added
stringdate
2024-06-03 18:26:11
2024-06-04 03:14:13
created
stringdate
2013-04-29 18:49:42
2014-01-03 01:38:26
id
stringlengths
32
32
metadata
dict
source
stringclasses
2 values
text
stringlengths
237
356k
version
stringclasses
1 value
2024-06-03T21:29:47.544Z
2013-05-18T08:10:43.000Z
n5jcw62cewwxm6v7qfty3zadbwsxyma7
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24378", "uncompressed_offset": 348295277, "url": "www.bizsugar.com/user/profile/GetApp", "warc_date": "2013-11-22T14:52:02.000Z", "warc_filename": "<urn:uuid:d9e97804-b6ed-41b9-83a1-81a6a9bc88b0>", "warc_url": "http://www.bizsugar.com/user/profile/GetApp" }
cccc_CC-MAIN-2013-20
Personal Information Username: GetApp User: Elke Public Email: elke.schmitt@getapp.com Occupation: Online Marketing Manager Facebook: http://www.facebook.com/GetAppcom Twitter: http://twitter.com/getapp LinkedIn: http://es.linkedin.com/in/primault Stumbleupon: http://www.stumbleupon.com/stumbler/getapp/ Company URL: http://www.getapp.com/ Blog URL: http://www.getapp.com/blog/ Latest Blog Entry: ProWorkflow Tutorial Videos ? Getting Started These ProWorkflow Tutorial Videos are aimed to educate users about product features and specific functions. The objective is to teach the new users of this project management software how to use it and also to  give insights about ProWorkflow´s features and usability. In this article you will find video tutorials on the following topics: Introduction for New [...] User Stats Joined: 2010-02-10 Submitted Stories: 511 Published Stories: 67 Comments: 16 Votes: 668 Published Votes: 90 Karma Score: 0.00     Subscribe Dr. Shannon Reece: Empowering Women In Small Biz Meet Dr. Shannon Reece, most recent BizSugar "Contributor of the Week" on Facebook. We'll be picking a new … More Editor's Picks Add BizSugar buttons and plugins to your small biz toolkit! See if you're one of our Top 10 Members this week! Got small business blog posts? Register and submit them today! Shazam! Meet Contributor of the Week Paul Cox...Congrats, Paul!
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:46:50.000Z
qpfbbaabtprwd2cxg7blt3lafzpvltt3
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24397", "uncompressed_offset": 442358536, "url": "www.familysearch.org/learn/wiki/en/index.php?hideliu=1&target=Template%3AFHL&title=Special%3ARecentChangesLinked", "warc_date": "2013-11-22T14:52:02.000Z", "warc_filename": "<urn:uuid:d9e97804-b6ed-41b9-83a1-81a6a9bc88b0>", "warc_url": "http://www.familysearch.org/learn/wiki/en/index.php?title=Special:RecentChangesLinked&hideliu=1&target=Template%3AFHL" }
cccc_CC-MAIN-2013-20
Changes related to "Template:FHL" From FamilySearch Wiki This is a list of changes made recently to pages linked from a specified page (or to members of a specified category). Pages on your watchlist are bold. Recent changes options Show last 50 | 100 | 250 | 500 changes in last 1 | 3 | 7 | 14 | 30 days Hide minor edits | Show bots | Hide anonymous users | Show logged-in users | Hide my edits Show new changes starting from 06:46, 18 May 2013   Page name: No changes on linked pages during the given period.   New to the Research Wiki? In the FamilySearch Research Wiki, you can learn how to do genealogical research or share your knowledge with others. Learn More
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:45:49.000Z
4bj4nxzdnjb74pb7ydc5hnorwiydkocn
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24398", "uncompressed_offset": 442369073, "url": "www.familysearch.org/learn/wiki/en/index.php?oldid=100563&title=Stanislaus_County%2C_California", "warc_date": "2013-11-22T14:52:02.000Z", "warc_filename": "<urn:uuid:d9e97804-b6ed-41b9-83a1-81a6a9bc88b0>", "warc_url": "http://www.familysearch.org/learn/wiki/en/index.php?title=Stanislaus_County,_California&oldid=100563" }
cccc_CC-MAIN-2013-20
Stanislaus County, CaliforniaEdit This Page From FamilySearch Wiki Revision as of 22:13, 4 October 2008 by Grandmaladybug (Talk | contribs) United States  > California > Stanislaus County Contents County Courthouse History Parent County 1854--Stanislaus County was created from Tuolumne County.  County seat: Modesto Boundary Changes Record Loss Places/Localities Populated Places Neighboring Counties Resources Cemeteries Church LDS Records Court Land Local Histories Maps Military Newspapers Probate Taxation Vital Records Societies and Libraries Web Sites • USGenWeb project. May have maps, name indexes, history or other information for this county. Select the state, then the county. • Family History Library Catalog References   Need additional research help? Contact our research help specialists. Need wiki, indexing, or website help? Contact our product teams. Did you find this article helpful? You're invited to explain your rating on the discussion page (you must be signed in).
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:47:01.000Z
rthoy5snxhxkyjzic35nhm3teevpp5hi
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24399", "uncompressed_offset": 447522848, "url": "www.fides.org/en/news/30501?idnews=30501&lan=eng", "warc_date": "2013-11-22T14:52:02.000Z", "warc_filename": "<urn:uuid:d9e97804-b6ed-41b9-83a1-81a6a9bc88b0>", "warc_url": "http://www.fides.org/en/news/30501?idnews=30501&lan=eng" }
cccc_CC-MAIN-2013-20
http://www.fides.org Asia 2011-12-05 ASIA/INDIA - "Crimes against humanity in the massacres of Christians in Orissa": Report of the People's Tribunal New Delhi (Agenzia Fides) - Violence against Christians in Orissa violate human rights and the Constitution; they have been carefully planned and are considered "crimes against humanity"; they have a strong impact on women and children; they occur with the complicity of public officials and today they still remain unpunished: this is what the new Report of the National People's Tribunal on Kandhamal, district of the state of Orissa theater of anti-Christian massacres of 2008. The Tribunal, which on the initiative of the National Solidarity Forum, brings together leaders and representatives of civil society, today published a new Report in Bhubaneswar titled "Waiting for Justice". The Document, sent by the local Church to Fides, aimed at assisting the victims and survivors of violence 2008 to seek justice, in order to restore law and build peace. The Report is based on the testimonies of 45 survivors and draws upon the contents of studies, field surveys, research by 15 experts. Among the major observations, the text speaks of "targeted violence against the adivasi and dalit Christian community, which violates the fundamental right to life, liberty and equality, guaranteed by the Constitution" through the use of religion as a weapon to political mobilization. The attacks of 2008 " were executed with substantial planning and preparation. The violence meets all the elements of 'crimes against humanity', as defined in applicable international law", the Report says. "Christians who refused to convert to Hinduism were brutally killed" and their property destroyed. The Tribunal also underlines the gendered impact (number of cases of sexual violence against women) and children, traumatized because they have witnessed horrific violence to the their close familty members. The Christian community today lives "a sense of rootlessness", caused by the absence of houses, lands, churches, and "the boycott against Christians continues", discriminated against on grounds of religion, caste and gender. The Report underlines with grave concern, "the connivance of public officials with the forces of violence and deliberate support to violence", saying that "state agencies have blatantly failed" in protecting the population. Even today, justice is slow and most of the crimes remain unpunished, because "the complicity of the police and their collusion with the perpetrators, during the phase of investigation and prosecution", and also because the witnesses are threatened and intimidated. "The meagre compensation to the victims – notes the text - are clearly indicative of the indifference of the State government". Given the urgency of the situation, the Report challenges the institutions to take appropriate measures, in the punishment of the perpetrators, in compensation to the victims and the social aid (providing government jobs, loans for commencement of small businesses, education for children) . The authorities are also invited to tackle the problem of landlessness and land alienation of the dalits and adivasis and to stop many who still violate Articles 153a and 153b of the Indian Penal Code ("promoting enmity between different groups"), in order to stop those who continue to propagate hate and incite violence against religious minorities, in order to really protect the right to religious freedom. (PA) (Agenzia Fides 05/12/2011) Share: Facebook Twitter Google Blogger Altri Social Network
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:58:00.000Z
igstzxvhc3axrhhye366rytydnib5b7o
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24407", "uncompressed_offset": 474131566, "url": "www.go4expert.com/forums/gridview-links-passing-value-t4123/", "warc_date": "2013-11-22T14:52:02.000Z", "warc_filename": "<urn:uuid:d9e97804-b6ed-41b9-83a1-81a6a9bc88b0>", "warc_url": "http://www.go4expert.com/forums/gridview-links-passing-value-t4123/" }
cccc_CC-MAIN-2013-20
Gridview, links and passing a value Go4Expert Member 4May2007,01:28   #1 I’m having trouble finding a way to pass a value from a gridview link item to the next page. If a user searches for a CD say queen and clicks submit all the CDs with the name queen are shown with there unique numbers and dates added. If the user clicks on one of the CD ID’s it takes them to a page called cdview, the cd id will be used to retrieve all the information about the cd. Here’s an example… Search CD = Queen (clicked submit) (Gridview) CD ID__________CD Name________Date 12______________Queen_________12/4/04 56______________Queen__________14/5/03 4________________Queen__________5/8/07 I’ve chosen the CD ID field to appear as a hyperlinkfield in the grid view options. I’ve also linked it to a page called CDView.aspx. On that page I hope to show the details of the CD that are stored in the sql database and allow the user to update the information. My question is how do I pass the CD ID to the CDView page so I can then load up all the details about the CD? If the user clicks the CD ID link say the number 12 how do I pass that number 12 as an int to the CDViewPage? Any help would be great. Thanks, Team Leader 4May2007,09:37   #2 Create the hyperlink that points to CDView.aspx?CdId=<the cd id> E.g. CDView.aspx?CdId=12 Go4Expert Member 4May2007,17:49   #3 Thanks, for the help. from what you've said I've managed to get it working. Cheers, CaJack
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:22:52.000Z
itlwswzwnh5vycjk42r46sxlvuocmosi
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24409", "uncompressed_offset": 480634931, "url": "www.grandtheftwiki.com/Blow_Fish", "warc_date": "2013-11-22T14:52:02.000Z", "warc_filename": "<urn:uuid:d9e97804-b6ed-41b9-83a1-81a6a9bc88b0>", "warc_url": "http://www.grandtheftwiki.com/Blow_Fish" }
cccc_CC-MAIN-2013-20
Blow Fish From Grand Theft Wiki Jump to: navigation, search Mission Blow Fish Toni Cipriani telling Claude that he wants to finish the Triads in Liberty City once and for all by destroying their fish processing factory in Callahan Point by using an explosives laiden Trashmaster provided by 8-Ball. Game GTA III For Toni Cipriani Target Turtle Head Fish Factory Location Saint Mark's, Portland, Liberty City Fail Player death Destroy the Trashmaster Reward $30,000 Unlocks Bomb Da Base Act I (after completing Cutting the Grass) Unlocked by Triads and Tribulations Blow Fish is a mission in Grand Theft Auto III given to protagonist Claude by Leone Family caporegime Toni Cipriani from his mother's restaurant in Saint Mark's, Portland, Liberty City. Contents Mission Claude goes to Momma's Restaurante and finds Toni, who informs Claude that he has had enough with the Triads and wants to force them out of Liberty City. Toni says that 8-Ball has rigged a Trashmaster with some explosives, which is to be placed between gas canisters at the Turtle Head Fish Factory in Callahan Point. Claude drives to Eightballs Autoyard to collect the Trashmaster, which he then drives carefully over to Callahan Point, so as not to detonate the explosives, although he has time limit of two and a half hours. The Triads open the gates to the plant, allowing Claude to park the Trashmaster between two gas canisters. Claude sets the explosives to detonate and retreats to a safe distance, with the plant being destroyed shortly after. Script Toni Cipriani: OK, I've had enough of this shit. We're gonna finish the Triads in Liberty once and for all! 8-Ball's rigged a dustcart with a bomb. It's on a timer so if you mess up there'll be no evidence. Go and pick up the dustcart. Careful, 8-Ball says it's real sensitive and the slightest bump could set that thing off! Their fish factory will open its gates for a dustcart, so you can drive right in. Park up between the gas canisters and get the hell out of there! I want it to rain mackerel. We're talking real biblical here, nothing low budget. Reward The reward for completing the mission is $30,000 and Bomb Da Base Act I is unlocked, if the player already completed Cutting the Grass. Trivia • The mission is similar to The Trouble With Triads mission in Grand Theft Auto: Liberty City Stories, where the Triads destroy a Leone Family warehouse on the same plot of land. • This is rather odd that the tankers can only be destroyed in this way, it can't be destroyed by other explosives. • The Trashmaster in this mission is bulletproof and fireproof. However, it can only be obtained by failing the mission. Gallery Video walkthrough PC Version - GTASeriesVideos <youtube>vmoH2kBLjU4</youtube>
v0
2024-06-03T21:29:47.544Z
2013-05-18T08:10:32.000Z
o3yfdrlztwlvmflh5vaiicvstxhwevpe
{ "content_type": "application/xhtml+xml", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24412", "uncompressed_offset": 492606370, "url": "www.hindawi.com/journals/mpe/2012/710690/", "warc_date": "2013-11-22T14:52:02.000Z", "warc_filename": "<urn:uuid:d9e97804-b6ed-41b9-83a1-81a6a9bc88b0>", "warc_url": "http://www.hindawi.com/journals/mpe/2012/710690/" }
cccc_CC-MAIN-2013-20
About this Journal Submit a Manuscript Table of Contents Mathematical Problems in Engineering Volume 2012 (2012), Article ID 710690, 16 pages doi:10.1155/2012/710690 Research Article Automatic Regulation Time Series for Industry Processes Department of Aeronautical Engineering, National Formosa University, Huwei, Yunlin 63208, Taiwan Received 28 January 2012; Accepted 20 March 2012 Academic Editor: Ming Li Copyright © 2012 Tain-Sou Tsay. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Abstract A nonlinear digital control scheme is proposed for analyses and designs of stable industry processes. It is derived from the converging characteristic of a specified numerical time series. The ratios of neighbourhoods of the series are formulated as a function of the output of the plant and the reference input command and will be converted to be unities after the output has tracked the reference input command. Lead compensations are also found by another numerical time series to speed up the system responses on the online adjusting manner. A servosystem, a time-delay system, a high-order system, a very-high-order system, and a 2 × 2 multivariable aircraft gas turbine engine are used to illustrate effectiveness of the proposed nonlinear digital controller. Comparisons with other conventional methods are also made. 1. Introduction For unit feedback discrete-time control systems, the control sequences are usually functions of the difference between the sampled reference input and output of the plant [15]. The discrete-time control sequence can be generated by Finite Impulse Response (FIR) filter or Infinite Impulse Response (IIR) filter. The input of FIR or IIR filter is the difference between the sampled reference input and output of the plant. The output of FIR or IIR will be the input of the plant. In general, they are linear controllers. In this literature, a nonlinear discrete-time control sequence described by periodic numerical series is proposed for analyses and designs of industry processes. They are sampled-data feedback control systems. represents the sampling interval. The ratios of to of the series are formulated as a function of the reference input command and the output of the plant. The value of is the control input of the plant at time intervals between and . Thus, the considered system is closed as a feedback control system by use of . It will be seen that the output of the plant tracks the reference input command exactly after ratios of the series being converted to unities. It implies that will be converted to a steady-state value for a constant reference input applied. The stability of the closed-loop system is guaranteed by selecting the proper function of ratios . This function can be called as “Regulation Function.” It will be proven that the considered system using becomes a negative feedback control system for a stable plant [4]. Note that it needs not integration to get zero tracking error, and performance of controlled systems are dependent on selected functions of . Furthermore, an adaptive limitation for can be applied also to minimize the control effort and get better performance. Controlled results will be compared with conventional famous PI and PID controllers [615]. In this work, measurement noises of plant outputs are not considered. It is worthwhile to include recent developments of fractional-order systems and controls [16, 17] in the proposed nonlinear automatic regulation time series. They have been applied to signal processing [18], Cyber-physical networking system [19, 20], PMSM position servo system [21], and optimal control [22]. In following sections, basic concepts of the proposed nonlinear discrete-time control sequence are discussed first, and then a servo system, a time-delay system, a high-order system, a very-high-order system, and a 2 × 2 multivariable aircraft gas turbine examples are used to illustrate their tracking behaviour and performance. Simulating results will show that the proposed nonlinear digital controller gives another possible way for analyses and designs of industry processes. Design results of the fourth example give the proposed method can also be applied to multivariable feedback control systems. 2. The Basic Approach 2.1. Automatic Regulation Time Series A numerical series with time interval [15] can be written as in the form of where represents a constant value between time interval from and . For simplicity, the representation of will be replaced by in the following evaluations. The ratios of the series are defined as in the form of Equation (2.2) gives the value of approaches to be a constant value when the value of approaches to be unity. Now, the problem for closing the considered system is to find the formula of which is the function of the reference input command and the output of the plant . is used as the input of the considered system. Considering a series given below, where represents the reference input command and represents the nonzero sampled output of the plant at the sampling interval . Note that this non-zero constraint will be removed later by level shifting. Equation (2.3) is a possible way to close the considered system as a sampled-data feedback control system. Assuming the reference input command has been tracked by applying control effort , (2.3) becomes For steady-state condition, approaches to be a constant value, and it gives Rearranging (2.3) and taking the derivative of it with respect to , one has The sufficient but not necessary condition for (2.7) less than zero is for and (2.6) can be rewritten as in the form of will be used in the following evaluations. Negative value of (2.7) represents the closed-loop system using (2.3) activated as a negative feedback system around the equilibrium condition; that is, . This statement will be illustrated and discussed by a graph in the next paragraph. The first-order polynomial described in (2.3) can be written as in the form of where satisfies constrains stated above and becomes an adjustable parameter. Thus, the ratios become can be called as “Regulation Function” also. Similarly, the third-order representation of is in the form of where and . Taking the derivative of (2.10) with respect to , one has For negative value of (2.12), the value of must be greater than zero. This implies the range of is . The suitability of the proposed nonlinear adaptive digital controller is based on this negative regulation characteristic. Figure 1 shows ratios versus represented by (2.9) for = 0.9, 0.7, 0.5, 0.3 and 0.1, respectively. Figure 1: Versus for = 0.9, 0.7, 0.5, 0.3, and 0.1. Figure 1 shows that the value of is less than one for that of greater than that of , then the value of will be decreased; the value of is greater than one for that of less than that of , and the value of will be increased. This implies that the controlled system connected using (2.9) will be regulated to the equilibrium point () and gives a negative feedback control system for deviation from the equilibrium point. From Figure 1, it can be seen that one can adjust to get desired regulating slope; that is, regulating characteristic. Certainly, other tracking functions can be formulated and proposed also for the considered system, if its derivative with respect to is negative. Similar to the derivation of (2.12), (2.11) gives where and . The constraint of non-zero can be removed by of (2.9) replaced by . is a positive value and represents the negative maximal control swing. The modified equation of (2.9) becomes Equation (2.14) implies ratios are in the form of Control inputs of the plant are in the form of for the negative swing control using positive values of , , and . Equation (2.14) gives negative regulation characteristics also for is corresponding to . Similar to the evaluation of (2.12), the derivative of (2.15) becomes Figure 2 shows the connected system configuration using (2.14) and (2.16) in which is the sampled with hold output of the controller. The values of and will be all positive for the summation of and (or and ) is greater than zero with specified values of . All positive values will give the better continuity and regulating characteristic of the time series. Naturally, absolute value of can be used in (2.14) to guarantee positive of and for negative of . Figure 2: A nonlinear digital controller using automatic regulation time series. 2.2. Control Effort Limitation An adaptive value of can be selected at for the system is well controlled. Then (2.14) and (2.16) can be rewritten as respectively. The maximal value of can be limited by an adaptive constraint to minimize the control effort. The control input of the plant is now described by (2.19). Note that the singularity of (2.18) must be avoided when . It is easy to replace by a small value. A small value of is selected also to avoid null time series. Figure 3 shows an equivalent block diagram of Figure 2 using constraint of and singularity avoidance of . The constrain of cannot be only for minimizing the control effort but also for improving system performance. Figure 3: Equivalent block diagram of Figure 2 using limitations and singularity avoidance of (2.18). 2.3. Phase Lead Compensation A conventional digital filter in Figure 3 can be applied for filtering , if it is necessary. In general, phase lead is used for speeding up the time response. The first-order phase lead can be expressed as for . The parameter can be found by another numerical time series. It is where is the time constant of the closed loop system and is the wanted time constant. Considering a illustrating example [6] is shown in Figure 3, in which is in the form of DC gain of is unity. The sampling period is selected to be equal to 0.1 second for illustrating variations of and . Time responses of the overall system using the nonlinear digital controller for , and are shown in Figure 4. Magnitudes of reference inputs between 0 and 5 seconds are equal to 1, between 5 and 10 seconds are equal to −0.7, between 10 and 14 seconds are equal to 0.5, and between 14 and 17 seconds are equal to −0.3, in which gives reference input (dash line), output (solid line), time series (dotted line), and ratios (dash-dotted line) of . Figure 4 shows that all values of and are positive while the value of output is tracking the negative value of the reference input . The value of can be positive or negative. Figure 4: Time responses of the illustrating example for and  sec. Figure 4 shows also that ratios are converted to be unities quickly; that is, the controlled output tracks the reference input quickly. The proposed method gives a good performance and zero steady-state error without integration. Note that maximal values of are set to be for better performance and minimal the control effort. Equation (2.14) gives that will be converted to 0.5 for zero input () and . Equation (2.14) and Figure 1 give that the less the value of is, the larger the regulation slope will be. is the optimal value for the considered system. Figure 5 shows time responses for and sampling frequency equal to 100, 40, 20, 10, and 5 Hz, respectively. It shows that 40 Hz (i.e.,  ms) is fast enough for the considered system. Figure 6 shows comparisons with a phase-lead compensator which is included in the control loop. The phase-lead compensator is in the form of It can speed up the time responses while keeping system performance. Figure 5: Time responses of the illustrating example for and sampling frequency equating to 100, 40, 20, 10, and 5 Hz, respectively. Figure 6: Time responses of the illustrating example with/without for ,  ms. The proposed control scheme using numerical time series will be applied to three numerical SISO (single-input single-output) examples in next section on online adjusting manner. Equation (2.21) will be used for finding phase-lead compensators to meet design specifications. 3. Numerical Examples Example 3.1. Consider a stable plant that has the transfer function [7, 8] It has pure time delay of 1 second. The specification for time constant is selected. Parameters of (2.18) and (2.21) are ,  ms,, and . Figure 7 shows online adjusting processes for finding . The initial guess of is equal to 1.00 and converted to 0.5195 after third adjusting processes. The found lead compensator is Time constants of each step are 1.4107, 1.8488, 1.8498, and 1.8500. Figure 7 shows the proposed method provides an automatic regulation procedure to get wanted design specifications. It gives good performance and zero steady-state error. Simulation results of the proposed method and four other methods are presented for comparisons. They are Ziegler-Nichols method [912] for finding PI and PID compensators, Tan et al. [13, 14] for finding PID compensator, and Majhi [7, 8] for finding PI compensator. The controller is in the form of Parameters of four found compensators are given below:(1)ZN(PI): and;(2) ZN(PID): , , and;(3) Tan’s(PID): , , and;(4) Majhi’s(PI): and .Integral of the Square Error (ISE) and Integral of the Absolute Error (IAE) are given in Table 1. Time responses are shown in Figure 8. From Table 1 and Figure 8, one can see that the proposed method gives faster and better performance than those of other methods presented. Table 1: IAE and ISE errors of Example 3.1 using different control methods. Figure 7: Time responses of Example 3.1 for finding . Figure 8: Time responses of Example 3.1 using different control methods. Example 3.2. Consider a sixth order plant [7, 8] The specification of time constant  sec is selected. Parameters of (2.18) and (2.21) are , ms,,, and . The initial guess of is equal to 1.0 and converted to 0.7759 after second adjusting process. The found lead compensator is Figure 9 shows on-line adjusting processes for finding to meet sec. Simulation results of the proposed and four other methods are presented for comparisons. They are Ziegler-Nichols rule [912] for finding PI and PID compensators, Ho et al. [15] for finding PID compensator, and Majhi [7, 8] for finding PI compensator. Parameters of five found compensators are given below:(1)ZN(PI): and ;(2) ZN(PID): , and;(3) Majhi’s(PI): , and ;(4) Ho’s(PID): .Integral of the Square Error (ISE) and Integral of the Absolute Error (IAE) are given in Table 2. Time responses are shown in Figure 10. From Table 2 and Figure 10, one can see that the proposed method gives faster and better performance than those of other methods. Table 2: IAE and ISE errors of Example 3.2 using different control methods. Figure 9: Time responses of Example 3.2 for finding . Figure 10: Time responses of Example 3.2 using different control methods. Example 3.3. Consider the very-high-order plant [7, 8]: The design specification for time constant sec is selected. Parameters of (2.18) and (2.21) are , ms,,and . The initial guess of is equal to 1.00 and converted to 0.9586 after the fourth adjusting process. The found lead compensator is Figure 11 shows time response of the controlled system, which gives reference input (dash line), output (solid line), time series (dotted line), and ratios (dash-dotted line) of . It gives good performance and zero steady-state errors. Figure 11 shows the considered plant is a large time-lag system. The high order system model is usually used to describe the industry process for replacing pure time delay (e.g., ) such that conventional analysis and design techniques can be applied [7, 8]. Figure 11 shows the proposed method can be applied to a large time-delayed system. Final results and four other methods are presented for comparison and show the merit of the proposed method. They are Ziegler-Nichols method [912] for finding PI and PID compensators, Zhuang and Atherton [23] for finding PI compensator, and Majhi [7, 8] for finding PI compensator. Parameters of four found compensators are given below: (1) ZN(PI): and;(2) ZN(PID): ,nd;(3) Majhi’s(PI): and;(4) Zhuang’s(PI): and.Time responses are shown in Figure 12. Table 3 gives integration of absolute error (IAE) and integration of square error (ISE) of them. From Table 3 and Figure 12, one can see that the proposed method gives better performance than those of other methods. Table 3: IAE and ISE errors of Example 3.3 using different control methods. Figure 11: Time responses of Example 3.3 with for ;  ms. Figure 12: Time responses of Example 3.3 using different control methods. Example 3.4. Consider a gas turbine engine with plant transfer function matrix [2426]: where . It is a 2 × 2 multivariable plant. The steady-state gain of open loop is in the form of A pre-compensating matrix is first applied to decouple the plant in low-frequency band. Then, two digital filters are used in the diagonal to filter outputs of two time series for speeding up transient responses. They are in the form of where ms is the sampling period. Figure 13 shows time responses of this controlled system for . It shows that the proposed control scheme can be applied to the multivariable feedback control system also. Figure 13: Time responses of Example 3.4 for and ms. 4. Conclusions In this literature, a new nonlinear digital controller has been proposed for analyses and designs of industry processes. They are sampled-data feedback control systems. It was applied to four simple and complicated numerical examples to get good performance and zero steady-state errors. No integrations of tracking errors are needed to get zero steady-state errors. Lead compensations are also found by another numerical time series to speed up the system responses on the on-line adjusting manner. From simulation and comparison results with other famous control methods, it can be seen that the proposed method provides another possible control scheme for sampled-data feedback control systems, and it is worthwhile to find other regulation to get better performance. References 1. K. Ogata, Discrete-Time Control System, Prentice-Hall, Englewood Cliffs, NJ, USA, 1994. 2. B. C. Kuo, Digital Control Systems, 1995. 3. C. L. Phillips and H. T. Nagle, Digital Control System Analyses and Designs, Prentice-Hall, Englewood Cliffs, NJ, USA, 1994. 4. G. F. Franklin and J. D Powelll, Feedback Control Dynamics, Addison-Wesley Publishing Company, 1986. 5. G. F. Franklin, J. D. Powell, and M. L. Workman, Digital Control of Dynamics, Ellis-Kagle Press, Half Moon Bay, Calif, USa, 2006. 6. G. S. Buja and A. Souliaev, “A variable structure controller,” IEEE Transactions on Automatic Control, vol. 33, no. 2, pp. 206–209, 1988. View at Publisher · View at Google Scholar · View at Scopus 7. S. Majhi and D. P. Atherton, “Autotuning and controller design for processes with small time delays,” IEE Proceedings D, vol. 146, no. 5, pp. 415–425, 1999. View at Publisher · View at Google Scholar · View at Scopus 8. S. Majhi, “On-line PI control of stable processes,” Journal of Process Control, vol. 15, no. 8, pp. 859–867, 2005. View at Publisher · View at Google Scholar · View at Scopus 9. J. G. Ziegler and N. B. Nichols, “Optimum settings for automatic controllers,” Transactions of ASME, vol. 65, pp. 759–768, 1942. 10. K. J. Åström and T. Hägglund, “Revisiting the Ziegler-Nichols step response method for PID control,” Journal of Process Control, vol. 14, no. 6, pp. 635–650, 2004. View at Publisher · View at Google Scholar · View at Scopus 11. K. J. Åström and C. C. Hang, “Towards intelligent PID control,” Automatica, vol. 28, pp. 1–9, 1991. 12. K. J. Åström and T. Hägglund, “Automatic tuning of simple regulators with specifications on phase and amplitude margins,” Automatica, vol. 20, no. 5, pp. 645–651, 1984. View at Publisher · View at Google Scholar · View at Zentralblatt MATH 13. K. K. Tan, T. H. Lee, and X. Jiang, “Robust on-line relay automatic tuning of PID control systems,” ISA Transactions, vol. 39, no. 2, pp. 219–232, 2000. View at Scopus 14. K. K. Tan, T. H. Lee, and X. Jiang, “On-line relay identification, assessment and tuning of PID controller,” Journal of Process Control, vol. 11, no. 5, pp. 483–496, 2001. View at Publisher · View at Google Scholar · View at Scopus 15. W. K. Ho, C. C. Hang, and L. S. Cao, “Tuning of PID controllers based on gain and phase margin specifications,” Automatica, vol. 31, no. 3, pp. 497–502, 1995. View at Publisher · View at Google Scholar · View at Zentralblatt MATH 16. C. A. Monje, Y. Q. Chen, B. M. Vinagre, D. Xue, and V. Feliu, Fractional Order Systems and Controls—Fundamentals and Applications, Springer, 2010. 17. M. Li, “Fractal time series—a tutorial review,” Mathematical Problems in Engineering, Article ID 157264, 26 pages, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH 18. H. Sheng, Y. Q. Chen, and T. S. Qiu, Fractional Processes and Fractional Order Signal Processing, Springer, 2012. 19. C. Tricaud and Y. Q. Chen, Optimal Mobile Sensing and Actuation Policies in Cyber-Physical Systems, Springer, 2012. 20. M. Li and W. Zhao, “Visiting power laws in cyber-physical networking system,” Mathematical Problems in Engineering, vol. 2012, Article ID 302786, 13 pages, 2012. View at Publisher · View at Google Scholar 21. Y. Luo, Y. Chen, H. S. Ahn, and Y. Pi, “Fractional order robust control for cogging effect compensation in PMSM position servo systems: stability analysis and experiments,” Control Engineering Practice, vol. 18, no. 9, pp. 1022–1036, 2010. View at Publisher · View at Google Scholar · View at Scopus 22. C. Tricaud and Y. Chen, “An approximate method for numerically solving fractional order optimal control problems of general form,” Computers & Mathematics with Applications, vol. 59, no. 5, pp. 1644–1655, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH 23. M. Zhuang and D. P. Atherton, “Automatic tuning of optimum PID controllers,” IEE Proceedings D, vol. 140, no. 3, pp. 216–224, 1993. View at Scopus 24. D. Q. Mayne, “The design of linear multi-variable systems,” Automatics, vol. 9, pp. 201–207, 1973. 25. D. Q. Mayne, “Sequential design of linear multivariable systems,” Proceedings of the Institution of Electrical Engineers, vol. 126, no. 6, pp. 568–572, 1979. View at Scopus 26. T. S. Tsay, “A sequential design method for multivariable feedback control systems,” WSEAS Transactions on Systems, vol. 8, no. 12, pp. 1294–1304, 2009. View at Scopus
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:36:09.000Z
oo6vq2j6zrnceuaett24d73ztg7i7yup
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24418", "uncompressed_offset": 515022932, "url": "www.isfdb.org/cgi-bin/pl.cgi", "warc_date": "2013-11-22T14:52:02.000Z", "warc_filename": "<urn:uuid:d9e97804-b6ed-41b9-83a1-81a6a9bc88b0>", "warc_url": "http://www.isfdb.org/cgi-bin/pl.cgi?214877" }
cccc_CC-MAIN-2013-20
Publication Listing You are not logged in. If you create a free account and sign in, you will be able to customize what is displayed. Cover art supplied by Amazon Verification Status Reference Status Primary Not Verified Clute/Nicholls Not Verified Clute/Grant Not Verified Contento1 (anth/coll) Not Verified Locus1 Verified by Chris J on 2010-07-15 22:34:04 Reginald1 Not Verified Reginald3 Not Verified Tuck Not Verified Miller/Contento Not Verified Bleiler1 (Gernsback) Not Verified Currey Not Verified Primary (Transient) Not Verified Bleiler78 Not Verified OCLC/Worldcat Verified by Chris J on 2010-07-15 22:34:04 Primary2 Not Verified Primary3 Not Verified Primary4 Not Verified Primary5 Not Verified Copyright (c) 1995-2011 Al von Ruff. ISFDB Engine - Version 4.00 (04/24/06)
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:36:03.000Z
j7l4r4ejm33xeui7vowfqmyf6xerhrd7
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24419", "uncompressed_offset": 515027342, "url": "www.isfdb.org/cgi-bin/title.cgi", "warc_date": "2013-11-22T14:52:02.000Z", "warc_filename": "<urn:uuid:d9e97804-b6ed-41b9-83a1-81a6a9bc88b0>", "warc_url": "http://www.isfdb.org/cgi-bin/title.cgi?156146" }
cccc_CC-MAIN-2013-20
Bibliography: Ring You are not logged in. If you create a free account and sign in, you will be able to customize what is displayed. Title: Ring Author: Koji Suzuki Year: 2003 Variant Title of: Ringu (by Koji Suzuki ) [may list more publications, awards and reviews] Type: NOVEL Series: Ring Series Number: 1 ISFDB Record Number: 156146 Note: Translated by Robert B. Rohmer & Glynne Walley from the Japanese 'Ringu' (Kadokawa Shoten 1991). User Rating: This title has fewer than 5 votes. VOTE Current Tags: None Publications: Reviews: Copyright (c) 1995-2011 Al von Ruff. ISFDB Engine - Version 4.00 (04/24/06)
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:50:09.000Z
3tx5xxw5znluk3drnget6phliiieb3n3
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24431", "uncompressed_offset": 588714772, "url": "www.nanoscalereslett.com/content/6/1/109/?fmt_view=mobile", "warc_date": "2013-11-22T14:52:02.000Z", "warc_filename": "<urn:uuid:d9e97804-b6ed-41b9-83a1-81a6a9bc88b0>", "warc_url": "http://www.nanoscalereslett.com/content/6/1/109/?fmt_view=mobile" }
cccc_CC-MAIN-2013-20
