 1 9 10 10 7 11 8 273 2004 9 29 1 9 10 10 8 12 8 274 2004 9 30 1 9 10 10 9 1 8 October S/N Year Month Day HS of Year EB of Year HS of Month EB of Month HS of Day EB of Day Season 275 2004 10 1 1 9 10 10 10 2 8 276 2004 10 2 1 9 10 10 1 3 8 277 2004 10 3 1 9 10 10 2 4 8 278 2004 10 4 1 9 10 10 3 5 8 279 2004 10 5 1 9 10 10 4 6 8 280 2004 10 6 1 9 10 10 5 7 8 281 2004 10 7 1 9 10 10 6 8 8 282 2004 10 8 1 9 1 11 7 9 9 283 2004 10 9 1 9 1 11 8 10 9 284 2004 10 10 1 9 1 11 9 11 9 285 2004 10 11 1 9 1 11 10 12 9 286 2004 10 12 1 9 1 11 1 1 9 287 2004 10 13 1 9 1 11 2 2 9 288 2004 10 14 1 9 1 11 3 3 9 289 2004 10 15 1 9 1 11 4 4 9 290 2004 10 16 1 9 1 11 5 5 9 291 2004 10 17 1 9 1 11 6 6 9 292 2004 10 18 1 9 1 11 7 7 9 293 2004 10 19 1 9 1 11 8 8 9 294 2004 10 20 1 9 1 11 9 9 9 295 2004 10 21 1 9 1 11 10 10 9 296 2004 10 22 1 9 1 11 1 11 9 297 2004 10 23 1 9 1 11 2 12 9 298 2004 10 24 1 9 1 11 3 1 9 299 2004 10 25 1 9 1 11 4 2 9 300 2004 10 26 1 9 1 11 5 3 9 301 2004 10 27 1 9 1 11 6 4 9 302 2004 10 28 1 9 1 11 7 5 9 303 2004 10 29 1 9 1 11 8 6 9 304 2004 10 30 1 9 1 11 9 7 9 305 2004 10 31 1 9 1 11 10 8 9 November S/N Year Month Day HS of Year EB of Year HS of Month EB of Month HS of Day EB of Day Season 306 2004 11 1 1 9 1 11 1 9 9 307 2004 11 2 1 9 1 11 2 10 9 308 2004 11 3 1 9 1 11 3 11 9 309 2004 11 4 1 9 1 11 4 12 9 310 2004 11 5 1 9 1 11 5 1 9 311 2004 11 6 1 9 1 11 6 2 9 312 2004 11 7 1 9 2 12 7 3 10 313 2004 11 8 1 9 2 12 8 4 10 314 2004 11 9 1 9 2 12 9 5 10 315 2004 11 10 1 9 2 12 10 6 10 316 2004 11 11 1 9 2 12 1 7 10 317 2004 11 12 1 9 2 12 2 8 10 318 2004 11 13 1 9 2 12 3 9 10 319 2004 11 14 1 9 2 12 4 10 10 320 2004 11 15 1 9 2 12 5 11 10 321 2004 11 16 1 9 2 12 6 12 10 322 2004 11 17 1 9 2 12 7 1 10 323 2004 11 18 1 9 2 12 8 2 10 324 2004 11 19 1 9 2 12 9 3 10 325 2004 11 20 1 9 2 12 10 4 10 326 2004 11 21 1 9 2 12 1 5 10 327 2004 11 22 1 9 2 12 2 6 10 328 2004 11 23 1 9 2 12 3 7 10 329 2004 11 24 1 9 2 12 4 8 10 330 2004 11 25 1 9 2 12 5 9 10 331 2004 11 26 1 9 2 12 6 10 10 332 2004 11 27 1 9 2 12 7 11 10 333 2004 11 28 1 9 2 12 8 12 10 334 2004 11 29 1 9 2 12 9 1 10 335 2004 11 30 1 9 2 12 10 2 10 December S/N Year Month Day HS of Year EB of Year HS of Month EB of Month HS of Day EB of Day Season 336 2004 12 1 1 9 2 12 1 3 10 337 2004 12 2 1 9 2 12 2 4 10 338 2004 12 3 1 9 2 12 3 5 10 339 2004 12 4 1 9 2 12 4 6 10 340 2004 12 5 1 9 2 12 5 7 10 341 2004 12 6 1 9 2 12 6 8 10 342 2004 12 7 1 9 3 1 7 9 11 343 2004 12 8 1 9 3 1 8 10 11 344 2004 12 9 1 9 3 1 9 11 11 345 2004 12 10 1 9 3 1 10 12 11 346 2004 12 11 1 9 3 1 1 1 11 347 2004 12 12 1 9 3 1 2 2 11 348 2004 12 13 1 9 3 1 3 3 11 349 2004 12 14 1 9 3 1 4 4 11 350 2004 12 15 1 9 3 1 5 5 11 351 2004 12 16 1 9 3 1 6 6 11 352 2004 12 17 1 9 3 1 7 7 11 353 2004 12 18 1 9 3 1 8 8 11 354 2004 12 19 1 9 3 1 9 9 11 355 2004 12 20 1 9 3 1 10 10 11 356 2004 12 21 1 9 3 1 1 11 11 357 2004 12 22 1 9 3 1 2 12 11 358 2004 12 23 1 9 3 1 3 1 11 359 2004 12 24 1 9 3 1 4 2 11 360 2004 12 25 1 9 3 1 5 3 11 361 2004 12 26 1 9 3 1 6 4 11 362 2004 12 27 1 9 3 1 7 5 11 363 2004 12 28 1 9 3 1 8 6 11 364 2004 12 29 1 9 3 1 9 7 11 365 2004 12 30 1 9 3 1 10 8 11 366 2004 12 31 1 9 3 1 1 9 11 back to : Hsia Calendar <|fim▁end|> | 9 7 7 4 2 |
<|fim▁begin|> DBpedia is a project to convert the contents of Wikipedia to RDF so that it can be linked into other datasets to add to the Semantic Web. A w:SPARQL endpoint is provided to query this database. Contents 1 SPARQL to KML 1.1 SPARQL Query 1.2 DBpedia Query 1.3 Execute the SPARQL Query 1.4 DBpedia Result 1.5 Query to Tuples 1.6 KML output 1.7 Document construction 1.8 Data cleanup 1.9 Data typing 1.10 Placemark Construction 1.11 Execute 1.12 Complete Script 2 Club Index 2.1 XQuery Script 2.2 Club Index SPARQL to KML This application uses DBpedia to create a kml file showing the birth places of the members of a selected UK Football team. Data quality is limited by a number of factors: the age of the Wikipedia extract on which DBpedia is based the existence or non-existence of individual pages in Wikipedia for players the consistency of property labeling on Wikipedia infoboxes SPARQL Query declare variable $query := " PREFIX geo: <http://www.w3.org/2003/01/geo/wgs84_pos#> PREFIX p: <http://dbpedia.org/property/> SELECT * WHERE { ?player p:currentclub <http://dbpedia.org/resource/Arsenal_F.C.>. OPTIONAL {?player p:cityofbirth ?city}. OPTIONAL {?player p:dateOfBirth ?dob}. OPTIONAL {?player p:clubnumber ?no}. OPTIONAL {?player p:position ?position}. OPTIONAL {?player p:image ?image}. OPTIONAL { { ?city geo:long ?long. } UNION { ?city p:redirect ?city2. ?city2 geo:long ?long. }. }. OPTIONAL { { ?city geo:lat ?lat.} UNION { ?city p:redirect ?city3. ?city3 geo:lat ?lat. }. }. } "; This query is complicated by the need to handle possible redirection of the city name - (can this be improved - this is a generic problem?). To obtain more complete data, the query should also handle the multiple synonyms used for place and date of birth Changes to dbpedia lead to a short life for queries based om the data-model and vocabulary. As of Jan 2011, the query is being updated. Currently to get locations and birthdates for the current players at Arsenal, the following query seems to work. PREFIX geo: <http://www.w3.org/2003/01/geo/wgs84_pos#> PREFIX p: <http://dbpedia.org/property/> PREFIX dbpedia-owl: <http://dbpedia.org/ontology/> SELECT * WHERE { <http://dbpedia.org/resource/Arsenal_F.C.> p:name ?player. ?player dbpedia-owl:birthPlace ?city; dbpedia-owl:birthDate ?dob. ?city geo:long ?long; geo:lat ?lat. } However this yields multiple geocoded locations, of which it can be assumed that the first is most specific (but not possible ? to filter in SPARQL). DBpedia Query The prototype SPARQL query is targeted on Arsenal_F.C. This team name needs to be replaced by the supplied team name, the query then URI-encoded and passed to the DBpedia SPARQL endpoint. let $club := request:get-parameter ("club","Arsenal_F.C.") let $queryx := replace($query,"Arsenal_F.C.",$club) Aside: Initially, the query was written with a generic placeholder ($team) rather than a protypical value (Arsenal_F.C.). The prototype idiom has the benefit of providing an executable SPARQL query without editing, is more expressive and less tricky - the $ in $team needs escaping in the replace expression since the second argument is a regular expression. Execute the SPARQL Query This query uses the SPARQL endpoint provided by the Virtuoso engine. The format of the result is defined to be XML i.e. the SPARQL Query Result format. A function tidies up the interface: declare function local:execute-sparql($query as xs:string) { let $sparql := concat("http://dbpedia.org/sparql?format=xml&default-graph-uri=http://dbpedia.org&query=", encode-for-uri($query) ) return doc($sparql) }; DBpedia Result The result is in SPARQL Query Results XML format. It is more convenient to convert this generic format to tuples with named elements for later processing. declare namespace r = "http://www.w3.org/2005/sparql-results#"; declare function local:sparql-to-tuples($rdfxml ) { for $result in $rdfxml//r:result return <tuple> { for $binding in $result/r:binding return if ($binding/r:uri) then element {$binding/@name} { attribute type {"uri"} , string($binding/r:uri) } else element {$binding/@name} { attribute type {$binding/r:literal/@datatype}, string($binding/r:literal) } } </tuple> }; Query to Tuples let $result:= local:execute-sparql($queryx) let $tuples := local:sparql-to-tuples($result) KML output Since we are generating kml, we need to set the media type and file name and create a Document node - in the appropriate places in the script: declare option exist:serialize "method=xhtml media-type=application/vnd.google-earth.kml+xml highlight-matches=none"; let $x := response:set-header('Content-disposition',concat('Content-disposition: inline;filename=',$team,'.kml;')) return <Document> <name>Birthplaces of players in the {$team} squad</name> <Style id="player"> <IconStyle> <Icon><href>http://maps.google.com/mapfiles/kml/pal2/icon49.png</href> </Icon> </IconStyle> </Style> ..... </Document> The icon is a stock GoogleEarth footballer icon. Document construction Due to the multiple values for some of the properties, for example cityofbirth is often expressed as an address path, there are multiple tuples for each player. These need grouping and compressing. Here we use the XQuery idiom which uses distinct-values to get a set of player names, and then accesses groups of rows with the name as the key. This scripts takes a simplistic approach of using only the first of multiple tuples which contains a latitude , pending a better resolution of the multiple cityofbirth values. We are only interested in players whose place of birth has been geo-coded, so we filter for tuples with a latitude element: { for $playername in distinct-values($tuples[lat]/player) let $player := $tuples[player=$playername][lat][1] Data cleanup The wikiPedia data needs some clean-up before being usable in the kml. A generic clean function decodes the uri-encoded characters, removes some irrelevant text and replaces underscores with spaces. ( this hack needs improving ) declare function local:clean($text) { let $text:= util:unescape-uri($text,"UTF-8") let $text := replace($text,"http://dbpedia.org/resource/","") let <|fim▁hole|> := replace($text,"Football__positions#","") let $text := replace($text,"#",",") let $text := replace($text,"_"," ") return $text }; let $name := local:clean($player/player) let $city :=local:clean($player/city) let $position := local:clean($player/position) Data typing The date of birth is in the form xs:date, but is optional. If the value is a valid date, it is converted to a more readable form using an eXist function: let $dob := if ($player/dob castable as xs:date) then datetime:format-date(xs:date($player/dob),"dd MMM, yyyy" ) else "" Similarly for the position number which should be an xs:integer: let $no := if ($player/no castable as xs:integer) then concat(" [# ", xs:integer($player/no) ,"] ") else "" The latitude and longitude should be xs:decimal. Since sometimes several players in a team come from the same place, the mapped positions are dithered a little. let $lat :=xs:decimal($player/lat) + (math:random() - 0.5)* 0.01 let $long :=xs:decimal($player/long) + (math:random() - 0.5)* 0.01 Placemark Construction The body of the Placemark description will contain XHTML markup to display an image if there is one and to link to the DBpedia page. The XML needs to be serialised to a string for GoogleMap to render the description in a pop-up: let $description := <div> {concat ($position, $no, " born ", $dob, " in ", $city)} <div> <a href="{$player/player}">DBpedia</a> <a href="http://images.google.co.uk/images?q={$name}">Google Images</a> </div> {if ($player/image !="") then <div><img src="{$player/image}" height="200"/> </div> else () } </div> order by $name return <Placemark> <name>{$name}</name> <description> {util:serialize($description,"method=xhtml")} </description> <Point> <coordinates>{concat($long, ",",$lat,",0")}</coordinates> </Point> <styleUrl>#player</styleUrl> </Placemark> } Execute Map of Arsenal players: generate the kml link to GoogleMaps Note that the q parameter is URI-encoded. Complete Script (: generate a sparql query on the dbpedia server This takes a team name and generates a kml file showing the birth place of the players :) declare namespace r = "http://www.w3.org/2005/sparql-results#"; declare variable $query := " PREFIX geo: <http://www.w3.org/2003/01/geo/wgs84_pos#> PREFIX : <http://dbpedia.org/resource/> PREFIX p: <http://dbpedia.org/property/> SELECT * WHERE { ?player p:currentclub <http://dbpedia.org/resource/Arsenal_F.C.>. OPTIONAL {?player p:cityofbirth ?city}. OPTIONAL {?player p:birth ?dob}. OPTIONAL {?player p:clubnumber ?no}. OPTIONAL {?player p:position ?position}. OPTIONAL {?player p:image ?image}. OPTIONAL { { ?city geo:long ?long. } UNION { ?city p:redirect ?city2. ?city2 geo:long ?long. }. }. OPTIONAL { { ?city geo:lat ?lat.} UNION { ?city p:redirect ?city3. ?city3 geo:lat ?lat. }. }. } "; declare function local:execute-sparql($query as xs:string) { let $sparql := concat("http://dbpedia.org/sparql?format=xml&default-graph-uri=http://dbpedia.org&query=", encode-for-uri($query) ) return doc($sparql) }; declare function local:sparql-to-tuples($rdfxml ) { for $result in $rdfxml//r:result return <tuple> { for $binding in $result/r:binding return if ($binding/r:uri) then element {$binding/@name} { attribute type {"uri"} , string($binding/r:uri) } else element {$binding/@name} { attribute type {$binding/@datatype}, string($binding/r:literal) } } </tuple> }; declare function local:clean($text) { let $text:= util:unescape-uri($text,"UTF-8") let $text := replace($text,"http://dbpedia.org/resource/","") let $text := replace($text,"\(.*\)","") let $text := replace($text,"Football__positions#","") let $text := replace($text,"#",",") let $text := replace($text,"_"," ") return $text }; declare option exist:serialize "method=xhtml media-type=application/vnd.google-earth.kml+xml highlight-matches=none"; let $club := request:get-parameter ("club","Arsenal_F.C.") let $queryx := replace($query,"Arsenal_F.C.",$club) let $result:= local:execute-sparql($queryx) let $tuples := local:sparql-to-tuples($result) let $x := response:set-header('Content-disposition',concat('Content-disposition: inline;filename=',$club,'.kml;')) return <Document> <name>Birthplaces of {local:clean($club)} players</name> <Style id="player"> <IconStyle> <Icon><href>http://maps.google.com/mapfiles/kml/pal2/icon49.png</href> </Icon> </IconStyle> </Style> {$result} { for $playername in distinct-values($tuples[lat]/player) let $player := $tuples[player=$playername][lat][1] let $name := local:clean($player/player) let $city :=local:clean($player/city) let $position := local:clean($player/position) let $dob := if ($player/dob castable as xs:date) then datetime:format-date(xs:date($player/dob),"dd MMM, yyyy" ) else "" let $no := if ($player/no castable as xs:integer) then concat(" [# ", xs:integer($player/no),"] ") else "" let $lat := if ($player/lat castable as xs:decimal) then xs:decimal($player/lat) + (math:random() - 0.5)*0.01 else "" let $long := if ($player/long castable as xs:decimal) then xs:decimal($player/long) + (math:random() -0.5)* 0.01 else "" let $description := <div> {concat ($position, $no, " born ", $dob, " in ", $city)} <div><a href="{$player/player}">DBpedia</a> <a href="http://images.google.co.uk/images?q={$name}">Google Images</a> </div> {if ($player/image !="") then <div><img src="{$player/image}" height="200"/> </div> else ()} </div> order by $name return <Placemark> <name>{$name}</name> <description> {util:serialize($description,"method=xhtml")} </description> <Point> <coordinates>{concat($long, ",",$lat,",0")}</coordinates> </Point> <styleUrl>#player</styleUrl> </Placemark> } </Document> Club Index We also need an index page, selecting all Clubs in the major English and Scottish leagues. This script follows the same lines as the more complex script above, except that due to the simpler data, the raw SPARQL result is used without transformation. The index is sorted alphabetically by club name and provides links to the player map and to the base DBpedia data. XQuery Script declare option exist:serialize "method=xhtml media-type=text/html"; declare namespace r = "http://www.w3.org/2005/sparql-results#"; declare variable $query := " PREFIX : <http://dbpedia.org/resource/> PREFIX p: <http://dbpedia.org/property/> SELECT * WHERE { ?club p:league ?league. { ?club p:league :Premier_League.} UNION {?club p:league :Football_League_One.} UNION {?club p:league :Football_League_Two.} UNION {?club p:league :Scottish_Premier_League.} UNION {?club p:league :Football_League_Championship.} } "; declare function local:execute-sparql($query as xs:string) { let $sparql := concat("http://dbpedia.org/sparql?format=xml&default-graph-uri=http://dbpedia.org&query=",escape-uri($query,true()) ) return doc($sparql) }; declare function local:clean($string as xs:string) as xs:string { let $string := util:unescape-uri($string,"UTF-8") let $string := replace($string,"\(.*\)","") let $string := replace($string,"_"," ") return $string }; <html> <body> <h1>England and Scottish Football Clubs</h1> <table border="1"> { for $tuple in local:execute-sparql($query)//r:result let $club := $tuple/r:binding[@name="club"]/r:uri let $club :=substring-after($club,"/resource/") let $clubx := local:clean($club) let $league := $tuple/r:binding[@name="league"]/r:uri let $league := local:clean(substring-after($league,"/resource/")) let $mapurl := concat("http://maps.google.co.uk/maps?q=",escape-uri(concat("http://www.cems.uwe.ac.uk/xmlwiki/RDF/club2kml.xq?club=",$club),true())) order by $club return <tr> <td>{$clubx}</td> <td>{$league}</td> <td><a href="{$mapurl}">Player Map</a></td> <td><a href="http://dbpedia.org/resource/{$club}">DBpedia</a></td> </tr> } </table> </body> </html> Club Index Club Index <|fim▁end|> | $text := replace($text,"\(.*\)","") let $text |
<|fim▁begin|> I AM THE LORD AND I DO NOT CHANGE God is bold enough to declare this simple statement, I AM. Together with this statement that "I do not change". This declaration is a majestic proclamation that God, whoever he is, does not change. If he is good, then that goodness never changes. Whatever his attributes, like mercy and justice, those do not change. Ever. This is the Doctrine of Immutability. God is Lord and he does not change. If one is to believe in a God, it is essential that he is immutable. Faith is based on the trust that God says who he is. God must therefore be immutable for the Bible to be true. For the prophecies and the promises to be of any value, God <|fim▁hole|> He must be who he has always been. Otherwise everything that faith calls for needs to change. If God makes a promise then he must be capable of fulfilling his word. Also he must be trusted to deliver on his promise. Trusting God is by definition believing in his unchanging nature. Changing is something humans have to do to regain their status before the fall of man. God is perfect, therefore does not need to change. Immutability and perfection are connected. If one is perfect then change is not required. The Bible teaches that God never changes. The promises are unchanging. God boldly declared in Malachi 3:6 that he is unchanging. The immutability of God is thus certain and an essential part of the doctrine of Christianity. <|fim▁end|> | must be the ultimate being. |
<|fim▁begin|> Periodic Table of the Elements Inorganic chemistry is the study of the synthesis, reactions, structures and properties of compounds of the elements. This subject is usually taught after students are introduced to organic chemistry, which concerns the synthesis and reactions of compounds of carbon (typically containing C-H bonds). Inorganic chemistry encompasses the compounds - both molecular and extended solids - of everything else in the periodic table, and overlaps with organic chemistry in the area of organometallic chemistry, in which metals are bonded to carbon-containing ligands and molecules. Inorganic chemistry is fundamental to many practical technologies including catalysis and materials (structural, electronic, magnetic,...), energy conversion and storage, and electronics. Inorganic compounds are also found in biological systems where they are essential to life processes. This textbook (in its initial form) is intended for use in a first semester course in inorganic chemistry, covering the basic concepts in structure, bonding, and properties that underlie the field. The objective of this book is for students to understand how to use valence bond theory, crystal field theory, and molecular orbital theory to describe bonding in inorganic compounds, learn periodic trends in redox and acid-base equilibria, and learn the structures of solid elements and simple compounds. Building on this foundation we will develop a conceptual framework for understanding the stability and the electronic, magnetic, electrochemical, and mechanical properties of inorganic solids. We will also connect the chemistry of inorganic materials to some of their current and emerging applications, especially in the realm of nanoscale chemistry. By the end of the book the diligent student should know many of the elements in the periodic table as good friends, and the others at least as familiar acquaintances. This course will also help students understand the connection between inorganic chemistry and technological problems of current relevance, including: Where in the periodic table should we look for new semiconductors to make cheap and efficient solar cells? What's in a lithium battery, and how can we improve them for electric cars? How do inorganic compounds store and sequester hydrogen, methane, and CO2? Some of the water supply in the developing world is contaminated with arsenic and other toxic substances. How can we clean up the water? How do nanoparticles provide better technology for medical diagnostics and therapy? How do the devices (transistors, LEDs, piezoelectrics, alloys) in a cell phone and computer work? We hope to add second-semester topics, including group theory, spectroscopy, organometallic chemistry, and bioinorganic chemistry, in future editions of this book. Authors Born in 2014, this wikibook is a cooperative learning project of students in Chemistry 310 at Penn State University. It is a work in progress, and students and teachers of inorganic chemistry are encouraged to edit the book and add to it. Contents 1 Chapter 1: Review of Chemical Bonding 2 Chapter 2: Molecular Orbital Theory 3 Chapter 3: Acid-Base Chemistry 4 Chapter 4 : Redox Stability and Redox Reactions 5 Chapter 5 : Coordination Chemistry and Crystal Field Theory 6 Chapter 6 : Metals and Alloys: Structure, Bonding, Electronic and Magnetic Properties 7 Chapter 7 : Metals and Alloys: Mechanical Properties 8 Chapter 8 : Ionic and Covalent Solids - Structures 9 Chapter 9 : Ionic and Covalent Solids - Energetics 10 Chapter 10 : Electronic Properties of Materials: Superconductors and Semiconductors 11 Chapter 11: Basic Science of Nanomaterials 12 Chapter 12: Resources for Students and Teachers Chapter 1: Review of Chemical Bonding 1.1 Valence bond theory: Lewis dot structures, the octet rule, formal charge, resonance, and the isoelectronic principle 1.2 The shapes of molecules (VSEPR theory) and orbital hybridization 1.3 Bond polarity and <|fim▁hole|> Problems 1.6 References Chapter 2: Molecular Orbital Theory 2.1 Constructing molecular orbitals from atomic orbitals 2.2 Orbital symmetry 2.3 σ, π, and δ orbitals 2.4 Diatomic molecules 2.5 Orbital filling 2.6 Periodic trends in π bonding 2.7 Three-center bonding 2.8 Building up the MOs of more complex molecules: NH3, P4 2.9 Homology of σ and π orbitals in MO diagrams 2.10 Chains and rings of π-conjugated systems 2.11 Discussion questions 2.12 Problems 2.13 References Chapter 3: Acid-Base Chemistry 3.1 Brønsted and Lewis acids and bases 3.2 Hard and soft acids and bases 3.3 The electrostatic-covalent (ECW) model for acid-base reactions 3.4 Frustrated Lewis pairs 3.5 Discussion questions 3.6 Problems 3.7 References Chapter 4 : Redox Stability and Redox Reactions 4.1 Balancing redox reactions 4.2 Electrochemical potentials 4.3 Latimer and Frost diagrams 4.4 Redox reactions with coupled equilibria 4.5 Pourbaix diagrams 4.6 Discussion questions 4.7 Problems 4.8 References Chapter 5 : Coordination Chemistry and Crystal Field Theory 5.1 Counting electrons in transition metal complexes 5.2 Crystal field theory 5.3 Spectrochemical series 5.4 π-bonding between metals and ligands 5.5 Crystal field stabilization energy, pairing, and Hund's rule 5.6 Non-octahedral complexes 5.7 Jahn-Teller effect 5.8 Tetrahedral complexes 5.9 Stability of transition metal complexes 5.10 Chelate and macrocyclic effects 5.11 Ligand substitution reactions 5.12 Discussion questions 5.13 Problems 5.14 References Chapter 6 : Metals and Alloys: Structure, Bonding, Electronic and Magnetic Properties 6.1 Unit cells and crystal structures 6.2 Bravais lattices 6.3 Crystal structures of metals 6.4 Bonding in metals 6.5 Conduction in metals 6.6 Atomic orbitals and magnetism 6.7 Ferro-, ferri- and antiferromagnetism 6.8 Hard and soft magnets 6.9 Discussion questions 6.10 Problems 6.11 References Chapter 7 : Metals and Alloys: Mechanical Properties 7.1 Defects in metallic crystals 7.2 Work hardening, alloying, and annealing 7.3 Malleability of metals and alloys 7.4 Iron and steel 7.5 Amorphous alloys 7.6 Discussion questions 7.7 Problems 7.8 References Chapter 8 : Ionic and Covalent Solids - Structures 8.1 Close-packing and interstitial sites 8.2 Structures related to NaCl and NiAs 8.3 Tetrahedral structures 8.4 Layered structures and intercalation reactions 8.5 Bonding in TiS2, MoS2, and pyrite structures 8.6 Spinel, perovskite, and rutile structures 8.7 Discussion questions 8.8 Problems 8.9 References Chapter 9 : Ionic and Covalent Solids - Energetics 9.1 Ionic radii and radius ratios 9.2 Structure maps 9.3 Energetics of crystalline solids: the ionic model 9.4 Born-Haber cycles for NaCl and silver halides 9.5 Kapustinskii equation 9.6 Discovery of noble gas compounds 9.7 Stabilization of high and low oxidation states 9.8 Alkalides and electrides 9.9 Resonance energy of metals 9.10 The strange case of the alkali oxides 9.11 Lattice energies and solubility 9.12 Discussion questions 9.13 Problems 9.14 References Chapter 10 : Electronic Properties of Materials: Superconductors and Semiconductors 10.1 Metal-insulator transitions 10.2 Superconductors 10.3 Periodic trends: metals, semiconductors, and insulators 10.4 Semiconductors: band gaps, colors, conductivity and doping 10.5 Semiconductor p-n junctions 10.6 Diodes, LED's and solar cells 10.7 Amorphous semiconductors 10.8 Discussion questions 10.9 Problems 10.10 References Chapter 11: Basic Science of Nanomaterials 11.1 Physics and length scales: cavity laser, Coulomb blockade, nanoscale magnets 11.2 Semiconductor quantum dots 11.3 Synthesis of semiconductor nanocrystals 11.4 Surface energy 11.5 Nanoscale metal particles 11.6 Applications of nanomaterials 11.7 Discussion questions 11.8 Problems 11.9 References Chapter 12: Resources for Students and Teachers 12.1 VIPEr: Virtual Inorganic Pedagogical Electronic Resource: A community for teachers and students of inorganic chemistry 12.2 Beloit College / University of Wisconsin Video Lab Manual 12.3 Atomic and Molecular Orbitals (University of Liverpool) 12.4 Interactive 3D Crystal Structures (University of Liverpool) 12.5 Appendix 1: Periodic Tables 12.6 Appendix 2: Selected Thermodynamic Values 12.7 Appendix 3: Bond Enthalpies <|fim▁end|> | bond strength 1.4 Discussion questions 1.5 |