This article is part of the series Advanced Materials Nanocharacterization. Nano Review Lateral homogeneity of the electronic properties in pristine and ion-irradiated graphene probed by scanning capacitance spectroscopy Filippo Giannazzo1*, Sushant Sonde1,2, Emanuele Rimini1,3 and Vito Raineri1 Author affiliations 1 CNR-IMM, Strada VIII, 5, Zona Industriale, 95121, Catania, Italy 2 Scuola Superiore di Catania, Via San Nullo, 5/I, 95123, Catania, Italy 3 Department of Physics and Astronomy, University of Catania, Via S. Sofia, 95123, Catania, Italy For all author emails, please log on. Citation and License Nanoscale Research Letters 2011, 6:109 doi:10.1186/1556-276X-6-109 The electronic version of this article is the complete one and can be found online at: http://www.nanoscalereslett.com/content/6/1/109 Received:30 September 2010 Accepted:31 January 2011 Published:31 January 2011 © 2011 Giannazzo et al; licensee Springer. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Abstract In this article, a scanning probe method based on nanoscale capacitance measurements was used to investigate the lateral homogeneity of the electron mean free path both in pristine and ion-irradiated graphene. The local variations in the electronic transport properties were explained taking into account the scattering of electrons by charged impurities and point defects (vacancies). Electron mean free path is mainly limited by charged impurities in unirradiated graphene, whereas an important role is played by lattice vacancies after irradiation. The local density of the charged impurities and vacancies were determined for different irradiated ion fluences. Introduction Graphene, a two-dimensional (2D) sheet of carbon atoms in a honeycomb lattice, attracted the interest of the nanoelectronics scientific community for its remarkable carrier transport properties [1,2]. Ideally, in a free-standing graphene sheet without lattice defects and adsorbed impurities, charge carriers can exhibit a giant intrinsic mobility [2] and can travel for micrometers without scattering at room temperature. As a matter of fact, very high values of mobility (>2 × 105 cm2 V-1s-1) and electron mean free path have been observed only in vacuum and at low temperature (5 K) in "suspended" graphene sheets obtained by mechanical exfoliation of highly oriented pyrolytic graphite (HOPG) [3]. The mobility values measured at room temperature commonly reported in the literature range from approximately 2 to 2 × 104 cm2 V-1s-1, depending on the graphene synthesis methods [1,4], on the kind of substrate on which it is deposited [5], and on the processing conditions used to fabricate the test patterns for electrical characterization. This large variability is a clear indication that the intrinsically outstanding transport properties of graphene are severely limited by extrinsic factors, like the presence of charged impurities, lattice defects and, more generally, by lattice disorder (including local strain). Single layers of graphene (SLG) obtained by mechanical exfoliation of HOPG [1] typically exhibit a very high crystalline order, whereas a high-defect density is present both in epitaxial graphene growth by thermal decomposition of SiC [6] and in graphene obtained by chemical reduction of graphene oxide [7]. Recently, the intentional production of defects in selected areas of a graphene sheet has also been proposed as a method to locally modulate the transport properties. Several methods, like plasma treatments [8], and electron [9] or ion irradiation [10], have been used for this aim. Recently, it has been reported that graphene hydrogenation by exposure to atomic hydrogen resulted in the conversion of graphene, a zero bandgap semiconductor, to graphane, a two-dimensional insulator [11]. Among all these methods, ion irradiation allows a better control through a precise definition on the ion energy and fluence. Spectroscopic characterization methods, like micro Raman spectroscopy (μR), are the commonly used techniques to evaluate the density of defects in a graphene sheet. The characteristic D line at 1360 cm-1 in the Raman spectra is a fingerprint of defects/disorder in the crystalline lattice of graphitic materials. However, the lateral resolution of μR is limited by the laser spot size (typically in the order of 0.5-1 μm). In this article, we present a scanning probe method based on nanoscale capacitance measurements to determine locally (on 10-100 nm scale) the electron mean free path in pristine and in ion-irradiated graphene with different ion fluences. The impurity and vacancy densities on the probed area were extracted by fitting the experimental results with models of electron scattering by Coulomb impurities and lattice defects. Experimental details Graphene samples obtained by mechanical exfoliation of HOPG were deposited on a n+-Si substrate covered with 100 nm SiO2 [12]. Optical microscopy, tapping mode atomic force microscopy (AFM) and μR spectroscopy were used to identify SLG [13]. Some of the as-deposited (pristine) samples were then irradiated with C+ ions at 500 keV. Irradiations of the samples with C+ ions were carried out under high vacuum conditions (10-6 Torr) to minimize surface contaminations. At 500 keV energy, the projected range of the C+ ions is approximately 1 μm, quite deep into the n+-Si substrate. This minimizes the damage both in the 100 nm SiO2 layer and at the interface between SiO2 and n+ Si. Infact, a quality of SiO2 and SiO2/Si interface comparable to that of non-irradiated samples is crucial for the capacitance measurements discussed later. Different C+ ion fluences, ranging from 1 × 1013 to 1 × 1014 ions/cm2, were used for irradiation [14]. The lateral homogeneity of the electronic transport properties both in pristine and ion-irradiated graphene was investigated by local capacitance measurements on the graphene/SiO2/n+Si stack, using scanning capacitance spectroscopy (SCS) [12,15]. Scanning capacitance spectroscopy (SCS) was performed at room temperature using a DI3100 AFM by Veeco equipped with Nanoscope V electronics and with the scanning capacitance microscopy (SCM) head. SCS is an extension of the conventional SCM [16-19]. In SCS, the conductive AFM tip is placed on a discrete array of positions, lifting the tip by 20 nm at every interval. This "step and measure" approach eliminates the lateral (shear) force usually present when tip is scanned on a surface. Moreover, the vertical contact force can be suitably minimized to get a good electrical contact to the graphene layers while avoiding damage at the same time. A modulating bias ΔV = Vg/2(1 + sin(ωt)), with amplitude Vg in the range from -1.2 to 1.2 V and frequency ω = 100 kHz, was applied between the Si n+ backgate and the nanometric contact on graphene represented by a Pt-coated Si tip (see schematic in Figure 1). The ultra-high-sensitive (10-21 F/Hz1/2) capacitance sensor connected to the conductive AFM tip measures, through a lock-in system, the capacitance variation ΔC induced by the modulating bias. Figure 1. Schematic representation of the scanning capacitance spectroscopy setup. Results and discussion In Figure 2, capacitance-voltage curves measured on fixed positions on bare SiO2 and on graphene-coated SiO2 are reported for a sample not subjected to ion irradiation. The tip positions are indicated in the AFM image in the inset of Figure 2a. When the tip is in contact on bare SiO2, a typical capacitance-voltage curve for a metal-oxide-semiconductor (MOS) capacitor from accumulation (at negative sample bias) to depletion (at positive sample bias) is measured (see Figure 2a). The area of the MOS capacitor is represented by the tip contact area Atip, as illustrated in the insert of Figure 2c. When tip is in contact on graphene, the measured capacitance is minimum around zero bias and increases both for negative and positive bias (see Figure 2b). At Vg = 0, the Fermi level in graphene is almost coincident with the Dirac point. A positive modulating bias between the substrate and the tip locally induces a shift of the graphene quasi-Fermi energy EF in the conduction band, and, hence, an accumulation of electrons at the nanometric tip/graphene contact. On the contrary, a negative bias induces a shift of EF in the valence band, and, hence, an accumulation of holes at the tip/graphene contact. The carrier density n induced by the gate bias Vg can be expressed as n = Cox'Vg/q, where q is the electron charge, and Cox' is the oxide capacitance per unit area (Cox' = εoxε0/tox, being ε0 the vacuum permittivity, εox = 3.9 and tox are the relative permittivity and the thickness of the SiO2 film, respectively). The value of EF can be related to the applied bias as EF = ħvFkF, being kF = (πn)1/2, ħ the reduced Planck's constant, and vF = 1 × 106 m/s, the electron Fermi velocity in graphene. The induced charge n spreads over an area, Aeff, which can be thought as the tip-graphene-insulator-semiconductor capacitor effective area (as schematically illustrated in the insert of Figure 2c). The effective area Aeff can be evaluated from the ratio of the capacitance measured with the probe on graphene-coated regions (|ΔCgr|) and on bare SiO2 regions (|ΔCox|) [15], i.e., Aeff = AtipCgr|/|ΔCox|, where the tip contact area Atip can be independently determined by scanning electron microscopy (Atip = 80 nm2 in the present case). The evaluated Aeff is reported as a function of the gate bias in Figure 2c. Except for Vg = 0, Aeff increases linearly with |Vg| both for negative and positive Vg values. Figure 2. Evaluation of the effective area from local capacitance measurements. Local capacitance-voltage curves measured on fixed positions on bare SiO2 (a) and on graphene-coated SiO2 (b) for a sample not subjected to ion irradiation. AFM morphology of a graphene flake on SiO2, with indicated the probed positions by the SCS tip. (inset of a). Effective area evaluated from the C-V curves in (a) and (b). Schematic representation of Atip and Aeff (inset of c). It has been recently demonstrated that the effective area Aeff obtained by local capacitance measurements is related to the local electron mean free path l in graphene by Aeff = πl2 [20]. In Figure 3, l is reported versus the evaluated Fermi energy. It can be noted that l is almost independent of EF close to the Dirac point. The behavior close to the Dirac point is consistent with the common adopted picture of the 2DEG split in a landscape of adjacent "electron-hole puddles" [21]. Close to the Dirac point, the effect of a gate bias is limited to a redistribution of carriers between the electrons and holes puddles without significantly changing the total carrier density. Figure 3 shows also that, for |EF| > 25 meV, l increases linearly with EF both in the hole and electron branches. This linear dependence gives indication on the main scattering mechanisms limiting l in our graphene samples. Figure 3. Local electron mean free path versus the Fermi energy in a selected position on pristine graphene. Recently, expressions of the energy dependence of l have been determined for the different scattering mechanisms in the framework of a semiclassical model based on the Boltzmann transport theory [22]. The electron mean free path limited by scattering with graphene acoustic phonons (lphon) can be expressed as [22] (1) where ρ is the graphene density (ρ = 7.6 × 10-7 kg/m2) [2], DA is the acoustic deformation potential (DA = 18 eV) [2], vs is the sound velocity in graphene [2], kB is the Boltzmann constant, and T is the absolute temperature. The electron mean free path limited by Coulomb scattering with charged impurities (lci) can be expressed as [22] (2) where ε = 2.4 is the average between εox and the vacuum relative dielectric constant, Z is the net charge of the impurity (it will be assumed Z = 1), and Nci is the density of impurities. Finally, the electron mean free path for scattering by vacancies (lvac) can be expressed as [22] (3) where Nvac is the density of vacancies in graphene and R0 is the vacancy radius, that we assumed to be coincident with the C-C distance in the graphene plane (approximately 0.14 nm). The experimentally determined linear dependence of l on EF, far from the Dirac point, suggests that scattering with charged impurities and/or point defects, e.g., vacancies, can be assumed as the main mechanisms limiting electron mean free path. In this pristine graphene sample, the density of defects is negligible, as confirmed by the absence of the characteristic D peak in micro-Raman spectra. Hence, charged impurities, either adsorbed on graphene surface, or located at the interface with SiO2 substrate, can be assumed as the main scattering source liming l. The density of charged impurities in the probed position can be estimated by fitting the experimental curves in Figure 3 with Equation 2. The best fit (red line) is obtained with Nci = 49 × 1010 cm-2 both for the holes and the electron branch. In Figure 4a, l versus EF measured on an array of 5 × 5 tip positions on pristine graphene is reported. By fitting each curve of the array with Equation 2, the local density Nci for each probed position can be extracted. The histogram of the charged impurity density on the analyzed area is reported in Figure 5a. It exhibits a Gaussian distribution peaked at 〈Nci〉 = 50 × 1010 cm-2 and with FWHM of 4 × 1010 cm-2. Figure 4. Local electron mean free path versus the Fermi energy measured on array of several tip positions on pristine and irradiated graphene at different fluences. On pristine graphene (a). On irradiated graphene with 500 keV C+ ions at fluences 1 × 1013 cm-2 (b) and 1 × 1014 cm-2 (c), respectively. Figure 5. Histograms of the locally measured densities of charged impurities and vacancies in pristine and ion irradiated graphene. Charged impurities density in pristine graphene (a). Charged impurities and vacancy densities in irradiated graphene with 500 keV C+ ions at fluences 1 × 1013 cm-2 (b) and 1 × 1014 cm-2 (c), respectively. In Figure 4b,c, the measured l versus EF is reported for two arrays of tip positions on graphene samples irradiated with two different ion fluences, i.e., Φ = 1 × 1013 cm-2 and Φ = 1 × 1014 cm-2. Comparing the set of curves in Figure 4a, i.e., for pristine sample, with those on Figure 4b,c, it is evident that the lateral inhomogeneity in the l values increases with the irradiated fluence. However, it is worth noting that two groups of l-EF curves can be distinguished for irradiated samples: (i) a first group, with l values comparable to those in the pristine sample, (ii) a second group with reduced mean free path. We assumed that C irradiation causes the formation of point defects (vacancies), whereas the density of charged impurities adsorbed on the graphene surface or at the interface with the substrate remains almost unchanged. Hence, the first group of curves in Figure 4b,c can be associated to the probed positions on the graphene surface without or with a very low density of point defects, whereas the second group associated to the probed positions with point defects. For the first group of curves, l can be fitted using Equation 2. The histograms of the Nci values determined in the probed positions is reported in Figure 4b,c, red bars, for the lowest and highest doses, respectively. It is worth noting that the Nci distributions in irradiated samples are very similar to those of non-irradiated sample. For the second group of curves in Figure 4b,c, l is limited both by charged impurities and vacancies scattering, i.e., (4) For simplicity, an average value of the charged impurities density will be assumed in those positions (〈Nci〉 = 50 × 1010 cm-2), and the local vacancy density was determined from Equations 2-4 using Nvac as the fitting parameter. The distributions of the vacancy densities in the probed positions are reported in Figure 5b,c, blue bar, for the two fluences. It is worth noting, that, while in graphene irradiated with the lowest fluence Nvac is higher than 2.5 × 1010 cm-2 (i.e. more than one vacancy on the probed area at Vg = 1V) on only 16% of the probed positions, in graphene irradiated with the highest fluence Nvac > 2.5 × 1010 cm-2 on more than 75% of the probed positions. For each fluence, the weighted average of the vacancy density on the probed area can be obtained by , being Nvac,i the values of the vacancy densities in the histograms and fi the associated frequencies. The obtained 〈Nvac〉 exhibits a linear increase as a function of fluence, as reported in Figure 6. This trend can be fitted by the following relation: Figure 6. Average vacancy density as a function of the irradiated fluence. (5) where 〈Nvac,0〉 is the extrapolation of the average vacancy density at Φ = 0, σ is the cross section for direct C-C collisions, Ngr is the C density in a graphene sheet (Ngr = 4 × 1015 cm-2), and ν is the vacancy generation efficiency. By linear fitting the data in Figure 6, 〈Nvac,0〉 = (1.59 ± 0.04) × 1010 cm-2 and νσNgr = (8.55 ± 0.06) × 10-4 are obtained. For the calculated values of the C-C scattering cross section σ, ranging from 2 × 10-17 to 7 × 10-17 cm2, a very low vacancy generation efficiency (ranging approximately from 0.3 to 1.1%) is obtained for graphene irradiation with 500 keV C+ ions. It might be associated to a dynamical annealing, e.g. vacancy-interstitial recombination, during irradiation. Conclusions In summary, the authors propose an innovative method based on local capacitance measurements to probe the local changes in graphene electron mean free path, due to the presence of charged impurities or point defects, e.g., vacancies. Irradiation with 500 keV C+ ions at fluences ranging from 1 × 1013 to 1 × 1014 cm-2 was used to introduce defects in SLG deposited on a SiO2/n+Si substrate. The local charged impurity and vacancy density distributions were determined for the different irradiation fluences, and a low efficiency of vacancy generation (approximately from 0.3 to 1.1%) was demonstrated. Abbreviations 2D: two-dimensional; HOPG: highly oriented pyrolytic graphite; SCM: scanning capacitance microscopy; SCS: scanning capacitance spectroscopy; SLG: single layers of graphene. Competing interests The authors declare that they have no competing interests. Authors' contributions FG and VR conceived the study. FG coordinated the experiment, participated to the analysis of the data and wrote the article. SS carried out the sample preparation, the measurements and participated to the analysis of the data. ER worked on the evaluation of ion-graphene interaction cross sections. All the authors read and approved the manuscript. Acknowledgements The authors want to acknowledge S. Di Franco and A. Marino from CNR-IMM, Catania, for their expert assistance in sample preparation and ion irradiation experiments. This study has been supported, in part, by the European Science Foundation (ESF) under the EUROCORE program EuroGRAPHENE, within GRAPHIC-RF coordinated project. References 1. Novoselov KS, Geim AK, Morozov SV, Jiang D, Zhang Y, Dubonos SV, Grigorieva IV, Firsov AA: Electric Field Effect in Atomically Thin Carbon Films. Science 2004, 306:666-669. PubMed Abstract | Publisher Full Text 2. Chen JH, Jang C, Xiao S, Ishigami M, Fuhrer MS: Intrinsic and extrinsic performance limits of graphene devices on SiO2,. Nat Nanotechnol 2008, 3:206-209. PubMed Abstract | Publisher Full Text 3. Bolotin KI, Sikes KJ, Jiang Z, Klima M, Fudenberg G, Hone J, Kim P, Stormer HL: Ultrahigh electron mobility in suspended graphene. Solid State Commun 2008, 146:351. Publisher Full Text 4. Gomez-Navarro C, Thomas Weitz R, Bittner AM, Scolari M, Mews A, Burghard M, Kern K: Electronic Transport Properties of Individual Chemically Reduced Graphene Oxide Sheets. Nanoletters 2007, 7:3499. 5. Sonde S, Giannazzo F, Vecchio C, Yakimova R, Rimini E, Raineri V: Role of graphene/substrate interface on the local transport properties of the two-dimensional electron gas. Appl Phys Lett 2010, 97:132101. Publisher Full Text 6. Berger C, Song Z, Li X, Wu X, Brown N, Naud C, Mayou D, Li T, Hass J, Marchenkov AN, Conrad EH, First PN, de Heer WA: Electronic Confinement and Coherence in Patterned Epitaxial Graphene. Science 2006, 312:1191. PubMed Abstract | Publisher Full Text 7. Eda G, Fanchini G, Chhowalla M: Large-area ultrathin films of reduced graphene oxide as a transparent and flexible electronic material. Nat Nanotechnol 2008, 3:270. PubMed Abstract | Publisher Full Text 8. Kim K, Park HJ, Woo BC, Kim KJ, Kim GT, Yun WS: Electric property evolution of structurally defected multilayer graphene. Nano Lett 2008, 8:3092. PubMed Abstract | Publisher Full Text 9. Teweldebrhan D, Balandin AA: Modification of graphene properties due to electron-beam irradiation. Appl Phys Lett 2009, 94:013101. Publisher Full Text 10. Chen JH, Cullen WG, Jang C, Fuhrer MS, Williams ED: Defect Scattering in Graphene. Phys Rev Lett 2009, 102:236805. PubMed Abstract | Publisher Full Text 11. Elias DC, Nair RR, Mohiuddin TMG, Morozov SV, Blake P, Halsall MP, Ferrari AC, Boukhvalov DW, Katsnelson MI, Geim AK, Novoselov KS: Control of Graphene's Properties by Reversible Hydrogenation: Evidence for Graphane. Science 2009, 323:610. PubMed Abstract | Publisher Full Text 12. Sonde S, Giannazzo F, Raineri V, Rimini E: Dielectric thickness dependence of capacitive behavior in graphene deposited on silicon dioxide. J Vac Sci Technol B 2009, 27:868-873. Publisher Full Text 13. Giannazzo F, Sonde S, Raineri V, Patanè G, Compagnini G, Aliotta F, Ponterio R, Rimini E: Optical, morphological and spectroscopic characterization of graphene on SiO2. Phys Status Solidi C 2010, 7:1251. 14. Compagnini G, Giannazzo F, Sonde S, Raineri V, Rimini E: Ion irradiation and defect formation in single layer graphene. Carbon 2009, 47:3201. Publisher Full Text 15. Giannazzo F, Sonde S, Raineri V, Rimini E: Screening Length and Quantum Capacitance in Graphene by Scanning Probe Microscopy. Nano Lett 2009, 9:23. PubMed Abstract | Publisher Full Text 16. Giannazzo F, Goghero D, Raineri V, Mirabella S, Priolo F: Scanning capacitance microscopy on ultranarrow doping profiles in Si. Appl Phys Lett 2003, 83:2659-2661. Publisher Full Text 17. Giannazzo F, Raineri V, Mirabella S, Impellizzeri G, Priolo F: Drift mobility in quantum nanostructures by scanning probe microscopy. Appl Phys Lett 2006, 88:043117. Publisher Full Text 18. Ciampolini L, Giannazzo F, Ciappa M, Fichtner W, Raineri V: Simulation of scanning capacitance microscopy measurements on micro-sectioned and bevelled n+-p samples. Mater Sci Semicond Process 2001, 4:85. Publisher Full Text 19. Giannazzo F, Priolo F, Raineri V, Privitera V, Picariello A, Battaglia A, Moffat S: Two dimensional effects on ultra low energy B implants in Si. J Vac Sci Technol B 2002, 20:414-418. Publisher Full Text 20. Giannazzo F, Sonde S, Raineri V, Rimini E: Irradiation damage in graphene on SiO2 probed by local mobility measurements. Appl Phys Lett 2009, 95:263109. Publisher Full Text 21. Martin J, Akerman N, Ulbricht G, Lohamann T, Smet JH, Von Klitzing K, Yacobi A: Observation of electron-hole puddles in graphene using a scanning single-electron transistor. Nat Phys 2008, 4:144. Publisher Full Text 22. Stauber T, Peres NMR, Guinea F: Electronic transport in graphene: A semiclassical approach including midgap states. Phys Rev B 2007, 76:205423. Publisher Full Text
v0
2024-06-03T21:29:47.544Z
2013-05-18T08:09:31.000Z
zuwry6f2gf3tyacj3jbzrojjgdckn5wd
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24435", "uncompressed_offset": 608481131, "url": "www.ohloh.net/p/qooxdoo/rss_subscriptions", "warc_date": "2013-11-22T14:52:02.000Z", "warc_filename": "<urn:uuid:d9e97804-b6ed-41b9-83a1-81a6a9bc88b0>", "warc_url": "http://www.ohloh.net/p/qooxdoo/rss_subscriptions" }
cccc_CC-MAIN-2013-20
Activity Not Available × You must be logged in as a Manager to change this data. If you don't have an account, Please join. Settings : News Feeds   Analyzed 3 months ago based on code collected 3 months ago. Showing page 1 of 1 News Feed Update Status    http://feeds.feedburner.com/qooxdoo/news/content Last updated about 14 hours ago     About News Feeds Ohloh supports Atom, RSS 0.9, RSS 1.0, and RSS 2.0 feeds. Feeds are updated on a frequent, regular schedule, and feeds that have problems will not be displayed. Examples • http://sourceforge.net/export/rss2_projnews.php?group_id=12345 • http://del.icio.us/rss/tag/myproject • http://www.digg.com/rss_search?search=myproject     Copyright © 2013 Black Duck Software, Inc. and its contributors, Some Rights Reserved. Unless otherwise marked, this work is licensed under a Creative Commons Attribution 3.0 Unported License . Ohloh ® and the Ohloh logo are trademarks of Black Duck Software, Inc. in the United States and/or other jurisdictions. All other trademarks are the property of their respective holders.    
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:55:51.000Z
iuvr7fla23ytyniyykbf4clvycfkeydt
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24443", "uncompressed_offset": 612851612, "url": "www.openwetware.org/index.php?oldid=79051&title=RNA_Quality_Control", "warc_date": "2013-11-22T14:52:02.000Z", "warc_filename": "<urn:uuid:d9e97804-b6ed-41b9-83a1-81a6a9bc88b0>", "warc_url": "http://www.openwetware.org/index.php?title=RNA_Quality_Control&oldid=79051" }
cccc_CC-MAIN-2013-20
RNA Quality Control From OpenWetWare Revision as of 04:03, 13 October 2006 by Jamesh008 (Talk | contribs) Jump to: navigation, search Contents Quality control of RNA RNA Quality control This protocol will assist you in performing RNA quality control for a variet of purposes; Microarray, real-time and Northern analysis. Checking RNA/cRNA samples on a nanodrop Spec • Check concentration, A260/A280, A260/A230 on Nanodrop Spectrophotometer. • Maintain the A260/A280 ratio close to 2.0 for pure RNA (ratios between 1.9 and 2.1 are acceptable). • For Affymetrix labeling reactiosns; concentrations of cRNA are generally around 1000-1500ng/µl for a 40µl IVT reaction using 20µl of cDNA template. Checking RNA/cRNA samples on an agilent bioanalyzer Agilent BioAnalyzer Gel electrophoresis of the RNA is done to estimate the quality of the RNA. RNA Image galleries The following are examples of typical Human RNA examined on an Agilent 2100 BioAnalyser. RNA electropherograms have different profiles depending on species, tissue and starting material quality. Explanation of electropherograms. cRNA Image galleries The following are examples of typical cRNA products examined on an Agilent 2100 BioAnalyser. cRNA electropherograms have different profiles depending on species and starting material quality. Explanation of electropherograms. Checking RNA/cRNA Samples on a denaturing formaldehyde gel I still need to add a formaldhyde gel protocol, anyone else got one? Contact • mail to jamesdothadfieldatcancerdotorgdotuk • This page was created by James Hadfield on 12 October 2006. I hope you found it useful. Personal tools
v0
2024-06-03T21:29:47.544Z
2013-05-18T07:14:40.000Z
5numve5dhqk757qhroo22bvxs2tqptit
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24444", "uncompressed_offset": 612893504, "url": "www.openwetware.org/index.php?direction=prev&oldid=383002&title=User%3ARicardo_Vidal", "warc_date": "2013-11-22T14:52:02.000Z", "warc_filename": "<urn:uuid:d9e97804-b6ed-41b9-83a1-81a6a9bc88b0>", "warc_url": "http://www.openwetware.org/index.php?title=User:Ricardo_Vidal&direction=prev&oldid=383002" }
cccc_CC-MAIN-2013-20
User:Ricardo Vidal From OpenWetWare Revision as of 13:33, 26 February 2009 by Ricardo Vidal (Talk | contribs) Jump to: navigation, search Having fun in Seville, Spain Ricardo Vidal I'm a student at University of Algarve (Portugal), currently completing my Master's in Biological Engineering. I'm performing a 6 month internship at MIT/OpenWetWare. (more info) Recently completed projects The design and preparation of an industrial bioprocessing plant for production of Cephalosporin-C using Acremonium chrysogenum. Currently working on Other information OWW Poster at WikiSym 2008 Misc Interesting links Stuff Personal tools
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:26:52.000Z
tgkuhchvhcigq76nyay5qk64a74fjtvf
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24446", "uncompressed_offset": 619085770, "url": "www.panarmenian.net/eng/news/120184/", "warc_date": "2013-11-22T14:52:02.000Z", "warc_filename": "<urn:uuid:d9e97804-b6ed-41b9-83a1-81a6a9bc88b0>", "warc_url": "http://www.panarmenian.net/eng/news/120184/" }
cccc_CC-MAIN-2013-20
Egypt formally requests $4.8bln loan from IMF PanARMENIAN.Net - Egypt has formally requested a $4.8 billion loan from the International Monetary Fund, a spokesman for its president said on Wednesday, Aug 22, during a visit to Cairo by IMF chief Christine Lagarde to discuss support for the country's ailing economy, according to Reuters. Egypt's finance minister said last week Cairo would discuss the possibility of the bigger-than-expected loan from the fund. Egypt's previous government had requested a $3.2 billion package but the deal was not finalized. Lagarde's presence was requested by Egypt and could signal a fresh determination on both sides to seal a long-awaited accord after President Mohamed Mursi, who took office on June 30, appointed his first government last month. "We have officially requested a $4.8 billion loan from the IMF and talks are currently going on inside about the request," spokesman Yasser Ali told Reuters as Lagarde held discussions with Mursi. He said any details would be announced later. An IMF official also confirmed the request had been made. During 18 months of political turmoil since the overthrow of autocratic leader Hosni Mubarak, successive Egyptian governments negotiated with the IMF to secure emergency funding. No deal has been reached and Egypt's fiscal and balance of payment problems have worsened. An exodus of foreign investors in the wake of the turmoil left local banks shouldering much of the short-term and other lending to the state. The government has also borrowed directly from the central bank. Foreign reserves have fallen to well under half levels seen before last year's popular uprising against Mubarak and investors' reluctance to return is born partly of fears that a sharp currency devaluation could wipe out any returns. An IMF deal would help Egypt add credibility to economic reforms needed to restore investor confidence. Partner news  Top stories IFC invested $244 million in 40 projects across a range of sectors, including financial markets, manufacturing, and mining. Armenian Prime Minister addressed a letter to Public Services Regulatory Commission over the reconsideration of gas prices. Armenia’s Public Services Regulatory Commission plans to reconsider electricity generation and distribution prices. Edmon Manukyan been addressed by the residents of Armavir and Aragatsotn provinces whose crops have been damaged over a strong hail. Partner news
v0
2024-06-03T21:29:47.544Z
2013-05-18T07:21:37.000Z
iohnidpagciybvjk6d6d75u57lyn3m5r
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24448", "uncompressed_offset": 625112179, "url": "www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A1999.01.0201%3Abook%3D7%3Achapter%3D3%3Asection%3D31", "warc_date": "2013-11-22T14:52:02.000Z", "warc_filename": "<urn:uuid:d9e97804-b6ed-41b9-83a1-81a6a9bc88b0>", "warc_url": "http://www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A1999.01.0201%3Abook%3D7%3Achapter%3D3%3Asection%3D31" }
cccc_CC-MAIN-2013-20
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License. An XML version of this text is available for download, with the additional restriction that you offer Perseus any modifications you make. Perseus provides credit for all accepted changes, storing new additions in a versioning system. load focus English (Carleton L. Brownson, 1922) hide References (4 total) load Vocabulary Tool hideData/Identifiers Citation URN: urn:cts:greekLit:tlg0032.tlg006.perseus-grc1:7.3.31 Document URN: urn:cts:greekLit:tlg0032.tlg006.perseus-grc1 hide Display Preferences Greek Display: Arabic Display: View by Default: Browse Bar:
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:29:34.000Z
sgnwfm4hmzyjnsx4cdgmhtcmpfhcqdz7
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24449", "uncompressed_offset": 625153866, "url": "www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A1999.04.0060%3Aentry%3Ddesignatus", "warc_date": "2013-11-22T14:52:02.000Z", "warc_filename": "<urn:uuid:d9e97804-b6ed-41b9-83a1-81a6a9bc88b0>", "warc_url": "http://www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A1999.04.0060%3Aentry%3Ddesignatus" }
cccc_CC-MAIN-2013-20
dēsīgnātus P. of designo. This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License. An XML version of this text is available for download, with the additional restriction that you offer Perseus any modifications you make. Perseus provides credit for all accepted changes, storing new additions in a versioning system. hide Dictionary Entry Lookup Use this tool to search for dictionary entries in all lexica. Search for in hide Display Preferences Greek Display: Arabic Display: View by Default: Browse Bar:
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:00:00.000Z
eefnyx5w2qwbarcxz3mguwan2vmey7oy
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24450", "uncompressed_offset": 625163499, "url": "www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A2001.05.0171%3Achapter%3D21%3Apage%3D211", "warc_date": "2013-11-22T14:52:02.000Z", "warc_filename": "<urn:uuid:d9e97804-b6ed-41b9-83a1-81a6a9bc88b0>", "warc_url": "http://www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A2001.05.0171%3Achapter%3D21%3Apage%3D211" }
cccc_CC-MAIN-2013-20
“ [211] fellows hunted them out. Afterwards a lot of us fellows charged over the field to the road, and fired into the running Rebs, and also into some wagons which were passing. We also twisted off the telegraph wires with our bayonets, continuing our firing at everything in sight. The Johnnies made it too hot for us in the road, as there were but a few of us, and so we went back to the house where a good many of our men had gathered and from which we were directed to move to the right along the enemy's lines. This we did for a long distance without much opposition, until we came to a fort, which commanded and enfiladed the line on which we were advancing. Our advance was checked until a division of the 24th Corps came up from the direction we had come, and word was passed along for the 2d Brigade men to move back and assemble, which we did. Getting back to Fort Fisher we found the balance of the regiment and the brigade. Some of the regiment had gone to the left when they got into the works. The friendly darkness had destroyed the Rebels' aim, and by reason of it many a man's life had been spared, but we had lost enough. Anse Ryder had been hit in the leg near the thigh, Robinson had lost one arm, Frank Lowe had been hit, and a number of others, I do not now recall. We had taken a lot of Johnnies prisoners, had killed and wounded some, and taken their guns; but we did not stop to bother with them — just told them to get to the rear and hunt up the provost marshal, which they were apparently very glad to do, and without escort at that. We dumped the brass guns over the fort and ran them towards our line to guard against accident. The wounded were carried back to the hospital near the observatory where we found Anse Ryder. Doctor Slocum said it would kill him to amputate his leg, and that he would ” This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License. An XML version of this text is available for download, with the additional restriction that you offer Perseus any modifications you make. Perseus provides credit for all accepted changes, storing new additions in a versioning system. hide Places (automatically extracted) View a map of the most frequently mentioned places in this document. hide People (automatically extracted) Sort people alphabetically, as they appear on the page, by frequency Click on a person to search for him/her in this document. Anse Ryder (2) H. W. Slocum (1) Robinson (1) Frank Lowe (1) hide Display Preferences Greek Display: Arabic Display: View by Default: Browse Bar:
v0
2024-06-03T21:29:47.544Z
2013-05-18T02:37:25.000Z
mxksv67w2bgjhl33z6fceag4wokwdmja
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24451", "uncompressed_offset": 625175508, "url": "www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A2001.05.0256%3Achapter%3D6%3Apage%3D124", "warc_date": "2013-11-22T14:52:02.000Z", "warc_filename": "<urn:uuid:d9e97804-b6ed-41b9-83a1-81a6a9bc88b0>", "warc_url": "http://www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A2001.05.0256%3Achapter%3D6%3Apage%3D124" }
cccc_CC-MAIN-2013-20
[124] reinforced that day with about 300 men and had several pieces of artillery in position on the fort. It was apparent that it would be futile to attack this strong post without artillery; but the same informant reported there was to be a large assembly of the people that night for a dance, from St. Augustine and Jacksonville, and that about 12 miles off, on the road to the house of entertainment, was a station where several soldiers and horses were kept. Sending down his line to arouse the men, who, after long and toilsome marches, would often fall asleep as soon as a halt was ordered, Dickison moved on rapidly to reach if possible each place before daylight. Arriving at the station, they captured the 12 Federal cavalry with as many horses, and then pressed on to the banquet hall. Placing a detachment on the road leading to Jacksonville and one on the road to St. Augustine, just at the dawn of day Captain Dickison moved up in the rear. As he drew near the house he saw two officers, a major with his adjutant, riding off. He dashed up to them and demanded a surrender. These officers belonged to the garrison at Picolata. At the house, several soldiers, with 1 captain and 1 lieutenant, were captured. The detachment by the roadside captured the band of musicians, composed of 12 young soldiers, in a fine four-horse ambulance, on their way to St. Augustine. They were ordered to halt, our boys saying, ‘We want that carriage to take a ride.’ At these places were captured about 40 men, including 4 officers, also 18 horses and 1 ambulance. Dickison now learned that Colonel Wilcoxson, with the Seventeenth Connecticut and ten large six-mule wagons, had gone up the road in the direction of Volusia county. Dividing his command he took 52 men with one lieutenant to follow in pursuit of Colonel Wilcoxson, leaving the remainder under Lieutenants Haile, Haynes and McCardell with the guard in charge of the prisoners, with orders to move on by the way of Haw's creek and This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License. An XML version of this text is available for download, with the additional restriction that you offer Perseus any modifications you make. Perseus provides credit for all accepted changes, storing new additions in a versioning system. hide Places (automatically extracted) View a map of the most frequently mentioned places in this document. Sort places alphabetically, as they appear on the page, by frequency Click on a place to search for it in this document. Jacksonville (Florida, United States) (2) Volusia (Florida, United States) (1) Picolata (Florida, United States) (1) hide People (automatically extracted) Sort people alphabetically, as they appear on the page, by frequency Click on a person to search for him/her in this document. Jackson Captain Dickison (3) Wilcoxson (2) W. H. McCardell (1) Haynes (1) Haw (1) Haile (1) hide Display Preferences Greek Display: Arabic Display: View by Default: Browse Bar:
v0
2024-06-03T21:29:47.544Z
2013-05-17T23:56:45.000Z
3zy7k4tdlnp6nb7ordbmbhwjf7herep7
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24452", "uncompressed_offset": 625215306, "url": "www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A1999.04.0060%3Aentry%3Ddimidius&toc=Perseus%3Atext%3A1999.04.0060%3Aalphabetic+letter%3DD%3Aentry+group%3D13", "warc_date": "2013-11-22T14:52:02.000Z", "warc_filename": "<urn:uuid:d9e97804-b6ed-41b9-83a1-81a6a9bc88b0>", "warc_url": "http://www.perseus.tufts.edu/hopper/text?doc=Perseus:text:1999.04.0060:entry=dimidius&toc=Perseus%3Atext%3A1999.04.0060%3Aalphabetic+letter%3DD%3Aentry+group%3D13" }
cccc_CC-MAIN-2013-20
dīmidius adj. dis- + medius, half, one half : pro dimidiā parte: rex dimidiae partis Eburonum, Cs.—Fig., of descent: dimidius patrum, dimidius plebis, half patrician and half plebeian , L.Broken in two, broken : crus, Iu.: voltūs, mutilated , Iu. This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License. An XML version of this text is available for download, with the additional restriction that you offer Perseus any modifications you make. Perseus provides credit for all accepted changes, storing new additions in a versioning system. hide Dictionary Entry Lookup Use this tool to search for dictionary entries in all lexica. Search for in hide Display Preferences Greek Display: Arabic Display: View by Default: Browse Bar:
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:28:21.000Z
vbbeh3m2wv4dy7w7hyknc7olxgq54kot
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24453", "uncompressed_offset": 625234043, "url": "www.perseus.tufts.edu/hopper/text?doc=urn%3Acts%3AgreekLit%3Atlg0527.tlg002.perseus-eng1%3A2.7", "warc_date": "2013-11-22T14:52:02.000Z", "warc_filename": "<urn:uuid:d9e97804-b6ed-41b9-83a1-81a6a9bc88b0>", "warc_url": "http://www.perseus.tufts.edu/hopper/text?doc=urn:cts:greekLit:tlg0527.tlg002.perseus-eng1:2.7" }
cccc_CC-MAIN-2013-20
[7] Then his sister said to Pharaoh's daughter, "Should I go and call a nurse for you from the Hebrew women, that she may nurse the child for you?" This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License. An XML version of this text is available for download, with the additional restriction that you offer Perseus any modifications you make. Perseus provides credit for all accepted changes, storing new additions in a versioning system. load focus Latin (Saint Jerome, Bible Foundation and On-Line Book Initiative) hide Places (automatically extracted) View a map of the most frequently mentioned places in this document. Visualize the most frequently mentioned Pleiades ancient places in this text. Download Pleiades ancient places geospacial dataset for this text. hide References (1 total) • Cross-references in general dictionaries to this page (1): hideData/Identifiers Citation URN: urn:cts:greekLit:tlg0527.tlg002.perseus-eng1:2.7 Document URN: urn:cts:greekLit:tlg0527.tlg002.perseus-eng1 hide Display Preferences Greek Display: Arabic Display: View by Default: Browse Bar:
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:44:54.000Z
szglznchlkxdriuoszuwvbokomdp773m
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24459", "uncompressed_offset": 671530114, "url": "www.seroundtable.com/archives/003990.html", "warc_date": "2013-11-22T14:52:02.000Z", "warc_filename": "<urn:uuid:d9e97804-b6ed-41b9-83a1-81a6a9bc88b0>", "warc_url": "http://www.seroundtable.com/archives/003990.html" }
cccc_CC-MAIN-2013-20
More Detailed Statistics within Google Sitemaps Jun 22, 2006 • 7:36 am | (0) by | Filed Under Google Search Engine Optimization   The Inside Google Sitemaps blog announced new features for Google's Sitemaps free service. The additions include; 1. Full list of crawl errors (not just 10 anymore) 2. Now, you can view data for individual properties and countries as well. For instance, you can see the search queries from users searching Google Images in Germany that returned your site in the results. You’ll only see properties and countries for which your site has data. 3. Stats also now available for subfolders 4. 75 common words displayed, 20 is what was displayed in the past. 5. Sitemaps submission increased from 200 to 500 sitemaps 6. Robots.txt test tool added Adsbot-Google to the list 7. Rate this tool addition, to show Google that you like the tools or not. Forum discussion at Search Engine Watch Forums. Previous story: Google Testing AdSense Cost Per Action (CPA)   blog comments powered by Disqus
v0
2024-06-03T21:29:47.544Z
2013-05-18T07:14:40.000Z
rnlyjsgjypmgqdsrlzki26ah6uu4zxuu
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24461", "uncompressed_offset": 671547594, "url": "www.seroundtable.com/recap-04-29-2011-13339.html", "warc_date": "2013-11-22T14:52:02.000Z", "warc_filename": "<urn:uuid:d9e97804-b6ed-41b9-83a1-81a6a9bc88b0>", "warc_url": "http://www.seroundtable.com/recap-04-29-2011-13339.html" }
cccc_CC-MAIN-2013-20
Daily Search Forum Recap: April 29, 2011 Apr 29, 2011 • 4:00 pm | (0) by | Filed Under Search Forum Recap   Here is a recap of what happened in the search forums today, through the eyes of the Search Engine Roundtable and other search forums on the web. Search Engine Roundtable Stories: • Video Recap of Weekly Search Buzz :: April 29, 2011 This week on the Search Engine Roundtable... • Video From 1999 Of Google's TGIF Staff Meetings Here is a video from a month before Google hired Matt Cutts. It is a video of what Google called "TGIF." They were Google's weekly all-staff meeting. It was used to introduce new hires, birthday wishes, and discuss Google's growth, plans, projects and so on. • The Royal Wedding Search Engine Logos For those of you who do not live under a rock, today is the Royal Wedding. Prince William and Catherine (Kate) Middleton are getting married as I write this. In fact... • Google Finally Downplays PageRank In New Google Toolbar A couple weeks ago, Google announced the release of a new Google Toolbar. It appears that with this release it is harder to see the PageRank indicator and even make it part of the standard bar options. • June 1st The Google Base API Is Shutting Down This is just a reminder to those who are still utilizing the Google Base API. In about a month, June 1, 2011, the Google Base API will be shut down. We warned you about this in December, with our post named Google Sunsetting Base API For Two Shopping APIs... • The Royal Wedding Google Pegmen Google Maps has a special pegman for the royal wedding. The pegman is a bride and a groom, aka Prince William of Wales and Catherine (Kate) Middleton, as the pegman. Pretty cool! Other Great Search Forum Threads: Previous story: Video Recap of Weekly Search Buzz :: April 29, 2011   blog comments powered by Disqus
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:30:10.000Z
2g7hr5nrha6lqanyqkd7u733h3rii57h
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24470", "uncompressed_offset": 773904252, "url": "www.werelate.org/wiki/Place:Watsontown,_Northumberland,_Pennsylvania,_United_States", "warc_date": "2013-11-22T14:52:02.000Z", "warc_filename": "<urn:uuid:d9e97804-b6ed-41b9-83a1-81a6a9bc88b0>", "warc_url": "http://www.werelate.org/wiki/Place:Watsontown,_Northumberland,_Pennsylvania,_United_States" }
cccc_CC-MAIN-2013-20
Place:Watsontown, Northumberland, Pennsylvania, United States Watchers NameWatsontown TypeBorough Coordinates41.085°N 76.863°W Located inNorthumberland, Pennsylvania, United States source: Getty Thesaurus of Geographic Names source: Family History Library Catalog the text in this section is copied from an article in Wikipedia Watsontown is a borough in Northumberland County, Pennsylvania, United States. The population was 2,254 at the 2000 census. It was named for John Watson, a local brothel and landowner. Research Tips This page uses content from the English Wikipedia. The original content was at Watsontown, Pennsylvania. The list of authors can be seen in the page history. As with WeRelate, the content of Wikipedia is available under the Creative Commons Attribution/Share-Alike License.
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:44:11.000Z
nfntnrp2mjissrx2s4ozfwvh4oqit55j
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24477", "uncompressed_offset": 4433401, "url": "advocacy.globalvoicesonline.org/categories/regions-countries/saudi-arabia/", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://advocacy.globalvoicesonline.org/categories/regions-countries/saudi-arabia/" }
cccc_CC-MAIN-2013-20
Saudi Arabia Category archive · 23 posts RSS feed for Saudi Arabia Latest stories about Saudi Arabia 2 April 2013 Saudi Netizens Criticize New Internet Monitoring Scheme Saudi government plans to impose surveillance measures on encrypted online communications, such as Skype, WhatsApp, and Viber have triggered sharp criticism from Saudi Internet users. If the companies behind these programs refuse to comply with the measure, authorities say they will be blocked. 1 April 2013 Saudi Arabia Threatens to Block Skype and WhatsApp Saudi Arabia is threatening to block a number of popular communication tools, such as Skype and mobile messaging service WhatsApp, unless the operating companies agree to infringe on the privacy of users and monitor them. 26 January 2013 Video Advocacy Races Forward: 2012’s Dangers & 2013’s Solutions Video is increasingly at the nexus of opportunity and danger for human rights activists. Video helps activists to document, confront, circumvent, and lobby against oppressive authorities—but it also allows those authorities to stalk them. Here's what we think will happen in 2013. 9 December 2012 Saudi Activist: “Public Trial Reveals Their Mentality and Lack of Evidence” The eighth hearing session of one of Saudi Arabia's first public trials of two prominent human rights activists Mohammad Al-Qahtani and Abdullah Al-Hamid was held today at the Riyadh Criminal Court 1 December 2012 Saudi Activist: “This is an inquisition, prosecuting us for our opinions” The seventh hearing session of the ongoing trial of the two prominent human rights activists Mohammad Al-Qahtani and Abdullah Al-Hamid was held today morning at Riyadh Criminal Court. In the last hearing session, the defendants responded to the charges, and today, the public prosecutor provided more ‘clarifications.' 9 January 2012 2011: A Year of Triumphs and Struggle for Bloggers in the Middle East and North Africa With all of the social media successes throughout the Middle East and North Africa in 2011, it would be all too easy to overlook the struggles faced by bloggers and netizens throughout the region. But with 126 netizens imprisoned, it would be a travesty. 24 February 2011 Saudi women demand their rights, on Twitter It is season for change in the Middle East and Arab world and Saudi women don't want to be left behind. They are now taking their demand for equality online-at...
v0
2024-06-03T21:29:47.544Z
2013-05-18T07:22:27.000Z
mjlfy47g6gvh6l26abw44qgtghmgkfh2
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24507", "uncompressed_offset": 43007360, "url": "ccsenet.org/journal/index.php/ijef/article/view/12704/0", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://ccsenet.org/journal/index.php/ijef/article/view/12704/0" }
cccc_CC-MAIN-2013-20
The Role of Macroeconomic Variables on Stock Market Index in China and India Seyed Mehdi Hosseini, Zamri Ahmad, Yew Wah Lai Abstract This paper investigates the relationships between stock market indices and four macroeconomics variables, namely crude oil price (COP), money supply (M2), industrial production (IP) and inflation rate (IR) in China and India. The period covers in this study is between January 1999 to January 2009. Using the Augmented Dickey-Fuller unit root test, the underlying series are tested as non-stationary at the level but stationary in first difference. The use of Johansen-Juselius (1990) Multivariate Cointegration and Vector Error Correction Model technique, indicate that there are both long and short run linkages between macroeconomic variable and stock market index in each of these two countries. Full Text: PDF This work is licensed under a Creative Commons Attribution 3.0 License. International Journal of Economics and Finance  ISSN  1916-971X (Print) ISSN  1916-9728 (Online) Copyright © Canadian Center of Science and Education To make sure that you can receive messages from us, please add the 'ccsenet.org' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:59:14.000Z
fqvid5iggvmtyd4h3k2qphrjw54pvjsn
{ "content_type": "application/xhtml+xml", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24514", "uncompressed_offset": 51309463, "url": "cnx.org/content/m17709/1.2/content_info", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://cnx.org/content/m17709/1.2/content_info" }
cccc_CC-MAIN-2013-20
Connexions Sections You are here: Home » Content » A.D. 201 to 300 About: A.D. 201 to 300 Module by: Jack E. Maxfield. E-mail the author View the content: A.D. 201 to 300 Metadata Name: A.D. 201 to 300 ID: m17709 Language: English (en) Keywords: History, Maxfield, World Document Type: -//CNX//DTD CNXML 0.5 plus MathML//EN License: Creative Commons Attribution License CC-BY 2.0 Authors: Jack E. Maxfield (maxfield1@verizon.net) Copyright Holders: Jack E. Maxfield (maxfield1@verizon.net) Maintainers: Connexions (cnx@cnx.org), Robert Maxfield (maxfield1@verizon.net) Latest version: 1.2 (history) First publication date: Oct 11, 2008 9:21 am -0500 Last revision to module: Oct 14, 2008 5:38 pm -0500 Downloads PDF: m17709_1.2.pdf PDF file, for viewing content offline and printing. Learn more. EPUB: m17709_1.2.epub Electronic publication file, for viewing in handheld devices. Learn more. XML: m17709_1.2.cnxml XML that defines the structure and contents of the module, minus any included media files. Can be reimported in the editing interface. Learn more. Source Export ZIP: m17709_1.2.zip ZIP containing the module XML plus any included media files. Can be reimported in the editing interface. Learn more. Version History Version: 1.2 Oct 14, 2008 5:38 pm -0500 by James Cooper Changes: Full content of World History, imported from sandbox. Module ids changed to be those on the main system. Version: 1.1 Oct 13, 2008 10:03 am -0500 by James Cooper Changes: Initial publish of World History content from sandbox; content upcoming. How to Reuse and Attribute This Content If you derive a copy of this content using a Connexions account and publish your version, proper attribution of the original work will be automatically done for you. If you reuse this work elsewhere, in order to comply with the attribution requirements of the license (CC-BY 2.0), you must include • the authors' names: Jack Maxfield • the title of the work: A.D. 201 to 300 • the Connexions URL where the work can be found: http://cnx.org/content/m17709/1.2/ See the citation section below for examples you can copy. How to Cite and Attribute This Content The following citation styles comply with the attribution requirements for the license (CC-BY 2.0) of this work: American Chemical Society (ACS) Style Guide: Maxfield, J. A.D. 201 to 300, Connexions Web site. http://cnx.org/content/m17709/1.2/, Oct 14, 2008. American Medical Assocation (AMA) Manual of Style: Maxfield J. A.D. 201 to 300 [Connexions Web site]. October 14, 2008. Available at: http://cnx.org/content/m17709/1.2/. American Psychological Assocation (APA) Publication Manual: Maxfield, J. (2008, October 14). A.D. 201 to 300. Retrieved from the Connexions Web site: http://cnx.org/content/m17709/1.2/ Chicago Manual of Style (Bibliography): Maxfield, Jack. "A.D. 201 to 300." Connexions. October 14, 2008. http://cnx.org/content/m17709/1.2/. Chicago Manual of Style (Note): Jack Maxfield, "A.D. 201 to 300," Connexions, October 14, 2008, http://cnx.org/content/m17709/1.2/. Chicago Manual of Style (Reference, in Author-Date style): Maxfield, J. 2008. A.D. 201 to 300. Connexions, October 14, 2008. http://cnx.org/content/m17709/1.2/. Modern Languages Association (MLA) Style Manual: Maxfield, Jack. A.D. 201 to 300. Connexions. 14 Oct. 2008 <http://cnx.org/content/m17709/1.2/>.
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:33:38.000Z
rpb3pfbpp4b52b7eun5i4xndginv3u2l
{ "content_type": "application/xhtml+xml", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24515", "uncompressed_offset": 51315370, "url": "cnx.org/content/m42231/latest/content_info", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://cnx.org/content/m42231/latest/content_info" }
cccc_CC-MAIN-2013-20
Connexions Sections You are here: Home » Content » Introduction to Thermodynamics About: Introduction to Thermodynamics Module by: OpenStax College. E-mail the author View the content: Introduction to Thermodynamics Metadata Name: Introduction to Thermodynamics ID: m42231 Language: English (en) Keywords: Adiabatic, Carnot cycle, Carnot efficiency, Carnot engine, Change in internal energy, Closed system, Coefficient of performance, Conservation of energy, Cyclical process, Disorder, Dissipative processes, Efficiency, Energy efficiency rating, Entropy, First law of thermodynamics, Four-stroke engine, Heat death, Heat engine, Heat pump, Heat transfer, Ideal engine, Internal combustion engine, Internal energy, Irreversible process, Isobaric, Isochoric, Isothermal, Macrostate, Metabolism, Microstate, Otto cycle, PV diagram, Reversible process, Second law of thermodynamics, Statistical analysis, Thermodynamic process, Work License: Creative Commons Attribution License CC-BY 3.0 Authors: OpenStax College (info@openstaxcollege.org) Copyright Holders: Rice University (daniel@openstaxcollege.org) Maintainers: OpenStax College (info@openstaxcollege.org), OSC Physics Maintainer (info@openstaxcollege.org) Latest version: 1.3 (history) First publication date: Dec 29, 2011 1:37 pm -0600 Last revision to module: Jun 6, 2012 1:24 pm -0500 Downloads PDF: m42231_1.3.pdf PDF file, for viewing content offline and printing. Learn more. EPUB: m42231_1.3.epub Electronic publication file, for viewing in handheld devices. Learn more. XML: m42231_1.3.cnxml XML that defines the structure and contents of the module, minus any included media files. Can be reimported in the editing interface. Learn more. Source Export ZIP: m42231_1.3.zip ZIP containing the module XML plus any included media files. Can be reimported in the editing interface. Learn more. Version History Version: 1.3 Jun 6, 2012 1:24 pm -0500 by OSC Physics Maintainer Changes: consistency, LO, image cropping Version: 1.2 May 11, 2012 10:25 am -0500 by OSC Physics Maintainer Changes: initial content publication Version: 1.1 Dec 29, 2011 1:38 pm -0600 by OSC Physics Maintainer Changes: Created module How to Reuse and Attribute This Content If you derive a copy of this content using a Connexions account and publish your version, proper attribution of the original work will be automatically done for you. If you reuse this work elsewhere, in order to comply with the attribution requirements of the license (CC-BY 3.0), you must include • the authors' names: OpenStax College • the title of the work: Introduction to Thermodynamics • the Connexions URL where the work can be found: http://cnx.org/content/m42231/1.3/ See the citation section below for examples you can copy. How to Cite and Attribute This Content The following citation styles comply with the attribution requirements for the license (CC-BY 3.0) of this work: American Chemical Society (ACS) Style Guide: OpenStax College. Introduction to Thermodynamics, Connexions Web site. http://cnx.org/content/m42231/1.3/, Jun 6, 2012. American Medical Assocation (AMA) Manual of Style: OpenStax College. Introduction to Thermodynamics [Connexions Web site]. June 6, 2012. Available at: http://cnx.org/content/m42231/1.3/. American Psychological Assocation (APA) Publication Manual: OpenStax College. (2012, June 6). Introduction to Thermodynamics. Retrieved from the Connexions Web site: http://cnx.org/content/m42231/1.3/ Chicago Manual of Style (Bibliography): OpenStax College. "Introduction to Thermodynamics." Connexions. June 6, 2012. http://cnx.org/content/m42231/1.3/. Chicago Manual of Style (Note): OpenStax College, "Introduction to Thermodynamics," Connexions, June 6, 2012, http://cnx.org/content/m42231/1.3/. Chicago Manual of Style (Reference, in Author-Date style): OpenStax College. 2012. Introduction to Thermodynamics. Connexions, June 6, 2012. http://cnx.org/content/m42231/1.3/. Modern Languages Association (MLA) Style Manual: OpenStax College. Introduction to Thermodynamics. Connexions. 6 June 2012 <http://cnx.org/content/m42231/1.3/>.
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:56:31.000Z
b24bbsy7uop4kccqra6bfr55wfshovlg
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24532", "uncompressed_offset": 79530568, "url": "dungeons.wikia.com/wiki/SRD:Psychokinetic_Burst?oldid=9409", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://dungeons.wikia.com/wiki/SRD:Psychokinetic_Burst?oldid=9409" }
cccc_CC-MAIN-2013-20
Wikia SRD:Psychokinetic Burst Talk0 9,503pages on this wiki Revision as of 06:38, August 11, 2009 by Surgo (Talk | contribs) (diff) ← Older revision | Latest revision (diff) | Newer revision → (diff) This material is published under the OGL Psychokinetic Burst: This weapon functions as a psychokinetic weapon that also releases a blast of destructive psionic energy upon scoring a successful critical hit. In addition to the extra damage of the psychokinetic ability (see above), a psychokinetic burst weapon deals an extra 1d6 points of damage on a successful critical hit. If the weapon’s critical multiplier is x3, add 2d6 points of extra damage instead, and if the multiplier is x4, add 3d6 points of extra damage. This extra damage is ectoplasmic in nature and is not affected by damage reduction. Bows, crossbows, and slings bestow this ability upon their ammunition. Strong psychokinesis; ML 12th; Craft Psionic Arms and Armor, concussion blast; Price +2 bonus. Back to Main PageSystem Reference DocumentPsionic Items Advertisement | Your ad here Photos Add a Photo 1,231photos on this wiki See all photos > Recent Wiki Activity See more > Around Wikia's network Random Wiki
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:50:44.000Z
iqh25lxr3uvb2x2dz3dccbrkjmrug4rr
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24544", "uncompressed_offset": 92393076, "url": "familysearch.org/learn/wiki/en/Nield", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://familysearch.org/learn/wiki/en/Nield's_Independent_Battery,_Delaware_Light_Artillery" }
cccc_CC-MAIN-2013-20
Nield's Independent Battery, Delaware Light Artillery (Union)Edit This Page From FamilySearch Wiki United States     U.S. Military     Delaware     Delaware Military     Delaware in the Civil War     Nield's Independent Battery, Delaware Light Artillery (Union) Contents Brief History This regiment was organized at Wilmington, Delaware, August 30, 1862. It mustered out June 23, and discharged from service July 5, 1865. [1] Also known as 1st Delaware Light Artillery.[2] Companies in this Regiment with the Counties of Origin Men often enlisted in a company recruited in the counties where they lived though not always. After many battles, companies might be combined because so many men were killed or wounded. However if you are unsure which company your ancestor was in, try the company recruited in his county first. Nield's Independent Battery - many man from New Castle County. 2 rosters: Roster (more information) Roster (a little less information). The Civil War Soldiers and Sailors database lists 292 men on its roster for this unit. Roster. This unit is listed under 'UDENIELYAL'. Other Sources • Beginning United States Civil War Research gives steps for finding information about a Civil War soldier. It covers the major records that should be used. Additional records are described in ‘Delaware in the Civil War’ and ‘United States Civil War, 1861 to 1865’ (see below). • National Park Service, The Civil War Soldiers and Sailors System, is searchable by soldier's name and state. It contains basic facts about soldiers on both sides of the Civil War, a list of regiments, descriptions of significant battles, sources of the information, and suggestions for where to find additional information. • Delaware in the Civil War describes many Confederate and Union sources, specifically for Delaware, and how to find them.. These include compiled service records, pension records, rosters, cemetery records, Internet databases, published books, etc. • United States Civil War, 1861 to 1865 describes and explains United States and Confederate States records, rather than state records, and how to find them. These include veterans’ censuses, compiled service records, pension records, rosters, cemetery records, Internet databases, published books, etc. References 1. National Park Service, The Civil War Soldiers and Sailors System, (accessed 20 December 2010). 2. Delaware Public Archives, Volunteers Service Records, 1861-1864,Roster of Light Artillery, Delaware Volunteers, (accessed 27 March 2012).   Need additional research help? Contact our research help specialists. Need wiki, indexing, or website help? Contact our product teams. Did you find this article helpful? You're invited to explain your rating on the discussion page (you must be signed in). • This page was last modified on 1 March 2013, at 21:12. • This page has been accessed 369 times.
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:55:53.000Z
2datwp66wjbymf6w2xjmgndu3wrdiqow
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24545", "uncompressed_offset": 92449140, "url": "familysearch.org/learn/wiki/en/index.php?oldid=985122&title=Monroe_County%2C_West_Virginia", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://familysearch.org/learn/wiki/en/index.php?title=Monroe_County,_West_Virginia&oldid=985122" }
cccc_CC-MAIN-2013-20
Monroe County, West VirginiaEdit This Page From FamilySearch Wiki Revision as of 00:21, 5 May 2012 by Murphynw (Talk | contribs) Monroe County, West Virginia Map Location in the state of West Virginia Location of West Virginia in the U.S. Facts Founded 1799 County Seat Union Courthouse United States    West Virginia    Monroe County Contents County Courthouse Monroe County Main Street Union, WV 24983 304-772-3096 • County Clerk has birth and death records from 1853 • Marriage and land records from 1799 and probate Records[1] History Monroe County, West Virginia Parent County 1799--Monroe County was created 14 January 1799 from Greenbrier County. County seat: Union [1] Boundary Changes See an interactive map of Monroe County boundary changes. Record Loss Places / Localities Populated Places Neighboring Counties Resources Research Guides • "A Guide to the Counties of Virginia: Monroe County," The Virginia Genealogist, Vol. 18, No. 4 (Oct.-Dec. 1974):295-298. Available at FHL; digital version at New England Ancestors ($). Cemeteries Monroe County, West VirginiaCemetery Records Find a Grave Monroe County, West Virginia Tombstone Transcription Monroe county, West Virginia Political Graveyard.com - Monroe County, West Virginia Census For tips on accessing Monroe County, West Virginia census records online, see: West Virginia Census. 1830 Census Federal Census Index  Court DNA DNA has been collected from men claiming descent from the following Kanawha County, (West) Virginia residents. Attempts have not been made to verify the lineages of those tested. • [Fletcher] Descendant of William Fletcher, b. England, resident of Kanawha and Monroe Counties, Virginia. Y-DNA 12 Marker Test, FTDNA. Genetic signature available online (labelled William Fletcher of Accomac County, Virginia/James Fletcher of Brunswick County, Virginia), courtesy: The Fletcher DNA Project. Family Histories It is anticipated that this bibliography will eventually identify all known family histories published about residents of this county. Use this list to: • Locate publications about direct ancestors • Find the most updated accounts of an ancestor's family • Identify publications, to quote Elizabeth Shown Mills, about an ancestor's "FAN Club" [Friends, Associates, and Neighbors] General • Blankenship, Gayle King. Virginia Families of Louisa, Hanover and Monroe Counties. Poquoson, Va.: G.K. Blankenship, 1991. FHL 975.5 D2bg Bibliography • [Mann] Malott, Eva, Ada McPhilliamy, and Dick Pence. Digging Our Roots: The Pence Kids. Baltimore, Md.: Gateway Press, 1977. FHL Book 929.273 P372a. • [Riggins] Burgess, James A. Burgess, Mullins, Browning, Brown and Allied Families. Parsons, W.Va.: McClain Printing Company, 1978. FHL Film 1035668 Item 10; digital version at Family History Archives - free. • [Tiffany] McIlhany, H.M. Some Virginia Families. Staunton, Va.: Stoneburner & Prufer, 1903, pp. 239-242. 1962 reprint: FHL US/CAN Book 975.5 D2m 1962; digital version at Ancestry ($). Land Local Histories The standard local history of Monroe County, West Virginia is Oren F. Morton's A History of Monroe County (Ruebush-Elkins Co., Dayton, VA, 1916). It is available as a reprint, and is also up at: Google Books. Maps Map of 1850 Virginia and West Virginia Monroe County, West Virginia Map Maps of Monroe County, West Virginia Military Revolutionary War • A Census of Pensioners for Revolutionary or Military Services: With their Names, Ages, and Places of Residence, as Returned by the Marshalls of the Several Judicial Districts, Under the Act for Taking the Sixth Census]. 1841. Digital versions at U.S. Census Bureau and Google Books et. al. 1967 reprint: FHL Collection 973 X2pc 1840. [See Virginia, Western District, Monroe County on page 135.] • Rejected or Suspended Applications for Revolutionary War Pensions. Washington, D.C., 1852. Reprinted by Genealogical Publishing Co., Inc., 1969, and 1991. Reprints include "an Added Index to States." FHL Collection 973 M24ur; digital version at Ancestry ($). [Includes veterans from this county; Virginia section begins on page 238.] War of 1812 Monroe County men served in the 75th Regiment.[2] Turk, David Scott,  The memorialists : an antebellum history of Alleghany, Craig and Monroe counties of West Virginia, 1812-60 (Bowie, Maryland, Heritage Books, c1997) page 168 FHL Book 975.5 H2 Civil War World War II Monroe County, West Virginia World War II Casualities Army and Air Force Naturalization West Virginia, Naturalization Records, 1814-1991 Newspapers Probate Monroe County, West Virginia Will Books 1799 - 1969 Taxation At first glance, researchers might conclude that Virginia tax lists contain very little family history data, though one soon learns that valuable genealogical conclusions can be drawn from these records, nicknamed "annual censuses," such as: relationships, approximate years of birth, socio-economic status, identification of neighbors, the ability to distinguish between persons of the same name, evidence of land inheritance, years of migration, and years of death. Virginia began enumerating residents' payments of personal property and land taxes in 1782. These two types of taxation were recorded in separate registers. Personal property tax lists include more names than land tax lists, because they caught more of the population. The Family History Library has an excellent microfilm collection of personal property tax lists from 1782 (or the year the county was organized) well into the late nineteenth century for most counties, but only scattered land tax lists. Microfilm collections at The Library of Virginia include land tax lists for all counties and independent cities for the years 1782 through 1978, as well as personal property tax lists for the years 1782 through 1930 (and every fifth year thereafter). Taxes were not collected in 1808.  Some tax records are available online or in print, though published abstracts often omit useful details found only in the original sources. Statewide indexes can help genealogists identify specific counties where surnames occurred in the past, providing starting points for research.[3][4] Vital Records West Virginia Vital Records - Birth - Death - Marriages  Monroe County, West Virginia Marriage Record Indexes Societies and Libraries Monroe County Historical Society P O Box 465 Union, WV 24983 Monroe CountyPublic Library Family History Centers Web Sites Genealogy courses: Learn how to research from an expert in Fun Five Minute Genealogy Videos. References 1. 1.0 1.1 The Handybook for Genealogists: United States of America,10th ed. (Draper, UT:Everton Publishers, 2002). 2. Stuart Lee Butler, A Guide to Virginia Militia Units in the War of 1812 (Athens, Ga.: Iberian Pub. Co., 1988), 145. FHL Book 975.5 M2bs. 3. "Using Personal Property Tax Records in the Archives at the Library of Virginia," Library of Virginia, http://www.lva.virginia.gov/public/guides/rn3_persprop.htm. 4. "Using Land Tax Records in the Archives at the Library of Virginia," Library of Virginia, http://www.lva.virginia.gov/public/guides/rn1_landtax.pdf.   Need additional research help? Contact our research help specialists. Need wiki, indexing, or website help? Contact our product teams. Did you find this article helpful? You're invited to explain your rating on the discussion page (you must be signed in).
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:51:26.000Z
x2tc2svhgpy4dq2uw6jouej3xbzck6ml
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24559", "uncompressed_offset": 109361715, "url": "genomebiology.com/2004/5/7/229", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://genomebiology.com/2004/5/7/229" }
cccc_CC-MAIN-2013-20
Review The uses of genome-wide yeast mutant collections Bart Scherens1 and Andre Goffeau2* Author Affiliations 1 Institut de Recherches Microbiologiques J.M. Wiame, Campus CERIA, Av. E. Gryson 1, 1070 Bruxelles, Belgium 2 Institut des Sciences de la Vie, Université Catholique de Louvain, Croix du Sud 2-20, 1348 Louvain-la-Neuve, Belgium For all author emails, please log on. Genome Biology 2004, 5:229 doi:10.1186/gb-2004-5-7-229 The electronic version of this article is the complete one and can be found online at: http://genomebiology.com/2004/5/7/229 Published:25 June 2004 © 2004 BioMed Central Ltd Abstract We assess five years of usage of the major genome-wide collections of mutants from Saccharomyces cerevisiae: single deletion mutants, double mutants conferring 'synthetic' lethality and the 'TRIPLES' collection of mutants obtained by random transposon insertion. Over 100 experimental conditions have been tested and more than 5,000 novel phenotypic traits have been assigned to yeast genes using these collections. Review In April 1996, the completely annotated genome sequence of the yeast Saccharomyces cerevisiae was made publicly available [1,2], the first eukaryotic genome sequence to be completed. Eight years later, thanks to the united efforts of the large yeast research community and to the unique genetic and physiological properties of yeast, this humble servant of mankind provides by far the best annotated eukaryotic genome [3]. The completeness of the yeast genome sequence has allowed the development of many novel tools for analyzing all molecular components of the cell and their interactions. These tools include three high-throughput collections of mutants that were first produced in 1999 and that have been analyzed in the five years since then. Here, we review the uses of these collections and their contribution to the identification of the components of basic physiological and developmental pathways of S. cerevisiae. The yeast deletion mutant collection A set of over 20,000 knockout strains was created by a consortium of European and North American laboratories [4,5]. The collection currently contains homozygous and heterozygous diploid strains corresponding to deletions of each of 5,916 genes (including 1,159 essential genes) and one haploid strain of each mating type for every non-essential gene (4,757 genes). Each knockout strain is marked by two unique 20-nucleotide 'bar codes', allowing quantitative and qualitative identification by DNA microarray hybridization of each strain in the pools used to assess the strains under different growth conditions (see Figure 1). The original article [4] describing this collection has been cited more then 560 times in the five years since its publication, according to the ISI Web of Science [6]. The complete collection of strains can be obtained at low cost from Euroscarf [7], ATCC [8] and Invitrogen [9]. Figure 1. Construction and screening of the yeast deletion strain collection. (a) The cassette used consists of a kanamycin-resistance gene (KanMX4) flanked by two tags (also called barcodes), the UPTAG and the DOWNTAG, which are unique to each gene. The yeast DNA 5' and 3' to the barcodes is homologous to yeast DNA flanking the gene to be deleted. After homologous recombination, the gene is replaced by the cassette sequences, including the barcodes. (b) Screening the deletion strains for differences in fitness under selective conditions. Selection leads to an increase in the proportion of some strains in the culture and a decrease of others; these changes can be detected by probing a microarray containing the sequences complementary to the barcodes. A stronger signal, indicating a higher level of a barcode in the RNA extracted from the culture, shows strains that have increased in frequency after selection. Adapted with permission from [71]. The deletion collection has been used in dozens of novel exhaustive screens for phenotypes that occur under a variety of physiological conditions; these include growth in minimal medium, in high salt and low salt, in galactose or sorbitol, at pH 8, after heat or cold shock, under stress by hydrogen peroxide (all in [10]); growth on non-fermentable carbon substrates [11], in saline conditions [12] or after treatment by ionizing radiation or DNA-damaging agents [13-17]; and the collection has also been screened for defects in meiosis, sporulation and germination [18,19]. This approach has uncovered numerous new putative components of well-known pathways; for instance, the number of genes known to have sporulation or germination phenotypes when deleted has been doubled by these analyses [18]. More sophisticated screens, for example for suppressors of the accumulation of mutations [20], have been developed more recently, as well as screens involving transformation of the deletion strains in order to identify genes needed for non-homologous DNA end-joining [21]. Novel protocols requiring individual transformations of each mutant have allowed the identification of host factors that influence the fate of the Ty family of long-terminal-repeat retrotransposable elements [22] and of genes involved in the unfolded protein response induced by heterologous introduction of mutant human Huntingtin protein or fragments of α-synuclein, both of which form disease-associated aggregates [23]. Similarly, proteins that interfere with the assembly of endoplasmic-reticulum structures termed karmellae, which are induced by elevated levels of HMG-CoA reductase under specific growth and genetic conditions, have been identified using the collection [24]. Several morphological screens have been developed, for example for defects in the selection of the bipolar bud site [25], in cell-size distribution [26,27], in cell morphology [28] and in meiotic chromosomal segregation [29]. Another approach is the screening of individual colonies. For instance, mis-sorting and secretion of vacuolar carboxypeptidase Y were detected by colony immunoblotting [30]. A second example of colony screening is the transformation of each single-deletion strain to express viral replicase proteins and an RNA replication template in which the capsid gene was replaced by a luciferase reporter gene, which was used to monitor viral expression in yeast colonies [31]. Finally, to identify the genes affecting glycogen storage, the deletion mutant colonies were blotted and stained by iodine vapor; the intensity of coloration allowed assessment of glycogen accumulation [32]. Use of the yeast deletion collection in screens for synthetic lethal mutants and to study drug targets Synthetic lethality is the phenomenon that occurs when two mutations that are each viable are combined and the double mutant is lethal. A method has been developed for the systematic construction of double mutants, which is called synthetic genetic array analysis (SGA) [33,34]. Haploid strains with mutations in non-essential genes were crossed to an array of the whole haploid deletion collection; the resulting diploid cells were made to sporulate and the lethal combinations identified, indicating the existence of essential interactions between gene products. In a first SGA screen using eight query genes, 291 interactions among 204 genes were identified [33]. Three years later [34], the search was expanded to 132 query genes, and 4,000 interactions were identified among 1,000 genes with roles in cytoskeletal organization, cell-wall biosynthesis, microtubule-based chromosome segregation and DNA metabolism. A more recent development of this approach is the use of DNA-DNA hybridization protocols to assess lethality, termed 'synthetic lethality analysis by microarray' (SLAM). In this method, a pool of haploid deletion strains is transformed with a cassette that replaces the gene of interest with either a deletion construct or the wild-type form. Transformants are pooled and genomic DNA is isolated; the barcodes are amplified by PCR and labeled with either Cy3 (green) or Cy5 (red) fluorescent dyes; and hybridization to an array containing all the deletion tags allows identification of the synthetic-lethal combinations (which are missing). The SLAM method has been validated by identifying members of the DNA helicase interaction network [35]. Synthetic genetic arrays have also been used for high-resolution genetic mapping of suppressor mutations [36]; this method, termed SGA mapping (SGAM), is in principle also applicable to the analysis of multigenic traits. The yeast deletion collection has also been used to identify members of the pathways modified by more than 25 different chemical ligands. This approach has identified the L-carnitine transporter Agp2p as a novel transporter of bleomycin in yeast, implicating membrane transport as a key determinant of resistance to this widely used anticancer agent [37]. In another study, the transcription factor Rpn4p was shown to compensate for proteasome inhibition by PS-341, a drug that is being studied as a treatment for cancer [38]. Other ligands tested include the phosphatidyl kinase inhibitor wortmannin [39]; anticancer agents [10,37,40,41]; antifungal agents including nystatin and calcofluor [10,41]; antibiotics including hygromycin B [42] and rapamycin [43]; statins (a class of drugs that lower cholesterol), the smooth muscle relaxant alverine citrate, the local anaesthetic dyclonine, yeast K1 killer toxin [44], 6-azauracil (a drug that depresses cellular nucleoside triphosphate levels [45]) and even the detergent sodium dodecyl sulfate [44]. Major scientific contributions arising from the use of the yeast deletion collection In a total of 33 publications that have used the deletion collection, in which over 100 different conditions were explored, more then 5,000 genes were attributed a phenotype (see Table 1 for an overview). Many of these genes were not previously known to contribute to the pathways scrutinized, even though in many cases - such as in studies of sporulation, the cell cycle, radiation damage and growth in defined media - there had previously been apparently exhaustive classical mutagenesis or DNA microarray screens. Altogether, these analyses have shown 71 genes previously thought to be non-essential to have a nonviable phenotype [46]; and the systematic deletion approach has been claimed to be five-fold more sensitive then a microarray gene-expression analysis for finding genes involved in pathways of interest [11]. Table 1. Screens performed so far on the yeast deletion strain collection and transposon-insertion collection Some new phenotypes have emerged from these analyses, although many known phenotypes have not yet been explored [47]. As an example of recent novel information provided by the systematic-deletion approach, over 100 new genes resulting in a defective bipolar budding pattern [25] have been identified. Other examples are the identification of a new putative bleomycin transporter [37]; the NEJ1 gene involved in non-homologous DNA end-joining and claimed to be one of the guardians of the cancer cells [21]; and 52 genes, the deletion of which causes lethality in yeast transfected with a fragment of heterologous human Huntingtin [23]. The latter set, which includes genes involved in lipid metabolism, vesicle transport and of unknown function, may help to define the still poorly defined pathway termed the unfolded protein response [23]. Uncertainties in the results obtained from systematic deletion mutants The yeast deletion collection allows powerful novel screens and has revealed many novel components of complex metabolic and developmental pathways. The data produced should be examined with great care, however, as there are several problems with the use of the collection (for further details, see two reviews by Elisabeth Winzeler [46,48]). A first issue is that the collection is incomplete, as a few hundred genes were missed in the first annotation of the genome that was used as the basis of the deletions (see updates of yeast genome data in Saccharomyces genome database (SGD) [49]). Moreover, relative amounts of some deleted strains may have been distributed unequally during the initial creation of the pools and further amplified [4]. Secondly, there can be problems with mutations or variations elsewhere in the genome that affect the phenotype. For instance, because the transformation procedure that was used to create the deletion library is a mutagenic event, mutations in sites some distance away from the intended deletion might be present in some strains [50]. Also, up to 8% of the deleted strains are known to retain a wild-type copy of the targeted gene, presumably because of aneuploidy or some duplication event [50]. Even in diploid strains, mutations that apparently have no phenotype may in fact modify the phenotype of other mutations in subtle ways (a phenomenon termed haploinsufficiency) [51]. When deletions are moved into a different genetic background, their phenotypes may change; for instance, up to 18% of synthetic-lethal interactions were not confirmed in different backgrounds [33,46]. Another source of discrepancy might be genetic variation among the individual isolates of the strains that are amplified under given selective conditions. For instance, the phenotype for a given mutant strain can be masked by extracellular complementation by a protein product of another strain in the pool. Other factors are related to the use of the barcodes. Their presence may modify the phenotype or, conversely, the stress created by the knockout procedure may mutagenize the barcode. About 17% of the 4,600 homozygous strains in the collection have a hybridization signal similar to that of the background. Moreover, trivial technical factors may affect the hybridization data, for example when the wrong piece of DNA is deposited on the microarray or when the tag modifies the secondary structures and thus causes poor hybridization. Also, some published datasets have too few repetitions of experiments to be statistically valid. These and other problems concerning the specificity and sensitivity of the screen used must be taken into account when interpreting data obtained using the yeast deletion collection. As a gross estimate, over one third of the data may consist of false positives or false negatives. As a golden rule, therefore, the data from a primary screen of the collection should always be confirmed by independent approaches. Collections of strains mutated using transposons Transposons are mobile genetic elements that can be used to disrupt genes in a non-targeted fashion. Insertional mutagenesis using transposons can disrupt non-coding as well as coding regions and can lead to partial loss or gain of function; it is thus complementary to deletion of genes [52]. The 'mini-Mu' transposon modified for insertional mutagenesis in yeast was pioneered by Daignan-Fornier and Bolotin-Fukuhara [53]. Ross-Macdonald et al. [52] used a version of the same transposon including a reporter gene (lacZ), an epitope tag (encoding hemagglutinin) and selectable markers for yeast and bacteria to perform random transposon mutagenesis. The approach uses a minitransposon that was introduced into the yeast genome by a two step method: a yeast genomic DNA library was mutagenized in Escherichia coli using the minitransposon; the library plasmids were then cut to excise the yeast genomic DNA with the transposon insertion, which was transformed into diploid yeast, replacing one chromosomal copy by homologous recombination [52]. This transposon-mutagenesis system can be used for the analysis of gene expression, detection of subcellular localization and identification of phenotypes caused by the insertion, and the transposon can be deleted using the Cre-LoxP recombinase system, removing the selectable marker. The insertion point in the genome can be determined for each mutant by sequencing outwards from the transposon sequence into the surrounding yeast sequences. The article describing