<|fim▁begin|> A-level Computing Further Programming Software Development Specification link Stages of software development show understanding that software development consists of a number of stages, including requirement identification, design, coding, testing, documentation and maintenance show understanding that stages may overlap show understanding of the possible role of program generators and program libraries in the development process Testing show awareness of why errors occur show understanding of how testing can expose possible errors appreciate the significance of testing throughout software development show understanding of the methods of testing <|fim▁hole|> white-box, black-box, integration, alpha, beta, acceptance show understanding of the need for a test strategy and test plan and their likely contents choose appropriate test data (normal, abnormal and extreme/boundary) for a test plan Project management show understanding that large developments will involve teams show understanding of the need for project management show understanding of project planning techniques including the use of GANTT and Program Evaluation Review Technique (PERT) charts describe the information that GANTT and PERT charts provide construct and edit GANTT and PERT charts <|fim▁end|> | available: dry run, walkthrough, |
<|fim▁begin|> Solutions Problem 1 Use least-squares to judge if the coin in this experiment is fair. flips 8 16 24 32 40 heads 4 9 13 17 20 Answer As with the first example discussed above, we are trying to find a best m {\displaystyle m} to "solve" this system. 8 m = 4 16 m = 9 24 m = 13 32 m = 17 40 m = 20 {\displaystyle {\begin{array}{*{5}{rc}r}8m&=&4\\16m&=&9\\24m&=&13\\32m&=&17\\40m&=&20\end{array}}} Projecting into the linear subspace gives this ( 4 9 13 17 20 ) ⋅ ( 8 16 24 32 40 ) ( 8 16 24 32 40 ) ⋅ ( 8 16 24 32 40 ) ⋅ ( 8 16 24 32 40 ) = 1832 3520 ⋅ ( 8 16 24 32 40 ) {\displaystyle {\frac {{\begin{pmatrix}4\\9\\13\\17\\20\end{pmatrix}}\cdot {\begin{pmatrix}8\\16\\24\\32\\40\end{pmatrix}}}{{\begin{pmatrix}8\\16\\24\\32\\40\end{pmatrix}}\cdot {\begin{pmatrix}8\\16\\24\\32\\40\end{pmatrix}}}}\cdot {\begin{pmatrix}8\\16\\24\\32\\40\end{pmatrix}}={\frac {1832}{3520}}\cdot {\begin{pmatrix}8\\16\\24\\32\\40\end{pmatrix}}} so the slope of the line of best fit is approximately 0.52 {\displaystyle 0.52} . Problem 2 For the men's mile record, rather than give each of the many records and its exact date, we've "smoothed" the data somewhat by taking a periodic sample. Do the longer calculation and compare the conclusions. Answer With this input A = ( 1 1852.71 1 1858.88 ⋮ ⋮ 1 1985.54 1 1993.71 ) b = ( 292.0 285.0 ⋮ 226.32 224.39 ) {\displaystyle A={\begin{pmatrix}1&1852.71\\1&1858.88\\\vdots &\vdots \\1&1985.54\\1&1993.71\end{pmatrix}}\qquad b={\begin{pmatrix}292.0\\285.0\\\vdots \\226.32\\224.39\end{pmatrix}}} (the dates have been rounded to months, e.g., for a September record, the decimal .71 ≈ ( 8.5 / 12 ) {\displaystyle .71\approx (8.5/12)} was used), Maple responded with an intercept of b = 994.8276974 {\displaystyle b=994.8276974} and a slope of m = − 0.3871993827 {\displaystyle m=-0.3871993827} . Problem 3 Find the line of best fit for the men's 1500 {\displaystyle 1500} meter run. How does the slope compare with that for the men's mile? (The distances are close; a mile is about 1609 {\displaystyle 1609} meters.) Answer With this input (the years are zeroed at 1900 {\displaystyle 1900} ) A := ( 1 .38 1 .54 ⋮ ⋮ 1 92.71 1 95.54 ) b = ( 249.0 246.2 ⋮ 208.86 207.37 ) {\displaystyle A:={\begin{pmatrix}1&.38\\1&.54\\\vdots \vdots \\1&92.71\\1&95.54\end{pmatrix}}\qquad b={\begin{pmatrix}249.0\\246.2\\\vdots \\208.86\\207.37\end{pmatrix}}} (the dates have been rounded to months, e.g., for a September record, the decimal .71 ≈ ( 8.5 / 12 ) {\displaystyle .71\approx (8.5/12)} was used), Maple gives an intercept of b = 243.1590327 {\displaystyle b=243.1590327} and a slope of m = − 0.401647703 {\displaystyle m=-0.401647703} . The slope given in the body of this Topic for the men's mile is quite close to this. Problem 4 Find the line of best fit for the records for women's mile. Answer With this input (the years are zeroed at 1900 {\displaystyle 1900} ) A = ( 1 21.46 1 32.63 ⋮ ⋮ 1 89.54 1 96.63 ) b = ( 373.2 327.5 ⋮ 255.61 252.56 ) {\displaystyle A={\begin{pmatrix}1&21.46\\1&32.63\\\vdots &\vdots \\1&89.54\\1&96.63\end{pmatrix}}\qquad b={\begin{pmatrix}373.2\\327.5\\\vdots \\255.61\\252.56\end{pmatrix}}} (the dates have been rounded to months, e.g., for a September record, the decimal .71 ≈ ( 8.5 / 12 ) {\displaystyle .71\approx (8.5/12)} was used), MAPLE gave an intercept of b = 378.7114894 {\displaystyle b=378.7114894} and a slope of m = − 1.445753225 {\displaystyle m=-1.445753225} . Problem 5 Do the lines of best fit for the men's and women's miles cross? Answer These are the equations of the lines for men's and women's mile (the vertical intercept term of the equation for the women's mile has been adjusted from the answer above, to zero it at the year 0 {\displaystyle 0} , because that's how the men's mile equation was done). y = 994.8276974 − 0.3871993827 x y = 3125.6426 − 1.445753225 x {\displaystyle {\begin{array}{rl}y&=994.8276974-0.3871993827x\\y&=3125.6426-1.445753225x\end{array}}} Obviously the lines cross. A computer program is the easiest way to do the arithmetic: MuPAD gives x = 2012.949004 {\displaystyle x=2012.949004} and y = 215.4150856 {\displaystyle y=215.4150856} ( 215 {\displaystyle 215} seconds is 3 {\displaystyle 3} minutes and 35 {\displaystyle 35} seconds). Remark. Of course all of this projection is highly dubious — for one thing, the equation for the women is influenced by the quite slow early times — but it is nonetheless fun. Problem 6 When the space shuttle Challenger exploded in 1986, one of the criticisms made of NASA's decision to launch was in the way the analysis of number of O-ring failures versus temperature was made (of course, O-ring failure caused the explosion). Four O-ring failures will cause the rocket to explode. NASA had data from 24 previous flights. temp °F 53 75 57 58 63 70 70 66 67 67 67 failures 3 2 1 1 1 1 1 0 0 0 0 temp °F 68 69 70 70 72 73 75 76 76 78 79 80 81 failures 0 0 0 0 0 0 0 0 0 0 0 0 0 The temperature that day was forecast to be 31 ∘ F {\displaystyle 31^{\circ }{\text{F}}} . NASA based the decision to launch partially on a chart showing only the flights that had at least one O-ring failure. Find the line that best fits these seven flights. On the basis of this data, predict the number of O-ring failures when the temperature is 31 {\displaystyle 31} , and when the number of failures will exceed four. Find the line that best fits all 24 flights. On the basis of this extra data, predict the number of O-ring failures when the temperature is 31 {\displaystyle 31} , and when the number of failures will exceed four. Which do you think is the more accurate method of predicting? (An excellent discussion appears in (Dalal, Folkes & Hoadley 1989).) Answer A computer algebra system like MAPLE or MuPAD will give an intercept of b = 4259 / 1398 ≈ 3.239628 {\displaystyle b=4259/1398\approx 3.239628} and a slope of m = − 71 / 2796 ≈ − 0.025393419 {\displaystyle m=-71/2796\approx -0.025393419} Plugging x = 31 {\displaystyle x=31} into the equation yields a predicted number of O-ring failures of y = 2.45 {\displaystyle y=2.45} (rounded to two places). Plugging in y = 4 {\displaystyle y=4} and solving gives a temperature of x = − 29.94 ∘ {\displaystyle x=-29.94^{\circ }} F. On the basis of this information A = ( 1 53 1 75 ⋮ 1 80 1 81 ) b = ( 3 2 ⋮ 0 0 ) {\displaystyle A={\begin{pmatrix}1&53\\1&75\\\vdots \\1&80\\1&81\end{pmatrix}}\qquad b={\begin{pmatrix}3\\2\\\vdots \\0\\0\end{pmatrix}}} MAPLE gives the intercept b = 187 / 40 = 4.675 {\displaystyle b=187/40=4.675} and the slope m = − 73 / 1200 ≈ − 0.060833 {\displaystyle m=-73/1200\approx -0.060833} . Here, plugging x = 31 {\displaystyle x=31} into the equation predicts y = 2.79 {\displaystyle y=2.79} O-ring failures (rounded to two places). Plugging in y = 4 {\displaystyle y=4} failures gives a temperature of x = 11 ∘ {\displaystyle x=11^{\circ }} F. Problem 7 This table lists the average distance from the sun to each of the first seven planets, using earth's average as a unit. Mercury Venus Earth Mars Jupiter Saturn Uranus 0.39 0.72 1.00 1.52 5.20 9.54 19.2 Plot the number of the planet (Mercury is 1 {\displaystyle 1} , etc.) versus the distance. Note that it does not look like a line, and so finding the line of best fit is not fruitful. It does, however look like an exponential curve. Therefore, plot the number of the planet versus the logarithm of the distance. Does this look like a line? The asteroid belt between Mars and Jupiter is thought to be what is left of a planet that broke apart. Renumber so that Jupiter <|fim▁hole|> Saturn is 7 {\displaystyle 7} , and Uranus is 8 {\displaystyle 8} , and plot against the log again. Does this look better? Use least squares on that data to predict the location of Neptune. Repeat to predict where Pluto is. Is the formula accurate for Neptune and Pluto? This method was used to help discover Neptune (although the second item is misleading about the history; actually, the discovery of Neptune in position 9 {\displaystyle 9} prompted people to look for the "missing planet" in position 5 {\displaystyle 5} ). See (Gardner 1970) Answer The plot is nonlinear. Here is the plot. There is perhaps a jog up between planet 4 {\displaystyle 4} and planet 5 {\displaystyle 5} . This plot seems even more linear. With this input A = ( 1 1 1 2 1 3 1 4 1 6 1 7 1 8 ) b = ( − 0.40893539 − 0.1426675 0 0.18184359 0.71600334 0.97954837 1.2833012 ) {\displaystyle A={\begin{pmatrix}1&1\\1&2\\1&3\\1&4\\1&6\\1&7\\1&8\end{pmatrix}}\qquad b={\begin{pmatrix}-0.40893539\\-0.1426675\\0\\0.18184359\\0.71600334\\0.97954837\\1.2833012\end{pmatrix}}} MuPAD gives that the intercept is b = − 0.6780677466 {\displaystyle b=-0.6780677466} and the slope is m = 0.2372763818 {\displaystyle m=0.2372763818} . Plugging x = 9 {\displaystyle x=9} into the equation y = − 0.6780677466 + 0.2372763818 x {\displaystyle y=-0.6780677466+0.2372763818x} from the prior item gives that the log of the distance is 1.4574197 {\displaystyle 1.4574197} , so the expected distance is 28.669472 {\displaystyle 28.669472} . The actual distance is about 30.003 {\displaystyle 30.003} . Plugging x = 10 {\displaystyle x=10} into the same equation gives that the log of the distance is 1.6946961 {\displaystyle 1.6946961} , so the expected distance is 49.510362 {\displaystyle 49.510362} . The actual distance is about 39.503 {\displaystyle 39.503} . Problem 8 William Bennett has proposed an Index of Leading Cultural Indicators for the US (Bennett 1993). Among the statistics cited are the average daily hours spent watching TV, and the average combined SAT scores. 