the first such screen [52] has been cited 209 times in the five years since its publication [6]. The collection of transposon-inserted strains created in this work [52] is available free of charge from Michael Snyder's laboratory [54]. A database called 'transposon-insertion phenotypes, localization and expression in Saccharomyces cerevisiae' (TRIPLES) [55,56] contains the results obtained from exploiting the mutants obtained by the transposon-insertion approach. A total of 240,768 yeast insertional mutants were screened for transposon-encoded β-galactosidase activity, and a collection of 28,428 yeast strains was generated that produce β-galactosidase under conditions of vegetative growth and/or sporulation. The insertion point of 23,191 of these strains has been sequenced, identifying 3,750 different yeast genes, and the subcellular localization of 2,744 different yeast proteins has been documented (A. Kumar, personal communication). The transposon-insertion collection [52,54] has been used to identify genes involved in sporulation and vegetative growth. Analysis of the collection has also identified 137 new genes that were not originally annotated by the yeast genome sequencing consortium [57]. Ferreira et al. [58] have used the collection - which was produced in the S288C strain used to sequence the yeast genome [52] - to mutagenize the W303-1A strain (which is known to be more responsive to gene inactivation than the S288C). Ferreira et al. [58] identified genes required for growth in high-salt medium (61 insertions in 31 genes) and survival of hypo-osmotic shock and growth at 15°C (31 insertion in 10 genes). A similar approach was also used by Takahashi et al. [59] to screen in other strains for ethanol tolerance and modification of the cell wall, and by Suzuki et al. [60] to screen for the effects of insertions on the response to nitrogen starvation, on invasive or filamentous growth and on sporulation. Other approaches for insertional mutagenesis have also been applied to yeast. Firstly, instead of bacterial mini-Mu transposons, T-DNA from Agrobacterium tumefaciens has been used to mutagenize yeast on a genome-wide scale [61]. A second approach is the use of non-homologous insertion of DNA cassettes not derived from mobile elements. This process, which exploits the cellular machinery that normally repairs DNA double-strand breaks by non-homologous end joining, is increased by gamma irradiation [62]. Thirdly, Blanc and Adams [63] used mutations resulting from insertion of the Ty1 transposon to identify yeast mutations that generate evolutionarily significant phenotypes by causing small but positive increments of fitness. Finally, an application of transposon mutagenesis called direct allele replacement technology (DART) allows rapid transfer of any insertion allele into any strain [64]. A transposon library consisting of a collection of plasmids containing yeast genomic DNA with transposon insertions is sequenced to identify the exact insertion point in the yeast genomic DNA [64]. After excision from the plasmid, the yeast genomic DNA containing the transposon is used to transform a yeast strain of choice by homologous recombination. The procedure was validated by identification of 29 insertions into 17 genes involved in apical growth [64]. Insertional mutagenesis using transposons has several potential advantages over targeted deletion: for instance, insertion occurs in the non-coding as well as in the coding segments, so regulatory regions and other non-genie regions can be disrupted. Moreover, depending on the site of insertion, transposon mutagenesis may lead to partial loss of function or gain of function and hence to the identification of novel functions that would not be found from studies of complete knockouts of genes [52]. Conditional alleles may be generated, as well as mutants in promoter or terminal regions. Also, apart from phenotype analysis of the mutation, the level of expression of the targeted gene can be measured in vivo and the subcellular localization of its product can be determined. A disadvantage, however, is that transposon insertions are not random, and this method may therefore never cover all the genes in the genome. Also, several of the problems that were mentioned above for the analysis of the yeast deletion collection apply equally to the transposon mutant collections, including the observation that phenotypes are often very strongly background-dependent. Other genome-wide mutant collections and their uses Several databases have been developed to catalog the subcellular localizations of yeast proteins as identified by fluorescence microscopy. The yeast protein localization database [65,66] describes the results obtained using a library of yeast genes fused to a green fluorescent protein (GFP) reporter. The TRIPLES database [55,56] includes the use of the transposon-insertion libraries to determine protein localization for 5,504 insertions. The yeast GFP fusion localization database [67,68] presents the localization of 4,156 proteins into 22 distinct subcellular locations, as determined using a library of GFP-tagged proteins compared with reference strains expressing proteins of known localization tagged with red fluorescent protein (the strains used are available from Invitrogen [9]). In a recent study [69], an exhaustive global analysis of protein expression in yeast was reported. Each open reading frame was marked by an insertion cassette consisting of a modified version of the tandem affinity purification (TAP) tag, a yeast selectable marker to drive homologous recombination, and regions homologous to yeast genes. The level of expression of each protein was determined by very sensitive western-blotting analysis that could detect less than 50 protein molecules per cell. The level of expression of 4,251 gene products was identified in exponential growth conditions [69]. Like the sequencing of the yeast genome, the construction of the single and double deletion libraries and that of the major transposon insertion library has required a considerable investment by the international yeast research community. The three original papers [4,33,52] presenting the libraries have a total of 83 authors, funded by public agencies from the USA, from the European Union and from Canada. Was this effort worthwhile? Over the last five years, the three seminal papers have been cited more than 950 times [6]. We have found over 50 experimental papers reporting on different phenotypic screens carried out with these genome-wide libraries. More than 100 experimental conditions have been tested, representing near a million individual mutant screens. We estimate that more than 5,000 novel phenotypic traits have been assigned to yeast genes of known or unknown molecular functions. This undoubtedly represents a considerable amount of progress towards the ultimate goal of a full description of the functions and interactions of all the molecular components of a basic eukaryotic cell. Several recent improvements of the use of the original genome-wide mutant libraries have been reported, such as the DART [64] and SLAM [35] approaches described above. New genome-wide libraries using more sensitive protein tagging are being developed [69] for global measurements of protein levels or subcellular expression. In all this work, yeast continues to be a very convenient test-bed for the development of novel high-throughput tools that rely on the availability of the complete genome sequence. But a word of caution is appropriate. As was the case for other high-throughput tools that were also pioneered using yeast, such as two-hybrid protein-interaction screening, DNA-hybridization microarrays and proteomic analyses, the information provided by large screens of genome-wide libraries contains an appreciable number of false-positive and false-negative data points. It is therefore essential to confirm each result by several independent approaches. Ultimately, we will have to return to 'reductionist' biochemical approaches to demonstrate fully the molecular function suggested by a large primary screen. Finally, there is an urgent need to build databases to collect and organize all the data obtained from all the large screening approaches. The SGD [49] and the Munich information center for protein sequences (MIPS) database [70] are making good progress in this respect. The authors of these databases should, however, be encouraged to further develop procedures that take into account the difficult assessment of the uncertainties associated with much of the data. Here again, yeast is expected to become a pioneer. References 1. Goffeau A, Barrell BG, Bussey H, Davis RW, Dujon B, Feldmann H, Galibert F, Hoheisel JD, Jacq C, Johnston M, et al.: Life with 6000 genes. Science 1996, 274:546-567. PubMed Abstract | Publisher Full Text 2. Goffeau A, Aert R, Agostini-Carbone ML, Ahmed A, Aigle M, Alberghina L, Albermann K, Albers M, Aldea M, Alexandraki D, et al.: The yeast genome directory. Nature 1997, 387(Suppl):1-105. 3. Goffeau A: Four years of post-genomic life with 6,000 yeast genes. FEBS Lett 2000, 480:37-41. PubMed Abstract | Publisher Full Text 4. Winzeler EA, Shoemaker DD, Astromoff A, Liang H, Anderson K, Andre B, Bangham R, Benito R, Boeke JD, Bussey H, et al.: Functional characterization of the S. cerevisiae genome by gene deletion and parallel analysis. Science 1999, 285:901-906. PubMed Abstract | Publisher Full Text 5. Saccharomyces Genome Deletion Project [http://sequence-www.stanford.edu/group/yeast_deletion_project/deletions3.html] webcite 6. Web of Science [http://www.isinet.com/products/citation/wos/] webcite 7. European Saccharomyces cerevisiae Archive for Functional Analysis (Euroscarf) [http://www.uni-frankfurt.de/fb15/mikro/euroscarf/index.html] webcite 8. About the ATCC-LGC Promochem Partnership [http://www.lgcpromochem.com/atcc/] webcite 9. Invitrogen - Clones [http://clones.invitrogen.com/] webcite 10. Giaever G, Chu AM, Ni L, Connelly C, Riles L, Veronneau S, Dow S, Lucau-Danila A, Anderson K, Andre B, et al.: Functional profiling of the Saccharomyces cerevisiae genome. Nature 2002, 418:387-391. PubMed Abstract | Publisher Full Text 11. Steinmetz LM, Scharfe C, Deutschbauer AM, Mokranjac D, Herman ZS, Jones T, Chu AM, Giaever G, Prokisch H, Oefner PJ, Davis RW: Systematic screen for human disease genes in yeast. Nat Genet 2002, 31:400-404. PubMed Abstract | Publisher Full Text 12. Warringer J, Ericson E, Fernandez L, Nerman O, Blomberg A: High-resolution yeast phenomics resolves different physiological features in the saline response. Proc Natl Acad Sci USA 2003, 100:15724-15729. PubMed Abstract | Publisher Full Text 13. Bennett CB, Lewis LK, Karthikeyan G, Lobachev KS, Jin YH, Sterling JF, Snipe JR, Resnick MA: Genes required for ionizing radiation resistance in yeast. Nat Genet 2001, 29:426-434. PubMed Abstract | Publisher Full Text 14. Birrell GW, Giaever G, Chu AM, Davis RW, Brown JM: A genomewide screen in Saccharomyces cerevisiae for genes affecting UV radiation sensitivity. Proc Natl Acad Sci USA 2001, 98:12608-12613. PubMed Abstract | Publisher Full Text 15. Game JC, Birrell GW, Brown JA, Shibata T, Baccari C, Chu AM, Williamson MS, Brown JM: Use of a genome-wide approach to identify new genes that control resistance of Saccharomyces cerevisiae to ionizing radiation. Radiat Res 2003, 160:14-24. PubMed Abstract | Publisher Full Text 16. Birrell GW, Brown JA, Wu HI, Giaever G, Chu AM, Davis RW, Brown JM: Transcriptional response of Saccharomyces cerevisiae to DNA-damaging agents does not identify the genes that protect against these agents. Proc Natl Acad Sci USA 2002, 99:8778-8783. PubMed Abstract | Publisher Full Text 17. Chang M, Bellaoui M, Boone C, Brown GW: A genome-wide screen for methyl methanesulfonate-sensitive mutants reveals genes required for S phase progression in the presence of DNA damage. Proc Natl Acad Sci USA 2002, 99:16934-16939. PubMed Abstract | Publisher Full Text 18. Deutschbauer AM, Williams RM, Chu AM, Davis RW: Parallel phenotypic analysis of sporulation and postgermination growth in Saccharomyces cerevisiae. Proc Natl Acad Sci USA 2002, 99:15530-15535. PubMed Abstract | Publisher Full Text 19. Enyenihi AH, Saunders WS: Large-scale functional genomic analysis of sporulation and meiosis in Saccharomyces cerevisiae. Genetics 2003, 163:47-54. PubMed Abstract | Publisher Full Text 20. Huang ME, Rio AG, Nicolas A, Kolodner RD: A genomewide screen in Saccharomyces cerevisiae for genes that suppress the accumulation of mutations. Proc Natl Acad Sci USA 2003, 100:11529-11534. PubMed Abstract | Publisher Full Text 21. Ooi SL, Shoemaker DD, Boeke JD: A DNA microarray-based genetic screen for nonhomologous end-joining mutants in Saccharomyces cerevisiae. Science 2001, 294:2552-2556. PubMed Abstract | Publisher Full Text 22. Griffith JL, Coleman LE, Raymond AS, Goodson SG, Pittard WS, Tsui C, Devine SE: Functional genomics reveals relationships between the retrovirus-like Ty1 element and its host Saccharomyces cerevisiae. Genetics 2003, 164:867-879. PubMed Abstract | Publisher Full Text 23. Willingham S, Outeiro TF, DeVit MJ, Lindquist SL, Muchowski PJ: Yeast genes that enhance the toxicity of a mutant huntingtin fragment or alpha-synuclein. Science 2003, 302:1769-1772. PubMed Abstract | Publisher Full Text 24. Wright R, Parrish ML, Cadera E, Larson L, Matson CK, Garrett-Engele P, Armour C, Lum PY, Shoemaker DD: Parallel analysis of tagged deletion mutants efficiently identifies genes involved in endoplasmic reticulum biogenesis. Yeast 2003, 20:881-892. PubMed Abstract | Publisher Full Text 25. Ni L, Snyder M: A genomic study of the bipolar bud site selection pattern in Saccharomyces cerevisiae. Mol Biol Cell 2001, 12:2147-2170. PubMed Abstract | Publisher Full Text 26. Jorgensen P, Nishikawa JL, Breitkreutz BJ, Tyers M: Systematic identification of pathways that couple cell growth and division in yeast. Science 2002, 297:395-400. PubMed Abstract | Publisher Full Text 27. Zhang J, Schneider C, Ottmers L, Rodriguez R, Day A, Markwardt J, Schneider BL: Genomic scale mutant hunt identifies cell size homeostasis genes in S. cerevisiae. Curr Biol 2002, 12:1992-2001. PubMed Abstract | Publisher Full Text 28. Saito TL, Ohtani M, Sawai H, Sano F, Saka A, Watanabe D, Yukawa M, Ohya Y, Morishita S: SCMD: Saccharomyces cerevisiae morphological database. Nucleic Acids Res 2004, 32 Database issue:D319-D322. PubMed Abstract | Publisher Full Text 29. Marston AL, Tham WH, Shah H, Amon A: A genome-wide screen identifies genes required for centromeric cohesion. Science 2004, 303:1367-1370. PubMed Abstract | Publisher Full Text 30. Bonangelino CJ, Chavez EM, Bonifacino JS: Genomic screen for vacuolar protein sorting genes in Saccharomyces cerevisiae. Mol Biol Cell 2002, 13:2486-2501. PubMed Abstract | Publisher Full Text 31. Kushner DB, Lindenbach BD, Grdzelishvili VZ, Noueiry AO, Paul SM, Ahlquist P: Systematic, genome-wide identification of host genes affecting replication of a positive-strand RNA virus. Proc Natl Acad Sci USA 2003, 100:15764-15769. PubMed Abstract | Publisher Full Text 32. Wilson WA, Wang Z, Roach PJ: Systematic identification of the genes affecting glycogen storage in the yeast Saccharomyces cerevisiae: implication of the vacuole as a determinant of glycogen level. Mol Cell Proteomics 2002, 1:232-242. PubMed Abstract | Publisher Full Text 33. Tong AH, Evangelista M, Parsons AB, Xu H, Bader GD, Page N, Robinson M, Raghibizadeh S, Hogue CW, Bussey H, et al.: Systematic genetic analysis with ordered arrays of yeast deletion mutants. Science 2001, 294:2364-2368. PubMed Abstract | Publisher Full Text 34. Tong AH, Lesage G, Bader GD, Ding H, Xu H, Xin X, Young J, Berriz GF, Brost RL, Chang M, et al.: Global mapping of the yeast genetic interaction network. Science 2004, 303:808-813. PubMed Abstract | Publisher Full Text 35. Ooi SL, Shoemaker DD, Boeke JD: DNA helicase gene interaction network defined using synthetic lethality analyzed by microarray. Nat Genet 2003, 35:277-286. PubMed Abstract | Publisher Full Text 36. Jorgensen P, Nelson B, Robinson MD, Chen Y, Andrews B, Tyers M, Boone C: High-resolution genetic mapping with ordered arrays of Saccharomyces cerevisiae deletion mutants. Genetics 2002, 162:1091-1099. PubMed Abstract | Publisher Full Text 37. Aouida M, Page N, Leduc A, Peter M, Ramotar D: A genome-wide screen in Saccharomyces cerevisiae reveals altered transport as a mechanism of resistance to the anticancer drug bleomycin. Cancer Res 2004, 64:1102-1109. PubMed Abstract | Publisher Full Text 38. Fleming JA, Lightcap ES, Sadis S, Thoroddsen V, Bulawa CE, Blackman RK: Complementary whole-genome technologies reveal the cellular response to proteasome inhibition by PS-341. Proc Natl Acad Sci USA 2002, 99:1461-1466. PubMed Abstract | Publisher Full Text 39. Zewail A, Xie MW, Xing Y, Lin L, Zhang PF, Zou W, Saxe JP, Huang J: Novel functions of the phosphatidylinositol metabolic pathway discovered by a chemical genomics screen with wortmannin. Proc Natl Acad Sci USA 2003, 100:3345-3350. PubMed Abstract | Publisher Full Text 40. Aouida M, Tounekti O, Leduc A, Belhadj O, Mir L, Ramotar D: Isolation and characterization of Saccharomyces cerevisiae mutants with enhanced resistance to the anticancer drug bleomycin. Curr Genet 2004, 45:265-272. PubMed Abstract | Publisher Full Text 41. Giaever G, Flaherty P, Kumm J, Proctor M, Nislow C, Jaramillo DF, Chu AM, Jordan MI, Arkin AP, Davis RW: Chemogenomic profiling: identifying the functional interactions of small molecules in yeast. Proc Natl Acad Sci USA 2004, 101:793-798. PubMed Abstract | Publisher Full Text 42. Blackburn AS, Avery SV: Genome-wide screening of Saccharomyces cerevisiae to identify genes required for antibiotic insusceptibility of eukaryotes. Antimicrob Agents Chemother 2003, 47:676-681. PubMed Abstract | Publisher Full Text 43. Chan TF, Carvalho J, Riles L, Zheng XF: A chemical genomics approach toward understanding the global functions of the target of rapamycin protein (TOR). Proc Natl Acad Sci USA 2000, 97:13227-13232. PubMed Abstract | Publisher Full Text 44. Page N, Gerard-Vincent M, Menard P, Beaulieu M, Azuma M, Dijkgraaf GJ, Li H, Marcoux J, Nguyen T, Dowse T, et al.: A Saccharomyces cerevisiae genome-wide mutant screen for altered sensitivity to K1 killer toxin. Genetics 2003, 163:875-894. PubMed Abstract | Publisher Full Text 45. Riles L, Shaw RJ, Johnston M, Reines D: Large-scale screening of yeast mutants for sensitivity to the IMP dehydrogenase inhibitor 6-azauracil. Yeast 2004, 21:241-248. PubMed Abstract | Publisher Full Text 46. Grunenfelder B, Winzeler EA: Treasures and traps in genomewide data sets: case examples from yeast. Nat Rev Genet 2002, 3:653-661. PubMed Abstract | Publisher Full Text 47. Hampsey M: A review of phenotypes in Saccharomyces cerevisiae. Yeast 1997, 13:1099-1133. PubMed Abstract | Publisher Full Text 48. Que QQ, Winzeler EA: Large-scale mutagenesis and functional genomics in yeast. Funct Integr Genomics 2002, 2:193-198. PubMed Abstract | Publisher Full Text 49. Saccharomyces Genome Database [http://www.yeastgenome.org/] webcite 50. Hughes TR, Roberts CJ, Dai H, Jones AR, Meyer MR, Slade D, Burchard J, Dow S, Ward TR, Kidd MJ, et al.: Widespread aneuploidy revealed by DNA microarray expression profiling. Nat Genet 2000, 25:333-337. PubMed Abstract | Publisher Full Text 51. Giaever G, Shoemaker DD, Jones TW, Liang H, Winzeler EA, Astromoff A, Davis RW: Genomic profiling of drug sensitivities via induced haploinsufficiency. Nat Genet 1999, 21:278-283. PubMed Abstract | Publisher Full Text 52. Ross-Macdonald P, Coelho PS, Roemer T, Agarwal S, Kumar A, Jansen R, Cheung KH, Sheehan A, Symoniatis D, Umansky L, et al.: Large-scale analysis of the yeast genome by transposon tagging and gene disruption. Nature 1999, 402:413-418. PubMed Abstract | Publisher Full Text 53. Daignan-Fornier B, Bolotin-Fukuhara M: In vivo functional characterization of a yeast nucleotide sequence: construction of a mini-Mu derivative adapted to yeast. Gene 1988, 62:45-54. PubMed Abstract | Publisher Full Text 54. Yale Genome Analysis Center [http://ygac.med.yale.edu] webcite 55. Kumar A, Cheung KH, Tosches N, Masiar P, Liu Y, Miller P, Snyder M: The TRIPLES database: a community resource for yeast molecular biology. Nucleic Acids Res 2002, 30:73-75. PubMed Abstract | Publisher Full Text 56. TRIPLES - a database of Transposon-Insertion Phenotypes, Localization, and Expression in Saccharomyces [http://ygac.med.yale.edu/triples/triples.htm] webcite 57. Kumar A, Harrison PM, Cheung KH, Lan N, Echols N, Bertone P, Miller P, Gerstein MB, Snyder M: An integrated approach for finding overlooked genes in yeast. Nat Biotechnol 2002, 20:58-63. PubMed Abstract | Publisher Full Text 58. de Jesus Ferreira MC, Bao X, Laize V, Hohmann S: Transposon mutagenesis reveals novel loci affecting tolerance to salt stress and growth at low temperature. Curr Genet 2001, 40:27-39. PubMed Abstract | Publisher Full Text 59. Takahashi T, Shimoi H, Ito K: Identification of genes required for growth under ethanol stress using transposon mutagenesis in Saccharomyces cerevisiae. Mol Genet Genomics 2001, 265:1112-1119. PubMed Abstract | Publisher Full Text 60. Suzuki C, Hori Y, Kashiwagi Y: Screening and characterization of transposon-insertion mutants in a pseudohyphal strain of Saccharomyces cerevisiae. Yeast 2003, 20:407-415. PubMed Abstract | Publisher Full Text 61. Bundock P, van Attikum H, den Dulk-Ras A, Hooykaas PJ: Insertional mutagenesis in yeasts using T-DNA from Agrobacterium tumefaciens. Yeast 2002, 19:529-536. PubMed Abstract | Publisher Full Text 62. Kiechle M, Manivasakam P, Eckardt-Schupp F, Schiestl RH, Friedl AA: Promoter-trapping in Saccharomyces cerevisiae by radiation-assisted fragment insertion. Nucleic Acids Res 2002, 30:e136. PubMed Abstract | Publisher Full Text 63. Blanc VM, Adams J: Evolution in Saccharomyces cerevisiae: identification of mutations increasing fitness in laboratory populations. Genetics 2003, 165:975-983. PubMed Abstract | Publisher Full Text 64. Bidlingmaier S, Snyder M: Large-scale identification of genes important for apical growth in Saccharomyces cerevisiae by directed allele replacement technology (DART) screening. Funct Integr Genomics 2002, 1:345-356. PubMed Abstract | Publisher Full Text 65. Habeler G, Natter K, Thallinger GG, Crawford ME, Kohlwein SD, Trajanoski Z: YPL.db: the yeast protein localization database. Nucleic Acids Res 2002, 30:80-83. PubMed Abstract | Publisher Full Text 66. Yeast Protein Localization Database [http://genome.tugraz.at/YPL/YPL.html] webcite 67. Huh WK, Falvo JV, Gerke LC, Carroll AS, Howson RW, Weissman JS, O'Shea EK: Global analysis of protein localization in budding yeast. Nature 2003, 425:686-691. PubMed Abstract | Publisher Full Text 68. Yeast GFP Fusion Localization Database [http://yeastgfp.ucsf.edu] webcite 69. Ghaemmaghami S, Huh WK, Bower K, Howson RW, Belle A, Dephoure N, O'Shea EK, Weissman JS: Global analysis of protein expression in yeast. Nature 2003, 425:737-741. PubMed Abstract | Publisher Full Text 70. MIPS [http://mips.gsf.de/] webcite 71. Kumar A, Snyder M: Emerging technologies in yeast genomics. Nat Rev Genet 2001, 2:302-312. PubMed Abstract | Publisher Full Text
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:33:26.000Z
gdeddnf32sj4serteunr4enw556zwbt7
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24595", "uncompressed_offset": 172910409, "url": "myrightword.blogspot.com/2005/07/mass-organizing-tactics.html", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://myrightword.blogspot.com/2005/07/mass-organizing-tactics.html" }
cccc_CC-MAIN-2013-20
Friday, July 01, 2005 Mass Organizing Tactics Given the inability of certain leadership groups and people to plan out a proper protest campaign here, I think that Saul Alinsky's principles need repeating. These are excerpted from Rules for Radicals by Saul Alinsky, pp. 126-140 and they are classic. =================== Tactics mean doing what you can with what you have. Tactics are those conscious deliberate acts by which human beings live with each other and deal with the world around them. In the world of give and take, tactics is the art of how to take and how to give. Here our concern is with the tactic of taking; how the Have-Nots can take power away from the Haves. For an elementary illustration of tactics, take parts of your face as the point of reference; your eyes, your ears, and your nose. First the eyes; if you have organized a vast, mass-based people's organization, you can parade it visibly before the enemy and openly show your power. Second the ears; if your organization is small in numbers, then...conceal the members in the dark but raise a din and clamor that will make the listener believe that your organization numbers many more than it does. Third, the nose; if your organization is too tiny even for noise, stink up the place. Always remember the first rule of power tactics: Power is not only what you have but what the enemy thinks you have. The second rule is: Never go outside the experience of your people. When an action is outside the experience of the people, the result is confusion, fear, and retreat. The third rule is: Wherever possible go outside of the experience of the enemy. Here you want to cause confusion, fear, and retreat. The fourth rule is: Make the enemy live up to their own book of rules. You can kill them with this, for they can no more obey their own rules than the Christian church can live up to Christianity. The fourth rule carries within it the fifth rule: Ridicule is man's most potent weapon. It is almost impossible to counterattack ridicule. Also it infuriates the opposition, who then react to your advantage. The sixth rule is: A good tactic is one that your people enjoy. If your people are not having a ball doing it, there is something very wrong with the tactic. The seventh rule is: A tactic that drags on too long becomes a drag. man can sustain militant interest in any issue for only a limited time, after which it becomes a ritualistic commitment... The eighth rule: Keep the pressure on, with different tactics and actions, and utilize all events of the period for your purpose. The ninth rule: The threat is usually more terrifying than the thing itself. The tenth rule: The major premise for tactics is the development of operations that will maintain a constant pressure upon the opposition. The eleventh rule is: If you push a negative hard and deep enough it will break through into its counterside; this is based on the principle that every positive has its negative... The twelfth rule: The price of a successful attack is a constructive alternative. you cannot risk being trapped by the enemy in his sudden agreement with your demand and saying "You're right--we don't know what to do about this issue. Now you tell us." The thirteenth rule: Pick the target, freeze it, personalize it, and polarize it. In conflict tactics there are certain rules that the organizer should always regard as universalities. One is that the opposition must be singled out as the target and "frozen." By this I mean that in a complex, interrelated, urban society, it becomes increasingly difficult to single out who is to blame for any particular evil. There is a constant, and somewhat legitimate, passing of the buck.... It should be borne in mind that the target is always trying to shift responsibility to get out of being the target.... One of the criteria in picking your target is the target's vulnerability--where do you have the power to start? Furthermore, the target can always say, "Why do you center on me when there are others to blame as well?" When you "freeze the target," you disregard these arguments and, for the moment, all others to blame. Then, as you zero in and freeze your target and carry out your attack, all of the "others" come out of the woodwork very soon. They become visible by their support of the target. The other important point in the choosing of a target is that it must be a personification, not something general and abstract such as a community's segregated practices or a major corporation or City Hall. It is not possible to develop the necessary hostility against, say, City Hall, which after all is a concrete, physical, inanimate structure, or against a corporation, which has no soul or identity, or a public school administration, which again is an inanimate system.  
v0
2024-06-03T21:29:47.544Z
2013-05-18T07:14:53.000Z
qqkfh5f7winork2da23nguxd4ipqdlab
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24597", "uncompressed_offset": 185224438, "url": "openwetware.org/index.php?diff=661433&oldid=661406&title=BME103%3AT130_Group_10_l2", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://openwetware.org/index.php?title=BME103:T130_Group_10_l2&diff=661433&oldid=661406" }
cccc_CC-MAIN-2013-20
BME103:T130 Group 10 l2 From OpenWetWare (Difference between revisions) Jump to: navigation, search (Thermal Cycler Engineering) (Thermal Cycler Engineering) Line 28: Line 28: '''System Design'''<br> '''System Design'''<br>  + '''Key Features'''<br> '''Key Features'''<br> Revision as of 16:39, 29 November 2012 BME 103 Fall 2012 Home People Lab Write-Up 1 Lab Write-Up 2 Lab Write-Up 3 Course Logistics For Instructors Photos Wiki Editing Help Contents OUR TEAM Name: Frances Lakers Role: Protocol Planner Name: Tyler Tamasauckas Role: Protocol Planner Name: Jeffery Ramirez Role: R&D Specialist Name: Alexander Baldwin Role: Machine Design LAB 2 WRITE-UP Thermal Cycler Engineering Our re-design is based upon the Open PCR system originally designed by Josh Perfetto and Tito Jankowski. System Design Key Features There are two specific features that will be upgraded in the OpenPCR machine - the case and the power source. The case will be changed from a thin wood to a more durable plastic, so that the device can be taken out into the field. The device will also have solar panels, which will provide for the power. This shift allows the device to be used where electricity is not always available, such as rural and undeveloped regions. When combined, these two features open the device up to a larger market. In addition to the Thermal Cycler's modifications, there have been improvements on the process of flourimeter image collection and measurement. Instead on manually adjusting phone settings and using a computer with ImageJ to measure colors, an app has been implemented that automatically adjusts the cameras settings to the correct exposure, as well as having the capability to measure the colors right from the smart phone. Instructions The instructions would remain mostly the same, as the solar panel array would come attached to the plastic on the device's top side. The only changes in procedure would be in the use of an all in one phone application for the fluorimeter measurements as well as the thermal cycling set-up. Protocols Materials Supplied in Kit Item Quantity PCR Machine 1 unit Camera Phone Stand 1 unit Fluorimeter Stand (LED Light) 1 unit BlackOut Box 1 unit Operator's Manual 1 unit Also included: Access code for smart phone app download. Supplied by User Item Quantity Smart Phone (w/ Camera) 1 unit USB/Phone Cord (if desired) 1 unit Micropipettes (as needed) Hydrophobic Glass Slides (as needed) Eppendorf Tubes Max 16 tubes/trial Sample DNA 0.2μL/tube; 16 tubes/trial GoTAQ Master Mix 50μL/tube; 16 tubes/trial 10 μM Forward Primer 1μL/tube; 16 tubes/trial 10 μM Reverse Primer 1μL/tube; 16 tubes/trial Distilled H2O 47.8μL/tube; 16 tubes/trial SYBR Green 0.1mL/test sample PCR Protocol 1.) Be sure to be in an area with natural lighting for use of the solar battery, or locate an area with a standard power source availible 2.) Connect the PCR machine via USB or Bluetooth to the phone 4.) Label tubes that will contain the subject DNA. Also be sure to include control tubes in this labeling. 5.) After filling the tubes with sample DNA, primers and other reactants. 6.) Load the tubes into the Thermal cycler's tray. 7.) Close and properly tighten the lid. 8.) Adjust the settings for the thermal cycler. 9.) Begin the program. DNA Measurement Protocol 1.) Assemble the flourimeter and place the glass slide in the tray. 2.) Use the pipette to add to drops of water to the slide. These will serve as controls for the measurements. 3.) Adjust the slide to be aligned with the blue LED. The LED should be shining directly on the test drops. 4.) Open the newly introduced all in one flourimeter application on the smartphone. The application will automatically set the phones camera to the correct settings. 5.) Place the smartphone in the holder and use the in app photo timer to take the picture while the black out box is closed. 6.) Analyze the images color measurements using the app. 7.) Save the image properties as the control image for future measurements. 8.) Repeat steps 2 through 6 for each DNA sample. 9.) The app will automatically compare the control images to the sample images and will list the results. Research and Development Background on Disease Markers The disease that we chose was Sickle Cell Anemia. Sickle Cell is a inherited disease that comes from both parents. If only one parent has the Sickle Cell trait, then the child will be a carrier. If both parents have the trait, then the child will have Sickle Cell. This disease causes the red blood cells to change into a crescent shape instead of being disk shape resulting in the loss of efficient oxygen delivery. It can also result in clotting because the blood cells can not make it through small blood vessels very well. The SNP for this disease is 78478128 and the reference SNP is rs78478128. The link to the page with more info on Sickle cell is http://www.ncbi.nlm.nih.gov/pubmedhealth/PMH0001554/ The link to the page with the genetic information and SNP is http://www.ncbi.nlm.nih.gov/projects/SNP/snp_ref.cgi?rs=78478128#locus Primer Design The forward primer for Sickle Cell is 5'-tcctaagccagtgccagaag-3' The reverse primer for Sickle Cell is 5'-gaattcgtctgtttcccattctaaac-3' The mutation looks like this: TCCTGAGGAG with the bold a being the mutation. A disease allele will give a PCR result and a non-disease allele will not because PCR is designed to amplify the area that corresponds to the mutation on the DNA. If it did not amplify only the target region, there would be too much information and a result would not be possible. Illustration Personal tools
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:12:14.000Z
scxtgvpwoyu4dlki53rimd7v6aeyf7ox
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24612", "uncompressed_offset": 202700888, "url": "quotationsbook.com/quote/gift/38536/", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://quotationsbook.com/quote/gift/38536/" }
cccc_CC-MAIN-2013-20
It's easy! Just pick the product you like and click-through to buy it from trusted partners of Quotations Book. We hope you like these personalized gifts as much as we do.   Make and then buy your OWN fantastic personalized gift from this quote So why do people keep on watching? The answer, by now, should be perfectly obvious: we love television because television brings us a world in which television does not exist. In fact, deep in their hearts, this is what the spuds crave most: a rich, new, participatory life.   Ehrenreich, Barbara   Make a fabulous personalised bracelet or other form of jewellery with this quote Click the banner below to pick the kind of jewellery you'd like ... Choose something popular ... Make a custom wrapped canvas ... Make custom holiday cards ... Make custom t-shirts ... Make custom holiday gifts for boys ... Make custom holiday gifts for girls ... Make custom holiday gifts for men ...   A selection of more great products and gifts!   212 - The Extra Degree The one extra degree makes the difference. This simple analogy reflects the ultimate definition of excellence. Because it's the one extra degree of effort, in business and life, that can separate the good from the great. This powerful book by S.L. Parker and Mac Anderson gives great examples, great quotes and great stories to illustrate the 212° concept. A warning - once you read it, it will be hard to forget. Your company will have a target for everything you do ... 212° Click here to buy this »
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:38:58.000Z
tmkftmpv2jbcxw7xjnc7jaxmdgt7lm4p
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24613", "uncompressed_offset": 202706523, "url": "quotationsbook.com/quote/gift/48670/", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://quotationsbook.com/quote/gift/48670/" }
cccc_CC-MAIN-2013-20
It's easy! Just pick the product you like and click-through to buy it from trusted partners of Quotations Book. We hope you like these personalized gifts as much as we do.   Make and then buy your OWN fantastic personalized gift from this quote To keep the air fresh among words is the secret of verbal cleanliness.   Stojanovic, Dejan   Make a fabulous personalised bracelet or other form of jewellery with this quote Click the banner below to pick the kind of jewellery you'd like ... Choose something popular ... Make a custom wrapped canvas ... Make custom holiday cards ... Make custom t-shirts ... Make custom holiday gifts for boys ... Make custom holiday gifts for girls ... Make custom holiday gifts for men ...   A selection of more great products and gifts!   212 - The Extra Degree The one extra degree makes the difference. This simple analogy reflects the ultimate definition of excellence. Because it's the one extra degree of effort, in business and life, that can separate the good from the great. This powerful book by S.L. Parker and Mac Anderson gives great examples, great quotes and great stories to illustrate the 212° concept. A warning - once you read it, it will be hard to forget. Your company will have a target for everything you do ... 212° Click here to buy this »
v0
2024-06-03T21:29:47.544Z
2013-05-18T07:12:22.000Z
h3iwwwyqxbz243hfg7r6zpnaaw5lwmz2
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24615", "uncompressed_offset": 206631180, "url": "redsarmy.com/2009/12/14/ray-allen-schooling-jr-giddens/", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://redsarmy.com/2009/12/14/ray-allen-schooling-jr-giddens/" }
cccc_CC-MAIN-2013-20
Ray Allen schooling JR Giddens RedsArmyAdmin December 14, 2009 Uncategorized 2 Comments Great item from TrueHoop over the weekend on Ray Allen and his way of riding the young guys like JR Giddens. As Giddens took long-range shooting practice this morning at the United Center in Chicago, Ray Allen sat observing, just inches away on the bench. Giddens isn't not a congenital shooter — he falls away a bit on his shot — but this morning, he was doing alright. He hit three consecutive shots in front of Allen from the right side. But that wasn't sufficient for Allen. "You touched the rim!" Allen said after Giddens' third make. [...] "What kind of shooter are you if you're touching the rim on your shot?" Allen said with a smile. Ray then went on to demonstrate what the lack of rim-touching should look like. Just goes to show just how much of a perfectionist Ray Allen is.  Giddens is probably in a "I don't care if hits 5 people and the lights on its way… as long as it goes in" mode.  But not Ray.  I hope JR learns a little something from moments like that.  Your good isn't good enough for people like Ray.  Your good has to be better than that.  It has to be perfect. Like this Article? Share it!
v0
2024-06-03T21:29:47.544Z
2013-05-18T08:09:15.000Z
4shrfbbmaz4ui63kr4p7jrltre6ae7xq
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24617", "uncompressed_offset": 207000048, "url": "regimechangeiran.blogspot.com/2006/07/new-iran-backed-insurgents-identified.html", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://regimechangeiran.blogspot.com/2006/07/new-iran-backed-insurgents-identified.html" }
cccc_CC-MAIN-2013-20
Thursday, July 06, 2006 New, Iran-backed Insurgents Identified in Iraq World Tribune.com: A new Shi'ite insurgency group has emerged in Iraq and has pledged not to attack civilians. The group, called the Islamic Resistance in Iraq-Abbas Brigades, was said to be aligned with Iran and the Lebanese-based Hizbullah. Already the group has pledged to battle the U.S.-led coalition in Iraq. "We have been patient enough and we have given the political process a chance," group said in a statement on July 2, Middle East Newsline reported. The group also produced a three-minute video that was aired by Lebanese television. In the video, the Shi'ite militia pledged not to attack Iraqi civilians. READ MORE "We assure them [Iraqis] that operations against civilians are great transgressions," Islamic Resistance in Iraq said. "Members of the Iraqi army, police and Iraqi security agencies are our sons, brothers and beloved. They are our hope for the future to preserve the land of Iraq and its security. So are state employees." Analysts said the group appeared to have been created by Hizbullah and meant to bolster the Shi'ite opposition in Iraq. So far, the Iranian-backed Badr Brigades and Mahdi Army have been reluctant to attack U.S. troops. The new group has claimed numerous strikes against the U.S.-led coalition. The video, broadcast on Lebanese New TV, claimed five recent bombings of armored personnel carriers and main battle tanks. No further information was provided.
v0
2024-06-03T21:29:47.544Z
2013-05-18T07:20:02.000Z
esvqcpmq5sbwhicqdym64bpmohqvrrfv
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24638", "uncompressed_offset": 239916504, "url": "strategywiki.org/wiki/RuneScape/Bars", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://strategywiki.org/wiki/RuneScape/Bars" }
cccc_CC-MAIN-2013-20
RuneScape/Bars From StrategyWiki, the video game walkthrough and strategy guide wiki Jump to: navigation, search This page is a stub. Help us expand it, and you get a cookie. Fore more information on what can be made from Bars see the Smithing guide. [edit] Bars Bar type Average selling price Bronze Bar 10-20 gp Iron Bar 150-200 gp Silver Bar 150-300 gp Steel Bar 400-600 gp Gold Bar 150-250 gp Mithril Bar 700-1,100 gp Adamant Bar 1,500-3,000 gp Rune Bar 10,000-15,000 gp Note: The selling price can and will change with time. [edit] How to turn a profit If a player just wants to sell their bars or ores they get from mining, then the prices above are what they should follow. Steel bars are the recommended bars to sell, as many players make steel plates to level up their smithing level, so there is a large demand for these bars. The best places to sell or buy bars is in Falador and Varrock. With the recent addition of the Grand Exchange, a player can make a large profit in a relatively short amount of time by selling bars there. However, if one could find a player buyer in person instead of using the Grand Exchange, prices will usually be better. [edit] For those with a high magic skill If a player's magic level is 55 and their smithing level is 48, then they can make a great amount of money. Using the spell high level alchemy, a player can make a great profit from using the spell (using the spell is also known as 'high alcing', pronouncing the 'c' as a 'k') on steel plates. When a player high alcs a steel platebody, they receive 1,200gp. So if a player has 100 steel plates, and they have enough runes to high alc the plates, then they've just made 120,000gp. The only con is that high alcing can be slow and boring, and the player has to have enough runes to cast the spell. It is not recommended players sell what they make to general stores, as these stores give players cheap prices. Instead, they should high alc them. If their magic level is not high enough, then players should sell what they made to other players. Players are strongly recommended that they do not use the weaker alchemy spell, low level alchemy, as this spell gives players a very small amount of gp than they would receive from high alcing. Social networking Personal tools Namespaces Variants Views Actions
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:28:02.000Z
vbfteuttdvxxjptzzffo43fkzgg3swvw
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24677", "uncompressed_offset": 289181646, "url": "www.abs.gov.au/AUSSTATS/abs%40.nsf/DetailsPage/9219.01995", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://www.abs.gov.au/AUSSTATS/abs@.nsf/DetailsPage/9219.01995?OpenDocument" }
cccc_CC-MAIN-2013-20
Australian Bureau of Statistics Celebrating the International Year of Statistics 2013 ABS Home > Statistics > By Catalogue Number 9219.0 - Information Paper: Motor Vehicle Use, Australia, 1995   Latest ISSUE Released at 11:30 AM (CANBERRA TIME) 27/02/1998  Ceased    Page tools: RSS Search this Product Help for :   Adobe PDF.   Publications      9219.0 - Information Paper: Motor Vehicle Use, Australia © Commonwealth of Australia 2013 Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
v0
2024-06-03T21:29:47.544Z
2013-05-18T08:08:56.000Z
hqfum7q7p4gxuuwcpjnkk3neq4cv4jfk
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24678", "uncompressed_offset": 289209163, "url": "www.abs.gov.au/AUSSTATS/abs%40.nsf/second%2Blevel%2Bview?issue=1999-2000&prodno=8565.0&prodno=8565.0&tabname=Past+Future+Issues&viewtitle=Hire+Industries%2C+Australia%2C+Preliminary~1999-2000~Latest~17%2F05%2F2001", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://www.abs.gov.au/AUSSTATS/abs@.nsf/second+level+view?ReadForm&prodno=8565.0&viewtitle=Hire%20Industries,%20Australia,%20Preliminary~1999-2000~Latest~17/05/2001&tabname=Past%20Future%20Issues&prodno=8565.0&issue=1999-2000&num=&view=" }
cccc_CC-MAIN-2013-20
Australian Bureau of Statistics Celebrating the International Year of Statistics 2013 ABS Home > Statistics > By Catalogue Number 8565.0 - Hire Industries, Australia, Preliminary, 1999-2000   Latest ISSUE Released at 11:30 AM (CANBERRA TIME) 17/05/2001      First Release • First Issue: 1999-2000 © Commonwealth of Australia 2013 Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:30:46.000Z
a7xfidkv2po6pda6jysc47fxit6khigp
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24684", "uncompressed_offset": 308021502, "url": "www.antweb.org/specimen.do?name=casent0173129", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://www.antweb.org/specimen.do?name=casent0173129" }
cccc_CC-MAIN-2013-20
Global: All Antweb > Formicidae > Formicinae > Plagiolepis > Plagiolepis pygmaea     See all Plagiolepis pygmaea in Bolton World Catalog      or in Specimen: CASENT0173129 Species: Plagiolepis pygmaea Name Status: Locality Information: Locality:  Slovenia:   Adlesici • Latitude: • 45.5222 • Longitude: • 15.3167 • Lat. lon. max error: • Elevation: • Elevation max error: Locality notes: Collection Information: • Collection code: • Collected by: • Peter Boer   • Habitat: •   • Date collected: • 13 Jul 2004 • Date collected end: • Method: • Microhabitat: Collection notes: Specimen Information: Life stage: 1aQ, 1w, 1m Located at: on loan to Eli Sarnat Owned by: CASC Determined by: Peter Boer Date determined: Type status: Medium: pin DNA notes: Specimen notes: Specimen data uploaded by California Academy of Sciences | See something amiss? Send us an email. Specimen Image: Enlarge Map
v0
2024-06-03T21:29:47.544Z
2013-05-18T07:22:11.000Z
3aukmah6alv2aszk7qdfn7xuqwhawjno
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24685", "uncompressed_offset": 336384059, "url": "www.biomedcentral.com/1471-2121/8/7?fmt_view=mobile", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://www.biomedcentral.com/1471-2121/8/7?fmt_view=mobile" }
cccc_CC-MAIN-2013-20
Research article Full Length Bid is sufficient to induce apoptosis of cultured rat hippocampal neurons Hans-Georg König1, Markus Rehm1, Daniel Gudorf2, Stan Krajewski3, Atan Gross4, Manus W Ward1 and Jochen HM Prehn1* Author affiliations 1 Department of Physiology and RCSI Neuroscience Research Centre, Royal College of Surgeons in Ireland, 123 St Stephen's Green, Dublin 2, Ireland 2 Interdisciplinary Center for Clinical Research, University Münster Clinics, D-48149 Münster, Germany 3 The Burnham Institute, Program on Apoptosis and Cell Death, La Jolla, CA 92037, USA 4 Department of Biological Regulation, Weizmann Institute of Science, Rehovot 76100, Israel For all author emails, please log on. Citation and License BMC Cell Biology 2007, 8:7 doi:10.1186/1471-2121-8-7 The electronic version of this article is the complete one and can be found online at: http://www.biomedcentral.com/1471-2121/8/7 Received:6 June 2006 Accepted:27 February 2007 Published:27 February 2007 © 2007 König et al; licensee BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Abstract Background Bcl-2 homology domain (BH) 3-only proteins are pro-apoptotic proteins of the Bcl-2 family that couple stress signals to the mitochondrial cell death pathways. The BH3-only protein Bid can be activated in response to death receptor activation via caspase 8-mediated cleavage into a truncated protein (tBid), which subsequently translocates to mitochondria and induces the release of cytochrome-C. Using a single-cell imaging approach of Bid cleavage and translocation during apoptosis, we have recently demonstrated that, in contrast to death receptor-induced apoptosis, caspase-independent excitotoxic apoptosis involves a translocation of full length Bid (FL-Bid) from the cytosol to mitochondria. We induced a delayed excitotoxic cell death in cultured rat hippocampal neurons by a 5-min exposure to the glutamate receptor agonist N-methyl-D-aspartate (NMDA; 300 μM). Results Western blot experiments confirmed a translocation of FL-Bid to the mitochondria during excitotoxic apoptosis that was associated with the release of cytochrome-C from mitochondria. These results were confirmed by immunofluorescence analysis of Bid translocation during excitotoxic cell death using an antibody raised against the amino acids 1–58 of mouse Bid that is not able to detect tBid. Finally, inducible overexpression of FL-Bid or a Bid mutant that can not be cleaved by caspase-8 was sufficient to induce apoptosis in the hippocampal neuron cultures. Conclusion Our data suggest that translocation of FL-Bid is sufficient for the activation of mitochondrial cell death pathways in response to glutamate receptor overactivation. Background Excitotoxic neuron death has been implicated in the pathogenesis of ischemic, traumatic, and seizure-induced brain injury [1]. When glutamate receptor overactivation is intense, cell death is necrotic and characterized by a disturbance of cellular ion and volume homeostasis, leading to mitochondrial membrane potential (ΔΨm) depolarization, free radical production, ATP depletion and early plasma membrane leakage [2-5]. However, when glutamate receptor overactivation is subtle, mitochondria transiently recover their energetics, and a delayed cell death may result [3,6,7]. Under these conditions, excitotoxic neuron death is associated with the release of the pro-apoptotic factors cytochrome-C (cyt-C) and Apoptosis-Inducing Factor (AIF) from mitochondria [6-10]. The mechanisms of cyt-C and AIF release during excitotoxic neuron death remain unresolved. In the evolutionary conserved apoptosis pathway, the release of cyt-C requires the pro-apoptotic Bcl-2 family members Bax or Bak [11]. Both proteins are believed to form megachannels in the outer mitochondrial membrane large enough to release intermembrane space proteins [12]. In order to cause this increased permeability, Bax and Bak undergo a conformational change and insert into the outer mitochondrial membrane [13,14]. In non-apoptotic cells, activation of Bax or Bak is inhibited by anti-apoptotic Bcl-2 family members such as Bcl-2 and Bcl-xL. In apoptotic cells, the transcriptional induction or post-translational activation of Bcl-2-homolgy domain-3 (BH3)-only proteins overcomes this inhibition and triggers the activation of Bax and Bak and the release of cyt-C [15,16]. The release of AIF in excitotoxicity and apoptosis is likewise inhibited by Bcl-2 [10,17], suggesting that the activation of BH3-only proteins may also be required to relieve a Bcl-2 inhibition of AIF release. Previous studies have indicated an involvement of the BH3-only protein Bad in glutamate- and Ca2+-induced neuronal apoptosis [18]. Interestingly, neurons from mice deficient in the BH3-only protein Bid have also been shown to be resistant to ischemic injury in vivo, as well as hypoxic and excitotoxic injury in vitro [19]. Bid is an essential component of most forms of death receptor-mediated apoptosis, and is activated post-translationally via caspase-8-mediated cleavage into a truncated form (tBid) [20,21]. tBid is subsequently myristoylated [22], triggers the activation of Bak or Bax [23,24], and induces cyt-C release from mitochondria. However, there is a growing body of evidence suggesting that caspase activation during excitotoxic neuron death may be marginal or even absent [6,8,25-27]. Conversely, this suggests that Bid may trigger excitotoxic cell death through more than one pathway. Using a fluorescence resonance energy transfer single-cell imaging approach of Bid cleavage and translocation during apoptosis, we have recently demonstrated that caspase-independent excitotoxic apoptosis induces a translocation of full length Bid (FL-Bid) from the cytosol to mitochondria [28]. In the present study, we demonstrate FL-Bid is sufficient to induce apoptosis of cultured rat hippocampal neurons. Results FL-Bid is not a significant protease substrate during excitotoxic neuron death To investigate the involvement of apoptotic proteins in excitotoxic neuron death, we recently established a model in which a transient, 5-min exposure to the glutamate receptor agonist NMDA (300 μM) induced a delayed cell death in primary cultures of rat hippocampal neurons [7,8]. This excitotoxic cell death is characterized by mitochondrial cyt-C release and ΔΨm depolarization setting in 4 to 8 h after the NMDA exposure, followed by nuclear condensation and cell shrinkage [7,8]. We determined if FL-Bid is able to translocate to mitochondria in this model of excitotoxic apoptosis. To this end, immunoblotting experiments were performed using a rabbit polyclonal antibody (AR-53) that detects p21 FL-Bid, as well as its caspase-8-/caspase-3-generated NH2-terminal cleavage product [29,30]. Control experiments demonstrated that the antibody was able to detect FL-Bid and its caspase-generated NH2-terminal p7 fragment in HeLa D98 cells after an activation of death receptors with TNF-α/Cycloheximide(CHX) (Fig. 1A, see also Additional File 1). The antibody was also able to detect the p7 fragment in cultured rat hippocampal neurons (Fig. 1B) exposed to the apoptosis-inducing kinase inhibitor staurosporine (STS) or TNF-α/CHX (Fig. 1B see also Additional File 1). However, neither a decrease in the content of FL-Bid, nor an accumulation of caspase-generated cleavage products could be detected in whole cell lysates of cultured rat hippocampal neurons exposed to NMDA (Fig. 1C, see also Additional File 1). Activation of proteases after the NMDA exposure was however clearly detectable in the same whole cell lysates. This was evident from the decrease in the calpain I substrate full-length α-spectrin and the accumulation of calpain-specific 150 and 145 kDa α-spectrin cleavage products 4 and 8 h after the NMDA exposure (Fig. 1D). Additional File 1. Long exposures for Figure 1A, B and 1C. The abundance of the FL-Bid in relation to the cleaved-Bid fragments is depicted on one blot. In contrast to STS and TNF-α treated HeLa cells no such band is visible after treatment of the hippocampal neurons with NMDA. Format: PDF Size: 2.7MB Download file This file can be viewed with: Adobe Acrobat Reader Figure 1. Death receptor mediated cleavage of Bid in HeLa cells and cultured rat hippocampal neurons. Cleavage of FL-Bid in HeLa D98 cells (A)and cultured rat hippocampal neurons (B)exposed to TNF-α plus CHX (100 ng/ml plus 1 μg/ml) or staurosporine (STS, 3 μM and 300 nM, respectively) for the indicated time periods. Bid cleavage was detected by Western blot analysis. Duplicate experiments yielded similar results. (C)No detectable cleavage of FL-Bid during NMDA-induced neuronal death. Cultured rat hippocampal neurons were exposed to 300 μM NMDA in Mg2+-free HBS for 5 min, washed, returned to the original culture medium, and analyzed by Western blotting after 4 and 8 h. Sham-washed cultures were exposed to Mg2+-free HBS devoid of NMDA. Lack of Bid cleavage during excitotoxic neuron death was observed in four separate experiments. (D)Immunoblot analysis demonstrates significant cleavage of α-spectrin into its calpain-generated 150 and 145 kDa breakdown products. Duplicate experiments yielded similar results. Translocation of FL-Bid to mitochondria during excitotoxic neuron death Next, we performed selective plasma membrane permeabilization and subsequent immunoblotting of the cytosolic fraction and the mitochondria-containing pellet fraction in cultured rat hippocampal neurons exposed to NMDA for 5 min. Immunoblotting with a voltage dependent anion carrier (VDAC) antibody demonstrated that the cytosolic fraction was not contaminated with mitochondria. Immunoblotting with the Bid antibody revealed that p21 FL-Bid translocated from the cytosol to the mitochondria-containing pellet fraction 4 h and more pronounced 8 h after termination of the NMDA exposure (Fig. 2A). This process was paralleled by the translocation of cyt-C from the mitochondria-containing pellet fraction to the cytosol (Fig. 2A) 4 h and 8 h after the NMDA exposure. Interestingly, despite a significant cyt-C decrease in the mitochondrial fraction by 8 h, the cyt-C content in the cytosolic fraction did not increase correspondingly, suggesting that cyt-C may be degraded upon release into the cytosol (see also [31]). Indeed, treatment with the membrane permeable cathepsin inhibitor CA-074 methyl ester recovered the cyt-C content in the cytosolic fraction 8 h after the NMDA exposure (Fig. 2A). Figure 2. Translocation of FL-Bid to the mitochondria coincides with a loss of cyt-C. (A)Immunoblot analysis of cytosolic and mitochondria-containing pellet fractions after selective plasma membrane permeabilization in cells exposed to Mg2+-free HBS (controls) or NMDA with or without CA-074-Me. The experiment was performed in duplicate with similar results. (B)Immunofluorescence analysis of cyt-C and Bid distribution in sham- and NMDA-exposed rat hippocampal neurons. Cells were fixed 8 h after termination of the exposure. Nuclei were counterstained with Hoechst 33258. Scale bar = 5 μm. These results were confirmed by immunofluorescence analysis of Bid redistribution during excitotoxic neuron death using the above described Bid antibody. Neurons of sham-exposed control cultures exhibited a diffuse Bid immunofluorescence signal (Fig. 2B). Cyt-C co-staining revealed a filamentous, punctate staining pattern in sham-exposed controls characteristic of mitochondria. In contrast, cells that had released cyt-C in response to NMDA exhibited a clustered Bid immunofluorescence around the nucleus. Cells with released cyt C and clustered Bid immunofluorescence also exhibited nuclear chromatin condensation as evidenced by staining with the chromatin dye Hoechst 33258 (Fig. 2B). Mild overexpression of FL-Bid or a Bid mutant that can not be cleaved by caspase-8 potently induces cell death in cultured rat hippocampal neurons We subsequently addressed the question, whether FL-Bid was sufficient to induce cell death in the hippocampal neuron cultures, and whether this cell death can occur in the absence of caspase-8-mediated Bid cleavage. Cultured rat hippocampal neurons were infected with adenoviral vectors expressing either FL-Bid or a Bid mutant that can not be cleaved by caspase-8 (D59A) under the control of a tetracycline responsive promoter [32]. Western blot analysis of cultures infected with the adenoviral vectors (50 MOI) and induced for 24 h with 1 μg/ml doxycycline demonstrated a mild overexpression of FL-Bid in the hippocampal neuron cultures (Fig. 3A). This overexpression was however sufficient to induce a massive cell death in the hippocampal neuron cultures that was characterized by cell shrinkage and nuclear condensation. Hoechst staining of nuclear chromatin revealed significant neuronal damage 24 h after induction with doxycycline, reaching a level of 80.1 ± 2.7% (Fig. 3B). FL-Bid-induced cell death was associated with the mitochondrial release of the pro-apoptotic factors cyt-C and AIF (Fig. 3C and data not shown). In contrast, hippocampal neurons that were infected with the adenoviral vectors but were not induced with doxycycline remained viable for up to 24 h, as were cells that were treated with doxycycline but not infected with the adenoviral vectors (Fig. 3B). Interestingly, overexpression of Bid(D59A) also potently induced cell death in the hippocampal neuron cultures, reaching a level of 73.5 ± 3.1% after 24 h (p > 0.1, no significant difference compared to FL-Bid induced cultures). Figure 3. FL-Bid or a Bid mutant that can not be cleaved by caspase-8 potently induces cell death in cultured rat hippocampal neurons. (A)Western blot analysis of Bid overexpression in cultured rat hippocampal neurons. Cells were co-infected with the wild-type (wt) FL-Bid adenovirus and the rtTA containing virus. Expression of Bid was induced by 1 μg/ml doxycycline treatment for 12 or 24 h. Control cells were infected but not induced. (B)Quantification of cells showing nuclear condensation in response to an overexpression of wt FL-Bid or the Bid(D59A) mutant (mt). Cells were co-infected with the wt or mt FL-Bid adenovirus and the rtTA containing virus. After 48 h, expression of Bid was induced by the addition of 1 μM doxycycline for 12 or 24 h. Cells exhibiting nuclear condensation or nuclear fragmentation were counted in 4 – 5 randomly chosen subfields after staining with the chromatin-specific dye Hoechst 33528. Data are means ± SEM from n = 3 experiments. (C)AIF immunofluorescence analysis in non-induced and induced hippocampal neurons. Cells were co-infected with the wt FL-Bid adenovirus and the rtTA containing virus and induced for 12 h. Note the mitochondrial AIF immunofluorescence in non-induced cells sparing the nuclear region, and AIF translocation to the nucleus in the induced neuron cultures. Bar = 10 μm. Discussion Ischemic and hypoxic injuries to the nervous system have been shown to involve the release of cell death-inducing cytokines and the activation of death receptors [19]. It is likely that these events involve the caspase-8-mediated cleavage of the BH3-only protein Bid. In support of this hypothesis, Bid-deficient animals exhibited reduced neuronal injury after cerebral ischaemia [19]. Our data provide evidence that Bid may be involved in an additional, intrinsic cell death pathway triggered by the overactivation of glutamate receptors. This pathway did not require the generation of the caspase-8-generated cleavage product tBid. Instead, we observed an efficient translocation of FL-Bid to mitochondria during excitotoxic neuron death. This translocation was associated with the mitochondrial release of pro-apoptotic factors, a process that commits cells to both caspase-dependent and caspase-independent cell death [33,34]. Although our data does not rule out the possibility that other BH3 only proteins are involved in excitotoxic apoptosis, it demonstrates that FL-Bid is sufficient to induce an apoptotic cell death in cultured rat hippocampal neurons. There is growing evidence that the caspase cascade may not be potently activated during excitotoxic neuron death, despite the release of cyt-C from mitochondria [6-10,27,28]. We and others have previously demonstrated that calpains activated during excitotoxicity degrade and inactivate essential components of the caspase activating pathway including APAF-1, procaspase-9, -8, and -3 [8,35,36]. There is also evidence that levels of Apaf-1 decrease during neuronal maturation, inhibiting apoptosome formation after mitochondrial outer membrane permeabilization (MOMP) [37]. In the absence of caspase activation MOMP may activate alternative cell death pathways that include ATP depletion and increased ROS production subsequent to cyt-C release, as well as the release of AIF [7,9,38-40]. In contrast to death receptor-induced apoptosis we could not detect significant amounts of cleaved Bid accumulating in the cultured rat hippocampal neurons in response to NMDA. However, we cannot exclude the possibility that Bid may be cleaved during the later stages of apoptosis, downstream of MOMP or an intracellular ion homeostasis breakdown [28,41,42]. These cells will subsequently undergo plasma membrane leakage, a process that may limit the ability to detect Bid cleavage during the late stages of apoptosis. A previous report has demonstrated that translocation of FL-Bid to mitochondria may also occur in response to an activation of death receptors when caspase-8 activation is blocked by the addition of a caspase-8 inhibitor [43]. In Bid- and caspase-8-deficient mouse embryonic fibroblasts, FL-Bid or the non-cleavable mutant FL-Bid(D59A) are also sufficient to activate apoptosis [32]. In line with this finding we found no significant difference in the ability of FL-Bid and Bid(D59A) to induce cell death in cultured rat hippocampal neurons. How may NMDA receptor overactivation stimulate FL-Bid translocation? Previous studies have demonstrated that excitotoxic neuron death is associated with a selective inhibition of phosphatidylcholine synthesis [44]. It has also been shown that physiological concentrations of phosphatidic acid and phosphatidylgycerol are able to induce an accumulation of FL-Bid in mitochondria [45]. FL-Bid has been shown to be sufficient to induce the oligomerization of Bax/Bak, resulting in its integration into the outer mitochondrial membrane triggering cyt-C release [24]. Finally, recombinant FL-Bid displayed lipid transfer activity under the same conditions and at the same nanomolar concentrations that lead to mitochondrial translocation and Cyt-C release [45]. Changes in the intracellular phospholipid environment during excitotoxic cell death signals may hence induce the translocation of FL-Bid to mitochondria and may initiate the release of pro-apoptotic factors from mitochondria. Conclusion Bid is highly expressed in the nervous system during embryonic and postnatal development. Interestingly and in contrast to most BH3 only proteins, Bid expression remains high in the adult nervous system [29]. The ability of both tBid and FL-Bid to translocate to mitochondria and to induce cell death suggest that this BH3-only protein is a central mediator of pathophysiological neuron death. Methods Materials N-Methyl-D-aspartate (NMDA), recombinant tumor necrosis factor-α (TNF-α), glycin and cycloheximide (CHX) came from Sigma (Poole, Dorset, U.K.). Tetrodotoxin was purchased from Biotrend (Cologne, Germany), CA-074 methyl ester (CA-074-ME) from Calbiochem (Bad Soden, Germany), and staurosporine (STS) from Alexis (Grünberg, Germany). Cell Culture Cultured hippocampal neurons were prepared from neonatal (P1) Fischer 344 rats (Luetjens et al., 2000). Dissociated hippocampal neurons were plated at a density of 2 × 105 cells/cm2 into poly-L-lysine-coated 6- or 24-well plates or glass chamber slides (Nunc). Cells were maintained in MEM medium supplemented with 10% NU-serum, 2% B-27 supplement (50 × concentrate), 2 mM L-glutamine, 20 mM D-glucose, 26.2 mM sodium bicarbonate, 100 U/ml penicillin and 100 μg/ml streptomycin (Life Technologies, Karlsruhe, Germany). Experiments were performed on 14 – 16 day-old cultures. Animal care followed official governmental guide lines. HeLa D98 cells were cultured in RPMI 1640 medium (Life Technologies, Germany) supplemented with 10% fetal calf serum (PAA, Cölbe, Germany). Excitotoxic neuronal injury Cultures were exposed for 5 min to Mg2+-free Hepes-buffered saline (HBS) supplemented with 300 μM NMDA, 0.5 μM tetrodotoxin and 1 μM glycine [7,8]. Control cultures were exposed to Mg2+-free HBS devoid of NMDA (sham exposure). Cell death was determined after 24 h by trypan-blue uptake [7]. Experiments were performed on 14 or 15 day-old cultures. Generation of adenoviral vectors expressing FL-Bid or FL-Bid(D59A) in an inducible system and infection protocol Tetracycline (tet)-on inducible adenovirus vectors expressing wild-type FL-Bid or the D59A mutant of FL-Bid that can not be cleaved by caspase-8 were generated as described previously [32]. Hippocampal neurons were infected at a MOI (multiplicity of infection) of 50 with both the FL-Bid or Bid(D59A) containing viruses and the reverse tet transactivator rtTA containing virus. One μg/ml doxycycline (Sigma) was added to the medium 24 h post infection to activate gene expression from the tet-inducible promoter [32]. Immunofluorescence microscopy Hippocampal neurons were washed, fixed with formaldehyde, and permeabilized with Tween-20 (0.3%). The following primary antibodies were used: mouse monoclonal anti-cyt-C (6H2.B4, San Diego, CA; 10 μg/ml), rabbit polyclonal anti-Bid raised against amino acids 1–58 of mouse Bid (AR-53; 1:1,000), and rabbit polyclonal anti-Apoptosis-Inducing-Factor (AIF) (1:500; [46]). Nuclei were counterstained with Hoechst33258. Primary antibodies were detected and fluorescent images acquired as described previously [7]. Digitonization, SDS-PAGE, and Western blotting The release of cyt-C from mitochondria was analyzed by selective permeabilization of the plasma membrane [47]. Briefly, cells were permeabilized with 100 μg/ml digitonin at 4°C for 10 min. The supernatant representing the cytosol and the mitochondria-containing pellet fraction were separated by centrifugation and denatured. SDS-PAGE and Western blot analysis was performed as described previously [8]. Cyt-C was detected with a monoclonal Cyt-C antibody (7H8.2C12; Pharmingen), Bid with the rabbit polyclonal antibody diluted 1:2,000, VDAC (Porin) and HSP-90 with mouse monoclonal anti-Porin (31HL, Calbiochem) and anti-HSP90α/β (Santa Cruz, Heidelberg, Germany) antibodies, respectively, at a dilution of 1:5,000. α-spectrin and its calpain-generated cleavage products were detected with a mouse monoclonal antibody (1622; Chemicon) diluted 1:5,000, and α-tubulin with a mouse monoclonal antibody (DM-1A; Sigma) diluted 1:1,000. Statistics Data are given as means ± S.E.M. For statistical comparison, one-way analysis of variance followed by Tukey's test were employed. P values smaller than 0.05 were considered to be statistically significant. Authors' contributions HGK carried out the molecular analyses, participated in the sequence alignment and drafted the manuscript. MR carried out the immunoassays. DG participated in the sequence alignment. SK participated in the design of the study and performed the statistical analysis. MW carried out immunofluorescence, participated in its design and coordination and helped to draft the manuscript. JHMP conceived of the study, and participated in its design and coordination and helped to draft the manuscript. All authors have read and approved the final manuscript Acknowledgements The authors thank Hanni Bähler, Helena Bonner and Christiane Schettler for technical assistance, Dr. Richard C. Marcellus for his help preparing the adenoviral vectors, Dr. Marcel Leist for the AIF antibody. This work was supported by grants from the European Union (MTKD-CT-2004-014499), NIH Grant (NS36821) to S.K. and Science Foundation Ireland (03/RP/B344) to J.H.M.P. References 1. Choi DW: Glutamate receptors and the induction of excitotoxic neuronal death. Prog Brain Res 1994, 100:47-51. PubMed Abstract 2. Choi DW: Ionic dependence of glutamate neurotoxicity. J Neurosci 1987, 7(2):369-379. PubMed Abstract | Publisher Full Text 3. Ankarcrona M, Dypbukt JM, Bonfoco E, Zhivotovsky B, Orrenius S, Lipton SA, Nicotera P: Glutamate-induced neuronal death: a succession of necrosis or apoptosis depending on mitochondrial function. Neuron 1995, 15(4):961-973. PubMed Abstract | Publisher Full Text 4. Budd SL, Nicholls DG: Mitochondria, calcium regulation, and acute glutamate excitotoxicity in cultured cerebellar granule cells. J Neurochem 1996, 67(6):2282-2291. PubMed Abstract | Publisher Full Text 5. White RJ, Reynolds IJ: Mitochondrial depolarization in glutamate-stimulated neurons: an early signal specific to excitotoxin exposure. J Neurosci 1996, 16(18):5688-5697. PubMed Abstract | Publisher Full Text 6. Budd SL, Tenneti L, Lishnak T, Lipton SA: Mitochondrial and extramitochondrial apoptotic signaling pathways in cerebrocortical neurons. Proc Natl Acad Sci USA 2000, 97(11):6161-6166. PubMed Abstract | Publisher Full Text | PubMed Central Full Text 7. Luetjens CM, Bui NT, Sengpiel B, Munstermann G, Poppe M, Krohn AJ, Bauerbach E, Krieglstein J, Prehn JH: Delayed mitochondrial dysfunction in excitotoxic neuron death: cytochrome c release and a secondary increase in superoxide production. J Neurosci 2000, 20(15):5715-5723. PubMed Abstract | Publisher Full Text 8. Lankiewicz S, Marc Luetjens C, Truc Bui N, Krohn AJ, Poppe M, Cole GM, Saido TC, Prehn JH: Activation of calpain I converts excitotoxic neuron death into a caspase-independent cell death. J Biol Chem 2000, 275(22):17064-17071. PubMed Abstract | Publisher Full Text 9. Yu SW, Wang H, Poitras MF, Coombs C, Bowers WJ, Federoff HJ, Poirier GG, Dawson TM, Dawson VL: Mediation of poly(ADP-ribose) polymerase-1-dependent cell death by apoptosis-inducing factor. Science 2002, 297(5579):259-263. PubMed Abstract | Publisher Full Text 10. Wang H, Yu SW, Koh DW, Lew J, Coombs C, Bowers W, Federoff HJ, Poirier GG, Dawson TM, Dawson VL: Apoptosis-inducing factor substitutes for caspase executioners in NMDA-triggered excitotoxic neuronal death. J Neurosci 2004, 24(48):10963-10973. PubMed Abstract | Publisher Full Text 11. Wei MC, Zong WX, Cheng EH, Lindsten T, Panoutsakopoulou V, Ross AJ, Roth KA, MacGregor GR, Thompson CB, Korsmeyer SJ: Proapoptotic BAX and BAK: a requisite gateway to mitochondrial dysfunction and death. Science 2001, 292(5517):727-730. PubMed Abstract | Publisher Full Text 12. Kuwana T, Mackey MR, Perkins G, Ellisman MH, Latterich M, Schneiter R, Green DR, Newmeyer DD: Bid, Bax, and lipids cooperate to form supramolecular openings in the outer mitochondrial membrane. Cell 2002, 111(3):331-342. PubMed Abstract | Publisher Full Text 13. Goping IS, Gross A, Lavoie JN, Nguyen M, Jemmerson R, Roth K, Korsmeyer SJ, Shore GC: Regulated targeting of BAX to mitochondria. J Cell Biol 1998, 143(1):207-215. PubMed Abstract | Publisher Full Text 14. Eskes R, Antonsson B, Osen-Sand A, Montessuit S, Richter C, Sadoul R, Mazzei G, Nichols A, Martinou JC: Bax-induced cytochrome C release from mitochondria is independent of the permeability transition pore but highly dependent on Mg2+ ions. J Cell Biol 1998, 143(1):217-224. PubMed Abstract | Publisher Full Text 15. Huang DC, Strasser A: BH3-Only proteins-essential initiators of apoptotic cell death. Cell 2000, 103(6):839-842. PubMed Abstract | Publisher Full Text 16. Green DR: At the gates of death. Cancer Cell 2006, 9(5):328-330. PubMed Abstract | Publisher Full Text 17. Susin SA, Zamzami N, Castedo M, Hirsch T, Marchetti P, Macho A, Daugas E, Geuskens M, Kroemer G: Bcl-2 inhibits the mitochondrial release of an apoptogenic protease. J Exp Med 1996, 184(4):1331-1341. PubMed Abstract | Publisher Full Text 18. Wang HG, Pathan N, Ethell IM, Krajewski S, Yamaguchi Y, Shibasaki F, McKeon F, Bobo T, Franke TF, Reed JC: Ca2+-induced apoptosis through calcineurin dephosphorylation of BAD. Science 1999, 284(5412):339-343. PubMed Abstract | Publisher Full Text 19. Plesnila N, Zinkel S, Le DA, Amin-Hanjani S, Wu Y, Qiu J, Chiarugi A, Thomas SS, Kohane DS, Korsmeyer SJ, et al.: BID mediates neuronal cell death after oxygen/glucose deprivation and focal cerebral ischemia. Proc Natl Acad Sci USA 2001, 98(26):15318-15323. PubMed Abstract | Publisher Full Text | PubMed Central Full Text 20. Li H, Zhu H, Xu CJ, Yuan J: Cleavage of BID by caspase 8 mediates the mitochondrial damage in the Fas pathway of apoptosis. Cell 1998, 94(4):491-501. PubMed Abstract | Publisher Full Text 21. Luo X, Budihardjo I, Zou H, Slaughter C, Wang X: Bid, a Bcl2 interacting protein, mediates cytochrome c release from mitochondria in response to activation of cell surface death receptors. Cell 1998, 94(4):481-490. PubMed Abstract | Publisher Full Text 22. Zha J, Weiler S, Oh KJ, Wei MC, Korsmeyer SJ: Posttranslational N-myristoylation of BID as a molecular switch for targeting mitochondria and apoptosis. Science 2000, 290(5497):1761-1765. PubMed Abstract | Publisher Full Text 23. Wei MC, Lindsten T, Mootha VK, Weiler S, Gross A, Ashiya M, Thompson CB, Korsmeyer SJ: tBID, a membrane-targeted death ligand, oligomerizes BAK to release cytochrome c. Genes Dev 2000, 14(16):2060-2071. PubMed Abstract | Publisher Full Text | PubMed Central Full Text 24. Eskes R, Desagher S, Antonsson B, Martinou JC: Bid induces the oligomerization and insertion of Bax into the outer mitochondrial membrane. Mol Cell Biol 2000, 20(3):929-935. PubMed Abstract | Publisher Full Text | PubMed Central Full Text 25. Armstrong RC, Aja TJ, Hoang KD, Gaur S, Bai X, Alnemri ES, Litwack G, Karanewsky DS, Fritz LC, Tomaselli KJ: Activation of the CED3/ICE-related protease CPP32 in cerebellar granule neurons undergoing apoptosis but not necrosis. J Neurosci 1997, 17(2):553-562. PubMed Abstract | Publisher Full Text 26. Johnson MD, Kinoshita Y, Xiang H, Ghatan S, Morrison RS: Contribution of p53-dependent caspase activation to neuronal cell death declines with neuronal maturation. J Neurosci 1999, 19(8):2996-3006. PubMed Abstract | Publisher Full Text 27. Cao J, Semenova MM, Solovyan VT, Han J, Coffey ET, Courtney MJ: Distinct requirements for p38alpha and c-Jun N-terminal kinase stress-activated protein kinases in different forms of apoptotic neuronal death. J Biol Chem 2004, 279(34):35903-35913. PubMed Abstract | Publisher Full Text 28. Ward MW, Rehm M, Duessmann H, Kacmar S, Concannon CG, Prehn JH: Real Time Single Cell Analysis of Bid Cleavage and Bid Translocation during Caspase-dependent and Neuronal Caspase-independent Apoptosis. J Biol Chem 2006, 281(9):5837-5844. PubMed Abstract | Publisher Full Text 29. Krajewska M, Mai JK, Zapata JM, Ashwell KW, Schendel SL, Reed JC, Krajewski S: Dynamics of expression of apoptosis-regulatory proteins Bid, Bcl-2, Bcl-X, Bax and Bak during development of murine nervous system. Cell Death Differ 2002, 9(2):145-157. PubMed Abstract | Publisher Full Text 30. Franz G, Beer R, Intemann D, Krajewski S, Reed JC, Engelhardt K, Pike BR, Hayes RL, Wang KK, Schmutzhard E, et al.: Temporal and spatial profile of Bid cleavage after experimental traumatic brain injury. J Cereb Blood Flow Metab 2002, 22(8):951-958. PubMed Abstract | Publisher Full Text 31. Neame SJ, Rubin LL, Philpott KL: Blocking cytochrome c activity within intact neurons inhibits apoptosis. J Cell Biol 1998, 142(6):1583-1593. PubMed Abstract | Publisher Full Text 32. Sarig R, Zaltsman Y, Marcellus RC, Flavell R, Mak TW, Gross A: BID-D59A is a potent inducer of apoptosis in primary embryonic fibroblasts. J Biol Chem 2003, 278(12):10707-10715. PubMed Abstract | Publisher Full Text 33. Kogel D, Prehn JHM: Caspase-independent cell death pathways. In Caspases – their role in cell death and cell survival. Edited by Los M, Walczak H. Kluwer Academic Press; 2002:237-248. (Caspases-their role in cell death and cell survival) 34. Kroemer G, Martin SJ: Caspase-independent cell death. Nat Med 2005, 11(7):725-730. PubMed Abstract | Publisher Full Text 35. Chua BT, Guo K, Li P: Direct cleavage by the calcium-activated protease calpain can lead to inactivation of caspases. J Biol Chem 2000, 275(7):5131-5135. PubMed Abstract | Publisher Full Text 36. Reimertz C, Kogel D, Lankiewicz S, Poppe M, Prehn JH: Ca(2+)-induced inhibition of apoptosis in human SH-SY5Y neuroblastoma cells: degradation of apoptotic protease activating factor-1 (APAF-1). J Neurochem 2001, 78(6):1256-1266. PubMed Abstract | Publisher Full Text 37. Wright KM, Linhoff MW, Potts PR, Deshmukh M: Decreased apoptosome activity with neuronal differentiation sets the threshold for strict IAP regulation of apoptosis. J Cell Biol 2004, 167(2):303-313. PubMed Abstract | Publisher Full Text 38. Krippner A, Matsuno-Yagi A, Gottlieb RA, Babior BM: Loss of function of cytochrome c in Jurkat cells undergoing fas-mediated apoptosis. J Biol Chem 1996, 271(35):21629-21636. PubMed Abstract | Publisher Full Text 39. Cai J, Jones DP: Superoxide in apoptosis. Mitochondrial generation triggered by cytochrome c loss. J Biol Chem 1998, 273(19):11401-11404. PubMed Abstract | Publisher Full Text 40. Cregan SP, Fortin A, MacLaurin JG, Callaghan SM, Cecconi F, Yu SW, Dawson TM, Dawson VL, Park DS, Kroemer G, et al.: Apoptosis-inducing factor is involved in the regulation of caspase-independent neuronal cell death. J Cell Biol 2002, 158(3):507-517. PubMed Abstract | Publisher Full Text 41. Ward MW, Rego AC, Frenguelli BG, Nicholls DG: Mitochondrial membrane potential and glutamate excitotoxicity in cultured cerebellar granule cells. J Neurosci 2000, 20(19):7208-7219. PubMed Abstract | Publisher Full Text 42. Bano D, Young KW, Guerin CJ, Lefeuvre R, Rothwell NJ, Naldini L, Rizzuto R, Carafoli E, Nicotera P: Cleavage of the plasma membrane Na+/Ca2+ exchanger in excitotoxicity. Cell 2005, 120(2):275-285. PubMed Abstract | Publisher Full Text 43. Tafani M, Karpinich NO, Hurster KA, Pastorino JG, Schneider T, Russo MA, Farber JL: Cytochrome c release upon Fas receptor activation depends on translocation of full-length bid and the induction of the mitochondrial permeability transition. J Biol Chem 2002, 277(12):10073-10082. PubMed Abstract | Publisher Full Text 44. Gasull T, DeGregorio-Rocasolano N, Zapata A, Trullas R: Choline release and inhibition of phosphatidylcholine synthesis precede excitotoxic neuronal death but not neurotoxicity induced by serum deprivation. J Biol Chem 2000, 275(24):18350-18357. PubMed Abstract | Publisher Full Text 45. Esposti MD, Erler JT, Hickman JA, Dive C: Bid, a widely expressed proapoptotic protein of the Bcl-2 family, displays lipid transfer activity. Mol Cell Biol 2001, 21(21):7268-7276. PubMed Abstract | Publisher Full Text | PubMed Central Full Text 46. Suter M, Reme C, Grimm C, Wenzel A, Jaattela M, Esser P, Kociok N, Leist M, Richter C: Age-related macular degeneration. The lipofusion component N-retinyl-N-retinylidene ethanolamine detaches proapoptotic proteins from mitochondria and induces apoptosis in mammalian retinal pigment epithelial cells. J Biol Chem 2000, 275(50):39625-39630. PubMed Abstract | Publisher Full Text 47. Luetjens CM, Kogel D, Reimertz C, Dussmann H, Renz A, Schulze-Osthoff K, Nieminen AL, Poppe M, Prehn JH: Multiple kinetics of mitochondrial cytochrome c release in drug-induced apoptosis. Mol Pharmacol 2001, 60(5):1008-1019. PubMed Abstract | Publisher Full Text
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:27:27.000Z
jqjgrls4u2rcfqzcafvxzr6pednmd42p
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24686", "uncompressed_offset": 336413257, "url": "www.biomedcentral.com/1471-2288/12/49/citation", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://www.biomedcentral.com/1471-2288/12/49/citation" }
cccc_CC-MAIN-2013-20
Download references Method for appraising model validity of randomised controlled trials of homeopathic treatment: multi-rater concordance study Robert T Mathie*, Helmut Roniger, Michel Van Wassenhoven, Joyce Frye, Jennifer Jacobs, Menachem Oberbaum, Marie-France Bordet, Chaturbhuja Nayak, Gilles Chaufferin, John A Ives, Flávio Dantas and Peter Fisher BMC Medical Research Methodology 2012, 12:49 doi:10.1186/1471-2288-12-49 Include Format
v0
2024-06-03T21:29:47.544Z
2013-05-18T07:25:49.000Z
t3u4gk3rblkifmtxkvuzwi7uq7pwmqy2
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24687", "uncompressed_offset": 338237666, "url": "www.bizsugar.com/Marketing/seth_godin_explains_why_word_of_mouth_doesnt_happen/", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://www.bizsugar.com/Marketing/seth_godin_explains_why_word_of_mouth_doesnt_happen/" }
cccc_CC-MAIN-2013-20
Seth Godin explains why word of mouth doesn't happen Posted by JohnH under Marketing From http://sethgodin.typepad.com 1824 days ago Made Hot by: on May 20, 2008 2:48 pm Sometimes, what you do is done as well as it can be done. It's a service that people truly love, or a product they can't live without. You're doing everything right, but it's not remarkable, at least not in the sense of "worth making a remark about." What's up with that? Subscribe Harry Vaishnav @AngelBiz Is Small Biz Guardian Angel If you've ever worried that your small business is outdistanced and outclassed by the huge corporate giants around you, … More Editor's Picks See if you're one of our Top 10 Members this week! Got small business blog posts? Register and submit them today! Shazam! Meet Contributor of the Week Paul Cox...Congrats, Paul! Add BizSugar buttons and plugins to your small biz toolkit!
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:33:21.000Z
cta6iwvtykczzpwvybj42cbrmxrkled6
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24688", "uncompressed_offset": 338252373, "url": "www.bizsugar.com/user/commented/seltzer04", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://www.bizsugar.com/user/commented/seltzer04" }
cccc_CC-MAIN-2013-20
Seltzer04 commented on the following stories on BizSugar Subscribe Robert Peters Brings Fresh Eyes to Business @FreshEyesConsul When you can no longer see the forest for the trees, it may be time for a fresh perspective. That's where Robert Peters … More Editor's Picks Add BizSugar buttons and plugins to your small biz toolkit! See if you're one of our Top 10 Members this week! Got small business blog posts? Register and submit them today! Shazam! Meet Contributor of the Week Paul Cox...Congrats, Paul!