1960 1965 1970 1975 1980 1985 1990 1992 TV 5:06 5:29 5:56 6:07 6:36 7:07 6:55 7:04 SAT 975 969 948 910 890 906 900 899 Suppose that a cause and effect relationship is proposed between the time spent watching TV and the decline in SAT scores (in this article, Mr. Bennett does not argue that there is a direct connection). Find the line of best fit relating the independent variable of average daily TV hours to the dependent variable of SAT scores. Find the most recent estimate of the average daily TV hours (Bennett's cites Neilsen Media Research as the source of these estimates). Estimate the associated SAT score. How close is your estimate to the actual average? (Warning: a change has been made recently in the SAT, so you should investigate whether some adjustment needs to be made to the reported average to make a valid comparison.) Answer With this input A = ( 1 306 1 329 1 356 1 367 1 396 1 427 1 415 1 424 ) b = ( 975 969 948 910 890 906 900 899 ) {\displaystyle A={\begin{pmatrix}1&306\\1&329\\1&356\\1&367\\1&396\\1&427\\1&415\\1&424\end{pmatrix}}\qquad b={\begin{pmatrix}975\\969\\948\\910\\890\\906\\900\\899\end{pmatrix}}} MAPLE gives the intercept b = 34009779 / 28796 ≈ 1181.0591 {\displaystyle b=34009779/28796\approx 1181.0591} and the slope m = − 19561 / 28796 ≈ − 0.6793 {\displaystyle m=-19561/28796\approx -0.6793} . Additional Data Data on the progression of the world's records (taken from the Runner's World web site) is below. Progression of Men's Mile Record time name date 4:52.0 Cadet Marshall (GBR) 02Sep52 4:45.0 Thomas Finch (GBR) 03Nov58 4:40.0 Gerald Surman (GBR) 24Nov59 4:33.0 George Farran (IRL) 23May62 4:29 3/5 Walter Chinnery (GBR) 10Mar68 4:28 4/5 William Gibbs (GBR) 03Apr68 4:28 3/5 Charles Gunton (GBR) 31Mar73 4:26.0 Walter Slade (GBR) 30May74 4:24 1/2 Walter Slade (GBR) 19Jun75 4:23 1/5 Walter George (GBR) 16Aug80 4:19 2/5 Walter George (GBR) 03Jun82 4:18 2/5 Walter George (GBR) 21Jun84 4:17 4/5 Thomas Conneff (USA) 26Aug93 4:17.0 Fred Bacon (GBR) 06Jul95 4:15 3/5 Thomas Conneff (USA) 28Aug95 4:15 2/5 John Paul Jones (USA) 27May11 4:14.4 John Paul Jones (USA) 31May13 4:12.6 Norman Taber (USA) 16Jul15 4:10.4 Paavo Nurmi (FIN) 23Aug23 4:09 1/5 Jules Ladoumegue (FRA) 04Oct31 4:07.6 Jack Lovelock (NZL) 15Jul33 4:06.8 Glenn Cunningham (USA) 16Jun34 4:06.4 Sydney Wooderson (GBR) 28Aug37 4:06.2 Gunder Hagg (SWE) 01Jul42 4:04.6 Gunder Hagg (SWE) 04Sep42 4:02.6 Arne Andersson (SWE) 01Jul43 4:01.6 Arne Andersson (SWE) 18Jul44 4:01.4 Gunder Hagg (SWE) 17Jul45 3:59.4 Roger Bannister (GBR) 06May54 3:58.0 John Landy (AUS) 21Jun54 3:57.2 Derek Ibbotson (GBR) 19Jul57 3:54.5 Herb Elliott (AUS) 06Aug58 3:54.4 Peter Snell (NZL) 27Jan62 3:54.1 Peter Snell (NZL) 17Nov64 3:53.6 Michel Jazy (FRA) 09Jun65 3:51.3 Jim Ryun (USA) 17Jul66 3:51.1 Jim Ryun (USA) 23Jun67 3:51.0 Filbert Bayi (TAN) 17May75 3:49.4 John Walker (NZL) 12Aug75 3:49.0 Sebastian Coe (GBR) 17Jul79 3:48.8 Steve Ovett (GBR) 01Jul80 3:48.53 Sebastian Coe (GBR) 19Aug81 3:48.40 Steve Ovett (GBR) 26Aug81 3:47.33 Sebastian Coe (GBR) 28Aug81 3:46.32 Steve Cram (GBR) 27Jul85 3:44.39 Noureddine Morceli (ALG) 05Sep93 3:43.13 Hicham el Guerrouj (MOR) 07Jul99 Progression of Men's 1500 Meter Record time name date 4:09.0 John Bray (USA) 30May00 4:06.2 Charles Bennett (GBR) 15Jul00 4:05.4 James Lightbody (USA) 03Sep04 3:59.8 Harold Wilson (GBR) 30May08 3:59.2 Abel Kiviat (USA) 26May12 3:56.8 Abel Kiviat (USA) 02Jun12 3:55.8 Abel Kiviat (USA) 08Jun12 3:55.0 Norman Taber (USA) 16Jul15 3:54.7 John Zander (SWE) 05Aug17 3:53.0 Paavo Nurmi (FIN) 23Aug23 3:52.6 Paavo Nurmi (FIN) 19Jun24 3:51.0 Otto Peltzer (GER) 11Sep26 3:49.2 Jules Ladoumegue (FRA) 05Oct30 3:49.0 Luigi Beccali (ITA) 17Sep33 3:48.8 William Bonthron (USA) 30Jun34 3:47.8 Jack Lovelock (NZL) 06Aug36 3:47.6 Gunder Hagg (SWE) 10Aug41 3:45.8 Gunder Hagg (SWE) 17Jul42 3:45.0 Arne Andersson (SWE) 17Aug43 3:43.0 Gunder Hagg (SWE) 07Jul44 3:42.8 Wes Santee (USA) 04Jun54 3:41.8 John Landy (AUS) 21Jun54 3:40.8 Sandor Iharos (HUN) 28Jul55 3:40.6 Istvan Rozsavolgyi (HUN) 03Aug56 3:40.2 Olavi Salsola (FIN) 11Jul57 3:38.1 Stanislav Jungwirth (CZE) 12Jul57 3:36.0 Herb Elliott (AUS) 28Aug58 3:35.6 Herb Elliott (AUS) 06Sep60 3:33.1 Jim Ryun (USA) 08Jul67 3:32.2 Filbert Bayi (TAN) 02Feb74 3:32.1 Sebastian Coe (GBR) 15Aug79 3:31.36 Steve Ovett (GBR) 27Aug80 3:31.24 Sydney Maree (usa) 28Aug83 3:30.77 Steve Ovett (GBR) 04Sep83 3:29.67 Steve Cram (GBR) 16Jul85 3:29.46 Said Aouita (MOR) 23Aug85 3:28.86 Noureddine Morceli (ALG) 06Sep92 3:27.37 Noureddine Morceli (ALG) 12Jul95 3:26.00 Hicham el Guerrouj (MOR) 14Jul98 Progression of Women's Mile Record time name date 6:13.2 Elizabeth Atkinson (GBR) 24Jun21 5:27.5 Ruth Christmas (GBR) 20Aug32 5:24.0 Gladys Lunn (GBR) 01Jun36 5:23.0 Gladys Lunn (GBR) 18Jul36 5:20.8 Gladys Lunn (GBR) 08May37 5:17.0 Gladys Lunn (GBR) 07Aug37 5:15.3 Evelyne Forster (GBR) 22Jul39 5:11.0 Anne Oliver (GBR) 14Jun52 5:09.8 Enid Harding (GBR) 04Jul53 5:08.0 Anne Oliver (GBR) 12Sep53 5:02.6 Diane Leather (GBR) 30Sep53 5:00.3 Edith Treybal (ROM) 01Nov53 5:00.2 Diane Leather (GBR) 26May54 4:59.6 Diane Leather (GBR) 29May54 4:50.8 Diane Leather (GBR) 24May55 4:45.0 Diane Leather (GBR) 21Sep55 4:41.4 Marise Chamberlain (NZL) 08Dec62 4:39.2 Anne Smith (GBR) 13May67 4:37.0 Anne Smith (GBR) 03Jun67 4:36.8 Maria Gommers (HOL) 14Jun69 4:35.3 Ellen Tittel (FRG) 20Aug71 4:34.9 Glenda Reiser (CAN) 07Jul73 4:29.5 Paola Pigni-Cacchi (ITA) 08Aug73 4:23.8 Natalia Marasescu (ROM) 21May77 4:22.1 Natalia Marasescu (ROM) 27Jan79 4:21.7 Mary Decker (USA) 26Jan80 4:20.89 Lyudmila Veselkova (SOV) 12Sep81 4:18.08 Mary Decker-Tabb (USA) 09Jul82 4:17.44 Maricica Puica (ROM) 16Sep82 4:15.8 Natalya Artyomova (SOV) 05Aug84 4:16.71 Mary Decker-Slaney (USA) 21Aug85 4:15.61 Paula Ivan (ROM) 10Jul89 4:12.56 Svetlana Masterkova (RUS) 14Aug96 References Bennett, William (March 15, 1993), "Quantifying America's Decline", Wall Street Journal Dalal, Siddhartha; Folkes, Edward; Hoadley, Bruce (Fall 1989), "Lessons Learned from Challenger: A Statistical Perspective", Stats: the Magazine for Students of Statistics: 14-18 Gardner, Martin (April 1970), "Mathematical Games, Some mathematical curiosities embedded in the solar system", Scientific American: 108-112 <|fim▁end|> | is 6 {\displaystyle 6} , |
<|fim▁begin|> Chapter 29 of Harry Potter and the Deathly Hallows: The Lost Diadem← Chapter 28 | Chapter 30 → Contents 1 Synopsis 2 Analysis 3 Questions 3.1 Review 3.2 Further Study 4 Greater Picture Synopsis Spoiler warning: Plot and/or ending details follow. Neville is overjoyed to see them, but Harry, Ron, and Hermione are horrified by his battered appearance. Neville says this is nothing, wait till they see Seamus. Neville informs a dismayed Aberforth that more people will be Apparating in. Leading the Trio down the long, dark tunnel, Neville explains that the seven known secret passageways into Hogwarts have been magically sealed, and Death Eaters guard the exits. Everyone is talking about the Trio breaking into Gringotts and escaping on a Dragon. Harry confirms it is true. Hogwarts has drastically changed since the Trio left. The Carrows, the two Death Eater professors now handle all student punishment, though the other teachers avoid sending anyone to them whenever possible. Amycus Carrow teaches Defence Against the Dark Arts, now just called "Dark Arts." Students are forced to practice the Cruciatus curse on detention students. Neville's refusal to curse anyone resulted in him being beaten, despite him being Pure Blood. Some students, notably Crabbe and Goyle, have proven quite apt at the Dark Arts and love practicing them. Alecto Carrow, the Muggle Studies teacher, insists Muggles are dirty and stupid like animals. Neville obtained one scar after asking how much Muggle blood she had. Neville and other Dumbledore's Army members were pulling pranks and creating disruptions, but after Luna and Ginny left school and punishments became more severe, the rebellion died down a bit. When Neville was identified as a ringleader, Death Eaters went after his grandmother, who put Dawlish in St. Mungo's, and is now on the run. Neville decided to "disappear". Reaching Hogwarts, they enter an unfamiliar room to a cheering crowd inside. The Trio are ecstatic to see old friends—Seamus Finnigan, Terry Boot, Michael Corner, Lavender Brown, Ernie Macmillan, Anthony Goldstein, Parvati and Padma Patil, and many more. Hammocks are strung from floor to ceiling, and the room is embellished with Gryffindor, Hufflepuff, and Ravenclaw colors and symbols; only Slytherin is missing. To Harry's astonishment, they are in the Room of Requirement. Neville has been hiding there for some weeks now, and the room has continually expanded as more D.A. members arrived. Seamus, whose swollen face Harry initially failed to recognize, says the room is secure as long as at least one D.A. member remains inside. The only thing it is unable to provide is food. When Neville was really hungry, the tunnel leading to the Hog's Head opened, and Aberforth has been sending supplies ever since. Everyone wants to know about the Trio's exploits. They have been listening to "Potterwatch" on the radio, but there are many unconfirmed rumors. Before Harry can respond, searing pain cuts through his scar as he briefly glimpses a furious Dark Lord discovering that the Ring Horcrux is missing. Little time is left, and everyone wants to help, believing Harry has returned to overthrow the Carrows and Snape. Harry explains they are only there to complete a task to help to destroy Voldemort, and insists everyone stay behind. He becomes panicked when more people pour in from the Hog's Head. Luna, Dean, Fred, George, Ginny, Lee Jordan, and Cho Chang climb through. Hermione agrees with Ron's suggestion that the others help them search. Harry does not need to do everything alone, time is running out, and they do not have to reveal what they are hunting. Harry finally concedes and says they are looking for something belonging to Rowena Ravenclaw. Luna thinks it could be the lost diadem, a type of crown. Hidden under the Invisibility Cloak, Luna leads Harry to the Ravenclaw Common room and shows him Rowena Ravenclaw's statue. As Harry steps out from under the Cloak, Alecto Carrow appears and instantly touches the Dark Mark on her forearm. Analysis Against Harry's wishes, the final battle between him and Voldemort is primed to happen at Hogwarts, his arrival likely triggering it. It seems appropriate, indeed inevitable, that Harry and Voldemort's last confrontation should occur here; the castle and its surrounding grounds have played a major role throughout the story, and is where much of the series' action is set. With its many Ghosts, talking portraits, and other magical denizens, the castle is nearly a character in its own right. It is also the place that both Harry and Voldemort most consider home, and in Voldemort's case, probably the only thing he has ever had anything close to loving feelings for, though that is an emotion he can never fully experience. Harry loves Hogwarts, and he has always derived strength and security from the venerable old castle, enduring his enforced summer hiatus at the Dursleys' while impatiently waiting to return each September. This time, Harry's arrival is as a soldier on a mission rather than as a returning student, and Hogwarts is hardly a safe sanctuary but an imminent battleground, though that was never Harry's intention, nor does he have a battle plan. Regardless, reinforcements begin arriving, and Harry <|fim▁hole|> than sneaking in, finding the Horcrux, then sneaking out again to continue his quest, his appearance has set off a chain reaction of events that will culminate in a final resolution. And like it or not, Harry is the shining beacon that rallies and unifies the fragmented rebellion, and he is being pushed to the forefront to lead the climactic clash against Voldemort and his Death Eaters. Harry also sees how much Hogwarts has changed, including Neville Longbottom. While Neville's battered appearance is shocking, his cheerful demeanor about it seems even more so. This clearly shows just how much Neville has grown from the ineffectual, frightened boy who first arrived at Hogwarts; he wears his bruises as badges of honor. The Sorting Hat placing Neville into Gryffindor House had always seemed questionable, and many readers probably, at least initially, believed he would have been better suited to Hufflepuff, rather than a House known for bravery and nobility. But courage and nobleness comes in many forms, and Neville, despite his magical deficiencies and timid nature, has always faced the adversity in his life head on, and showed fortitude as early as the first book, when he challenged the Trio after objecting to their questionable actions. This strength has gradually increased, and Neville has transformed from a shy, insecure, and nearly incompetent student, into a strong, capable wizard, mostly due to Harry's patient guidance. Curiously, and appropriately, while Harry's influence helped develop Neville's character and magical abilities, Neville, in true epic-hero tradition, has grown significantly more during Harry's absence, just as Harry has further developed after Dumbledore's demise. Neville, along with Ginny and Luna, have assumed leadership roles by ably guiding Dumbledore's Army following Harry's departure, rebelling against the Carrows and Snape. Neville shows that, given the right circumstances, he is a natural leader, as well as a true Gryffindor; he, and the other D.A. members, are ready and able to join forces with Harry in the final battle against Voldemort. Questions Study questions are meant to be left for each student to answer; please don't answer them here. Review Why doesn't Harry recognize the Room of Requirement? Why doesn't Harry want the other students to help him with the mission, or follow him in overthrowing Snape and the Carrows? What changes his mind? Why are there no Slytherin colors or symbols represented in the Room of Requirement? Further Study How did news about the Trio's escape from Gringotts travel to Hogwarts so quickly? Why is Neville so cheerful, despite his battered appearance? How has Neville