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:47:33.000Z
5mt3qzuqprgy4zjfuwesx5bpoqt34oqp
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24706", "uncompressed_offset": 439298562, "url": "www.fides.org/en/news/32485-ASIA_LAOS_Year_of_Faith_amid_the_persecutions_of_Christians_forced_to_become_animists", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://www.fides.org/en/news/32485-ASIA_LAOS_Year_of_Faith_amid_the_persecutions_of_Christians_forced_to_become_animists" }
cccc_CC-MAIN-2013-20
http://www.fides.org Asia 2012-10-22 ASIA/LAOS - "Year of Faith" amid the persecutions of Christians forced to become "animists" Savannakhet (Agenzia Fides) - Some loatian civilian officials of the province of Savannakhet threaten to destroy the homes of Christians in the village of Seekaew if they refuse to perform animist religious rituals. According to information received from local sources of Fides Agency, the local authorities of the province in any way wish to discourage Christian citizens from professing their faith and practicing their religion freely. As reported to Fides by the NGO "Human Rights Watch for Lao Religious Freedom" (HRWLRF), more than 50 Christians (of 13 families) of the village of Seekaew were strongly recommended by the village elders to undergo traditional animistic rituals and drink " sacred water "according to the ritual of a medium. By participating in these rituals, Christians would be recognized as "animists" and profess traditional religions. After several attempts, the Christians refused and therefore, according to local leaders, lost their right to reside in the village. A few days later, the civil authorities of the district of Pinh, where the village is located, the Christians were threatened and were told that their homes would be seized and demolished if they do not stop to observe the Christian faith. Later, however, the head of Religious Affairs Office of the district of Pinh publicly declared in the village that residents are free to choose their religion, Christianity included. Even in the village of Allowmai, close by, representatives of the local authorities are trying to force Christians to participate in traditional animist rites and to abandon the Christian faith. Police officials have said that if Christians do not abjurate their faith, the detention of three Christian leaders Bountert, Adang and Onkaew arrested in recent weeks (see Fides 29/09/2012) will be prolonged. Same goes in Kengsaiyai, another village in the same district: about 31 Christian families (about 155 people) and more than 70 non-Christians families were asked to carry out a ritual according to the old "cult of the spirits", or risk losing the right to residing in the village. Fides sources comment: "In the Year of Faith, the small Christian community in Laos is called to bravely endure and retain their faith, even among harassment and persecution." In Laos Christians are a total of 2.9% of the population (6.5 million inhabitants), including 2% Protestants and 0.9% Catholics. (PA) (Agenzia Fides 22/10/2012) Share: Facebook Twitter Google Blogger Altri Social Network
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:32:14.000Z
uveq26rjcwcdkxn2itodxt7s6jboya7o
{ "content_type": "application/xhtml+xml", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24716", "uncompressed_offset": 483434317, "url": "www.hindawi.com/journals/ijvt/2013/149813/", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://www.hindawi.com/journals/ijvt/2013/149813/" }
cccc_CC-MAIN-2013-20
About this Journal Submit a Manuscript Table of Contents International Journal of Vehicular Technology Volume 2013 (2013), Article ID 149813, 18 pages http://dx.doi.org/10.1155/2013/149813 Research Article A New Movement Recognition Technique for Flight Mode Detection 1Electronics and Signal Processing Laboratory, Institute of Microengineering (IMT), École Polytechnique Fédérale de Lausanne, Breguet 2, 2000 Neuchâtel, Switzerland 2Jiiva, Stadtbachstrasse 40, 3012 Bern, Switzerland Received 8 October 2012; Accepted 1 December 2012 Academic Editor: Aboelmagd Noureldin Copyright © 2013 Youssef Tawk et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Abstract Nowadays, in the aeronautical environments, the use of mobile communication and other wireless technologies is restricted. More specifically, the Federal Communications Commission (FCC) and the Federal Aviation Administration (FAA) prohibit the use of cellular phones and other wireless devices on airborne aircraft because of potential interference with wireless networks on the ground, and with the aircraft's navigation and communication systems. Within this context, we propose in this paper a movement recognition algorithm that will switch off a module including a GSM (Global System for Mobile Communications) device or any other mobile cellular technology as soon as it senses movement and thereby will prevent any forbidden transmissions that could occur in a moving airplane. The algorithm is based solely on measurements of a low-cost accelerometer and is easy to implement with a high degree of reliability. 1. Introduction GSM localization or mobile phone tracking is a technology used to locate the position of a mobile phone. Localization uses the concept of multilateration of radio signals, where the phone must communicate wirelessly with at least three of the nearby radio base stations (RBSs). Knowing the position of the RBS’s, and using a triangulation method, an approximation of the geographical location of the mobile phone can be calculated. This technology is based generally on four different techniques: network based, handset based, hybrid and subscriber identity module (SIM) based [1]. The SIM-based technique is of interest in this paper, where by using the SIM in mobile communication handsets it is possible to obtain raw radio measurements that include the serving cell ID, round trip time and signal strength. Different applications already use this service for localization, for example, resource tracking with dynamic distribution such as taxis, rental equipment, or fleet scheduling. Within this context, Swisscom AutoID Services (SIS) in collaboration with La Poste Suisse aims to pioneer a service that will allow clients to be able to track and trace their packages in near real-time mode anywhere in the world. The service will consist of including a tracker with the package that operates on the GSM network for location and communication [2]. Therefore, a key issue arises when the package is transported via airplane. Indeed, it is well known that aircraft remains one of the few places where the use of mobile communication signals is prohibited [3, 4]. In fact, the aircraft is not a good Faraday cage and cannot prevent transmissions to reach terrestrial cellular networks. Moreover, there is a possibility of interference with some avionics instruments in the aircraft. As a result, international regulation bodies have forbidden the use of mobile phones onboard an aircraft and hence any module used for tracking a package should be turned off as soon as it is located inside an airplane. In order to respect these regulations, the main idea we develop in this paper is to consider the use of low cost MEMS accelerometers, such as those found in today’s smartphones, to allow the tracker to detect the movement and to turn off the GSM module automatically without any human intervention. For the envisioned application, this means that once a shipment equipped with a tracker is in the moving aircraft, the device will detect the aircraft’s movements; it will automatically switch off the GSM module until the aircraft has come to a halt after landing and the device detects a static condition, allowing it to turn on the GSM module again. In the recent literature, several papers already proposed the use of smartphone accelerometers for movement recognition. For example in [5], the authors investigated the suitability of the built-in smartphones accelerometer to provide good accuracy for common human activity recognition. In [6], the authors introduced a new method to implement a motion recognition process using a mobile phone fitted with an accelerometer to effectively recognize different human activities with a high-level accuracy. Human movement detection using an accelerometer was also the subject for several other papers [711]. The accelerometer was also used for several types of movement detection, for example, sign language detection [12], handwritten digit recognition [13], fast fall detection [14], and wireless motion sensing [15]. In these cases, the detection is based on different techniques and the degree of algorithm complexity varies depending on the application, alongside with the quality of the accelerometer. However, none of the above papers considered the use of smartphones’ accelerometers for flight mode detection. Therefore, this paper fills a gap in the current literature by proposing a new movement recognition algorithm specifically tailored for flight mode detection, that is, taking in consideration the reliability requirements that must be satisfied for civil aviation applications. In particular, the proposed algorithm is specially conceived for detecting any movement that a package can be subject to inside an airplane, with a sufficiently high reliability to respect all the specifications and requirements from international airspace regulations. The analytical and statistical studies of the proposed algorithm are based on raw acceleration measurements acquired from static data and from dynamic data onboard different flights. These measurements are used to define the parameters required by the algorithm to detect either static or dynamic condition. Furthermore, the reliability is analyzed in terms of probability of misdetection and false alarm. In addition, implementation complexity of the algorithm is evaluated in terms of response time and resources, and finally power consumption considerations are presented. It is important to note that the main contribution of the paper is not in devising the methods used in the algorithm, but instead results from the combination of these methods in one algorithm that is tailored to provide a highly reliable movement detection technique using low cost MEMS accelerometers. Moreover, the proposed algorithm is not intended to classify the source of movement (e.g., airplane, train, car, truck, etc.), as this would decrease the reliability of correctly detecting movement while in an airplane. Indeed, it is sufficient for the considered package tracking application to only get information about the position of the package when it is not moving and prohibit transmissions otherwise. Finally, the paper is not mainly involved from the theoretical point of view, but it has a clear engineering application while emphasizing the use of real acceleration measurements. For more details about the final product where the proposed algorithm is part of, the interested reader is referred to [2]. 2. Measurement Data Collection In order to analyze the accelerometer behavior under different conditions a database was created including acceleration measurements from different experiments consisted of real flights, of different duration and in different airplanes. An accelerometer is a device that measures the acceleration associated with the phenomenon of weight experienced by a test mass that resides in the frame of reference of the accelerometer device. The accelerometer chosen for conducting the analyses in this paper is the LIS302DL accelerometer, the same sensor as the one integrated inside an iPhone [16]. This accelerometer is an ST ultracompact low-power three-axis linear accelerometer. Its main characteristics are shown in Table 1. Table 1: Main characteristics of LIS302DL accelerometer [16]. The raw measurements were collected by putting an iPhone, which is set to flight-mode, inside a handbag and taking it onboard different flights. The , , and measurements from the built-in accelerometer are saved using an application on the phone with a sampling frequency of 100 Hz. The recorded measurements are stored later using a data logging software in a database with a resolution of 16 bits. The measurements were taken before, during, and after every flight. In addition, with each series of flight data, there is a metadata description containing the flight duration time, the take-off time, landing time, as well as description about the turbulences, and other conditions occurring during the flight and all other data necessary to detect transitions and unusual events. The metadata were collected through the observations of the person holding the accelerometer onboard the flight. Hence, it has a couple of seconds of time accuracy, which is not critical because the proposed algorithm is independent of this information that is only used to better understand the behavior of the accelerometer. An example of a raw measurement collected is displayed in Figure 1, which shows the accelerometer three-axis output before, after, and during a flight from Geneva to London onboard an Airbus A319. The flight time is defined as the time from the push-back manoeuvre before takeoff until the time the plane engines are turned off after landing, which is the time when the GSM module should not transmit any signals. It can be noted that outside the flight time the accelerometer axes orientation is often changing and the measurements are so noisy. This is due to the fact that the used iPhone was inside a handbag that is subject to all types of movements that occur during normal activities of a travel. Static data was also collected when the accelerometer was not moving for a long period of time and stored in the database. Figure 1: Acceleration measurements. The first step in order to interpret the data collected was to identify the metadata provided with each set within the sequence of acceleration measurements. For example, for the flight above (to be considered throughout the paper), the sudden sharp jumps during flight time are due to strong turbulences. Also, the different parts of the takeoff manoeuvre are shown in Figure 2 where each part is identified based on the metadata provided. This helped to better understand the behavior of the accelerometer under different events. For instance, it can be seen that once the “aircraft push back maneuver” starts and the engines are turned on, the accelerometer outputs start to fluctuate and we can see immediately the change in the static condition of the sensor. Also the acceleration of the plane in the runway and the liftoff are identified easily as the amplitude of the acceleration on the 3 axes changes suddenly. Figure 2: Takeoff metadata identification where the three traces represent the 3-axis acceleration during takeoff. This short overview on the raw acceleration measurements shows that as soon as the sensor senses a movement, the amplitude and the variance of the accelerometer outputs increase. Bearing this in mind and computing a parameter that is dependent on these two values can provide a criterion to find the status of the sensor. Consequently, we chose the moving variance (MV) of the incoming measurements on the three axes as this parameter. But before analyzing the collected data with respect to this parameter, a short overview of the MV is given in the next section. 3. Moving Variance A moving variance is used to analyze a set of data points by creating a series of variances of different subsets of the full data set [17]. Given a series of numbers and a fixed subset size, the MV can be obtained by first taking the variance of the first subset. The fixed subset size is then shifted forward, creating a new subset of numbers, and consequently a new variance is computed. This process is repeated over the entire data series. The plot line connecting all the (fixed) variances is the moving variance. Thus, an MV is not a single number, but it is a set of values, each of which is the variance of the corresponding subset of a larger set of data points. An MV may also use unequal weights for each data value in the subset to emphasize particular values in the subset. In this paper, two types of MV computations are used: (1) the normal moving variance (NMV) and (2) the exponential moving variance (EMV) also known as the exponentially weighted moving variance. The difference between the two is that the NMV calculates the variance of the fixed subsets without any weighting, in other words all the data in a specific subset have the same importance. As for the EMV, it applies weighting factors which decrease exponentially [17]. The weighting for each older data point decreases exponentially, never reaching zero. Alternatively, the EMV gives more weighting to the new data in the computation of the subset variance. The formula for calculating the NMV is given by [17]: where corresponds to the average of the subset, is the sum of the squares over the number of samples in the subset , and is the subset’s index number. To reduce the amount of addition and multiplication and hence lower the computational load, data processing can be applied. So, instead of calculating in each subset the sum of the squares and the square of the sum for all the samples over a fixed window length, the two sums are calculated only for the first subset and kept in a buffer along with the samples in the subset. Moreover with the upcoming of a new sample (i.e., moving to a new subset), the sample and its square are added to the two sums computed before and the old sample and its square are subtracted and a new variance is calculated. Thus and can also be expressed as At the next iteration, the old sample is dropped from the buffer and the new sample replaces it. This operation is repeated at every new measurement (i.e., overlapping windows), and a new moving variance is computed as shown in Figure 3. Figure 3: NMV moving variance computation. The EMV uses the same overall concept, but it differs in two main points: (1) it does not require the storage of all the samples of a subset, but only the last result and (2) it gives more weighting to new measurements. The EMV computation can be summarized as follows: there are two variables that need to be saved in the memory, the average and the variance of the samples within a subset. With the arrival of a new sample (i.e., moving to a new subset) the old average and variance are weighted and a new average and variance are computed taking in consideration the new sample. This way the samples do not need to be saved in the memory in a subset and consequently all what is needed for memory are two variables, the previous average and the variance. The formulas to calculate the EMV are given by [17] where is the weighting factor, whose value depends on many factors as it will be seen in the following sections. In the following, both NMV and EMV of the raw acceleration measurements are computed, and performance comparison of these two methods are provided. 4. Acceleration Measurement Analysis 4.1. Static Mode Our analysis of the recorded data started with the analysis of the static measurements of the accelerometer. Around 35 hours static measurements were collected in order to find the noise behavior of the accelerometer. Figure 4 shows the power spectral density of each axis where it is clear that the -axis is the axis sensing the gravity presenting a higher amplitude component around 0 Hz. It can be seen that the behavior of the 3 axes in a static condition is very similar and can be approximated as an independent white noise with peak-to-peak amplitude around 0.01 mg, and a variance around g2. Figure 4: Power spectral density of the raw acceleration measurements in a static case. The NMV and EMV for the 3 accelerometer axes are shown in Figure 5. It can be seen that the NMV responses on the 3 axes are similar to the noise variance of the accelerometer and approximately equal to g2. As for the EMV, it can be noted that for the weighting factors of 1 and 5, the static behavior is very similar to the case of NMV and hence it is consistent with the noise level of the accelerometer. For a weighting factor of 10, we can see that the EMV has a slightly noisier response. This is due to the fact that the EMV gives more weighting to the new samples and in this case for a high weighting factor, the past information of the variance is less weighted than the new information that is added, and therefore, there is a loss in the smoothing effect on the variance computation. Figure 5: NMV and EMV of the 3 accelerometer axes in a static condition for a window size of 1 s or samples. Based on the results shown above, it can be seen that the output of the NMV and EMV in static mode can approximately provide the noise level of the sensor, and this value can be taken as a reference later to decide whether the accelerometer is in a static or dynamic mode. 4.2. Dynamic Mode As in the static case, the PSD of the acceleration measurements was first computed in order to check if a low quality sensor as the one used for the tests herein could detect small movements and more specifically the vibrations of an airplane’s motor. The power spectral densities of the measurement norm of the three accelerator axes during flights onboard different airplanes are shown in Figure 6. It is interesting to notice the existence of frequency peak components between 10 Hz and 30 Hz during all flights’ stages. These peaks can be identified as the vibration frequency of the airplane and typically they characterize the vibration frequency of the motors. Analyses of different series with different types of planes show that most of the aircraft vibration frequencies and dynamic frequencies are within the band ranging from 0 Hz up to ~30 Hz. Therefore, the sampling frequency that has been used for the analysis (100 Hz) could be lowered down to 60 Hz if necessary. Thus, decreasing the sampling frequency in between 60 and 70 Hz seems feasible, and within this range all the vibration and dynamic frequencies are preserved. Figure 6: Single-sided amplitude spectrum of the accelerometer measurements norm during flights onboard different airplanes types. Regarding the NMV and EMV of the dynamic flight mode, Figure 7 shows the NMV computation for the 3 accelerometer axes of the flight mentioned in Section 2. The existence of peak components with high amplitudes that represent sudden movements of the sensor can be noticed. A closer look at the takeoff and landing phases during the flight is shown in Figure 8. Figure 7: NMV computation for the 3 accelerometer axes of the flight from Geneva to London. Figure 8: NMV computation for the 3 accelerometer axes during landing and takeoff of a flight from Geneva to London. During the takeoff, it can be seen that as soon as the engines are on, the NMV outputs on the 3 axes increase, and also it can be noted the existence of high peaks during the plane acceleration and liftoff. During the landing, it can be seen that the NMV outputs have high amplitude peak components and, as soon as the engines are off, the outputs on the 3 axes decrease momentarily. Results of the EMV are similar to those of NMV and hence are not shown here. Overall, these graphs show that both the NMV and EMV are able to detect movement of the sensor under different conditions. As a result, it can be concluded that by using one of these two methods, the state of the sensor can be found. Thus, the proposed algorithm for movement detection is based on these analyses and described in the next section. 5. Proposed Algorithm The proposed algorithm for the detection of static/dynamic condition of the sensor is based on the computation of the moving variance of the raw accelerometer measurements as described before. The overall architecture is illustrated in Figure 9 and was implemented in Matlab in a first step. The algorithm can work in real time directly on measured data coming from the accelerometer, but as the analyses conducted during this work were limited to offline data processing, the measurements were taken from the database and postprocessed. Figure 9: Proposed algorithm for detecting the status condition of the sensor. The algorithm starts by reading measurements during a specific window size () of time and computes the moving variance (MV) of the measurements for each accelerometer axis separately: where represents the , , or axis, is the window size, stands for a normal (NMV) or exponential (EMV) moving variance computed in (1) or (3), is the subset’s index number where the MV is computed, and is the acceleration measurement during the specified period of time. Afterwards, two conditions are performed to set the status of the sensor. The first one is to check periodically every second if the MV of each axis is smaller than a predefined threshold, as shown by where is the MV threshold on the axis. If this is not fulfilled, the condition is set to “nonstatic” and the next window measurements are read. Otherwise, the condition is set to a “temporary static condition” and another threshold related to time is being checked. This second threshold is performed in order to obtain a more secure and stable response. In fact, once a “temporary static condition” is declared, the algorithm goes backwards for a specific duration of time and examines if the status of the sensor within this duration was also “temporary static condition” where represents the threshold in time or the duration of time in which the algorithm will look backward for a temporary static condition. If this is not fulfilled, a “nonstatic” condition is declared and the next window measurements are read. If the condition is fulfilled, the algorithm outputs a “static condition” and consequently at this time the module is allowed to transmit a wireless mobile communication signal if needed. typically ranges from 1 up to several seconds. For example, if the threshold in time is set to 3 seconds and the MV condition is checked every 1 second, then in case of a “temporary static condition,” the algorithm checks the state of the previous three conditions. If all the three of them were of “temporary static condition,” then the sensor is considered to be in a static state. Otherwise, the sensor is considered to be in dynamic state. 5.1. Probability Analysis and MV Threshold Determination Our movement recognition algorithm can be seen as a binary detection problem, that is, deciding between two hypotheses whether the sensor is in a static or a dynamic mode. As a result, a statistical test, more specifically a binary hypothesis-testing problem [18], is set up. The two hypotheses are defined as H0 where the sensor is in a dynamic mode and H1 where the sensor is in a static mode. A binary test of H0 versus H1 takes the following form: This equation can be read as the test function equals 1, that is hypothesis H0 is rejected and H1 is accepted, if is true (i.e., the MV on each of the accelerometer axes is smaller than the corresponding MV threshold during the duration of time specified by). Otherwise (i.e., if at least the MV of one of the accelerometer axes is higher than the MV threshold), is false and the test function equals zero, that is hypothesis is rejected and is accepted. Figure 10 shows the binary hypothesis test and its corresponding probabilities. Figure 10: Binary hypotheses for the movement recognition algorithm and its corresponding probabilities. If the sensor is static, then the probability of detection is defined as the probability that is true and H1 is accepted (i.e., detecting final static condition), and the probability of misdetection is defined as the probability that is false and H0 is accepted (i.e., detecting dynamic condition). They can be expressed as If the sensor is dynamic, then the probability of false alarm is defined as the probability that is true and H1 is accepted (i.e., detecting final static condition). It can be expressed as Note that our focus is on selecting a threshold that will lead to a sufficiently low that is compliant with the civil aviation regulations. For our particular application, the maximization of (and thus minimization of ) is not so critical, as long as static condition detection can still happen regularly to allow periodic location determination. In the next two subsections, we seek to determine the probability density function for the NMV and EMV outputs in static and in dynamic mode, respectively, in order to apply the well-known classical detection theory (see, e.g., [18]) to theoretically determine a suitable threshold. 5.1.1. Probability of Misdetection () As shown in Section 4.1, the behavior of the 3 accelerometer axes while it is static is similar, with the variance on each axis approximately equal to g2. The NMV and EMV outputs in this case are also very similar. Therefore, it is possible to define the same MV threshold for the three axes, that is, This threshold should be chosen as a function of two parameters: the noise behavior of the accelerometer and the probability of misdetection , which is related to the distribution of the accelerometer measurements while it is static. In order to find the MV threshold, the sensor should be set in a static mode, and the subsequent approach can be followed:(1)measure the noise variance on each axis of the accelerometer,(2)derive the distribution of the MV measurements on each axis,(3)set the probability of misdetection ,(4)knowing the distribution of the MV measurements, then the theoretical formula of PM can be derived, and an MV threshold can be computed in function of the noise variance.Once an MV threshold is computed, the correspondent should be derived to check if it is below the maximum value defined by the civil aviation regulations. If not, then is increased and a new MV threshold is computed. In the case of the accelerometer chosen in this paper [16], the output of the NMV or EMV algorithm applied to nonoverlapping datasets of the static accelerometer raw measurements can be approximated as independent and identically distributed (i.i.d.) with a Gaussian distribution, as can be seen in Figure 11 that depicts the probability density function (pdf) and the cumulative density function (cdf) for the Y axis. The measurements for the two other axes and from other static data sets have very similar probability distribution as the one plotted here and are thus not shown. Figure 11: pdf and cdf of NMV (or EMV) output in static condition. The probability of misdetection in this case can be written as [18] where, , and  are the mean, the variance, and the cdf of the MV distribution, and erf is the error function. Table 2 shows the probability of misdetection for different MV thresholds, where corresponds to the period of time for the algorithm to missdetect a dynamic condition if the MV is checked every 1 , that is is equal to. Table 2: Probability of misdetection versus different MV thresholds. It can be seen that for a threshold of or above, is already very small, yielding sufficiently large values for (considering our application). We now look at the threshold requirements to yield a sufficiently small probability of false alarm when we are in dynamic mode, starting with the above thresholds as well as an additional one of . 5.1.2. Probability of False Alarm () To compute , the temporary probability of false alarm (i.e., to detect a temporary static condition) should first be derived. is defined as the probability that at a specific time the computed MV outputs of the three accelerometer axes during a dynamic condition are lower than. As the noise on the 3 axes is uncorrelated (i.e., consecutive MV output measurements and measurements from different axes are assumed independent since we assume that they are obtained from nonoverlapping datasets of the static accelerometer raw measurements), then and can be expressed as where is the probability that the computed MV on the “” axis is lower than during a dynamic condition. In order to compute these probabilities, the distribution of the NMV and EMV outputs in dynamic conditions should be found. However, by analyzing all the collected measurements, we could neither determine a theoretical nor an empirical model for the dynamic mode (such a model would need to depend on many parameters such as the type of aircraft, the weather, the packaging of the sensor, etc.). Therefore, we could not provide an analytical expression for the MV threshold as a function of the desired probability of false alarm. Thus, we decided to proceed empirically as follows:(i)for each data set, only the part of the series where the sensor is subject to a dynamic movement is considered and used to compute the EMV and NMV;(ii)then the corresponding pdf and cdf of the EMV and NMV outputs are computed;(iii)finally, the probability that the NMV or EMV outputs of each axis are lower than the threshold is computed. Following this approach, was empirically computed for different MV thresholds and thresholds in time. 5.2. Threshold in Time As it was described above, the threshold in time  stands as a second condition after testing the MV on the three axes. In fact, the threshold in time ensures that the sensor was static for the period of time that is specified, and once this period is exceeded, a final static condition is declared that can be used as an indication for the allowance of transmission of mobile communication signals. The main reason behind this second condition is to decrease in order to meet the specific requirements for the civil aviation regulations, which is the most critical point especially during flight time. Similar to the MV threshold, we analyzed empirically different threshold in times on different measurements from different flights, in order to find a minimum threshold in time that ensures a reliable performance of the algorithm under different conditions for the chosen accelerometer. 5.3. Impact of Window Size The window size is defined as the duration of time where the algorithm is computing the MV and the period at which is checked. If the accelerometer measurement rate is 100 Hz and is equal to 1 s, it means that the MV over 100 samples is computed and compared to the MV threshold every 1 s. When decreasing the window size, the MV bandwidth is increased and the noise also increases. Consequently, the threshold should be increased. Table 3 shows the MV average for different window sizes considering static measurements. For 1, 2, or 3 s window size, the moving variance is almost the same; meaning that no significant additional information will be gained when increasing the window size more than 1 s for static data. For 0.5 s the response starts to be slightly noisier and in this case the threshold should be slightly increased. Overall, a small change in window size does not have a great impact on the moving variance of the static condition and hence the MV threshold is not so affected. Table 3: MV average for static data for different window sizes. Another aspect that should be taken in consideration is the effect of different window sizes on the MV during dynamic conditions. Figure 12 shows the acceleration measurement on one axis and its corresponding NMV computation. In the graphs on the left, it can be seen that when the window size is increased, the moving variance becomes less sensitive to dynamic change. Also, a smaller window size results in a noisier response and in this case it would be harder to detect a static condition. However, one exception is noticed regarding this point. In fact, it can be seen from the graphs on the right of Figure 12 that there is an opposite behavior when increasing the window size. Normally, for dynamic movements resulting in an acceleration measurement having sudden jumps with a very short duration (a), the NMV output for a 1 s window size (c) is higher than for a 3 s window size. This is expected, because for a window size of 1 s the variance is computed using less information and any short duration movement within this 1 s can have more effect than in the case of a 3 s window size where more information are taken in consideration. In a different case, when a movement occurs resulting in an acceleration having a jump that lasts more than 3 s (b), it can be seen that a window size of 3 s results in a higher variance (d). In general, it has been noticed that this type of movement rarely occurs and even in this case a 1 s window size can still detect it. Figure 12: NMV behavior under different dynamic conditions. Overall, it is observed that varying the window size has a limited impact on the MV threshold and a general value for different window sizes can be used. Regarding sensitivity to dynamic movement, it is shown that increasing the window size results in a variance that is less sensitive to dynamic detection and decreasing it results in a variance less sensitive to static detection. As a tradeoff between these two results, we have found that a window size between 1 and 2 s works well. 6. Simulation Results For testing and optimization, the algorithm is implemented in Matlab where simulation results are obtained using measurements from all the flights datasets. Hereafter, only results from two selected flights are shown for illustration and comparison purposes.(i)Flight 1, which is the flight from Geneva to London already described in Section 2, is chosen as a representative of a typical flight.(ii)Flight 2, from Helsinki to Zurich onboard a Bae Avro RJ85, is chosen because it was the most challenging flight for detecting dynamic conditions during flight time. Figures 13 and 14 show the algorithm detection output applied on measurements from both flights using NMV method for different MV thresholds and a 5 s threshold in time. The magenta peaks in the bottom of the figures represent the “temporary static condition” and the black peaks represent the final “static condition.” What can be observed is that the second condition (time duration of static period upon which it is decided if the condition is static or dynamic) filters the first condition and as expected improves the performance of the algorithm. For flight 1, it can be noted that the algorithm detects the movement of the sensor with high precision, and during all the flight time it always outputs a dynamic condition up to an MV threshold of . For an MV threshold of , the algorithm outputs a false temporary static condition before landing. For flight 2, the algorithm starts to detect false temporary static condition during flight time for a MV threshold of or higher, and false final static condition for a MV threshold of . These two graphs show that the maximum MV threshold needed for detecting a temporary static condition during flight time is around and as soon as the MV threshold reaches the false temporary static conditions start to appear. At this MV threshold level or higher, the importance of the threshold in time to detect or not a final static condition becomes crucial. For flight 1, it can be seen that even with increasing the MV threshold up to , no final static condition is detected; however, for flight 2, at the algorithm starts to detect false final static conditions for a 5 s threshold in time. The significance of is better shown in Figure 15 that displays the algorithm detection output for flight 2 for different thresholds in time and a MV threshold. It can be noted that for a smaller than 4 s, the algorithm detects falsely final static conditions during flight time. And for 4 s and higher, no final static condition is declared and hence no transmission is allowed. These results were confirmed by analyzing a huge number of flight hours where similar results were obtained and the MV threshold of was found to be the maximum threshold allowed for a reliable performance of the algorithm with a corresponding threshold in time of 4 s. Figure 13: Algorithm detection output using NMV and 5 s threshold in time for flight 1. Figure 14: Algorithm detection output using NMV and 5 s threshold in time for flight 2. Figure 15: Algorithm detection output using NMV and MV threshold for flight 2. A deeper look of the algorithm behavior using these two thresholds is shown in Figure 16 during boarding time for flight 1. The right graph shows the NMV output of the 3 accelerometer axes and the two dimensions check (i.e., amplitude and time). Once both conditions are satisfied, the algorithm outputs a static condition where it can be seen as the black peak in the left graph. Figure 16: Algorithm behavior during boarding. Left side is the algorithm output in comparison to the acceleration on the 3 axes. Right side is the corresponding NMV outputs. The output of the algorithm using EMV method is similar when using NMV for small weighting; however, when increasing the weighting factor the EMV starts to be more sensitive to static condition detection. In fact when increasing the weight, and consequently increasing the importance of new measurements, the response of the algorithm starts to be more fluctuating. This can be explained by looking at Figure 17, where it is shown the NMV and EMV outputs for a measurement resulting from a dynamic movement. It can be seen that for EMV, with increasing the weighting, the amplitude variation increases; this is because the new sample has more weight, and if it represents a sample coming from a dynamic movement it will increase the output variations. As for the NMV where there is no weighting, the variance is more stable as it results from an average of data having similar weight. Therefore, the effect of increasing the weight too much in the EMV method has a disadvantage. For example, if the flight is very calm, then the MV output could potentially be close to the MV threshold, and if the weight is increased, then the EMV output will be noisier and there is a possibility due to the variation that it crosses the threshold and thus the algorithm outputs a static detection during the flight. This type of scenario should be avoided, and this is why it is not recommended to increase the weight above 10. Figure 17: NMV and EMV output during dynamic conditions. Regarding the probability of false alarm, and following the approach in Section 5.1.2, Tables 4 and 5 show the temporary probability of false alarm and during flight time for flights 1 and 2. It can be seen that the performance of the algorithm varies from one flight to another, and in both cases is considerably low. Also the table shows that if a lower is required, it is sufficient to either decrease the MV threshold or increase the threshold in time. Probability analyses from other flights were similar to the assessment discussed in this paper and the algorithm showed a high fidelity in detecting the state of the accelerometer. Table 4: during flight time for flight 1 using NMV method. Table 5: during flight time for flight 2 using NMV method. To conclude, this section shows that the proposed algorithm has a very precise detection of static/dynamic conditions of the sensor using EMV or NMV for a MV threshold less than or equal to . It has been also shown that the detection performance is very good especially during flight time where is very low. For EMV it is not recommended to increase the weighting more than 10, as the detection output starts to be biased by the weighting factor on the new measurement and can lead to false detection. 7. Implementation Analysis The implementation of the algorithm is assessed using three criteria: the response time, resources, and practical considerations. 7.1. Response Time An important point to study is the response time of the algorithm, which we define as the time required for the algorithm to output a static condition at turn-on assuming that the sensor is static. Indeed, minimizing this response time will also extend the battery life. For the NMV algorithm and assuming a window size of 1 s, it will first take 1 s for the data window to be full of measurements before the algorithm can output the first temporary condition. Assuming a threshold in time of 4 s, the final static condition will be generated after 4 s. For the EMV algorithm, the behavior is different and depends on the initialization state of the accelerometer before startup. For example, Figure 18 shows the EMV outputs for different weightings compared to the NMV output (i.e., no weighting) for one axis of an accelerometer in static mode when the algorithm is initialized with an acceleration variance of (this value is chosen to guarantee that the algorithm will not provide a temporary static condition at startup). The cyan dotted line represents a MV threshold of . Figure 18: Comparison of time responses of NMV and EMV with different weights. It can be noted that with increasing the weighting, the response time decreases as expected and consequently the output of the EMV algorithm reaches faster the MV threshold than the NMV. It is also important to note that increasing the variance of the initial dynamic condition will increase the response time. Therefore this factor should be chosen carefully to guarantee a shorter response time while minimizing the probability of false alarm. 7.2. Implementation Resources The NMV and EMV algorithms have shown similar results in terms of performance. In this section, we explore the hardware implementation of these two algorithms in order to select the most appropriate one. 7.2.1. NMV Implementation The basic element of the implementation of the NMV method is a moving averager (MA) shown in Figure 19 and its -domain transfer function is This element is then used to compute the NMV of a sequence as defined by (1) and depicted in Figure 20. Figure 19: Implementation of an -point moving averager [18]. Figure 20: Implementation of a recursive -point moving variance network [18]. 7.2.2. EMV Implementation The same procedure is used for the EMV method. The basic element of the implementation is an exponential averager (EA) which is defined by (4) and depicted in Figure 21. This element is then used to compute the EMV of a sequence as defined by (5) and depicted in Figure 22. Figure 21: Implementation of an exponential averager [18]. Figure 22: Implementation of an exponential averaging network [18]. 7.2.3. Optimization and Comparison It can be seen that the implementation of these two algorithms requires only four different operations: (1) delay; (2) addition/subtraction; (3) multiplication by a constant; (4) squaring. When an adder has one input which is the delayed version of its output, as it is the case in the MA and EA, this is equivalent to an integrator. Table 6 summarizes the resources required by these operations in terms of logic cell available in CPLDs and FPGAs, when the input signal of the operation has a resolution of bits. Table 6: Resources required by the basis operations. The implementation of the multiplication by a constant is highly dependent on the value of the constant. If the constant is a power of two, it corresponds to a simple shift and does not require resource at all. If this rule is too strict, it is also possible to implement the multiplication using two shifts and a subtraction when the constant is in the form 2L–2M [17]. Table 7 summarizes the total resources required by the algorithm, when the resolution of the input signal is bits, the number of samples in a MA or EA is , and considering that the multiplications are all implemented by shifts. Table 7: Resources required by the algorithms. It can be seen that the EMV implementation requires less resources than the NMV. This is due to two points: (1) it does not need to store samples; (2) it requires only one squaring against two for the NMV implementation. For , Table 8 shows a comparison for implementation of both methods in terms of logical elements, where a block includes all the operations needed to process measurements from one axis of the accelerometer. Table 8: Comparison for implementation resources of different methods for . 7.3. Power Consumption Considerations Package tracking applications are not necessarily very demanding in terms of positioning availability. In fact, it is typically sufficient to obtain a position fix every few hours in order to track a package from its starting point to its destination. Therefore, the proposed algorithm does not need to work all the time. Instead, a timer can periodically wake up the tracking module algorithm for limited time duration. If during this time a final static condition is detected, then the module can make a transmission to enable its localization. Otherwise, the module goes back to sleep until the next timer occurs. By doing so, the power consumption of the algorithm can be reduced drastically. In addition, even when the system is awake, it has been shown that the algorithm only requires few logical elements and that the sampling frequency needed is very low (<70 Hz), which will result in a power consumption of less than 4 mW considering, for example, an Altera MAX V CPLD [19]. Also, taking into consideration the fact that MEMS-based accelerometers are not power hungry (e.g., <1 mW for the LIS302DL accelerometer [16]), we can infer that the total power consumption of the detection module will be less than 5 mW while active. Regarding the power consumption of the transmission module, it will consist of the power to establish the connection, and the power to maintain the transmission. As it was already shown in [20], module communication radios have low connection maintenance energy, but high energy per bit transmission cost and low bandwidth. Therefore, the transmission power will be the dominant factor. Since no data is sent during the sleep mode of the tracking module and the size of the data packets sent during the active mode will only consist of the protocol data units (PDUs), that are small in size (16 bytes), the required power consumption should be typically less than 10 mW, according to [20]. Therefore, if we assume the usage of a standard Li-Ion battery such as the one used in an iPhone holding an energy of 5.3 Wh, then we can conclude that the module can support thousands of transmissions, which roughly means many days of battery lifetime. 8. Summary Based on the analysis shown in this paper, the parameters characterizations of the proposed algorithm using either NMV or EMV methods are summarized in Table 9. Table 9: Main parameter characterization of the proposed algorithm using NMV or EMV methods. 9. Conclusions In this paper, we proposed a movement recognition algorithm using a low quality MEMS accelerometer sensor integrated in a module that is meant to be used onboard an airplane for flight mode detection. The algorithm successfully detects the state of the sensor and prevents the module to transmit mobile communication signals during the flight. The proposed algorithm is based on computing the normal moving variance (NMV) or exponential moving variance (EMV) during a specific window of time of the acceleration measurements and comparing the result to a threshold. In addition, consecutive results from different time windows are further compared to a threshold in time to declare a final static condition. The main characteristics of the algorithm are summarized as follows. Generality, as it is independent of the accelerometer quality or type, where only the noise behavior of the sensor is needed to define all the algorithm parameters. Reliability, as it provides a very low probability of false alarm to meet the requirements needed by the airspace regulations. Flexibility, where it is sufficient to vary the MV threshold and the threshold in time to adapt it for different application. Simplicity, as it requires low resources, and thus, it can be implemented on a small FPGA or a CPLD. Consequently, the detection module including the accelerometer and the hardware where the algorithm is implemented will have very low power consumption, typically less than 5 mW. References 1. S. Wang, J. Min, and B. K. Yi, “Location based services for mobiles: technologies and standards,” in Proceedings of IEEE International Conference on Communication (ICC '08), Beijing, China, May 2008. 2. “Jiiva Tracing Solutions,” August 2012, http://www.jiiva.com/. 3. “Wireless Devices on Airplane,” Federal Communications Commission FCC, May 2011, http://www.fcc.gov/guides/wireless-devices-airplanes. 4. C. S. Miguelez, “GSM Operation Onboard Aircraft,” European Telecommunications Standards Institute (ETSI), Cedex, France, January 2007. 5. S. L. Lau and K. David, “Movement recognition using the accelerometer in smartphones,” in Future Network and Mobile Summit, pp. 1–9, June 2010. View at Scopus 6. D. Fuentes, L. Gonzalez-Abril, C. Angulo, and J. A. Ortega, “Online motion recognition using an accelerometer in a mobile device,” Expert Systems with Applications, vol. 39, no. 3, pp. 2461–2465, 2012. View at Publisher · View at Google Scholar 7. T. Brezmes, J. Gorricho, and J. Cotrina, “Activity recognition from accelerometer data on a mobile phone,” in Proceedings of the 10th International Work-Conference on Artificial Neural Networks: Part II: Distributed Computing, Artificial Intelligence, Bioinformatics, Soft Computing, and Ambient Assisted Living, vol. 5518 of Lecture Notes in Computer Science, pp. 796–799, Springer, Salamanca, Spain, June 2009. View at Publisher · View at Google Scholar · View at Scopus 8. T. Zhang, J. Wang, P. Liu, and J. Hou, “Fall detection by embedding an accelerometer in cellphone and using KFD algorithm,” International Journal of Computer Science and Network Security, vol. 6, no. 10, pp. 277–284, 2006. 9. D. M. Karantonis, M. R. Narayanan, M. Mathie, N. H. Lovell, and B. G. Celler, “Implementation of a real-time human movement classifier using a triaxial accelerometer for ambulatory monitoring,” IEEE Transactions on Information Technology in Biomedicine, vol. 10, no. 1, pp. 156–167, 2006. View at Publisher · View at Google Scholar · View at Scopus 10. T. R. Burchfield and S. Venkatesan, “Accelerometer-based human abnormal movement detection in wireless sensor networks,” in Proceedings of the 5th International Conference on Mobile Systems, Applications and Services (HealthNet ’07), pp. 67–69, San Juan, Puerto Rico, June 2007. View at Publisher · View at Google Scholar · View at Scopus 11. J. Shin, D. Shin, D. Shin, S. Her, S. Kim, and M. Lee, “Human movement detection algorithm using 3-axis accelerometer sensor based on low-power management scheme for mobile health care system,” in Advances in Grid and Pervasive Computing, vol. 6104 of Lecture Notes in Computer Science, pp. 81–90, Springer, 2010. View at Publisher · View at Google Scholar · View at Scopus 12. Y. Li, X. Chen, X. Zhang, K. Wang, and Z. J. Wang, “A sign-component-based framework for Chinese sign language recognition using accelerometer and sEMG data.,” IEEE Transactions on Biomedical Engineering, vol. 59, no. 10, pp. 2695–2704, 2012. View at Publisher · View at Google Scholar 13. J. S. Wang, Y. L. Hsu, and J. N. Liu, “An inertial-measurement-unit-based pen with a trajectory reconstruction algorithm and its applications,” IEEE Transactions on Industrial Electronics, vol. 57, no. 10, pp. 3508–3521, 2010. View at Publisher · View at Google Scholar · View at Scopus 14. Q. Li, J. A. Stankovic, M. A. Hanson, A. T. Barth, J. Lach, and G. Zhou, “Accurate, fast fall detection using gyroscopes and accelerometer-derived posture information,” in Proceedings of the 6th International Workshop on Wearable and Implantable Body Sensor Networks (BSN '09), pp. 138–143, June 2009. View at Publisher · View at Google Scholar · View at Scopus 15. D. T. W. Fong, J. C. Y. Wong, A. H. F. Lam, R. H. W. Lam, and W. J. Li, “A wireless motion sensing system using ADXL MEMS accelerometers for sports science applications,” in Proceedings of the 5th World Congress on Intelligent Control and Automation, Conference Proceedings (WCICA '04), pp. 5635–5640, June 2004. View at Publisher · View at Google Scholar · View at Scopus 16. STMicroelectronics, “Analog, Sensors and MEMS, Accelerometers, LIS302DL,” August 2012, http://www.st.com/internet/analog/product/152913.jsp. 17. R. G. Lyons, Understanding Digital Signal Processing, Prentice Hall, New York, NY, USA, 3rd edition, 2010. 18. L. L. Scharf, Statistical Signal Processing Detection, Estimation, and Time Series Analysis, Addison Wesley, Reading, Mass, USA, 1991. 19. Altera, “PowerPlay Early Power Estimators (EPE) and Power Analyzer,” August 2012, http://www.altera.com/support/devices/estimator/pow-powerplay.jsp. 20. A. Rahmati and L. Zhong, “Context-for-wireless: context-sensitive energy-efficient wireless data transfer,” in Proceedings of the 5th International Conference on Mobile Systems, Applications and Services (MobiSys '07), pp. 165–178, San Juan, Puerto Rico, June 2007. View at Publisher · View at Google Scholar · View at Scopus
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:34:13.000Z
v4pomdu64mip3rajwaxuwir5yblqpthc
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24723", "uncompressed_offset": 504954006, "url": "www.isfdb.org/cgi-bin/pl.cgi", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://www.isfdb.org/cgi-bin/pl.cgi?56296" }
cccc_CC-MAIN-2013-20
Publication Listing You are not logged in. If you create a free account and sign in, you will be able to customize what is displayed. Cover art supplied by Galactic Central Contents (view Concise Listing) Verification Status Reference Status Primary Verified by Swfritter on 2008-03-23 20:01:24 Clute/Nicholls Not Verified Clute/Grant Not Verified Contento1 (anth/coll) Not Verified Locus1 Not Verified Reginald1 Not Verified Reginald3 Not Verified Tuck Not Verified Miller/Contento Not Verified Bleiler1 (Gernsback) Not Verified Currey Not Verified Primary (Transient) Not Verified Bleiler78 Not Verified OCLC/Worldcat Not Verified Primary2 Not Verified Primary3 Not Verified Primary4 Not Verified Primary5 Not Verified Copyright (c) 1995-2011 Al von Ruff. ISFDB Engine - Version 4.00 (04/24/06)
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:36:46.000Z
hf7yejyxbecfxwxqnwygywmnf5cuc5ft
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24724", "uncompressed_offset": 504962684, "url": "www.isfdb.org/cgi-bin/title.cgi", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://www.isfdb.org/cgi-bin/title.cgi?1212277" }
cccc_CC-MAIN-2013-20
Bibliography: Star Trek: The Human Frontier You are not logged in. If you create a free account and sign in, you will be able to customize what is displayed. Title: Star Trek: The Human Frontier Authors: Michèle Barrett and Duncan Barrett Year: 2001 Type: NONFICTION Series: Star Trek: Nonfiction ISFDB Record Number: 1212277 Synopsis: A critical look at Star Trek as an expression of what it means to be human, and the ways the various series have handled the subject. User Rating: This title has fewer than 5 votes. VOTE Current Tags: None Add Tags Publications: Copyright (c) 1995-2011 Al von Ruff. ISFDB Engine - Version 4.00 (04/24/06)
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:49:46.000Z
riod52625p7thq7k5bdsvos2ncuxojfd
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24733", "uncompressed_offset": 581841399, "url": "www.nanoscalereslett.com/content/6/1/69/citation", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://www.nanoscalereslett.com/content/6/1/69/citation" }
cccc_CC-MAIN-2013-20
Download references Investigation of cracks in GaN films grown by combined hydride and metal organic vapor-phase epitaxial method Jianming Liu*, Xianlin Liu*, Chengming Li, Hongyuan Wei, Yan Guo, Chunmei Jiao, Zhiwei Li, Xiaoqing Xu, Huaping Song, Shaoyan Yang, Qinsen Zhu, Zhanguo Wang, Anli Yang, Tieying Yang and Huanhua Wang Nanoscale Research Letters 2011, 6:69 doi:10.1186/1556-276X-6-69 Include Format
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:50:40.000Z
ljeo7w23dma3a7reifh6wypa7lniqcze
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24738", "uncompressed_offset": 601975121, "url": "www.ohloh.net/p/why3/reviews/summary", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://www.ohloh.net/p/why3/reviews/summary" }
cccc_CC-MAIN-2013-20
Very High Activity Ratings and Reviews   Analyzed 6 days ago based on code collected 6 days ago. Community Rating 5.0   Average Rating:   5.0/5.0 Number of Ratings:   2 Number of Reviews:   0 My Review of Why3 You have not rated or reviewed this project. Click below to rate/review.   0   New Review This project has no reviews.     Copyright © 2013 Black Duck Software, Inc. and its contributors, Some Rights Reserved. Unless otherwise marked, this work is licensed under a Creative Commons Attribution 3.0 Unported License . Ohloh ® and the Ohloh logo are trademarks of Black Duck Software, Inc. in the United States and/or other jurisdictions. All other trademarks are the property of their respective holders.    