changed from his first year at Hogwarts? What accounts for that change? Greater Picture Intermediate warning: Details follow which you may not wish to read at your current level. Against his will, Harry becomes the rallying point for defending Hogwarts. This is, at least for the next while, a position that we see Harry attempting to sidestep. Harry quite clearly wants to avoid the coming battle, not because he is reluctant to fight, but rather because he feels personally responsible for all the deaths and injuries that would likely occur. He also sees this as being his own battle, and is extremely reluctant to involve others. He is clearly bewildered by the alacrity with which others seem to be taking up his cause, hardly realizing that so many other wizards are equally oppressed and have been searching for a banner to rally around. It is only after the encounter in the Forbidden Forest, when Harry feels he has acted to protect his friends against Voldemort, that he chooses to show himself as the leader of the counter-attack against the Dark Lord and his Death Eater army. As mentioned above, Neville seems almost astoundingly changed, on this sudden arrival. We can see that this has actually been a more gradual development, if we review how he has changed over the previous six books. Neville will continue to exhibit strength of character and magical power over the next few chapters, by helping to defend the castle and in recovering casualties. Harry's faith in Neville's abilities grows to where Harry will entrust Neville with a vital task: dispatching the final Horcrux, embedded in Voldemort's pet snake Nagini, in the event that he, Ron, or Hermione are unable to do the job. Neville will prove that he is up to the challenge. Harry here determines that the Horcrux he is searching for, the last but one, is hidden within Rowena Ravenclaw's lost Diadem. He bases this guess on Voldemort's proclivity for using artifacts once belonging to the Hogwarts Founders as vessels for his other Horcruxes. While his guess remains unsure, several things will reinforce this belief, including Alecto Carrow's presence in the Ravenclaw common room; Alecto is there because Voldemort believed Harry would enter it if he returned to Hogwarts, and this supports Harry's belief that Voldemort used a Ravenclaw artifact. Over the next few chapters, Harry will discover what happened to that Diadem after it supposedly vanished, and how it made its way back to the school. He will also learn that he actually once held it in his hand a year earlier without realizing it. <|fim▁end|> | is deeply dismayed, because now, rather |
<|fim▁begin|> MODULE OCS; (*NW 7.6.87 / 20.12.90*) IMPORT Files, Reals, Texts, Oberon; (* symbols: | 0 1 2 3 4 -------------------------------------------------- 0 | null * / DIV MOD 5 | & + - OR = 10 | # < <= > >= 15 | IN IS ^ . , 20 | : .. ) ] } 25 | OF THEN DO TO ( 30 | [ { ~ := number 35 | NIL string ident ; | 40 | END ELSE ELSIF UNTIL IF 45 | CASE WHILE REPEAT LOOP WITH 50 | EXIT RETURN ARRAY RECORD POINTER 55 | BEGIN CONST TYPE VAR PROCEDURE 60 | IMPORT MODULE eof *) CONST KW = 43; (*size of hash table*) maxDig = 32; maxInt = 7FFFH; maxShInt = 7FH; maxExp = 38; maxLExp = 308; maxStrLen = 128; (*name, numtyp, intval, realval, lrlval are implicit results of Get*) VAR numtyp* : INTEGER; (* 1 = char, 2 = integer, 3 = real, 4 = longreal*) intval* : LONGINT; realval*: REAL; lrlval* : LONGREAL; scanerr*: BOOLEAN; name* : ARRAY maxStrLen OF CHAR; R: Texts.Reader; W: Texts.Writer; ch: CHAR; (*current character*) lastpos: LONGINT; (*error position in source file*) i: INTEGER; keyTab : ARRAY KW OF RECORD symb, alt: INTEGER; id: ARRAY 12 OF CHAR END; PROCEDURE Mark*(n: INTEGER); VAR pos: LONGINT; BEGIN scanerr := TRUE; pos := Texts.Pos(R); IF lastpos + 10 < pos THEN Texts.WriteLn(W); Texts.WriteString(W, " pos"); Texts.WriteInt(W, pos, 6); Texts.WriteString(W, " err"); Texts.WriteInt(W, n, 4); Texts.Append(Oberon.Log, W.buf); lastpos := pos END END Mark; PROCEDURE String(VAR sym: INTEGER); VAR i: INTEGER; BEGIN i := 0; LOOP Texts.Read(R, ch); IF ch = 22X THEN EXIT END ; IF ch < " " THEN Mark(3); EXIT END ; IF i < maxStrLen-1 THEN name[i] := ch; INC(i) ELSE Mark(212); i := 0 END END ; Texts.Read(R, ch); IF i = 1 THEN sym := 34; numtyp := 1; intval := ORD(name[0]) ELSE sym := 36; name[i] := 0X (*string*) END END String; PROCEDURE Identifier(VAR sym: INTEGER); VAR i, k: INTEGER; BEGIN i := 0; k := 0; REPEAT IF i < 31 THEN name[i] := ch; INC(i); INC(k, ORD(ch)) END ; Texts.Read(R, ch) UNTIL (ch < "0") OR ("9" < ch) & (CAP(ch) < "A") OR ("Z" < CAP(ch)); name[i] := 0X; k := (k+i) MOD KW; (*hash function*) IF (keyTab[k].symb # 0) & (keyTab[k].id = name) THEN sym := keyTab[k].symb ELSE k := keyTab[k].alt; IF (keyTab[k].symb # 0) & (keyTab[k].id = name) THEN sym := keyTab[k].symb ELSE sym := 37 (*ident*) END END END Identifier; PROCEDURE Hval(ch: CHAR): INTEGER; VAR d: INTEGER; BEGIN d := ORD(ch) - 30H; (*d >= 0*) IF d >= 10 THEN IF (d >= 17) & (d < 23) THEN DEC(d, 7) ELSE d := 0; Mark(2) END END ; RETURN d END Hval; PROCEDURE Number; VAR i, j, h, d, e, n: INTEGER; x, f: REAL; y, g: LONGREAL; lastCh: CHAR; neg: BOOLEAN; dig: ARRAY maxDig OF CHAR; PROCEDURE ReadScaleFactor; BEGIN Texts.Read(R, ch); IF ch = "-" THEN neg := TRUE; Texts.Read(R, ch) ELSE neg := FALSE; IF ch = "+" THEN Texts.Read(R, ch) END END ; IF ("0" <= ch) & (ch <= "9") THEN REPEAT e := e*10 + ORD(ch)-30H; Texts.Read(R, ch) UNTIL (ch < "0") OR (ch >"9") ELSE Mark(2) END END ReadScaleFactor; BEGIN i := 0; REPEAT dig[i] := ch; INC(i); Texts.Read(R, ch) UNTIL (ch < "0") OR ("9" < ch) & (CAP(ch) < "A") OR ("Z" < CAP(ch)); lastCh := ch; j := 0; WHILE (j < i-1) & (dig[j] = "0") DO INC(j) END ; IF ch = "." THEN Texts.Read(R, ch); IF ch = "." THEN lastCh := 0X; ch := 7FX END END ; IF lastCh = "." THEN (*decimal point*) h := i; WHILE ("0" <= ch) & (ch <= "9") DO (*read fraction*) IF i < maxDig THEN dig[i] := ch; INC(i) END ; Texts.Read(R, ch) END ; IF ch = "D" THEN y := 0; g := 1; e := 0; WHILE j < h DO y := y*10 + (ORD(dig[j])-30H); INC(j) END ; WHILE j < i DO g := g/10; y := (ORD(dig[j])-30H)*g + y; INC(j) END ; ReadScaleFactor; IF neg THEN IF e <= maxLExp THEN y := y / Reals.TenL(e) ELSE y := 0 END ELSIF e > 0 THEN IF e <= maxLExp THEN y := Reals.TenL(e) * y ELSE y := 0; Mark(203) END END ; numtyp := 4; lrlval := y ELSE x := 0; f := 1; e := 0; WHILE j < h DO x := x*10 + (ORD(dig[j])-30H); INC(j) END ; WHILE j < i DO f := f/10; x := (ORD(dig[j])-30H)*f + x; INC(j) END ; IF ch = "E" THEN ReadScaleFactor <|fim▁hole|> THEN IF e <= maxExp THEN x := x / Reals.Ten(e) ELSE x := 0 END ELSIF e > 0 THEN IF e <= maxExp THEN x := Reals.Ten(e) * x ELSE x := 0; Mark(203) END END ; numtyp := 3; realval := x END ELSE (*integer*) lastCh := dig[i-1]; intval := 0; IF lastCh = "H" THEN IF j < i THEN DEC(i); intval := Hval(dig[j]); INC(j); IF i-j <= 7 THEN IF (i-j = 7) & (intval >= 8) THEN DEC(intval, 16) END ; WHILE j < i DO intval := Hval(dig[j]) + intval * 10H; INC(j) END ELSE Mark(203) END END ELSIF lastCh = "X" THEN DEC(i); WHILE j < i DO intval := Hval(dig[j]) + intval*10H; INC(j); IF intval > 0FFH THEN Mark(203); intval := 0 END END ELSE (*decimal*) WHILE j < i DO d := ORD(dig[j]) - 30H; IF d < 10 THEN IF intval <= (MAX(LONGINT) - d) DIV 10 THEN intval := intval*10 + d ELSE Mark(203); intval := 0 END ELSE Mark(2); intval := 0 END ; INC(j) END END ; IF lastCh = "X" THEN numtyp := 1 ELSE numtyp := 2 END END END Number; PROCEDURE Get*(VAR sym: INTEGER); VAR s: INTEGER; xch: CHAR; PROCEDURE Comment; (* do not read after end of file *) BEGIN Texts.Read(R, ch); LOOP LOOP WHILE ch = "(" DO Texts.Read(R, ch); IF ch = "*" THEN Comment END END ; IF ch = "*" THEN Texts.Read(R, ch); EXIT END ; IF ch = 0X THEN EXIT END ; Texts.Read(R, ch) END ; IF ch = ")" THEN Texts.Read(R, ch); EXIT END ; IF ch = 0X THEN Mark(5); EXIT END END END Comment; BEGIN LOOP (*ignore control characters*) IF ch <= " " THEN IF ch = 0X THEN ch := " "; EXIT ELSE Texts.Read(R, ch) END ELSIF ch > 7FX THEN Texts.Read(R, ch) ELSE EXIT END END ; CASE ch OF (* " " <= ch <= 7FX *) " " : s := 62; ch := 0X (*eof*) | "!", "$", "%", "'", "?", "@", "\", "_", "`": s := 0; Texts.Read(R, ch) | 22X : String(s) | "#" : s := 10; Texts.Read(R, ch) | "&" : s := 5; Texts.Read(R, ch) | "(" : Texts.Read(R, ch); IF ch = "*" THEN Comment; Get(s) ELSE s := 29 END | ")" : s := 22; Texts.Read(R, ch) | "*" : s := 1; Texts.Read(R, ch) | "+" : s := 6; Texts.Read(R, ch) | "," : s := 19; Texts.Read(R, ch) | "-" : s := 7; Texts.Read(R, ch) | "." : Texts.Read(R, ch); IF ch = "." THEN Texts.Read(R, ch); s := 21 ELSE s := 18 END | "/" : s := 2; Texts.Read(R, ch) | "0".."9": Number; s := 34 | ":" : Texts.Read(R, ch); IF ch = "=" THEN Texts.Read(R, ch); s := 33 ELSE s := 20 END | ";" : s := 38; Texts.Read(R, ch) | "<" : Texts.Read(R, ch); IF ch = "=" THEN Texts.Read(R, ch); s := 12 ELSE s := 11 END | "=" : s := 9; Texts.Read(R, ch) | ">" : Texts.Read(R, ch); IF ch = "=" THEN Texts.Read(R, ch); s := 14 ELSE s := 13 END | "A".."Z": Identifier(s) | "[" : s := 30; Texts.Read(R, ch) | "]" : s := 23; Texts.Read(R, ch) | "^" : s := 17; Texts.Read(R, ch) | "a".."z": Identifier(s) | "{" : s := 31; Texts.Read(R, ch) | "|" : s := 39; Texts.Read(R, ch) | "}" : s := 24; Texts.Read(R, ch) | "~" : s := 32; Texts.Read(R, ch) | 7FX : s := 21; Texts.Read(R, ch) END ; sym := s END Get; PROCEDURE Init*(source: Texts.Text; pos: LONGINT); BEGIN ch := " "; scanerr := FALSE; lastpos := -8; Texts.OpenReader(R, source, pos) END Init; PROCEDURE EnterKW(sym: INTEGER; name: ARRAY OF CHAR); VAR j, k: INTEGER; BEGIN j := 0; k := 0; REPEAT INC(k, ORD(name[j])); INC(j) UNTIL name[j] = 0X; k := (k+j) MOD KW; (*hash function*) IF keyTab[k].symb # 0 THEN j := k; REPEAT INC(k) UNTIL keyTab[k].symb = 0; keyTab[j].alt := k END ; keyTab[k].symb := sym; COPY(name, keyTab[k].id) END EnterKW; BEGIN i := KW; WHILE i > 0 DO DEC(i); keyTab[i].symb := 0; keyTab[i].alt := 0 END ; keyTab[0].id := ""; EnterKW(27, "DO"); EnterKW(44, "IF"); EnterKW(15, "IN"); EnterKW(16, "IS"); EnterKW(25, "OF"); EnterKW( 8, "OR"); EnterKW(40, "END"); EnterKW( 4, "MOD"); EnterKW(35, "NIL"); EnterKW(58, "VAR"); EnterKW(41, "ELSE"); EnterKW(50, "EXIT"); EnterKW(26, "THEN"); EnterKW(49, "WITH"); EnterKW(52, "ARRAY"); EnterKW(55, "BEGIN"); EnterKW(56, "CONST"); EnterKW(42, "ELSIF"); EnterKW(43, "UNTIL"); EnterKW(46, "WHILE"); EnterKW(53, "RECORD"); EnterKW(47, "REPEAT"); EnterKW(51, "RETURN"); EnterKW(59, "PROCEDURE"); EnterKW(28, "TO"); EnterKW( 3, "DIV"); EnterKW(48, "LOOP"); EnterKW(57, "TYPE"); EnterKW(60, "IMPORT"); EnterKW(61, "MODULE"); EnterKW(54, "POINTER"); Texts.OpenWriter(W) END OCS. <|fim▁end|> | END ; IF neg |
<|fim▁begin|> LaTeX Getting Started Introduction Installation Installing Extra Packages Basics How to get help Common Elements Document Structure Text Formatting Paragraph Formatting Colors Fonts List Structures Special Characters Internationalization Rotations Tables Title creation Page Layout Customizing Page Headers and Footers Importing Graphics Floats, Figures and Captions Footnotes and Margin Notes Hyperlinks Labels and Cross-referencing Initials Mechanics Errors and Warnings Lengths Counters Boxes Rules and Struts Technical Text Mathematics Advanced Mathematics Theorems Chemical Graphics Algorithms Source Code Listings Linguistics Special Pages Indexing Glossary Bibliography Management More Bibliographies Special Documents Scientific Reports (Bachelor Report, Master Thesis, Dissertation) Letters Presentations Teacher's Corner Curriculum Vitae Creating Graphics Introducing Procedural Graphics MetaPost Picture PGF/TikZ PSTricks Xy-pic Creating 3D graphics Programming Macros Plain TeX Creating Packages Creating Package Documentation Themes Miscellaneous Modular Documents Collaborative Writing of LaTeX Documents Export To Other Formats Help and Recommendations FAQ Tips and Tricks Appendices Authors Links Package Reference Sample LaTeX documents Index Command Glossary edit this box • edit the TOC This is a glossary of LaTeX commands—an alphabetical listing of LaTeX commands with the summaries of their effects. (Brackets "[]" are optional arguments and braces "{}" are required arguments.) Contents # A B C D E F G H I J K L M N O P Q R S T U V W X Y Z # / see slash marks \@ following period ends sentence \\[*][extra-space] new line \, thin space, math and text mode \; thick space, math mode \: medium space, math mode \! negative thin space, math mode \- hyphenation; tabbing \= set tab, see tabbing \> tab, see tabbing \< back tab, see tabbing \+ see tabbing \' accent or tabbing \` accent or tabbing \| double vertical lines, math mode \( start math environment \) end math environment \[ begin displaymath environment \] end displaymath environment A \addcontentsline{file}{sec_unit}{entry} adds an entry to the specified list or table \addtocontents{file}{text} adds text (or formatting commands) directly to the file that generates the specified list or table \addtocounter{counter}{value} increments the counter \address{Return address} \addtolength{len-cmd}{len} increments a length command, see Length \addvspace adds a vertical space of a specified height \alph causes the current value of a specified counter to be printed in alphabetic characters \appendix changes the way sectional units are numbered so that information after the command is considered part of the appendix \arabic causes the current value of a specified counter to be printed in Arabic numbers \author declares the author(s). See Document Structure B \backslash prints a backslash \baselineskip a length command (see Lengths), which specifies the minimum space between the bottom of two successive lines in a paragraph \baselinestretch scales the value of \baselineskip \bfseries Boldface typeface \bibitem generates a labeled entry for the bibliography \bigskipamount \bigskip equivalent to \vspace{\bigskipamount} \boldmath bold font in math mode \boldsymbol bold font for symbols C \cal Calligraphic style in math mode \caption generate caption for figures and tables \cdots Centered dots \centering Used to center align LaTeX environments \chapter Starts a new chapter. See Document Structure. \circle \cite Used to make citations from the provided bibliography \cleardoublepage \clearpage Ends the current page and causes any floats to be printed. See Page Layout. \cline Adds horizontal line in a table that spans only to a range of cells. See \hline and Tables chapter. \closing Inserts a closing phrase (e.g. \closing{yours sincerely}), leaves space for a handwritten signature and inserts a signature specified by \signature{}. Used in the Letter class. \color Specifies color of the text. LaTeX/Colors \copyright makes © sign. See Formatting. D \dashbox \date \ddots Inserts a diagonal ellipsis (3 diagonal dots) in math mode \documentclass[options]{style} Used to begin a latex document \dotfill \dfrac E \em Toggles italics on/off for the text inside curly braces with the command. Such as {\em This is in italics \em but this isn't \em and this is again}. This command allows nesting. \emph Toggles italics on/off for the text in curly braces following the command e.g. \emph{This is in italics \emph{but this isn't} and this is again}. \ensuremath (LaTeX2e) Treats everything inside the curly braces as if it were in a math environment. Useful when creating commands in the preamble as they will work inside or out of math environments. \epigraph Adds an epigraph. Requires epigraph package. \euro Prints euro € symbol. Requires eurosym package. F \fbox \flushbottom \fnsymbol \footnote Creates a footnote. \footnotemark \footnotesize Sets font size. See Text Formatting. \footnotetext \frac inserts a fraction in mathematics mode. The usage is \frac{numerator}{denominator}. \frame \framebox Like \makebox but creates a frame around the box. See Boxes. \frenchspacing Instructs LaTex to abstain from inserting more space after a period (´.´) than is the case for an ordinary character. In order to untoggle this functionality resort to the command \nonfrenchspacing. G H \hfill Abbreviation for \hspace{\fill}. \hline adds a horizontal line in a tabular environment. See also \cline, Tables chapter. \href Add a link, or an anchor. See Hyperlinks \hrulefill \hspace Produces horizontal space. \huge Sets font size. See Text Formatting. \Huge Sets font size. See Text Formatting. \hyphenation{word list} Overrides default hyphenation algorithm for specified words. See Hyphenation I \include This command is different from \input in that it's the output that is added instead of the commands from the other files. For more see LaTex/Basics \includegraphics Inserts an image. Requires graphicx package. \includeonly \indent \input Used to read in LaTex files. For more see LaTex/Basics. \itshape Italicizes the text which is inside curly braces with the command. Such as {\itshape This is in italics}. \em is generally preferred since it allows nesting. <|fim▁hole|> list. Used in list structures. K \kill Prevent a line in the tabbing environment from being printed. L \label Used to create label which can be later referenced with \ref. See Labels and Cross-referencing. \large Sets font size. See Text Formatting. \Large Sets font size. See Text Formatting. \LARGE Sets font size. See Text Formatting. \LaTeX Prints LaTeX logo. See Formatting. \LaTeXe Prints current LaTeX version logo. See Formatting. \ldots Prints sequence of three dots. See Formatting. \left \lefteqn \line \linebreak Suggests LaTeX to break line in this place. See Page Layout. \linethickness \linewidth \listoffigures Inserts a list of the figures in the document. Similar to TOC \listoftables Inserts a list of the tables in the document. Similar to TOC \location M \makebox Defines a box that has a specified width, independent from its content. See Boxes. \maketitle Causes the title page to be typeset, using information provided by commands such as \title{} and \author{}. \markboth \markright \mathcal \mathop \mbox Write a text in roman font inside a math part \medskip \multicolumn \multiput N \newcommand Defines a new command. See New Commands. \newcolumntype Defines a new type of column to be used with tables. See Tables. \newcounter \newenvironment Defines a new environment. See New Environments. \newfont \newlength \newline Ends current line and starts a new one. See Page Layout. \newpage Ends current page and starts a new one. See Page Layout. \newsavebox \newtheorem \nocite Adds a reference to the bibliography without an inline citation. \nocite{*} causes all entries in a bibtex database to be added to the bibliography. \noindent \nolinebreak \nonfrenchspacing Setting the command untoggles the command \frenchspacing and activates LaTeX standards to insert more space after a period (´.´) than after an ordinary character. \normalsize Sets default font size. See Text Formatting. \nopagebreak Suggests LaTeX not to break page in this place. See Page Layout. \not O \onecolumn \opening Inserts an opening phrase when using the letter class, for example \opening{Dear Sir} \oval \overbrace Draws a brace over the argument. Can be used in displaystyle with superscript to label formulae. See Advanced Mathematics. \overline Draws a line over the argument. P \pagebreak Suggests LaTeX breaking page in this place. See Page Layout. \pagenumbering Defines the type of characters used for the page numbers. Options : arabic, roman, Roman, alph, Alph, gobble (invisible). \pageref Used to reference to number of page where a previously declared \label is located. See Floats, Figures and Captions. \pagestyle See Page Layout. \par Starts a new paragraph \paragraph Starts a new paragraph. See Document Structure. \parbox Defines a box whose contents are created in paragraph mode. See Boxes. \parindent Normal paragraph indentation. See Lengths. \parskip \part Starts a new part of a book. See Document Structure. \protect \providecommand (LaTeX2e) See Macros. \put Q \quad Similar to space, but with the size of a capital M \qquad double \quad R \raggedbottom Command used for top justified within other environments. \raggedleft Command used for right justified within other environments. \raggedright Command used for left justified within other environments. \raisebox Creates a box and raises its content. See LaTeX/Boxes. \ref Used to reference to number of previously declared \label. See Labels and Cross-referencing. \renewcommand \right \rmfamily Roman typeface. \roman Causes a counter to be printed in roman numerals. \rule Creates a line of specified width and height. See LaTeX/Rules and Struts. S \savebox Makes a box and saves it in a named storage bin. \sbox The short form of \savebox with no optional arguments. \scshape Small caps. \scriptsize Sets font size. See Text Formatting. \section Starts a new section. See Document Structure. \setcounter \setlength \settowidth \sffamily Sans serif. \shortstack \signature In the Letter class, specifies a signature for later insertion by \closing. \slshape Slanted. \slash See slash marks \small Sets font size. See Text Formatting. \smallskip \sout Strikes out text. Requires ulem package. See Text Formatting. \space force ordinary space \sqrt Creates a root (default square, but magnitude can be given as an optional parameter). \stackrel Takes two arguments and stacks the first on top of the second. \stepcounter Increase the counter. \subparagraph Starts a new subparagraph. See Document Structure. \subsection Starts a new subsection. See Document Structure. \subsubsection Starts a new sub-subsection. See Document Structure. T \tableofcontents Inserts a table of contents (based on section headings) at the point where the command appears. \telephone In the letter class, specifies the sender's telephone number. \TeX Prints TeX logo. See Text Formatting. \textbf{} Sets bold font style. See Text Formatting. \textcolor{}{} Creates colored text. See Entering colored text. \textit{} Sets italic font style. See Text Formatting. \textmd{} Sets medium weight of a font. See Text Formatting. \textnormal{} Sets normal font. See Text Formatting. \textrm{} Sets roman font family. See Text Formatting. \textsc{} Sets font style to small caps. See Text Formatting. \textsf{} Sets sans serif font family. See Text Formatting. \textsl{} Sets slanted font style. See Text Formatting. \texttt{} Sets typewriter font family. See Text Formatting. \textup{} Sets upright shape of a font. See Text Formatting. \textwidth \textheight \thanks \thispagestyle \tiny Sets font size. See Text Formatting. \title \today Writes current day. See Text Formatting. \ttfamily \twocolumn \typeout \typein U \uline Underlines text. Requires ulem package. See Formatting. \underbrace \underline \unitlength \usebox \usecounter \uwave Creates wavy underline. Requires ulem package. See Formatting. V \value \vbox{text} Encloses a paragraph's text to prevent it from running over a page break \vcenter \vdots Creates vertical dots. See Mathematics. \vector \verb Creates inline verbatim text. See Formatting. \vfill \vline \vphantom \vspace This page uses material from Dr. Sheldon Green's Hypertext Help with LaTeX. Previous: Index Index <|fim▁end|> | \item Creates an item in a |
<|fim▁begin|> Contents 1 Cloning in plasmid vectors 1.1 Introduction 1.2 Preparation of the DNA insert 1.3 Preparing the vector for cloning 1.4 Ligation of plasmid vector and insert DNA 1.5 Transformation of DNA into bacteria Cloning in plasmid vectors Introduction The success and easiness of cloning a DNA fragment into a plasmid vector depends on several factors. Cloning is significantly more successful when there is only one DNA fragment to be ligated into the plasmid vector. Compatibility of the ends of the two molecules is extremely essential. Cohesive complementary ends generate more efficient cloning then blunt ends. However, the highest cloning efficiency is achieved with DNA digested by two different restriction enzymes. Ligating templates prepared by this procedure is called directional cloning, because the insert DNA can only be ligated into the vector in a single orientation. This method dramatically decreases background level of non-recombinants. Another popular application is the cloning of PCR products produced by Taq polymerase. This polymerase adds a extra A at the 3'-end of amplified DNA, which assists the cloning of PCR products into a special vector. Preparation of the DNA insert The DNA is digested with suitable restriction enzymes to produce compatible ends for cloning. To guarantee that the correct restriction fragment is cloned, the DNA insert should be purified on an appropriate percentage agarose gel by gel electrophoresis. The DNA is then extracted and purified from the agarose gel to enhance ligation efficiency. DNA inserts can be prepared from genomic DNA through PCR amplification. Designing appropriate forward and reverse primers is an critical step in this process. By designing appropriate flanking primers, a target sequence can be amplified from genomic DNA. Once the PCR reaction has been completed and the target sequence amplified, as stated above, the products can be run through a 1-2% agarose gel and then run through a gel purification kit to purify the specific sized fragments in question. The DNA eluate can then be sequenced for further confirmation of the correct DNA sequence to be cloned. Then the amplified DNA product can be subjected to restriction digests or ligation. Preparing the vector for cloning The strategies for preparing the DNA inserts for cloning can be applied to the vector also, with the exception of introducing a restriction enzyme site by PCR. Cloning vectors <|fim▁hole|> for cloning by making sure that the vector is in correct concentrations for the highest efficiency yield. Also, it is important to be sure that the vector is appropriate for ligation with the DNA fragment to be cloned. Similar restriction enzyme sites or digests should be applied to be sure that the fragment can "fit in" to the vector