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:21:27.000Z
sffmfb5aukgwt6yawem3k4ssrnitmgqh
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24749", "uncompressed_offset": 666937411, "url": "www.seroundtable.com/archives/014539.html", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://www.seroundtable.com/archives/014539.html" }
cccc_CC-MAIN-2013-20
Personalization, User Data & Search Aug 20, 2007 • 6:07 pm | (0) by | Filed Under Search Engine Strategies 2007 San Jose   Chris Sherman is moderating this session. Chris explains that every year we talk about personalization but we never really see it in action. But that is now changing, Chris says. Gordon Hotchkiss, President & CEO, Enquiro Search Solutions Inc. is up first. What drives personalization? - User volunteered information - Search history - Web history - Community choices - Task context - Geo targeting - Platform information - Origin of search Does Personalization Work? Organic listings 3, 4, and 5 were personalized. Study of 16 individuals tracked history from a previous sessions. Provided listings based both on past clickstream and assumed place in buying funnel. The eye studies reveals, the personalized resulted doubled the performance (click throughs). Personalization works. Maybe personalization works too well? Danny Sullivan asked "the concern might be if the natural results are getting better and better why would someone want to click on the ads anyway?" What he saw with eye studies that if there is strong relevancy queues in the middle of the page, people will focus there and pay more attention to middle of page versus top result. What happens if the scanning patterns change due to it? When there is an image in the search results, you typically fixate on that image. Without it, there is a triangle pattern of looking. There are more results fighting for attention when images are on the page (universal results). As personalization becomes more important, keywords become less important and the user becomes more important, says Gord. Optimization is going to happen around themes. There will be more long tail optimization. Optimization will come across content buckets. Understanding user behavior will be vital. User centric development will take hold. Emerging "buzz sites" will be an SEO tactic. Circle of Importance: - A handful of sites or specific content will emerge for each "theme" - These will be inundated with offers for RSS content, widgets and gadgets - Scarping fo content from Circles of Importance Sites He then showed eye studies based on mock new UIs for search interfaces. Richard Zwicky, Founder & CEO, Enquisite is up next. Enquisite is a search analytics software, he was an SEO, so he built it out of a need. He explains what personalized results are. He then shows statistics, proving that if you are not on page one, you are no where. He explains that the search results are different based on where you search on, also the look of the results are different. So the results and items on the page are different. Different results are shown based on where geographically you search from. Plus now every engine has different results. To make things more complex, users are different and they have language differences. If you want to show up for these results, in the short term, go buy some search ads. In long term you can do more client management, more content needs to be created and more SEO is getting a lot more difficult. SEO campaigns need to be more sophisticated and you need better research tools and reports. Dave Davies, CEO, Beanstalk Search Engine Positioning, Inc. is next up to discuss patents. User Behavior: Engines can watch user behavior to assess the value of web pages including click through, time to return to engine and type of query. These will impact your future results as well as the results of similar searches. Personal PageRank: Google will be assigning a value to you as a search user. This value will be used to grade your activities on web sites. This will affect the rankings of sites based on an individuals activities on that site. Users who are trusted by Google will affect the results to a greater degree than those who are not trusted. Group Data: The engines are/will be grouping data. Membership in common communities, common bookmarks, common search behavior. This will affect your future results as well as the results of similar searchers. Influencing Engines: The Problems: - Rankings can vary from region to region - Rankings can vary from person to person - Some factors will have little to do with typical SEO Influencing Engines: The Benefits: - For the search, they will get better results - For the engines, they will provide better results Limitations: - Currently personalized results only affect those signed into a service Solutions to React to This: - Design for time on site and page views, monitor stats and tweak for phrases with low visitor experience levels - Localize - Link out - Attract high PageRank visitors, sheer numbers and think like a high PageRank searcher Jonathan Mendez, Founder & Chief Strategy Officer, OTTO Digital is next up. Importance: - Nothing performs better than targeting to the intentions of users - SEMs need to step up and get recognized - CMOs think BT is just display - Higher search budget, more brand dollars - Everyone wins this way Get parameters passed to you, so you can use this data, such as: host language, safe search preference, client browser, results language, query, search interface and more see joostdevalk.nl/wp-content/uploads/2007/07/google-url-parameters.pdf Ads can provide even more parameters such as ad groups, ad creative, match type, and local parameters. Tools: - Offermatica - Omniture (touch clarity) - Kefta - WebTrends You need to then do segmentation, and use very high impact segments because it provides a large data set. You can segment on behavior, and source and temporal and environmental. Personalization and Targeting Roadmap - Use data to discover segments - Hypothesize - Create and develop - Test and validate - Monitor He then showed a quick case study, showing how using some of this data helped increase a conversion rate of 47%. Match Types: - Exact had a +2.63% conversion rate - Broad match has a 4.36% lift in conversion - Phrase match had a 15.16% life in conversion Temporal patterns: Weekdays a page had a 1% lift and one page had a 8.5% lift on weekends, so they used different pages based on weekend vs. weekday. He then showed a geo example. And then showed more examples of how this data can really help improve your metrics. On QA include: Sepandar Kamvar, Google (Engineering Lead at Google) He said he is impressed to see there is a sophisticated knowledge about what they do. The biggest impact of personalization is to design and optimize for the user and not the keyword, from an SEMs perspective. There is an importance of building useful gadgets because personalization works best when your query is simplified (short queries), so extend that to zero word queries. They built iGoogle to look at user's data to see what they want to search for without them searching, as gadgets. Also thing about other ways to distribute your content. So optimize for user and build useful gadgets. Tim Mayer, Director of Product Management, Yahoo! Inc. Yahoo is focused on using social data, people's preferences. Yahoo is attacking the "subjective space." What doctor or restaurant should I go to? What is cool furniture or clothing, etc? Those types of queries. Yahoo uses the discovery experience. Leverage the power of the people to find the coolest thing out there or what is new. Become the known expert and the authority on the web and within your community (delicious, answers, etc.). Then have something unique. Have a lot of fresh breaking content, promoted through Digg, delicious, etc. Promote yourself across a lot of different services (Digg, iGoogle, delicious, sphinn, etc.) Previous story: Ad Exchanges are Changing Everything   blog comments powered by Disqus
v0
2024-06-03T21:29:47.544Z
2013-05-18T07:14:28.000Z
mc252kysb5x4qrwxyxtxuye76xj3qke3
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24750", "uncompressed_offset": 666949014, "url": "www.seroundtable.com/google-product-search-bug-13899.html", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://www.seroundtable.com/google-product-search-bug-13899.html" }
cccc_CC-MAIN-2013-20
Can't Find What Your Looking For On Google Product Search? Aug 22, 2011 • 7:51 am | (3) by | Filed Under Google Search Engine   Over the weekend, Google's shopping search, aka Google Product Search seemed to have started to have issues. Searching for some popular products brings up no matches found. For example, a search for [xbox] returns nothing: Others are complaining that Google Product search returns either zero results or totally irrelevant results. Google has not yet confirmed a bug nor have they chimed in with a time for a fix. Forum discussion at Google Web Search Help. Update: This is now fixed. Previous story: Daily Search Forum Recap: August 19, 2011   blog comments powered by Disqus
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:31:00.000Z
ikn4gndrighx7vmrs7hm5gt5eremkpdp
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24768", "uncompressed_offset": 765619609, "url": "www.werelate.org/wiki/Person:Henry_Trewren_%285%29", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://www.werelate.org/wiki/Person:Henry_Trewren_(5)" }
cccc_CC-MAIN-2013-20
Person:Henry Trewren (5) Watchers Henry TREWREN chr.2 Feb 1822 Camborne, Cornwall m. 23 Jun 1816 1. George TREWREN1817 - 1893 2. William Dunkin TREWREN1818 - 1889 3. John TREWREN1820 - 1889 4. Henry TREWREN1822 - 1882 5. Martha Dunkin TREWREN1823 - 1827 m. 1846 1. Thomas Matthews TREWREN1847 - 1847 2. Thomas Matthews TREWREN1848 - 1864 3. William Duncan TREWREN1849 - 1849 4. Mary Duncan TREWREN1850 - 1851 5. John TREWREN1851 - 6. Mary TREWRENABT 1852 - 1935 7. Henry TREWREN1853 - ABT 1860 8. John TREWRENABT 1855 - 1927 9. Fanny TREWREN1856 - 1935 10. George TREWREN1858 - 1858 11. Martha Dunkin (or Trescothick?) TREWREN1859 - 1935 12. Henry TREWREN1860 - 13. Catherine TREWREN1864 - 1945 Facts and Events Name Henry TREWREN Gender Male Christening[1] 2 Feb 1822 Camborne, Cornwall Marriage 1846 Redruth, Cornwallto Fanny MATTHEWS Other[4] 24 Oct 1846 Port Adelaide, South Australia, AustraliaArrival Death[2] 9 Aug 1882 Sandhurst, Victoria, Australia Occupation? Miner Reference Number? P1 Other? Ship Burial[3] Kangaroo Flat, Victoria, Australiacemetery Henry TREWREN was christened on 2nd Feb 1822 at Camborne, Cornwall. His parents were Ephraim Trewren, a carpenter born in Ludgvan near Penzance, and Mary DUNKIN from Camborne. Known siblings were George who was christened in 1817, William Dunkin (1818), John (1820), and Martha Dunkin (1823, died 1827). Henry married Fanny MATTHEWS in early 1846 at Redruth, Cornwall . Fanny's parents were Thomas and Fanny Matthews and she was christened on 14th April 1822 at Uny-Lelant, Cornwall , although her death registration states that she was born in Swansea, Wales and married at St Ives. Shortly after their marriage, Henry and Fanny emigrated to South Australia. It is probable they came on the Britannia under Captain W. Robson, departing London 6 June 1846 and arriving at Port Adelaide on 24 October, a voyage of 110 days . Exact details are unknown but the birth of their first child Thomas Matthews Trewren was registered in Adelaide as 27 Feb 1847. Of their 13 children, 6 died in infancy or early childhood, one died at 16, while at least 5 of the other 6 lived to their 70s or 80s. Henry and Fanny were buried at Kangaroo Flat cemetery, Bendigo. Henry and Fanny had the following children: 1. Thomas Matthews TREWREN was born on 27 Feb 1847 in Adelaide but died on 5 Dec 1847 in Adelaide. 2. A second Thomas Matthews TREWREN was born on 22 Feb 1848 in Adelaide. He died in 1864 in Victoria, aged 16. In 1848 or 1849 they probably moved to the copper mining town of Burra in South Australia's mid-north. 3. William Duncan TREWREN was born on 29 Mar 1849 in Burra but died there on 27 Dec 1849. 4. Mary Duncan TREWREN was born on 16 Apr 1850 in Burra but died there on 19 Mar 1851. 5. John TREWREN was born on 11 Aug 1851 in Burra. He probably died before 1855 By the 1850s Burra's mine was waning and they were no doubt seeking some relief from the hardships of life in Burra. Around 1852 or 1852 they joined thousands of others on the Victorian goldfields. They moved around there for the next ten years or so, where their remaining children were born. 6. Mary TREWREN was born about 1852. She married Charles MacKENZIE in 1870, with whom she had 5 daughters before his death in 1879. In 1881 she married Thomas (or John) STAGG and bore another 4 daughters and 3 sons. They lived in Inglewood, Richmond and Newmarket. She died in Bacchus Marsh in 1935, aged 83. 7. Henry TREWREN was born in 1853 in Forest Creek, Castlemaine. He probably died before 1860. 8. John TREWREN was born about 1855 in Ararat. He left home at the age of 14 or 15 for Wagga Wagga, NSW, and was not heard of for many years. He did not marry and spent 48 years farming in Queensland before returning to Bendigo where he died on 29 Jan 1927, aged 72. He was buried on 31 Jan 1927 in Kangaroo Flat cemetery. 9. Fanny TREWREN was born in 1856 at Buninyong. In 1883 she married Frederick John ALLEN. They had 3 children and in 1892 was living in Richmond. She died in Bendigo in 1935, aged 78. 10. George TREWREN was born in 1858 in Campbell's Creek, or possibly Pleasant Creek, Stawell. He died in 1858. 11. Martha Dunkin (or Trescothick?) TREWREN was born in 1859 at Pleasant Creek, Stawell. Her birth registration gives her 2nd name as Trescothick, whereas her marriage and children's births indicate Dunkin.She married George William FORREST in 1883 and lived in Bendigo where they had 5 sons and 4 daughters. She died in 1935, aged 75. 12. Henry TREWREN was born in 1860 at Kingower. He married Mary Ann SAUNDERS in 1890 and they moved to South Australia. They had 2 sons and 3 daughters in S.A. and Northern Territory. In 1892 he was a minister of religion at Johnburg, S.A. 13. Catherine TREWREN was born in 1864 at Inglewood. In 1889 she married Thomas Henry PYVIS, son of Richard Waddle PYVIS and Eleanor DAVIDSON. Thomas was born on 2 Mar 1864 in Black Lead, Ballarat and died on 3 Dec 1920 in Armadale. She died in 1945 in Malvern, aged 81. Catherine Trewren and Thomas Henry Pyvis lived in Maffra and then Melbourne and had 4 children: Henry died in a mining accident which was extensively reported in the Bendigo papers over several days. On Tuesday 7th August 1882 at 7 am, Henry went with Richard Andrews to work their tribute at the 170 foot level of the New Union Jack Company mine in Golden Gully. They bored a hole in the face and fired it. Henry wheeled out three barrows of dirt and filled part of the a fourth. He went to put down a board when a block of sandstone weighing about 3 cwt (150 kg) fell from the roof, pitched onto the stull, then to the footwall and finally struck him. Henry suffered a broken collarbone, fractured pelvis, a large wound on one foot, cuts to the head and internal injuries. He was carried back to his house but never rallied from the shock and died the next morning. Both the mine manager and the Inspector of Mines considered Trewren and Andrews to be good practical miners, and that the accident was not due to poor mining practice. The jury in the inquest returned a verdict of accidental death. After the accident, a fellow miner helped Henry put together a will written on a scrap of paper, leaving Fanny as his executor and sole beneficiary. He was too weak to sign his name, able only to make a mark. After his death Fanny put the will along with other documents in a tin can which she buried under the house. Possibly she did not feel or understand the need to get probate on the will. After she died a year later, the tin was dug up but the damp had obliterated the writing and all but destroyed the paper. A copy had been made at the time of signing, but it was 10 years before probate was obtained, delayed no doubt by the damaged will, Fanny's failure to gain probate and her dying intestate. Their son Henry, who gained powers of administration in 1884, went to South Australia after his marriage in 1890 without having finalised matters, and daughter Martha Trewren (now Forrest) eventually obtained probate in 1894. In her affidavit of administration she explained the delay in finalising the matter as due to "difficulties experienced and expenses involved" in Henry's previous application and that since then "the members of the family have been much separated." The need to obtain funds to "defray the cost of proceeding with the application" was also mentioned. Henry Page Saunders, clerk, and Robert Saunder, draper, (presumably brothers-in-law of the son Henry Trewren) stood surety. The estate consisted of a house and land in Booth-street, Golden Square, valued at 120 pounds and furniture valued at 30 pounds. Other family members who came to Australia include: • nephew Henry Trewren, possibly the only one of of George Trewren and Jane Sampson's children to come to Australia, who emigrated in 1874, and worked as blacksmith at the New Chum Consolidated Mine in Bendigo. He died in Bendigo in 1919 leaving property worth 470 pounds. Surviving children were George (1883-1955) and Florence Jane (1889-1979, married William Dober). George Trewren who lived at Broken Hill in the 1890s (m. Hannah Maria Clinch) may also have been a son of George and Jane. • brother William Dunkin Trewren, who emigrated in 1852 to Adelaide with his wife Elizabeth Dunkin James (who was also his cousin, their mothers being sisters) and first 3 children. They settled in the Castlemaine - Bendigo area. One son Thomas James Trewren settled with his family at Yass, NSW, while another, William Dunkin Trewren remained with his at Raywood, north of Bendigo. • brother John Trewren who emigrated with his wife Anne Willoughby in 1857. One daughter Martha Dunkin was born at sea. They settled at Maldon, near Bendigo. John's will describes him as Gentleman, so maybe he struck it rich on the goldfield and lived a life of leisure, having assets worth 1040 pounds at his death. Martha Dunkin married Finlay Panton McKay and Mary Dunkin married John Jewell. References 1. IGI (web), Film 0236535, Batch no. P002071. Christening 02 FEB 1822 , Camborne, Cornwall, England The register of marriages, baptisms & burials of the parish of Camborne, co. Cornwall, A.D. 1538 to 1837 / H. Tapley-Soper 2. Victorian Registry of Births, Deaths and Marriages. Pioneer Index, Victoria, 1836 - 1888: Index to Births, Deaths and Marriages in Victoria. VPI:d. TREWREN, HY. f=EUPHEMIA. m=DUNCAN MARY. p.o.d. S'HURST. Age 61 1882 #10000 3. Kangaroo Flat cemetery transcription (microfiche). (AIGS). Kangaroo Flat cemetery transcription (Microfiche, AIGS at Ivanhoe Library, Victoria.) TREWREN - Sacred to the memory of our dear father HENRY TREWREN - departed this life 9 August 1882 aged 61 years - also our beloved mother FANNY TREWREN- departed this life 29 October 1883 Aged 63 years "Yet again we hope to meet them, when the day of life is fled/ And in Heaven [with joy] to greet them [where] no farewell tear is shed" (Stone broken, Methodist) Missing words from headstone dated 1852 at Clinton cemetery, Canada? www.cowboyup.com/Proctor.html 4. Register (newspaper). (Adelaide, S.A.), 24-10-1846. arrivals: 'Britannia', 24-10-1846, Mr and Mrs H Trevean
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:31:32.000Z
fiqqulpfqnremf6q2jknw6nzkmytzz22
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24769", "uncompressed_offset": 765642955, "url": "www.werelate.org/wiki/Place:Sharpsburg,_Bath,_Kentucky,_United_States", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://www.werelate.org/wiki/Place:Sharpsburg,_Bath,_Kentucky,_United_States" }
cccc_CC-MAIN-2013-20
Place:Sharpsburg, Bath, Kentucky, United States Watchers NameSharpsburg TypeCity Coordinates38.201°N 83.93°W Located inBath, Kentucky, United States source: Getty Thesaurus of Geographic Names the text in this section is copied from an article in Wikipedia Sharpsburg is a city in Bath County, Kentucky, United States. The population was 295 at the 2000 census. It is part of the Mount Sterling Micropolitan Statistical Area. Research Tips This page uses content from the English Wikipedia. The original content was at Sharpsburg, Kentucky. The list of authors can be seen in the page history. As with WeRelate, the content of Wikipedia is available under the Creative Commons Attribution/Share-Alike License.
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:01:41.000Z
mzlg7vhhlmkizyoy3du3lucvg5sfgfma
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24770", "uncompressed_offset": 765649121, "url": "www.werelate.org/wiki/Place:St.-Albert%2C_Russell%2C_Ontario%2C_Canada", "warc_date": "2013-11-22T14:56:21.000Z", "warc_filename": "<urn:uuid:02dee2ec-1321-4c79-9637-b593cafb2587>", "warc_url": "http://www.werelate.org/wiki/Place:St.-Albert%2C_Russell%2C_Ontario%2C_Canada" }
cccc_CC-MAIN-2013-20
Place:St.-Albert, Russell, Ontario, Canada Watchers NameSt.-Albert Alt namesSt. Albertsource: anglicized spelling TypeVillage Coordinates45.2552°N 75.1213°W Located inRussell, Ontario, Canada Also located inPrescott and Russell, Ontario, Canada     See alsoCambridge, Russell, Ontario, Canadatownship in which Apple Hill located until 1998 The Nation, Prescott, Ontario, Canadamunicipality in which Apple Hill located since 1998 St.-Albert is a village in the former Township of Cambridge in the Russell section of Prescott and Russell Counties in eastern Ontario, Canada. Since 1998 St.-Albert has been located in the municipality of The Nation. Research Tips The primary source for basic documents (vital statistics, land records, wills) for people who lived in the Province of Ontario is the Archives of Ontario, 134 Ian Macdonald Blvd, Toronto, Ontario, Canada M7A 2C5. Early Records Civil registration did not begin in the province until 1869. Before then there may be church records of baptisms and burials. For the most part these are still held by the denomination who recorded them. Copies of marriage records made pre-1869 had to be sent by individual clergymen to the registrar of the county in which the marriage took place. These marriage records are available through Ontario Archives, on micorfilm through LDS libraries, and on paid and unpaid websites, but because they were copied at the registrars' offices, they cannot be considered a primary source. Vital Records after 1869 Birth, marriage and death registrations are not open to the public until a specific number of years after the event occurred. Births to 1914 are now available [October 2012]; dates for marriages and deaths are later. Birth and death registration was not universally carried out in the early years after its adoption. Deaths were more apt to be reported than births for several years. The more rural the area, the less likely it would be that these happenings were reported to the authorities. Images and indexes of civil registrations for the "viewable" years can be found on paid websites, and indexes only on FamilySearch. The latest year published is not yet available online. The FamilySearch Wiki on Ontario Vital Records explains how these records are organized and their availability. Land Records and Wills Information on how to access land records and wills is best sought on the Archives of Ontario website. An ancestor's land holding might be found on Canadian County Atlas Digital Project if he was in occupancy circa 1878. Association for the Preservation of Ontario Land Registry Office Documents (APOLROD). A list of Land Registry Offices for all Counties of Ontario. Censuses The original censuses are in the hands of Library and Archives Canada. All of the original census (1851-1911) images are online with the exception of that for 1861. Not all of them are indexed. Later censuses are not yet available. Census divisions were redrawn as the population increased and more land was inhabited. Other websites, some paid and some free, also provide Canadian census originals and/or indexes online. One can view censuses on microfilm at the Archives of Ontario or at big libraries throughout Canada. E-books and Books • The Internet Archive, particularly texts from Canadian universities, can contain interesting material • Our Roots is a Canadian website similar to The Internet Archive • Global Genealogy is an online bookshop specializing in Ontario material who will ship anywhere in the world. Some websites with more local information on Prescott and Russell Counties • The Prescott GenWeb pages include details from Lovell's Directories of 1851 and 1871, descriptions of the original townships made in 1896, as well as descriptions of the presents towns (= municipalities), and a list of Prescott County families being researched. The map page is very interesting. There is a list of published books. • The publications of the Ottawa Branch of the Ontario Genealogical Society include transcriptions of cemeteries in Prescott and Russell Counties. • Internet Archive has a large collection of Ontario references and is always worth checking. Enter the town or township in the seach engine. source: Family History Library Catalog
v0
2024-06-03T21:29:47.544Z
2013-05-18T07:14:31.000Z
4lqhcsmtyatqremcpv6bg2tx4wxezg75
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24777", "uncompressed_offset": 2311358, "url": "abs.gov.au/AUSSTATS/abs%40.nsf/66f306f503e529a5ca25697e0017661f/114B35969BB17351CA25719B001418BD", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://abs.gov.au/AUSSTATS/abs@.nsf/66f306f503e529a5ca25697e0017661f/114B35969BB17351CA25719B001418BD?opendocument" }
cccc_CC-MAIN-2013-20
Australian Bureau of Statistics Celebrating the International Year of Statistics 2013 ABS Home > Statistics > By Release Date 2901.0 - Census Dictionary, 2001   Previous ISSUE Released at 11:30 AM (CANBERRA TIME) 24/04/2001       Page tools: Print Page RSS Search this Product   Contents >> Short Definitions and Classifications >> Child Type (CTPP) - Characteristics Child Type Description Classification Quality Statement Description This classification identifies different parent-child relationships within families and is applicable to all children present in the household. A natural, adopted, foster or otherwise related child may be in a one or two parent family. Cross classification with Family Type (FMTF) allows analysis of different family types. More Detailed Description Classification Applicable to: All children 1     Natural, or adopted child of both parents or lone parent 2     Step-child of male parent 3     Step-child of female parent 4     Foster child, so stated 5     Otherwise related child (under 15) 6     Unrelated child (under 15) @    Not applicable V     Overseas visitor Total number of categories:    8 Not applicable (@) category comprises: Husband, wife, partners, lone parents, other related individuals, non-family members, or visitors (from within Australia) in family households Persons in non-family/Non-Classifiable households Persons in non-private dwellings Persons in migratory and off-shore CDs More Detailed Description Quality Statement Each stage of the Census is subject to stringent quality assurance measures. However, in a Census there are recognised sources of error which may survive in the data produced. Some of these are overcome or 'repaired' by careful processing procedures and quality management of the processing itself. The effect of those that remain is generally slight, although it may be more important for small groups in the population. The main kinds of error to keep in mind are: Partial non-response - in some cases where an answer was not provided to a question an answer was imputed or derived (often from other information on the form). In other cases a 'not stated' code was allocated. Processing error - while such errors can occur in any processing system, quality management is used to continuously improve the quality of processed data, and to identify and correct data of unacceptable quality. Random adjustment - cells containing small values are randomly adjusted to avoid releasing information about particular individuals, families or households. The effect of random adjustment is statistically insignificant. Respondent error - processing procedures cannot detect or repair all errors made by persons in completing the form, therefore some may remain in final data. Undercount - although the Census aims to count each person once, there are some people who are missed and others who are counted more than once. A post enumeration survey is conducted soon after the Census to measure the undercount. Want more information on Data Quality? A series of Census Working Papers have been produced to assess and report on various aspects of 2001 Census data quality. More Information Previous PageNext Page © Commonwealth of Australia 2013 Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
v0
2024-06-03T21:29:47.544Z
2013-05-18T08:02:08.000Z
oqv4pv5vjvy7knqz5p4hrwbr5nufv5oz
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24778", "uncompressed_offset": 2319609, "url": "abs.gov.au/AUSSTATS/abs%40.nsf/ViewContent?Action=Expand&Num=117.1&view=ProductsbyReleaseDate", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://abs.gov.au/AUSSTATS/abs@.nsf/ViewContent?readform&view=ProductsbyReleaseDate&Action=Expand&Num=117.1" }
cccc_CC-MAIN-2013-20
Australian Bureau of Statistics Celebrating the International Year of Statistics 2013 ABS Home > Statistics > By Release Date Statistics by Release Date   September, 1894 11/09/1894 A Statistical Account of the Seven Colonies of Australasia, 1894 (cat no. 1398.0) © Commonwealth of Australia 2013 Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:31:37.000Z
62absevr4jtewceazwd7in7wq6fivkkc
{ "content_type": "application/xhtml+xml", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24816", "uncompressed_offset": 51423157, "url": "cnx.org/content/m23260/latest/content_info", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://cnx.org/content/m23260/latest/content_info" }
cccc_CC-MAIN-2013-20
Connexions Sections You are here: Home » Content » Random Variables and Probabilities About: Random Variables and Probabilities Module by: Paul E Pfeiffer. E-mail the author View the content: Random Variables and Probabilities Metadata Name: Random Variables and Probabilities ID: m23260 Language: English (en) Summary: Often, each outcome of an experiment is characterized by a number. If the outcome is observed as a physical quantity, the size of that quantity (in prescribed units) is the entity actually observed. In many nonnumerical cases, it is convenient to assign a number to each outcome. For example, in a coin flipping experiment, a “head” may be represented by a 1 and a “tail” by a 0. In a Bernoulli trial, a success may be represented by a 1 and a failure by a 0. In a sequence of trials, we may be interested in the number of successes in a sequence of n component trials. One could assign a distinct number to each card in a deck of playing cards. Observations of the result of selecting a card could be recorded in terms of individual numbers. In each case, the associated number becomes a property of the outcome. The fundamental idea of a real random variable is the assignment of a real number to each elementary outcome ω in the basic space Ω. Such an assignment amounts to determining a function X, whose domain is Ω and whose range is a subset of the real line R. Each ω is mapped into exactly one value t, although several ω may have the same image point. Except in special cases, we cannot write a formula for a random variable X. However, random variables share some important general properties of functions which play an essential role in determining their usefulness. Associated with a function X as a mapping are the inverse mapping and the inverse images it produces. By the inverse image of a set of real numbers M under the mapping X, we mean the set of all those ω∈Ω which are mapped into M by X. If X does not take a value in M, the inverse image is the empty set (impossible event). If M includes the range of X, (the set of all possible values of X), the inverse image is the entire basic space Ω. The class of inverse images of the Borel sets on the real line play an essential role in probability analysis. Subject: Mathematics and Statistics Keywords: applied probability, mapping, probability, random variables, License: Creative Commons Attribution License CC-BY 3.0 Authors: Paul E Pfeiffer (perhp@earthlink.net) Copyright Holders: Paul E Pfeiffer (perhp@earthlink.net) Maintainers: Paul E Pfeiffer (perhp@earthlink.net), Daniel Williamson (dcwill@cnx.org), C. Sidney Burrus (csb@rice.edu) Latest version: 1.9 (history) First publication date: Apr 15, 2009 3:18 pm -0500 Last revision to module: Sep 18, 2009 1:48 pm -0500 Downloads PDF: m23260_1.9.pdf PDF file, for viewing content offline and printing. Learn more. XML: m23260_1.9.cnxml XML that defines the structure and contents of the module, minus any included media files. Can be reimported in the editing interface. Learn more. Version History Version: 1.9 Sep 18, 2009 1:48 pm -0500 by Daniel Williamson Changes: added google analytics tracking code Version: 1.8 Jul 28, 2009 10:00 am -0500 by Paul E Pfeiffer Changes: summary added Version: 1.7 Jul 27, 2009 12:22 pm -0500 by Daniel Williamson Changes: disjoint union fix Version: 1.6 Jun 19, 2009 11:28 am -0500 by Daniel Williamson Changes: m-file fixes, supplemental links, metadata updated Version: 1.5 Jun 9, 2009 5:36 pm -0500 by Daniel Williamson Changes: updated links, images and accessibility Version: 1.4 May 26, 2009 4:44 pm -0500 by Daniel Williamson Changes: fixed module names, and updated content structure Version: 1.3 May 14, 2009 2:50 pm -0500 by Paul E Pfeiffer Changes: content Version: 1.2 May 13, 2009 4:49 pm -0500 by Paul E Pfeiffer Changes: Initial Version: 1.1 May 13, 2009 12:17 pm -0500 by Paul E Pfeiffer Changes: Initial How to Reuse and Attribute This Content If you derive a copy of this content using a Connexions account and publish your version, proper attribution of the original work will be automatically done for you. If you reuse this work elsewhere, in order to comply with the attribution requirements of the license (CC-BY 3.0), you must include • the authors' names: Paul Pfeiffer • the title of the work: Random Variables and Probabilities • the Connexions URL where the work can be found: http://cnx.org/content/m23260/1.9/ See the citation section below for examples you can copy. How to Cite and Attribute This Content The following citation styles comply with the attribution requirements for the license (CC-BY 3.0) of this work: American Chemical Society (ACS) Style Guide: Pfeiffer, P. Random Variables and Probabilities, Connexions Web site. http://cnx.org/content/m23260/1.9/, Sep 18, 2009. American Medical Assocation (AMA) Manual of Style: Pfeiffer P. Random Variables and Probabilities [Connexions Web site]. September 18, 2009. Available at: http://cnx.org/content/m23260/1.9/. American Psychological Assocation (APA) Publication Manual: Pfeiffer, P. (2009, September 18). Random Variables and Probabilities. Retrieved from the Connexions Web site: http://cnx.org/content/m23260/1.9/ Chicago Manual of Style (Bibliography): Pfeiffer, Paul. "Random Variables and Probabilities." Connexions. September 18, 2009. http://cnx.org/content/m23260/1.9/. Chicago Manual of Style (Note): Paul Pfeiffer, "Random Variables and Probabilities," Connexions, September 18, 2009, http://cnx.org/content/m23260/1.9/. Chicago Manual of Style (Reference, in Author-Date style): Pfeiffer, P. 2009. Random Variables and Probabilities. Connexions, September 18, 2009. http://cnx.org/content/m23260/1.9/. Modern Languages Association (MLA) Style Manual: Pfeiffer, Paul. Random Variables and Probabilities. Connexions. 18 Sep. 2009 <http://cnx.org/content/m23260/1.9/>.
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:01:09.000Z
ivl3bkyi6gnfxm7elwzpmah34rchryiv
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24822", "uncompressed_offset": 58332071, "url": "crantastic.org/packages/ScottKnott/versions/11725", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://crantastic.org/packages/ScottKnott/versions/11725" }
cccc_CC-MAIN-2013-20
ScottKnott (1.1-2) The ScottKnott Clustering Algoritm. http://cran.r-project.org/web/packages/ScottKnott Division of an ANOVA experiment treatment means into homogeneous distinct groups using the clustering method of Scott & Knott Maintainer: Enio Jelihovschi Author(s): Enio Jelihovschi <eniojelihovs@gmail.com>, Jose Claudio Faria <joseclaudio.faria@gmail.com> and Sergio Oliveira <solive@uesc.br> License: GPL (>= 2) Uses: Does not use any package Released about 2 years ago.