appropriately. Also, specific vectors can be chosen based on certain characteristics of the DNA fragment to be inserted such as A-overhangs or blunt-end cloning. Ligation of plasmid vector and insert DNA After the insert DNA and vector have been prepared for ligation, estimate the concentration of each by agarose gel electrophoresis along with molecular weight standards of a known concentration. Different vector:insert DNA ratios can be tested to find the optimal ratio for ligation. Generally, a 1:1 or 1:3 molar ratio works pretty well. Addition of DNA ligase (generally T4 DNA ligase) and ligase buffer containing ATP is required for this ligation step. Specifically designed vectors can also be purchased where specific polymerase enzymes are already on the entry sites of the vector for easier more efficient cloning of fragments into entry vectors, but at a higher price. Transformation of DNA into bacteria Usually this step is subsequent to ligation, transforming the vector-DNA insert into competent cells. The transformed cells are plated on LB plates with selective antibiotics and grown overnight. The vectors with the inserts are screened by various methods: blue/white color screening, antibiotic screening, etc. The correct clones are selected and grown, producing huge amounts of vector with the DNA insert. Plasmid DNA minipreps are then done to obtain these correct vectors of interest from the bacteria. Transformation methods: Cells can be transformed with the cloned vectors through electroporating competent cells or through chemically competent heat sensitive cells. Electroporating involves mixing electrocompetent cells with the cloned vectors and then running an electric current through the cells allowing them to take up the DNA. Cells are then shaken at an appropriate growth temperature in growth media to stimulate growth and then plated on antibiotic-selective LB plates to select for successfully transformed cells that took up the antibiotic resistant cloned vectors. Chemically competent cells are similar to electro-competent cells except they take up the cloned vectors through heat shock rather than electrical current. <|fim▁end|> | can also be prepared |
<|fim▁begin|> Unicode Standard Discussion Character Reference (edit template) Legend: Unicode 1.0 Unicode 1.0.1 Unicode 1.1 Unicode 2.0 Unicode 2.1 Unicode 3.0 Unicode 3.1 Unicode 3.2 Unicode 4.0 Unicode 4.1 Unicode 5.0 Unicode 5.1 Unicode 5.2 Unicode 6.0 Unicode 6.1 Unicode 6.2 Unicode 6.3 Unicode 7.0 Unicode 8.0 Unicode 9.0 Unicode 10.0 Unicode 11.0 Unicode 12.0 Unicode 12.1 Unicode 13.0 Private Use Surrogate Reserved Noncharacter Unicode characters BMP SMP SIP TIP SSP PUA 0000–0FFF 8000–8FFF 10000–10FFF 18000–18FFF 20000–20FFF 28000–28FFF 30000–30FFF 38000–38FFF E0000–E0FFF E8000–E8FFF F0000–F0FFF F8000–F8FFF 100000–100FFF 108000–108FFF 1000–1FFF 9000–9FFF 11000–11FFF 19000–19FFF 21000–21FFF 29000–29FFF 31000–31FFF 39000–39FFF E1000–E1FFF E9000–E9FFF F1000–F1FFF F9000–F9FFF 101000–101FFF 109000–109FFF 2000–2FFF A000–AFFF 12000–12FFF 1A000–1AFFF 22000–22FFF 2A000–2AFFF 32000–32FFF 3A000–3AFFF E2000–E2FFF EA000–EAFFF F2000–F2FFF FA000–FAFFF 102000–102FFF 10A000–10AFFF 3000–3FFF B000–BFFF 13000–13FFF 1B000–1BFFF 23000–23FFF 2B000–2BFFF 33000–33FFF 3B000–3BFFF E3000–E3FFF EB000–EBFFF F3000–F3FFF FB000–FBFFF 103000–103FFF 10B000–10BFFF 4000–4FFF C000–CFFF 14000–14FFF 1C000–1CFFF 24000–24FFF 2C000–2CFFF 34000–34FFF 3C000–3CFFF E4000–E4FFF EC000–ECFFF F4000–F4FFF FC000–FCFFF 104000–104FFF 10C000–10CFFF 5000–5FFF D000–DFFF 15000–15FFF 1D000–1DFFF 25000–25FFF 2D000–2DFFF 35000–35FFF 3D000–3DFFF E5000–E5FFF ED000–EDFFF F5000–F5FFF FD000–FDFFF 105000–105FFF 10D000–10DFFF 6000–6FFF E000–EFFF 16000–16FFF 1E000–1EFFF 26000–26FFF 2E000–2EFFF 36000–36FFF 3E000–3EFFF E6000–E6FFF EE000–EEFFF F6000–F6FFF FE000–FEFFF 106000–106FFF 10E000–10EFFF 7000–7FFF F000–FFFF 17000–17FFF 1F000–1FFFF 27000–27FFF 2F000–2FFFF 37000–37FFF 3F000–3FFFF E7000–E7FFF EF000–EFFFF F7000–F7FFF FF000–FFFFF 107000–107FFF 10F000–10FFFF Note: Unicode character visualization will depend on the character support of your web browser and the fonts installed on your system. Unassigned U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F 1600x 1601x 1602x 1603x 1604x 1605x 1606x 1607x 1608x 1609x 160Ax 160Bx 160Cx 160Dx 160Ex 160Fx U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F 1610x 1611x 1612x 1613x 1614x 1615x 1616x 1617x 1618x 1619x 161Ax 161Bx 161Cx 161Dx 161Ex 161Fx U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F 1620x 1621x 1622x 1623x 1624x 1625x 1626x 1627x 1628x 1629x 162Ax 162Bx 162Cx 162Dx 162Ex 162Fx U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F 1630x 1631x 1632x 1633x 1634x 1635x 1636x 1637x 1638x 1639x 163Ax 163Bx 163Cx 163Dx 163Ex 163Fx U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F 1640x 1641x 1642x 1643x 1644x 1645x 1646x 1647x 1648x 1649x 164Ax 164Bx 164Cx 164Dx 164Ex 164Fx U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F 1650x 1651x 1652x 1653x 1654x 1655x 1656x 1657x 1658x 1659x 165Ax 165Bx 165Cx 165Dx 165Ex 165Fx U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F 1660x 1661x 1662x 1663x 1664x 1665x 1666x 1667x 1668x 1669x 166Ax 166Bx 166Cx 166Dx 166Ex 166Fx U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F 1670x 1671x 1672x 1673x 1674x 1675x 1676x 1677x 1678x 1679x 167Ax 167Bx 167Cx 167Dx 167Ex 167Fx Bamum Supplement U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F 1680x 𖠀 𖠁 𖠂 𖠃 𖠄 𖠅 𖠆 𖠇 𖠈 𖠉 𖠊 𖠋 𖠌 𖠍 𖠎 𖠏 1681x 𖠐 𖠑 𖠒 𖠓 𖠔 𖠕 𖠖 𖠗 𖠘 𖠙 𖠚 𖠛 𖠜 𖠝 𖠞 𖠟 1682x 𖠠 𖠡 𖠢 𖠣 𖠤 𖠥 𖠦 𖠧 𖠨 𖠩 𖠪 𖠫 𖠬 𖠭 𖠮 𖠯 1683x 𖠰 𖠱 𖠲 𖠳 𖠴 𖠵 𖠶 𖠷 𖠸 𖠹 𖠺 𖠻 𖠼 𖠽 𖠾 𖠿 1684x 𖡀 𖡁 𖡂 𖡃 𖡄 𖡅 𖡆 𖡇 𖡈 𖡉 𖡊 𖡋 𖡌 𖡍 𖡎 𖡏 1685x 𖡐 𖡑 𖡒 𖡓 𖡔 𖡕 𖡖 𖡗 𖡘 𖡙 𖡚 𖡛 𖡜 𖡝 𖡞 𖡟 1686x 𖡠 𖡡 𖡢 𖡣 𖡤 𖡥 𖡦 𖡧 𖡨 𖡩 𖡪 𖡫 𖡬 𖡭 𖡮 𖡯 1687x 𖡰 𖡱 𖡲 𖡳 𖡴 𖡵 𖡶 𖡷 𖡸 𖡹 𖡺 𖡻 𖡼 𖡽 𖡾 𖡿 1688x 𖢀 𖢁 𖢂 𖢃 𖢄 𖢅 𖢆 𖢇 𖢈 𖢉 𖢊 𖢋 𖢌 𖢍 𖢎 𖢏 1689x 𖢐 𖢑 𖢒 𖢓 𖢔 𖢕 𖢖 𖢗 𖢘 𖢙 𖢚 𖢛 𖢜 𖢝 𖢞 𖢟 168Ax 𖢠 𖢡 𖢢 𖢣 𖢤 𖢥 𖢦 𖢧 𖢨 𖢩 𖢪 𖢫 𖢬 𖢭 𖢮 𖢯 168Bx 𖢰 𖢱 𖢲 𖢳 𖢴 𖢵 𖢶 𖢷 𖢸 𖢹 𖢺 𖢻 𖢼 𖢽 𖢾 𖢿 168Cx 𖣀 𖣁 𖣂 𖣃 𖣄 𖣅 𖣆 𖣇 𖣈 𖣉 𖣊 𖣋 𖣌 𖣍 𖣎 𖣏 168Dx 𖣐 𖣑 𖣒 𖣓 𖣔 𖣕 𖣖 𖣗 𖣘 𖣙 𖣚 𖣛 𖣜 𖣝 𖣞 𖣟 168Ex 𖣠 𖣡 𖣢 𖣣 𖣤 𖣥 𖣦 𖣧 𖣨 𖣩 𖣪 𖣫 𖣬 𖣭 𖣮 𖣯 168Fx 𖣰 𖣱 𖣲 𖣳 𖣴 𖣵 𖣶 𖣷 𖣸 𖣹 𖣺 𖣻 𖣼 𖣽 𖣾 𖣿 U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F 1690x 𖤀 𖤁 𖤂 𖤃 𖤄 𖤅 𖤆 𖤇 𖤈 𖤉 𖤊 𖤋 𖤌 𖤍 𖤎 𖤏 1691x 𖤐 𖤑 𖤒 𖤓 𖤔 𖤕 𖤖 𖤗 𖤘 𖤙 𖤚 𖤛 𖤜 𖤝 𖤞 𖤟 1692x 𖤠 𖤡 𖤢 𖤣 𖤤 𖤥 𖤦 𖤧 𖤨 𖤩 𖤪 𖤫 𖤬 𖤭 𖤮 𖤯 1693x 𖤰 𖤱 𖤲 𖤳 𖤴 𖤵 𖤶 𖤷 𖤸 𖤹 𖤺 𖤻 𖤼 𖤽 𖤾 𖤿 1694x 𖥀 𖥁 𖥂 𖥃 𖥄 𖥅 𖥆 𖥇 𖥈 𖥉 𖥊 𖥋 𖥌 𖥍 𖥎 𖥏 1695x 𖥐 𖥑 𖥒 𖥓 𖥔 𖥕 𖥖 𖥗 𖥘 𖥙 𖥚 𖥛 𖥜 𖥝 𖥞 𖥟 1696x 𖥠 𖥡 𖥢 𖥣 𖥤 𖥥 𖥦 𖥧 𖥨 𖥩 𖥪 𖥫 𖥬 𖥭 𖥮 𖥯 1697x 𖥰 𖥱 𖥲 𖥳 𖥴 𖥵 𖥶 𖥷 𖥸 𖥹 𖥺 𖥻 𖥼 𖥽 𖥾 𖥿 1698x 𖦀 𖦁 𖦂 𖦃 𖦄 𖦅 𖦆 𖦇 𖦈 𖦉 𖦊 𖦋 𖦌 𖦍 𖦎 𖦏 1699x 𖦐 𖦑 𖦒 𖦓 𖦔 𖦕 𖦖 𖦗 𖦘 𖦙 𖦚 𖦛 𖦜 𖦝 𖦞 𖦟 169Ax 𖦠 𖦡 𖦢 𖦣 𖦤 𖦥 𖦦 𖦧 𖦨 𖦩 𖦪 𖦫 𖦬 <|fim▁hole|> 𖦱 𖦲 𖦳 𖦴 𖦵 𖦶 𖦷 𖦸 𖦹 𖦺 𖦻 𖦼 𖦽 𖦾 𖦿 169Cx 𖧀 𖧁 𖧂 𖧃 𖧄 𖧅 𖧆 𖧇 𖧈 𖧉 𖧊 𖧋 𖧌 𖧍 𖧎 𖧏 169Dx 𖧐 𖧑 𖧒 𖧓 𖧔 𖧕 𖧖 𖧗 𖧘 𖧙 𖧚 𖧛 𖧜 𖧝 𖧞 𖧟 169Ex 𖧠 𖧡 𖧢 𖧣 𖧤 𖧥 𖧦 𖧧 𖧨 𖧩 𖧪 𖧫 𖧬 𖧭 𖧮 𖧯 169Fx 𖧰 𖧱 𖧲 𖧳 𖧴 𖧵 𖧶 𖧷 𖧸 𖧹 𖧺 𖧻 𖧼 𖧽 𖧾 𖧿 U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F 16A0x 𖨀 𖨁 𖨂 𖨃 𖨄 𖨅 𖨆 𖨇 𖨈 𖨉 𖨊 𖨋 𖨌 𖨍 𖨎 𖨏 16A1x 𖨐 𖨑 𖨒 𖨓 𖨔 𖨕 𖨖 𖨗 𖨘 𖨙 𖨚 𖨛 𖨜 𖨝 𖨞 𖨟 16A2x 𖨠 𖨡 𖨢 𖨣 𖨤 𖨥 𖨦 𖨧 𖨨 𖨩 𖨪 𖨫 𖨬 𖨭 𖨮 𖨯 16A3x 𖨰 𖨱 𖨲 𖨳 𖨴 𖨵 𖨶 𖨷 𖨸 Mro U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F 16A4x 𖩀 𖩁 𖩂 𖩃 𖩄 𖩅 𖩆 𖩇 𖩈 𖩉 𖩊 𖩋 𖩌 𖩍 𖩎 𖩏 16A5x 𖩐 𖩑 𖩒 𖩓 𖩔 𖩕 𖩖 𖩗 𖩘 𖩙 𖩚 𖩛 𖩜 𖩝 𖩞 16A6x 𖩠 𖩡 𖩢 𖩣 𖩤 𖩥 𖩦 𖩧 𖩨 𖩩 𖩮 𖩯 Unassigned U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F 16A7x 16A8x 16A9x 16AAx 16ABx 16ACx Bassa Vah U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F 16ADx 𖫐 𖫑 𖫒 𖫓 𖫔 𖫕 𖫖 𖫗 𖫘 𖫙 𖫚 𖫛 𖫜 𖫝 𖫞 𖫟 16AEx 𖫠 𖫡 𖫢 𖫣 𖫤 𖫥 𖫦 𖫧 𖫨 𖫩 𖫪 𖫫 𖫬 𖫭 16AFx 𖫰 𖫱 𖫲 𖫳 𖫴 𖫵 Pahawh Hmong U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F 16B0x 𖬀 𖬁 𖬂 𖬃 𖬄 𖬅 𖬆 𖬇 𖬈 𖬉 𖬊 𖬋 𖬌 𖬍 𖬎 𖬏 16B1x 𖬐 𖬑 𖬒 𖬓 𖬔 𖬕 𖬖 𖬗 𖬘 𖬙 𖬚 𖬛 𖬜 𖬝 𖬞 𖬟 16B2x 𖬠 𖬡 𖬢 𖬣 𖬤 𖬥 𖬦 𖬧 𖬨 𖬩 𖬪 𖬫 𖬬 𖬭 𖬮 𖬯 16B3x 𖬰 𖬱 𖬲 𖬳 𖬴 𖬵 𖬶 𖬷 𖬸 𖬹 𖬺 𖬻 𖬼 𖬽 𖬾 𖬿 16B4x 𖭀 𖭁 𖭂 𖭃 𖭄 𖭅 16B5x 𖭐 𖭑 𖭒 𖭓 𖭔 𖭕 𖭖 𖭗 𖭘 𖭙 𖭛 𖭜 𖭝 𖭞 𖭟 16B6x 𖭠 𖭡 𖭣 𖭤 𖭥 𖭦 𖭧 𖭨 𖭩 𖭪 𖭫 𖭬 𖭭 𖭮 𖭯 16B7x 𖭰 𖭱 𖭲 𖭳 𖭴 𖭵 𖭶 𖭷 𖭽 𖭾 𖭿 16B8x 𖮀 𖮁 𖮂 𖮃 𖮄 𖮅 𖮆 𖮇 𖮈 𖮉 𖮊 𖮋 𖮌 𖮍 𖮎 𖮏 Unassigned U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F 16B9x 16BAx 16BBx 16BCx 16BDx 16BEx 16BFx U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F 16C0x 16C1x 16C2x 16C3x 16C4x 16C5x 16C6x 16C7x 16C8x 16C9x 16CAx 16CBx 16CCx 16CDx 16CEx 16CFx U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F 16D0x 16D1x 16D2x 16D3x 16D4x 16D5x 16D6x 16D7x 16D8x 16D9x 16DAx 16DBx 16DCx 16DDx 16DEx 16DFx U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F 16E0x 16E1x 16E2x 16E3x Medefaidrin U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F 16E4x 𖹀 𖹁 𖹂 𖹃 𖹄 𖹅 𖹆 𖹇 𖹈 𖹉 𖹊 𖹋 𖹌 𖹍 𖹎 𖹏 16E5x 𖹐 𖹑 𖹒 𖹓 𖹔 𖹕 𖹖 𖹗 𖹘 𖹙 𖹚 𖹛 𖹜 𖹝 𖹞 𖹟 16E6x 𖹠 𖹡 𖹢 𖹣 𖹤 𖹥 𖹦 𖹧 𖹨 𖹩 𖹪 𖹫 𖹬 𖹭 𖹮 𖹯 16E7x 𖹰 𖹱 𖹲 𖹳 𖹴 𖹵 𖹶 𖹷 𖹸 𖹹 𖹺 𖹻 𖹼 𖹽 𖹾 𖹿 16E8x 𖺀 𖺁 𖺂 𖺃 𖺄 𖺅 𖺆 𖺇 𖺈 𖺉 𖺊 𖺋 𖺌 𖺍 𖺎 𖺏 16E9x 𖺐 𖺑 𖺒 𖺓 𖺔 𖺕 𖺖 𖺗 𖺘 𖺙 𖺚 Unassigned U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F 16EAx 16EBx 16ECx 16EDx 16EEx 16EFx Miao U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F 16F0x 𖼀 𖼁 𖼂 𖼃 𖼄 𖼅 𖼆 𖼇 𖼈 𖼉 𖼊 𖼋 𖼌 𖼍 𖼎 𖼏 16F1x 𖼐 𖼑 𖼒 𖼓 𖼔 𖼕 𖼖 𖼗 𖼘 𖼙 𖼚 𖼛 𖼜 𖼝 𖼞 𖼟 16F2x 𖼠 𖼡 𖼢 𖼣 𖼤 𖼥 𖼦 𖼧 𖼨 𖼩 𖼪 𖼫 𖼬 𖼭 𖼮 𖼯 16F3x 𖼰 𖼱 𖼲 𖼳 𖼴 𖼵 𖼶 𖼷 𖼸 𖼹 𖼺 𖼻 𖼼 𖼽 𖼾 𖼿 16F4x 𖽀 𖽁 𖽂 𖽃 𖽄 𖽅 𖽆 𖽇 𖽈 𖽉 𖽊 𖽏 16F5x 𖽐 𖽑 𖽒 𖽓 𖽔 𖽕 𖽖 𖽗 𖽘 𖽙 𖽚 𖽛 𖽜 𖽝 𖽞 𖽟 16F6x 𖽠 𖽡 𖽢 𖽣 𖽤 𖽥 𖽦 𖽧 𖽨 𖽩 𖽪 𖽫 𖽬 𖽭 𖽮 𖽯 16F7x 𖽰 𖽱 𖽲 𖽳 𖽴 𖽵 𖽶 𖽷 𖽸 𖽹 𖽺 𖽻 𖽼 𖽽 𖽾 𖽿 16F8x 𖾀 𖾁 𖾂 𖾃 𖾄 𖾅 𖾆 𖾇 𖾏 16F9x 𖾐 𖾑 𖾒 𖾓 𖾔 𖾕 𖾖 𖾗 𖾘 𖾙 𖾚 𖾛 𖾜 𖾝 𖾞 𖾟 Unassigned U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F 16FAx 16FBx 16FCx 16FDx Ideographic Symbols and Punctuation U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F 16FEx 𖿠 𖿡 𖿢 𖿣 [KSS F] 16FFx 𖿰 𖿱 U+ 0 1 2 3 4 5 6 7 8 9 A B C D E F <|fim▁end|> | 𖦭 𖦮 𖦯 169Bx 𖦰 |
<|fim▁begin|> Contents 1 Socket 1.1 Example 1.2 Echo Client/Server 1.3 How to tell when a socket closes 1.4 Keeping a connection alive over time when there is no traffic being sent 1.5 setting socket options 1.6 Flushing 1.7 UDP Socket Example 1.8 UDP Broadcast Example 1.9 Multicast Example 1.9.1 Linux 1.9.2 Windows 1.10 Alternatives 1.10.1 Fibered 1.11 External Links Socket The Socket family of classes is the means that Ruby's standard library uses by default to communicate using networks. The typical use flow is to create a socket require 'socket' a = TCPSocket.new 'some host', 80 # port 80 Then read to and write from a. Now, if you try and read from a socket, it will typically block until some data comes in incoming_string = a.recv(1024) # blocks until data becomes available, or the socket is closed. You can avoid this blocking call by first checking if there is impending data, to do this you use the select call. readable,writable,error = IO.select([a], [a], nil, 3) # blocks until the timeout occurs (3 seconds) or until a becomes readable. At this point if a has any incoming data, readable will be an array like [a], otherwise it will be nil. if a is writable, then writable will be an array like [a] error is typically never used, though it might be useful in certain instances. The select method is really just a wrapper for the underlying select c call for whatever operating system you're on, though in general the semantics should be the same cross platform. Another way to read without blocking is to call a.recv_nonblock(1024), which will raise an exception if nothing is available. Example Here's an example: require 'socket' a = TCPSocket.new 'google.com', 80 a.write "GET / HTTP/1.0\r\n\r\n" begin r,w,e = select([a], [w], nil) # r will contain those that are ready to be read from [if they read "" that means the socket was closed], # w those ready to write to, e is hardly ever used--not actually sure when it is EVER used. rescue SystemCallError => e # this will rescue a multitude of network related errors, like Errno::ENETDOWN, etc. end Echo Client/Server server.rb (run this first) require 'socket' a = TCPServer.new('', 3333) # '' means to bind to "all interfaces", same as nil or '0.0.0.0' loop { connection = a.accept puts "received:" + connection.recv(1024) connection.write 'got something--closing now--here is your response message from the server' connection.close } client.rb require 'socket' a = TCPSocket.new('127.0.0.1', 3333) # could replace 127.0.0.1 with your "real" IP if desired. a.write "hi server!" puts "got back:" + a.recv(1024) a.close Output server: C:\dev>ruby server.rb received:hi server! Output client: C:\dev>ruby client.rb got back:got something--closing now--here is your response message from the server How to tell when a socket closes If BasicSocket#recv (available to all sockets) returns "" that means that the socket has been closed from the other side. The call to recv raising something like "ECONNRESET" means that the socket was closed, but ungracefully, from the other side. Keeping a connection alive over time when there is no traffic being sent It's common knowledge that TCP sockets stay active until they're closed by one side or the other. But while they're open but not <|fim▁hole|> that the connection becomes invalid. For example if the other side (the remote side) has gone away, or been rebooted or what not. It's also possible that intermediate NAT's will timed out your connection after awhile unused, thus also rendering the connection invalid. The real problem with this is that if you don't send any data, and the connection is invalid, you will only discover this fact *after* you send data, later. The notification can be thus delayed. The fix to this problem is to either, every so often, send a ping message or your own, or to set the TCP_SOCKET keepalive option, like socket.setsockopt(Socket::SOL_SOCKET, Socket::SO_KEEPALIVE, true) Note that this option works for sockets that have already been opened. Also note from here that it appears to only send a ping every two hours or so. If you have a timeout on read data (like you require them to send you something within x seconds or you will consider them dead), then you can track the last input using Time.now, then use the select command (with a reasonable timeout). Then, after each select, process the results, then iterate over your connections to see if old ones have become invalid because they haven't sent you data for a long time. setting socket options Note also that many options must be set before a socket is opened. here is some code demonstrating how to set one. Flushing By default sockets are typically created with the NAGL optimization option turned on, which means that there is a tiny delay before sending data after a write, which is so that if more small data is sent before the packet leaves, it can combine them into one packet. This can cause extra latency for the last of a set of packets. But can result in a small speedup by avoiding the overhead of multiple packets. To get around the latency for the end packet, you'll either want to call #flush on your sockets immediately after writing (preferably leave NAGL on, write a lot, then call #flush), or set the socket option to disable NAGL. See Nagle's algorithm for more information. UDP Socket Example server (run this first): require 'socket' BasicSocket.do_not_reverse_lookup = true # Create socket and bind to address client = UDPSocket.new client.bind('0.0.0.0', 33333) data, addr = client.recvfrom(1024) # if this number is too low it will drop the larger packets and never give them to you puts "From addr: '%s', msg: '%s'" % [addr.join(','), data] client.close client: require 'socket' sock = UDPSocket.new data = 'I sent this' sock.send(data, 0, '127.0.0.1', 33333) sock.close UDP Broadcast Example See [1] Multicast Example Linux See [2]. Windows See [3] Also note "in Windows the setsockopt call has to come after the bind call." from http://www.ruby-forum.com/topic/133208 Alternatives Other ways, such as using the eventmachine gem, also provide Socketed programming, with some benefits like better functionality with many sockets (and some drawbacks). The Rev gem is similar, though written mostly in Ruby, not C. Fibered You can use sockets with fibers (i.e. single threaded, but multiple connection) by using 1.9 + revactor or neverblock gem. External Links www.tutorialspoint.com/ruby/ruby_socket_programming.htm a tutorial a tutorial. a tutorial ↑ http://betterlogic.com/roger/?p=1646 ↑ http://onestepback.org/index.cgi/Tech/Ruby/MulticastingInRuby.red ↑ http://www.ruby-forum.com/topic/200353 <|fim▁end|> | any transmitting data, it's possible |
<|fim▁begin|> Theorem (geometrical Hahn–Banach theorem): Let V {\displaystyle V} be a real topological vector space, and let U ⊆ V {\displaystyle U\subseteq V} be open and convex so that 0 ∉ V {\displaystyle 0\notin V} . Then there exists a hyperplane W ≤ V {\displaystyle W\leq V} not intersecting U {\displaystyle U} . (On the condition of the axiom of choice.) Proof: The set of all vector subspaces of V {\displaystyle V} that do not intersect is inductive and also nonempty (because of the zero subspace). Hence, by Zorn's lemma, pick a maximal vector subspace W ≤ V {\displaystyle W\leq V} that does not intersect U {\displaystyle U} . Claim that W {\displaystyle W} is a hyperplane. If not, V / W {\displaystyle V/W} has dimension ≥ 2 {\displaystyle \geq 2} . Now the canonical map p : V → V / W {\displaystyle p:V\to V/W} is open, so that U ′ := p ( U ) {\displaystyle U':=p(U)} is an open, convex subset of V / W {\displaystyle V/W} . We consider the cone C := ⋃ λ > 0 λ U ′ {\displaystyle C:=\bigcup _{\lambda >0}\lambda U'} and note that it has a nonzero boundary point; for otherwise C {\displaystyle C} would be clopen in V / W ∖ { 0 } {\displaystyle V/W\setminus \{0\}} which is path-connected (indeed by assumption dim V / W ≥ 2 {\displaystyle \operatorname {dim} V/W\geq <|fim▁hole|> any two points x , y ∈ V / W {\displaystyle x,y\in V/W} we find a 2-dimensional plane containing both, and by using a "corner point" z {\displaystyle z} when x , y {\displaystyle x,y} do lie on a line through the origin, we may connect them in V / W ∖ { 0 } {\displaystyle V/W\setminus \{0\}} , because a segment in a TVS yields a continuous path by continuity of addition and scalar multiplication), so that C = V / W ∖ { 0 } {\displaystyle C=V/W\setminus \{0\}} , which is impossible because for any x ≠ 0 {\displaystyle x\neq 0} in V / W {\displaystyle V/W} , we then have x ∈ μ U ′ {\displaystyle x\in \mu U'} , − x ∈ λ U ′ {\displaystyle -x\in \lambda U'} for μ , λ > 0 {\displaystyle \mu ,\lambda >0} , so that 0 ∈ U ′ {\displaystyle 0\in U'} by convexity, a contradiction. Hence, let w ∈ ∂ C {\displaystyle w\in \partial C} . Then the line L {\displaystyle L} generated by w {\displaystyle w} does not intersect C {\displaystyle C} and hence not U ′ {\displaystyle U'} , and p − 1 ( L ) {\displaystyle p^{-1}(L)} is a larger subspace of V {\displaystyle V} that does not intersect U {\displaystyle U} than W {\displaystyle W} in contradiction to the maximality of the latter. ◻ {\displaystyle \Box } <|fim▁end|> | 2} , so that for |
<|fim▁begin|> Theorem 1 For all integers, n > 1 {\displaystyle n>1} , ∫ [ 0 , 1 ] n 1 1 − ∏ i = 1 n x i ∏ i = 1 n d x i = ζ ( n ) {\displaystyle \int _{[0,1]^{n}}{\frac {1}{1-\prod _{i=1}^{n}x_{i}}}\prod _{i=1}^{n}\mathrm {d} x_{i}=\zeta (n)} Proof Using the power series of ( 1 − x ) − 1 {\displaystyle (1-x)^{-1}} , ∫ [ 0 , 1 ] n 1 1 − ∏ i = 1 n x i ∏ i = 1 n d x i = ∫ [ 0 , 1 ] n ∑ j = 0 ∞ ( ∏ i = 1 n x i ) j ∏ i = 1 n d x i {\displaystyle \int _{[0,1]^{n}}{\frac {1}{1-\prod _{i=1}^{n}x_{i}}}\prod _{i=1}^{n}\mathrm {d} x_{i}=\int _{[0,1]^{n}}\sum _{j=0}^{\infty }\left(\prod _{i=1}^{n}x_{i}\right)^{j}\prod _{i=1}^{n}\mathrm {d} x_{i}} Evaluating, = ∫ [ 0 , 1 ] n ∑ j = 0 ∞ ∏ i = 1 n x i j d x i {\displaystyle =\int _{[0,1]^{n}}\sum _{j=0}^{\infty }\prod _{i=1}^{n}x_{i}^{j}\mathrm {d} x_{i}} = ∑ j = 0 ∞ ∏ i = 1 n ∫ 0 1 x i j d x i <|fim▁hole|> _{0}^{1}x_{i}^{j}\mathrm {d} x_{i}} Evaluating the integral, = ∑ j = 0 ∞ ∏ i = 1 n 1 j + 1 {\displaystyle =\sum _{j=0}^{\infty }\prod _{i=1}^{n}{\frac {1}{j+1}}} Evaluating the product, = ∑ j = 1 ∞ ∏ i = 1 n 1 j {\displaystyle =\sum _{j=1}^{\infty }\prod _{i=1}^{n}{\frac {1}{j}}} = ∑ j = 1 ∞ 1 j n {\displaystyle =\sum _{j=1}^{\infty }{\frac {1}{j^{n}}}} Using the definition of the zeta function that holds only for ℜ n > 1 {\displaystyle \Re n>1} , ∫ [ 0 , 1 ] n 1 1 − ∏ i = 1 n x i ∏ i = 1 n d x i = ∑ j = 1 ∞ 1 j n = ζ ( n ) {\displaystyle \int _{[0,1]^{n}}{\frac {1}{1-\prod _{i=1}^{n}x_{i}}}\prod _{i=1}^{n}\mathrm {d} x_{i}=\sum _{j=1}^{\infty }{\frac {1}{j^{n}}}=\zeta (n)} for all integers n > 1 {\displaystyle n>1} ◼ {\displaystyle \blacksquare } Note It can be noted that, ∫ 0 1 1 1 − x d x {\displaystyle \int _{0}^{1}{\frac {1}{1-x}}\mathrm {d} x} fails to converge, as − lim x → 1 log ( 1 − x ) = ∞ {\displaystyle -\lim _{x\to 1}\log(1-x)=\infty } . <|fim▁end|> | {\displaystyle =\sum _{j=0}^{\infty }\prod _{i=1}^{n}\int |
<|fim▁begin|> Lyrics | Manuscript | Authors and Composers The Lyrics of Henry VIII Appendix 1: Lyrics by Occasion/Theme | Appendix 2: Textual/Musical Witnesses | Appendix 3: Bibliography ← It is to me a ryght gret Ioy Fare well my Ioy and my swete hart → [ff. 65v-66r] I haue bene a foster long and many a day foster wyl I be no more no lenger shote I may yet haue I bene a foster 5 Hange I wyl my nobyl bow vpon the grene wod bough For I can nott shote in playne nor yett in rough yet hue I bene a foster 10 Euery bowe for me ys to bygge myne arow ny worne ys. The glew ys slypt frome the nyk when I shuld shoote I myse yet haue. I bene a foster 15 Lady venus hath commaundyd me owt of her courte to go. Ryght playnly she shewith me that beawtye ys my foo. yet haue. I. b.ene a foster 20 My berd ys so hard god wote when I shulde maydyns kysse Thay stand abak and make it strange. lo age ys cause of this. yet haue I bene a foster 25 Now will I take to me my bedes for and my santes booke. And pray I wyll for them that may for I may nowght but loke. yet haue I bene a foster 30 D. Cooper Textual Commentary As with other forester songs in H, this lyric explicitly exploits and draws attention to the double-entendre of the forester songs as a whole. This move is especially evident in the shift in the fourth and fifth stanzas (ll. 16–25) to a direct address of the courtly love topos. Flood (64–65) assigns this lyric to the play presented by Cornish at Windsor, 15 June 1522, in which a keeper, three foresters, and four hunters took part, as well as Cornish’s Children of the Chapel Royal.[1] See also the commentary and notes to Cornish’s “Yow and I and amyas” (H 35) and “Blow thi hornne hunter” (H 29), as well as that of the unattributed “I am a joly foster” (H 50), which appears to be in answer to this lyric. Also, as noted below, Cooper’s <|fim▁hole|> of the unattributed “y haue ben afoster long and meney day” in LRit (f. 53v), and shares many of the same sentiments, though not necessarily the explicit double-meaning of the forester lyrics; this text follows: y haue ben afoster long and meney day, my lockes ben ho re, foster woll y be no more y shall hong vp my horne by the greene wode spray my lookes ben hore, Foster will y be no mor All the whiles that y may bowe bend shall y wedde no wyffe, my bowe bend shall y wedde now wiffe, wiffe I shall bygges me a boure atte the wodes ende ther to lede my lyffe att the wodes end, ther to lede my lyfe 1 foster Forester. 4 no lenger shote I may Cf. the sentiment of Cornish’s “Blow thi hornne hunter” (H 29.22). 8 in playne On open ground, in the meadow, &c. (OED “plain” n.1 1.a). 9 in rough On rough or broken ground (OED n.1 2.a, b). 13 glew ys slypt frome the nyk Arrows were sometimes spliced with heavier wood and the “nock” to counterbalance the weight of the metal head; if the glue failed, the arrow would become unserviceable (noted by Greene [451]). 23 make it strange Estrange or remove themselves (OED “strange” 5). 26 bedes Beads. 27 for and And moreover (OED conj. 5). santes booke Book of saints’ lives. The first stanza of “I haue bene a foster,” the burden, is through-set for three voices and the remaining text is underlaid. The initial text and melody imitates that of “y haue ben afoster long and meney day” (LRit 53v; Robbins Index & Suppl. 1303.3, Ringler MS TM643), but Cooper’s lyric deviates from that in LRit and is extended; see the commentary, above. “I haue bene a foster” is indexed in Robbins Index & Suppl. 1303.5, Ringler MS TM518, and Crum I193. It is reprinted in Chappell Music 1.50, Flügel Anglia 244, Greene 313–4, Stevens M&P 408–9, and Stevens MCH8 48. Textual Notes Texts Collated H1,2,3 (ff. 65v–66r, ll. 1–5 H2,3). 29 I] ms omits References ↑ See L&P Henry VIII (III[ii] #2305), PRO SP1/24 (231v ff.), Hall (641), and CSP Spanish (II #437). <|fim▁end|> | text and melody imitate that |
<|fim▁begin|> Basics of integration Integration is the opposite of differentiation. For a power of x, you add 1 to the power, divide by the new power and add c, the constant of integration. Note that this rule will not work when the power of x is -1, this requires more advanced methods. The constant of integration is required because if a constant (i.e. a number without x in it) is differentiated it will become zero, and from just integration there is no way to determine the value of this constant. For example: ∫ 2 x d x {\displaystyle \int 2x\,\,dx} becomes: y = x 2 + c {\displaystyle \displaystyle y=x^{2}+c} Integrating fractions Fractions with an x term in the denominator cannot be integrated as they are; the x term must be brought up to the working line. This can be done easily with the laws of indices. For example: ∫ 2 x 2 d x = ∫ 2 x − <|fim▁hole|> {\frac {2}{x^{2}}}\,\,dx=\int 2x^{-2}\,\,dx} Determining the value of c You may be given a point on a curve and asked to determine the value of the constant of integration, c. This is quite simple, as the point is given as ( x , y ) {\displaystyle (x,y)} ; the values of x and y can be plugged in and the equation solved for c. Worked example: The gradient of the curve c is given by d y d x = 2 x {\displaystyle {\frac {dy}{dx}}=2x} . The point ( 3 , 12 ) {\displaystyle (3,12)} lies on c. Hence, find the equation for c. y = ∫ 2 x d x {\displaystyle y=\int 2x\,\,dx} y = x 2 + c {\displaystyle y=x^{2}+c} Plug in values x = 3, y = 12. 12 = 3 2 + c {\displaystyle 12=3^{2}+c} 12 − 9 = c {\displaystyle 12-9=c} 3 = c {\displaystyle 3=c} y = x 2 + 3 {\displaystyle y=x^{2}+3} <|fim▁end|> | 2 d x {\displaystyle \int |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.