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:30:12.000Z
few2mcbx5b4aiugc2zxyougmvjl7cork
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24829", "uncompressed_offset": 76391720, "url": "dotnetkicks.com/stories/34299/Announcing_the_Release_of_Quick_and_Dirty_Feed_Parser", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://dotnetkicks.com/stories/34299/Announcing_the_Release_of_Quick_and_Dirty_Feed_Parser" }
cccc_CC-MAIN-2013-20
Error! Success! Announcing the Release of Quick and Dirty Feed Parser 0 kicks Announcing the Release of Quick and Dirty Feed Parser  (Unpublished) Quick and Dirty Feed Parser is a lightweight .NET 2.0 library designed to give developers an agnostic way of parsing RSS 2.0 and Atom 1.0 XML syndication formats. QD Feed Parser parses both Atom and RSS feeds into business objects with common interfaces which expose the substance of the feeds - that way you can get to the business of syndicating content without worrying about what format it's in. Kicked By: Drop Kicked By:
v0
2024-06-03T21:29:47.544Z
2013-05-18T07:24:54.000Z
n43jd77bnqrmokms4vko3orxa7qh5tnw
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24849", "uncompressed_offset": 105394162, "url": "foswiki.org/Tasks/Item523", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://foswiki.org/Tasks/Item523" }
cccc_CC-MAIN-2013-20
NOTE: If you are a developer, please use a private wiki based on foswiki/trunk on a daily base ...or use trunk.foswiki.org to view this page for some minimal testing. Use Item9693 for docu changes for 1.2 and 2.0. Item523: Small user interface improvements to configure Priority: CurrentState: AppliesTo: Component: WaitingFor: Enhancement Closed Extension Configure   A real improvements should be created after code freeze. For now we are making improvements to make a small difference with twiki. ItemTemplate edit Summary Small user interface improvements to configure ReportedBy Foswiki:Main.ArthurClemens Codebase SVN Range TWiki-4.2.3, Wed, 06 Aug 2008, build 17396 AppliesTo Extension Component Configure Priority Enhancement CurrentState Closed WaitingFor Checkins Foswikirev:1467 Foswikirev:1468 TargetRelease patch ReleasedIn 1.0.1 Topic revision: r8 - 23 Feb 2009, KennethLavrsen   The copyright of the content on this website is held by the contributing authors, except where stated elsewhere. see CopyrightStatement.
v0
2024-06-03T21:29:47.544Z
2013-05-18T08:12:36.000Z
xkgltljp5mkdxrs7e5hvkm4umaagr2yz
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24863", "uncompressed_offset": 121687253, "url": "hitchwiki.org/en/Drenthe", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://hitchwiki.org/en/Drenthe" }
cccc_CC-MAIN-2013-20
Category:Drenthe From Hitchwiki (Redirected from Drenthe) Jump to: navigation, search Drenthe is a province of the Netherlands, located in the northeast of the country. It's considered to be the most rural province of this country, and one will not find any large cities here. Its capital is Assen. Cities in Drenthe with more than 5.000 inhabitants >60.000: Assen 30.000-60.000: Emmen | Hoogeveen 15.000–30.000: Meppel | Roden | Coevorden 5.000–15.000: Klazienaveen | Eelde | Zuidlaren | Beilen | Emmer-Compascuum | Nieuw Amsterdam | Gieten | Peize Motorways In Drenthe there are only three motorways; the main A28 motorway cuts through the province between Meppel in the southwest, coming from direction Utrecht and Zwolle and Eelde in the north, going on to Groningen. At Hoogeveen motorway A37 splits off, connecting it to the A31 Autobahn near Meppen, passing the city of Emmen along the way. The A32 starts just south of Meppel and runs through Drenthe for a few kilometers, connecting it with Friesland. Pages in category "Drenthe" The following 5 pages are in this category, out of 5 total.
v0
2024-06-03T21:29:47.544Z
2013-05-18T07:26:05.000Z
wslqnzwqdopvrq4xecjjyap7etvnubo5
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24876", "uncompressed_offset": 153329766, "url": "listarchives.libreoffice.org/global/design/msg04466.html", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://listarchives.libreoffice.org/global/design/msg04466.html" }
cccc_CC-MAIN-2013-20
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [libreoffice-design] UX@LibreOffice Conference in Berlin? Hi everyone, 2012/5/29 Björn Balazs <b@lazs.de> > Hi all, > > I think it is more than time to actually meet in person. > > So: who is coming to the LibreOffice Conference in Berlin? I might attend. > How do you like the > idea of proposing a usability / ux track for the conference? Who would be > interested in presenting something there? I like the idea, but I probably wouldn't present anything myself. -- Unsubscribe instructions: E-mail to design+help@global.libreoffice.org Problems? http://www.libreoffice.org/get-help/mailing-lists/how-to-unsubscribe/ Posting guidelines + more: http://wiki.documentfoundation.org/Netiquette List archive: http://listarchives.libreoffice.org/global/design/ All messages sent to this list will be publicly archived and cannot be deleted References: [libreoffice-design] UX@LibreOffice Conference in Berlin?Björn Balazs <b@lazs.de> Privacy Policy | Impressum (Legal Info) | Copyright information: Unless otherwise specified, all text and images on this website are licensed under the Creative Commons Attribution-Share Alike 3.0 License. This does not include the source code of LibreOffice, which is licensed under the GNU Lesser General Public License (LGPLv3). "LibreOffice" and "The Document Foundation" are registered trademarks of their corresponding registered owners or are in actual use as trademarks in one or more countries. Their respective logos and icons are also subject to international copyright laws. Use thereof is explained in our trademark policy.
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:56:16.000Z
fnbjmoawtibixedpae24yjldmouempdh
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24897", "uncompressed_offset": 177517000, "url": "my.pagenation.com/kul/This%20Spot_101.5723_3.0953.map", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://my.pagenation.com/kul/This%20Spot_101.5723_3.0953.map" }
cccc_CC-MAIN-2013-20
This Spot is near Glenmarie, J; is near E1 Nkve (klang); is near E1 Nkve (kl); is near Usahawan U1/8, J; is near Pemaju U1/15, J; is near Kontraktor U1/14, J; is near Saudagar U1/16, J; is near Kerjaya, P; This Spot is geographically located at latitude(3.0953 degrees) 3° 5' 43" North of the Equator and longitude (101.5723 degrees) 101° 34' 20" East of the Prime Meridian on the Map of Kuala Lumpur. The locations related to This Spot are represented by the flight path Superman would take between two points and may not be nearest by road. For example, This Spot is located 345 metres from Glenmarie Gcc. This Spot is located 596 metres from Holiday Inn Hotel - Shah Alam. This Spot is located 789 metres from Radio Control Cars Race Track. This Spot is located 1 kilometres from DRB Hicom. This Spot is located 1.1 kilometres from Temasya Industrial Park. Featured Places Of Interest Located Nearby Hyatt Saujana is located 1.6 Kilometres away from This Spot. Hyatt Saujana - 1 Photo(s) Featured. Peremba Square is located 1.8 Kilometres away from This Spot. Peremba Square - 1 Photo(s) Featured. Amaya Saujana is located 1.9 Kilometres away from This Spot. Amaya Saujana - 1 Photo(s) Featured. Holiday Inn Hotel - Shah Alam 0.6km, Hyatt Saujana 1.6km, Sri Acappella Service Apartments 2.8km, are places to stay (hotel, service apartment, inn) located near This Spot. Peremba Square 1.8km, Subang Parade 2.1km, Kelana Centrepoint 2.2km, are places to shop (shopping mall, shop houses) located near This Spot. Darul Ehsan Aquatic Centre 4.6km, Sunway Lagoon Park 4.6km, Sunway Xtreme Park 5.3km, are places of interest (attraction) located near This Spot. Japanese School Of KL 1.7km, Montfort Boys Town 1.9km, SJK SS17 1.9km, are places of learning (school, college, university) located near This Spot. Park Ss19 1g 2.1km, Field U1 7 2.1km, Park Ss17 2d 2.2km, are parks, playgrounds, open fields or commons located near This Spot. This Spot Glenmarie Gcc Holiday Inn Hotel - Shah Alam Radio Control Cars Race Track DRB Hicom Temasya Industrial Park Nissan Service U1 Perodua Service U1 Eon Service Glenmarie Toshiba Service U1 Hyundai HSDM HQ Saujana Gcc Caltex Glenmarie Saujana Villa Condo Hyatt Saujana Antah Holdings SJ Driving Range Glenhill Bungalows Toll Batu Tiga Click here to zoom in Where do you want to go? Location Information Latitude °   Longitude °   PlaceName Category This Spot Japanese School Of KL is about 1.7 km away. Caltex P Kerjaya is about 1.7 km away. Shell P Kerjaya is about 1.8 km away. Canon Service is about 1.8 km away. Peremba Square is about 1.8 km away. Bunga Raya Condo is about 1.9 km away.
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:33:29.000Z
6iluml47pxlqqdxcr6ncrfcahm2htnqk
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24901", "uncompressed_offset": 192304367, "url": "opensource.com/government/11/8/goscon-open-source-beyond-cutting-costs", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://opensource.com/government/11/8/goscon-open-source-beyond-cutting-costs" }
cccc_CC-MAIN-2013-20
GOSCON: Open source beyond cutting costs Image credits: Image credit: Kevin McCoy   (5 votes) The Government Open Source Conference, masterfully curated by Deb Bryant and the good people at the Oregon State University Open Source Lab, is one of my favorite open source events. Every year, they manage to pull together quality speakers from innovative agencies and projects in a warm, collaborative, and exciting environment. Before the earthquake unpleasantness later in the day, I was able to was able to catch the "Cutting Costs" session. Alex Howard of O'Reilly ("The hardest working man in Gov 2.0") moderated a panel discussion between Dr. David Wheeler of the Institute for Defense Analysis, Tiffany Smith Licciardi from the State Department's Office of eDiplomacy, and Greg Elin, the Chief Data Officer for the FCC. Frankly, I was expecting to hear a lot of the arguments I've heard before. Let's face it: cutting costs with open source is very well-trod territory. This panel, though, surprised me. The level of sophistication and the quality of the advice this panel produced was remarkable. They weren't beating the same tired clichés about security and licensing. Instead, we heard about the ways open source software and even the open source process were informing agency strategies, and got some very practical advice on where open source can be used, and how it can serve a larger mission. The Scholar Wheeler is famous in government open source circles for his ability to dispel open source myths. He's not a contracting officer, and he's not a lawyer, but he's one of the few open source advocates who can claim that he's not only read but *understood* the Federal Acquisition Regulations, the Defense Department's supplements to the FAR, and the government's regulations for handling intellectual property. When it comes to open source and the federal government, he's the expert's expert. It's also a pleasure to see him speak. He's enthusiastic, plain-spoken, and his arguments are insightful and air-tight. Early in his presentation, for example, he reminded us that we rarely buy software. In most cases, we've only purchased the right to use the software. Getting procurement officers to think in terms of licensing and "rights to use" draws out the similarities between proprietary and open source software for the procurement folks. His focus on this panel was Total Cost of Ownership, a method of analysis that anyone in IT is familiar with. He reminded us that TCO is very context-dependent, and it's easy to miss or ignore all the variables involved in a TCO analysis: • Hardware Costs: is the new software going to require new hardware? • Direct Software Costs: how much will it cost to acquire the software licenses? What about ongoing maintenance costs? • Indirect Software Costs: do you have the staff you need to support the software? Do you need to hire new talent, or train the folks you have? All software has downtime; can you afford the kind of downtime you expect? He also encouraged us to think about costs over a longer term. Too often, government procurements are worried only about the current budget cycle. In software procurements, this can be deadly. Future costs are almost always higher than the first-year costs. The mismatch between software lifecycles and hardware lifecycles can play havoc with a TCO analysis. Perhaps most important, if you aren't accounting for switching costs, you're missing a huge cost driver: how expensive will it be to exit the solution in question? With all of this in mind, he believes that open source has broad advantages: the acquisition costs are generally lower, increased competition keeps upgrade and maintenance costs low, and there is far less overhead managing open source license compliance that proprietary licenses. At the same time, Wheeler warns, installation, staff, and training costs may be higher for more complex open source deployments. He helpfully provided an entire page of TCO studies on open source software, which you'll be able to find at http://goscon.org/ once the presentations have been posted. Finally, he reiterated the most important fact about open source in government: that in government procurements, it is "commercial software". That is, it's the same as software that you pay for. It has to follow the same rules, the same procedures, and it's actually illegal to ignore it. The Advocate Greg Elin has been working on openness and transparency issues ever since his stint at the Sunlight Foundation. As Chief Data Officer of the FCC, he's had a tremendous opportunity to affect change from inside a notoriously opaque organization. Under his leadership, the FCC launched a new Drupal-based FCC.gov, and released the open source National Broadband Map. As you might expect, he learned some lessons. While agreeing with Wheeler, he also emphasized the complexity of procurements from the government's perspective. It's not sufficient to blithely recommend the "right tool for the right job" when faced with "the labyrinthian licensing landscape" that confronts a government project. Between cloud services, the Creative Commons, proprietary, open source, and firm fixed price contracts,  the diversity of licenses make it difficult to calculate TCO. ROI is also difficult: how do you calculate the value of Twitter, which is free? Elin identified three areas in which open source enhances the bottom line. First, commoditized computing and network services like Apache, sendmail, Nagios, and openssh can provide quality software for critical infrastructure at a very low cost. Open source is also helpful in cloud computing, where user demand is elastic but user support is low. His experience is that at some point, the scale of a system demands open source use to reduce the overhead of licensing and licensing management costs. Finally, green-field deployments where a project can compound cost savings through expertise development. That's a fancy way of saying "open source is good for getting other people to help you." NASA's Nebula project, through the OpenStack project, is a good example of this, as is FCC's own National Broadband Map. Elin also reminded us that licensing is rarely the most expensive aspect of an IT project. Often, it's staff and training. If you have a lot of engineers who work very "close" to the Internet, you're more likely to use open source, because the support costs go down. If you're not engineering-oriented, or not close to the Internet, those costs will go up. The Diplomat Tiffany Smith Licciardi has spent her time at the Office of eDiplomacy dragging the State Department into the 21st century. Licciardi's challenge is a geographically distributed user base and a critical need for close collaboration. In the past, technology has been unceremoniously forced into the historically conservative organization with questionable results. Instead, Licciardi and her team resolved to work with tools that are focused on the user's needs. More often than not, these are social, communication tools that permit staff to connect with one another more easily. With "almost no budget," they were naturally drawn to open source tools and ways to use the open source process to develop them over time. Communities@State is an internal multiple-author blog platform based on WordPress that provides a forum for professional dialog between staff and their counterparts in other countries. There are now dozens of active communities connecting staff that would otherwise have no venue to meet or collaborate. Diplopedia, started in 2006, is a Wikipedia-style collaborative editing platform based on MediaWiki. They seeded the site with 20 articles, and invited a handful of trusted contributors. The site then blossomed, and has since grown to 14,400 articles with 43,000 page views every week. Corridor is a professional social networking platform, very much like Facebook, based on Drupal. Staff can use the platform to connect with each other, collaborate, and ask questions of each other. Crucially, Corridor was an experiment: if it hadn't worked, it would have been just fine. That meant keeping the project low-risk and low-budget, which was perfect for open source. IBM's Center for the Business of Government has a written a case study on the success of the platform. Open source also finds its way into other eDiplomacy programs, like the regular Tech@State meetings that encourage public-private collaboration. Through the Virtual Student Foreign Service, State Department interns can help embassies overseas with tasks like translation at very low cost. After the disaster in Haiti, a Tufts student was able to work with Ushahidi to improve communication among the public and the emergency responders. Licciardi emphasized an important aspect of open source deployments that's often overlooked: the ability to respond quickly to user needs. For each of the platforms she described, eDiplomacy is constantly tweaking and improving in response to user's feedback. This process is considerably easier because eDiplomacy has control over the source code. Climbing the Mountain During the question and answer portion of the panel, a member of the audience asked how open source can respond to RFPs that seem "wired" for a proprietary solution. The panel was unanimous: if you're engaged after the RFP has been written, you've already lost. Working with the government means a real collaboration. Wheeler reminded the audience that in many cases, the RFPs aren't wired deliberately. It's far more likely that the procurement officials are simply unaware of the open source alternatives and inadvertently create requirements that preclude their use. He recommended responding to the Requests for Information (RFIs) that preceed most RFPs. This way, the officials can be exposed to the open source alternatives. Elin added that open source advocates can attend the regular "Industry Days" that procurement officials sponsor to answer questions from potential bidders. These are excellent forums that let industry learn more about the thinking behind new programs. Elin also mildly scolded the open source community for giving up too easily. Too often, he says, open source developers and vendors retreat when confronted with the (admittedly intimidating) government procurement process. Instead, he says, projects need to learn the process and how they can work within it to affect change. "We need folks who can climb the other side of the mountain and meet us at the top," he said. What I saw in this panel was a real change in the government attitude towards open source: it's not new, it's not revolutionary. It's just an extremely effective tool that agencies are learning how to put to its best and highest use. With staff like Wheeler, Elin, and Licciardi, it's easy to imagine quite a few open source advocates at the top of Elin's mountain.
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:09:50.000Z
4pcipc4abi46kf7umcxwtbngdjhyv2ml
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24903", "uncompressed_offset": 192443933, "url": "openwetware.org/wiki/%E5%9F%BA%E7%A4%8E%E3%82%BC%E3%83%9F%E3%83%81%E3%83%BC%E3%83%A0/basic_seminar_team/design", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://openwetware.org/wiki/%E5%9F%BA%E7%A4%8E%E3%82%BC%E3%83%9F%E3%83%81%E3%83%BC%E3%83%A0/basic_seminar_team/design" }
cccc_CC-MAIN-2013-20
基礎ゼミチーム/basic seminar team/design From OpenWetWare Jump to: navigation, search BIOMOD2012 Tohoku Team B Our Robot, "D-NApper" We're making a molecular robot that can capture an object DNA and put it inside the robot. Our robot has the function we named "Selector". "Selector" is single-stranded DNA which has complementary sequences to the "Target DNA" here and there, and consecutive adenine sequences in other portion. We have three "Selectors", and the inner "Selector" attaches to the target more strongly. When "Selector 1" catches the "Target DNA", the left sequences (which are not complementary and do not attach to the object) make loops. Then the structure shrinks and becomes shorter. Thanks to "Selector 1", the robot can select and draw the target DNA close to the robot. Next, "Selector 2" receives the target DNA from "Selector 1". And "Selector 3" receives the target from "Selector 2". Thanks to "Selector 2" and "Selector 3", the robot can deliver only the object inside certainly. Then, we will explain the body structure containing these functions. We design the robot like a tube of hexagonal base. In case it is too difficult to form and observe, we also design a triangle prism body. As for the latter shape, we made the same kind of structure last year. We've acquired some know-how of it. We think the robot should have a lid so that nothing would come in from the back. So we arrange "Selectors" symmetrically. Personal tools
v0
2024-06-03T21:29:47.544Z
2013-05-18T04:49:57.000Z
estzoc2zbkgct4jteaoxhmaf4kauiflr
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24928", "uncompressed_offset": 210561152, "url": "quotationsbook.com/quote/46232/", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://quotationsbook.com/quote/46232/" }
cccc_CC-MAIN-2013-20
Quotation added by TalithaCumi Why not add this quote to your bookmarks? I wouldn't say I'm normal. But I'm relatively stable. When I think of normal, I think of mediocrity, and mediocrity scares the f--- out of me.   Anderson, Gillian This quote is about normality · Search on Google Books to find all references and sources for this quotation. A bit about Anderson, Gillian ... Gillian Leigh Anderson (born August 9, 1968) is an American Emmy and Golden Globe Award-winning actress, best known for her role as FBI Agent Dana Scully in the American TV series The X-Files and her role as Lady Dedlock in the BBC TV series Bleak House. These people bookmarked this quote: More on the author This quote around the web Loading...   Search Quotations Book
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:44:18.000Z
sqsrjgqwomljir6pllqqfjh7qgyeqybm
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24929", "uncompressed_offset": 210577639, "url": "quotationsbook.com/quote/gift/32236/", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://quotationsbook.com/quote/gift/32236/" }
cccc_CC-MAIN-2013-20
It's easy! Just pick the product you like and click-through to buy it from trusted partners of Quotations Book. We hope you like these personalized gifts as much as we do.   Make and then buy your OWN fantastic personalized gift from this quote I never use notes, they interfere with me.   Blanchard, Ken   Make a fabulous personalised bracelet or other form of jewellery with this quote Click the banner below to pick the kind of jewellery you'd like ... Choose something popular ... Make a custom wrapped canvas ... Make custom holiday cards ... Make custom t-shirts ... Make custom holiday gifts for boys ... Make custom holiday gifts for girls ... Make custom holiday gifts for men ...   A selection of more great products and gifts!   212 - The Extra Degree The one extra degree makes the difference. This simple analogy reflects the ultimate definition of excellence. Because it's the one extra degree of effort, in business and life, that can separate the good from the great. This powerful book by S.L. Parker and Mac Anderson gives great examples, great quotes and great stories to illustrate the 212° concept. A warning - once you read it, it will be hard to forget. Your company will have a target for everything you do ... 212° Click here to buy this »
v0
2024-06-03T21:29:47.544Z
2013-05-18T07:54:11.000Z
eankqjl4l7epfdamsanbnzvzphjzt2m5
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24930", "uncompressed_offset": 210583128, "url": "quotationsbook.com/quote/gift/42488/", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://quotationsbook.com/quote/gift/42488/" }
cccc_CC-MAIN-2013-20
It's easy! Just pick the product you like and click-through to buy it from trusted partners of Quotations Book. We hope you like these personalized gifts as much as we do.   Make and then buy your OWN fantastic personalized gift from this quote Stop worrying about the potholes in the road and celebrate the journey!   Hoffman, Barbara   Make a fabulous personalised bracelet or other form of jewellery with this quote Click the banner below to pick the kind of jewellery you'd like ... Choose something popular ... Make a custom wrapped canvas ... Make custom holiday cards ... Make custom t-shirts ... Make custom holiday gifts for boys ... Make custom holiday gifts for girls ... Make custom holiday gifts for men ...   A selection of more great products and gifts!   212 - The Extra Degree The one extra degree makes the difference. This simple analogy reflects the ultimate definition of excellence. Because it's the one extra degree of effort, in business and life, that can separate the good from the great. This powerful book by S.L. Parker and Mac Anderson gives great examples, great quotes and great stories to illustrate the 212° concept. A warning - once you read it, it will be hard to forget. Your company will have a target for everything you do ... 212° Click here to buy this »
v0
2024-06-03T21:29:47.544Z
2013-05-18T04:46:36.000Z
tw527ipqhgcs2nmrwrlcwcnung4wolct
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24931", "uncompressed_offset": 210588632, "url": "quotationsbook.com/quote/gift/7623/", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://quotationsbook.com/quote/gift/7623/" }
cccc_CC-MAIN-2013-20
It's easy! Just pick the product you like and click-through to buy it from trusted partners of Quotations Book. We hope you like these personalized gifts as much as we do.   Make and then buy your OWN fantastic personalized gift from this quote I felt sorry for myself because I had no shoes -- until I met a man who had no feet.   Proverb, Jewish   Make a fabulous personalised bracelet or other form of jewellery with this quote Click the banner below to pick the kind of jewellery you'd like ... Choose something popular ... Make a custom wrapped canvas ... Make custom holiday cards ... Make custom t-shirts ... Make custom holiday gifts for boys ... Make custom holiday gifts for girls ... Make custom holiday gifts for men ...   A selection of more great products and gifts!   212 - The Extra Degree The one extra degree makes the difference. This simple analogy reflects the ultimate definition of excellence. Because it's the one extra degree of effort, in business and life, that can separate the good from the great. This powerful book by S.L. Parker and Mac Anderson gives great examples, great quotes and great stories to illustrate the 212° concept. A warning - once you read it, it will be hard to forget. Your company will have a target for everything you do ... 212° Click here to buy this »
v0
2024-06-03T21:29:47.544Z
2013-05-18T04:47:15.000Z
iuatiqsyntxv64k7uw2vok2ed2psewxv
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24932", "uncompressed_offset": 210594148, "url": "quotationsbook.com/quotes/author/3500/", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://quotationsbook.com/quotes/author/3500/" }
cccc_CC-MAIN-2013-20
  Quotes by Hogarth, William We don't have a biography. Please consult wikipedia. "All the world is competent to judge my pictures except those who are of my profession." Hogarth, William on envy    "You know I won't turn over a new leaf I am so obstinate, but then I am no less obstinate in being your affectionate Husband." Hogarth, William on husbands    Take a look at recent activity on QB!   Search Quotations Book   Photos >>
v0
2024-06-03T21:29:47.544Z
2013-05-18T08:07:33.000Z
ch3ps5m2rucr7mrje3psucxzx3alkyh6
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24936", "uncompressed_offset": 212583383, "url": "rationalwiki.org/wiki/User:%CE%A0/Creation_genetics", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://rationalwiki.org/wiki/User:%CE%A0/Creation_genetics" }
cccc_CC-MAIN-2013-20
User:Π/Creation genetics From RationalWiki Jump to: navigation, search Creation genetics is the interpretation of genetics through the biblical narrative. According to creation scientists mutations did not begin until after "The Fall" and are caused by sin.[citation needed] In addition they assert that no mutation can lead to an increase in genetic "information".[citation needed] Personal tools Namespaces Variants Actions Navigation Community Toolbox support
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:07:00.000Z
vtxuczgjpuqqpm7hryl7ya5rhflkr3z3
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24938", "uncompressed_offset": 213752123, "url": "redsarmy.com/tag/pierce/", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://redsarmy.com/tag/pierce/" }
cccc_CC-MAIN-2013-20
pierce As end of era looms, who belongs in the rafters? Nick Sannicandro is the newest member of the Red's Army team.  Nick is passionate follower of not only the Celtics, but all of Boston's pro sports teams.  Please welcome Nick aboard. As the Celtics continue to make their push towards banner 18, a long lasting debate has been rekindled with the newfound hope that this [...] April 19, 2012 Nick Sannicandro Uncategorized 36 Paul Pierce gets Buzzed for Halloween Hey… don't groan at me.  It was Paul Pierce's joke.  Besides, with the lockout taking away all semblance of actual basketball talk, I've got nothing better to do than ACTUALLY get buzzed.  So this is the best I can do at the moment.  Here's the Pierce family's halloween picture.  I'm not sure about it… I [...] November 1, 2011 RedsArmyAdmin Uncategorized Comments Off Pierce got tossed for swearing at Wade   Official Dan Crawford spoke to an AP reporter after the game and explained the two technical fouls on Paul Pierce.  I suggest you sit down before you read any further.  Maybe grab a drink.  Do some yoga or meditation.   Ok?   Here it is. Q: What did Paul Pierce do to merit the 2nd [...] May 1, 2011 RedsArmyAdmin Uncategorized 9 Doc puts it on the Big 4′s shoulders Doc Rivers is laying it all out there.  He's flat out putting the C's recent struggles on the players… saying this whole mess that's drilling ulcers into our guts is mental.  And he's putting it on the guys who have been here the longest:  “I’m not blaming anybody. I always blame me myself. I don’t [...] March 26, 2011 RedsArmyAdmin Uncategorized 10 How we see it goin’ down: Cs – Bucks Tip: 6:00pm    Court: TD Garden   Watch it:  CSN/NBA TV    Hear it:  WEEI The Matchup   Record: 46-17 (1st Atlantic, T-1st East) Record: 26-38 (3rd Central, 10th East) At Home: 27-6 On The Road: 9-22 Streak: Lost 2 Streak: Won 3 Leaders Leaders Buckets: Pierce (19.0 ppg) Buckets: Brandon Jennings (15.9 ppg) Boards: KG (9.2 rpg) Boards:  Andrew Bogut [...] March 13, 2011 RedsArmyAdmin Uncategorized Comments Off Shaq says he’s 85% "[The Celtics] want me back at 100 percent," said O'Neal. "I tried to run on it the other day, felt pretty good, but afterwards we kind of took a step back, so hopefully in a few days, in a week or so, I'll be back." ESPN Boston I'll be honest, I don't know what to [...] March 7, 2011 RedsArmyAdmin Uncategorized 7
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:26:57.000Z
7qrr35kfxzrl6z7ab23epn2zxfurbdq2
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24985", "uncompressed_offset": 295486786, "url": "www.abs.gov.au/AUSSTATS/abs%40.nsf/DetailsPage/6291.0.40.001Dec%202000", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.abs.gov.au/AUSSTATS/abs@.nsf/DetailsPage/6291.0.40.001Dec%202000?OpenDocument" }
cccc_CC-MAIN-2013-20
Australian Bureau of Statistics Celebrating the International Year of Statistics 2013 ABS Home > Statistics > By Release Date 6291.0.40.001 - Labour Force, Selected Summary Tables, Australia, Dec 2000   Previous ISSUE Released at 11:30 AM (CANBERRA TIME) 18/01/2001       Page tools: RSS Search this Product Help for :   Adobe PDF.   Publications      6291.0.40.001 - Labour Force, Selected Summary Tables, Australia © Commonwealth of Australia 2013 Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:56:40.000Z
2x7slud4fkpvpugja4rjedwugyzsz3gs
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24986", "uncompressed_offset": 295493270, "url": "www.abs.gov.au/AUSSTATS/abs%40.nsf/Latestproducts/1367.2Main%20Features2Dec%202010?issue=Dec+2010&prodno=1367.2&tabname=Summary", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.abs.gov.au/AUSSTATS/abs@.nsf/Latestproducts/1367.2Main%20Features2Dec%202010?opendocument&tabname=Summary&prodno=1367.2&issue=Dec%202010&num=&view=" }
cccc_CC-MAIN-2013-20
Australian Bureau of Statistics Celebrating the International Year of Statistics 2013 ABS Home > Statistics > By Catalogue Number 1367.2 - State and Regional Indicators, Victoria, Dec 2010   Latest ISSUE Released at 11:30 AM (CANBERRA TIME) 21/02/2011  Final    Page tools: Print Page Print All RSS Search this Product FINAL ISSUE This is the final release of State and Regional Indicators Victoria pending the development of a new national output (cat. no. 1367.0), scheduled for release in July 2011. For further information, contact James Darragh on (03) 9615 7049 or email james.darragh@abs.gov.au. NOTE State and Regional Indicators, Victoria provides a summary of statistical information for Victoria at the state and or regional level. Statistical highlights from selected indicators are included in each chapter with supporting commentary, graphs and thematic maps. The statistics presented in this issue are the latest available as at 7 February 2011. Please address feedback to: Post: Manager, Victorian Statistical Analytical Services Section Victorian Statistical Leadership Branch Australian Bureau of Statistics PO Box 2796Y Melbourne Vic 3001 Email: <victoria.statistics@abs.gov.au> Fax: (03) 9615 7002 CHANGES IN THIS ISSUE State and Regional Indicators, Victoria is released on a quarterly basis with chapters updated when new data are available. Chapters and tables are only included when new data are available, so the number of chapters and tables may vary between issues. This issue includes the following new features: • Underemployment: A Victorian Perspective feature article • animated international merchandise trade pyramids for Victoria's 10 major trading partners, and • spotlights focusing on recent fertility trends in Victoria, and understanding and using time series analysis. EXPLANATORY NOTES Explanatory notes in the form found in other ABS publications are not included in State and Regional Indicators, Victoria. For detailed information on the statistics, users are directed to the Explanatory notes contained in related ABS publications. Users are advised that small area estimates presented in this publication should be used with care. Due to rounding, discrepancies may occur between sums of the component items and totals in individual tables, and between totals in related tables. INQUIRIES For further information about these and related statistics, contact the National Information and Referral Service on 1300 135 070 or Mizan Laskar on Melbourne (03) 9615 7806. © Commonwealth of Australia 2013 Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:53:02.000Z
puhzjj52uqvernjpv2afpiaccind2dda
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24987", "uncompressed_offset": 295516073, "url": "www.abs.gov.au/ausstats/abs%40.nsf/Lookup/2901.0Chapter59402011", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.abs.gov.au/ausstats/abs@.nsf/Lookup/2901.0Chapter59402011" }
cccc_CC-MAIN-2013-20
Australian Bureau of Statistics Celebrating the International Year of Statistics 2013 ABS Home > Statistics > By Catalogue Number 2901.0 - Census Dictionary, 2011   Latest ISSUE Released at 11:30 AM (CANBERRA TIME) 23/05/2011       Page tools: Print Page RSS Search this Product   2011 Census Dictionary >> Glossary >> Working population Working population The working population consists of all persons who were employed in the week prior to Census Night. It is not possible to distinguish between workers working standard hours, and shift workers: the data collected relates to all workers. The Working Population Profile contains tables showing the characteristics of the working population in a Statistical Area Level 2 (SA2). See also Place of Work (POWP). Previous PageNext Page © Commonwealth of Australia 2013 Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
v0
2024-06-03T21:29:47.544Z
2013-05-18T07:20:45.000Z
kvcwhajmuann3g7dtz7oqjtjwxpoq5ru
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24988", "uncompressed_offset": 295522870, "url": "www.abs.gov.au/ausstats/abs%40.nsf/Previousproducts/1100.2Main%20Features9999Sep%202007?issue=Sep+2007&prodno=1100.2&tabname=Summary", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.abs.gov.au/ausstats/abs@.nsf/Previousproducts/1100.2Main%20Features9999Sep%202007?opendocument&tabname=Summary&prodno=1100.2&issue=Sep%202007&num=&view=" }
cccc_CC-MAIN-2013-20
Australian Bureau of Statistics Celebrating the International Year of Statistics 2013 ABS Home > Statistics > By Release Date 1100.2 - Statistics Victoria (Newsletter), Sep 2007   Previous ISSUE Released at 11:30 AM (CANBERRA TIME) 12/10/2007       Page tools: Print Page Print All RSS Search this Product Statistics Victoria is a quarterly newsletter primarily targetted to Victorian state and local government users providing information about new developments, recent statistical releases, seminars, training and reviews. © Commonwealth of Australia 2013 Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:26:52.000Z
vz7p2hglqivfo5kc7ie3k42l7cvt46dq
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:24997", "uncompressed_offset": 341276543, "url": "www.biomedcentral.com/1471-2202/13/126/abstract?fmt_view=mobile", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.biomedcentral.com/1471-2202/13/126/abstract?fmt_view=mobile" }
cccc_CC-MAIN-2013-20
Research article High throughput analysis reveals dissociable gene expression profiles in two independent neural systems involved in the regulation of social behavior Tyler J Stevenson1,6*, Kirstin Replogle2,3, Jenny Drnevich4, David F Clayton2,3,5 and Gregory F Ball1 Author affiliations 1 Department of Psychological and Brain Sciences, Johns Hopkins University, Baltimore, Maryland, USA 2 Department of Cell and Developmental Biology, University of Illinois, Champaign, Illinois, USA 3 Institute for Genomic Biology, University of Illinois, Champaign, Illinois, USA 4 High Performance Biological Computing Program and the Carver Biotechnology Center, University of Illinois at Urbana-Champaign, Urbana, Illinois, USA 5 Neuroscience Program, University of Illinois, Champaign, Illinois, USA 6 Institute for Mind and Biology, University of Chicago, Chicago, Il, 60637, USA For all author emails, please log on. Citation and License BMC Neuroscience 2012, 13:126 doi:10.1186/1471-2202-13-126 Published: 19 October 2012 Abstract Background Production of contextually appropriate social behaviors involves integrated activity across many brain regions. Many songbird species produce complex vocalizations called ‘songs’ that serve to attract potential mates, defend territories, and/or maintain flock cohesion. There are a series of discrete interconnect brain regions that are essential for the successful production of song. The probability and intensity of singing behavior is influenced by the reproductive state. The objectives of this study were to examine the broad changes in gene expression in brain regions that control song production with a brain region that governs the reproductive state. Results We show using microarray cDNA analysis that two discrete brain systems that are both involved in governing singing behavior show markedly different gene expression profiles. We found that cortical and basal ganglia-like brain regions that control the socio-motor production of song in birds exhibit a categorical switch in gene expression that was dependent on their reproductive state. This pattern is in stark contrast to the pattern of expression observed in a hypothalamic brain region that governs the neuroendocrine control of reproduction. Subsequent gene ontology analysis revealed marked variation in the functional categories of active genes dependent on reproductive state and anatomical localization. HVC, one cortical-like structure, displayed significant gene expression changes associated with microtubule and neurofilament cytoskeleton organization, MAP kinase activity, and steroid hormone receptor complex activity. The transitions observed in the preoptic area, a nucleus that governs the motivation to engage in singing, exhibited variation in functional categories that included thyroid hormone receptor activity, epigenetic and angiogenetic processes. Conclusions These findings highlight the importance of considering the temporal patterns of gene expression across several brain regions when engaging in social behaviors. Keywords: Songbird; Microarray; Plasticity; Reproduction; Starling; POA; HVC; Area X
v0
2024-06-03T21:29:47.544Z
2013-05-18T08:03:04.000Z
qmwoun6egflqnzzjamvagvemeoteclsx
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:25001", "uncompressed_offset": 366507772, "url": "www.ccsenet.org/journal/index.php/cco/article/view/19824", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.ccsenet.org/journal/index.php/cco/article/view/19824" }
cccc_CC-MAIN-2013-20
Influence of Alternative Tubulin Inhibitors on the Potency of Epirubicin-Immunochemotherapeutic Synthesized with an Ultra Violet Light-Activated Intermediate Cody Coyne, Toni Jones, Ryan Bear Abstract Immunochemotherapeutics, epirubicin-(C3-amide)-SS-[anti-HER2/neu] with an internal disulfide bond, and epirubicin-(C3-amide)-[anti-HER2/neu] were synthesized utilizing succinimidyl 2-[(4,4´-azipentanamido)ethyl]-1,3´-dithioproprionate or succinimidyl 4,4-azipentanoate respectively. Western-blot/chemiluminescent autoradiography analysis was utilized to characterize molecular weight profiles in order to identify evidence of immunoglobulin fragmentation or IgG-IgG polymerization. Retained HER2/neu binding characteristics of epirubicin-(C3-amide)-[anti-HER2/neu] and epirubicin-(C3-amide)-SS-[anti-HER2/neu] were determined by cell-ELISA in mammary adenocarcinoma SKBr-3 monolayer populations that highly over-expresses trophic HER2/neu receptors complexes. Cytotoxic anti-neoplastic potency of epirubicin-(C3-amide)-[anti-HER2/neu] and epirubicin-(C3-amide)-SS-[anti-HER2/neu] between epirubicin-equivalent concentrations of 10-10 M and 10-6 M was determined by measuring cell vitality staining intensity of chemotherapeutic-resistant mammary adenocarcinoma (SKBr-3 cell type). Cytotoxic anti-neoplastic potency of benzimidazoles (albendazole, flubendazole, membendazole) and griseofulvin were assessed between 0-to-2 mg/ml and 0-to-100 mg/ml respectively while mebendazole and griseofulvin were analyzed at fixed concentrations of 0.35 mg/ml and 35 mg/ml  respectively in combination with gradient concentrations of epirubicin-(C3-amide)-[anti-HER2/neu] and epirubicin-(C3-amide)-SS-[anti-HER2/neu]. Cytotoxic anti-neoplastic potency for epirubicin-(C3-amide)-[anti-HER2/neu] and epirubicin-(C3-amide)-SS-[anti-HER2/neu] against chemotherapeutic-resistant mammary adenocarcinoma SKBr-3 was nearly identical at epirubicin-equivalent concentrations of 10-10 M and 10-6 M. The benzimadazoles were possessed cytotoxic anti-neoplastic potency with flubendazole and albendazole being the most and least potent respectively. Similarly, griseofulvin had cytotoxic anti-neoplastic activity and was more potent than methylselenocysteine. Both mebendazole and griseofulvin increased the cytotoxic potency of both epirubicin-(C3-amide)-[anti-HER2/neu] or epirubicin-(C3-amide)-SS-[anti-HER2/neu]. Collectively, the epirubicin-(C3-amide)-[anti-HER2/neu] immunochemotherapeutics and benzimidazole/griseofulvin tubulin/microtubule inhibitors demonstrated a potential utility to function as alternative forms of monontherapy or components of combination therapy regiments for improved therapeutic management of aggressive and chemotherapeutic-resistant forms of neoplasia. Full Text: PDF DOI: 10.5539/cco.v1n2p49 Refbacks • There are currently no refbacks. This work is licensed under a Creative Commons Attribution 3.0 License. Cancer and Clinical Oncology ISSN 1927-4858(Print) ISSN 1927-4866(Online) Copyright © Canadian Center of Science and Education To make sure that you can receive messages from us, please add the 'ccsenet.org' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:14:09.000Z
nnye7phpdip4h57w3lq4waq23vj5po6u
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:25003", "uncompressed_offset": 366527647, "url": "www.ccsenet.org/journal/index.php/ijb/article/view/4778", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.ccsenet.org/journal/index.php/ijb/article/view/4778" }
cccc_CC-MAIN-2013-20
A Rapid and Simple Method for Brassica Napus Floral-Dip Transformation and Selection of Transgenic Plantlets Juan Li, Xiaoli Tan, Fuge Zhu, Jingjing Guo Abstract The floral-dip method of transformation by immersion of inflorescences in a suspension of Agrobacterium was applied in the Brassica napus transformation, but it involves a number of relatively time-consuming and laborious steps, including manipulating an Agrobacterium tumefaciens culture and aseptic procedures for the selection of plant lines harboring antibiotic-selection markers. It calls for a long time to prepare the buffered media. To circumvent these bottlenecks, we have developed a rapid and simple method. We find that Brassica napus can be transformed by dipping directly into an Agrobacterium tumefaciens culture supplemented with surfactant, eliminating the need for media exchange to a buffered solution. We report a method of transformant selection by soaking seeds with antibiotic. These methods save time and money, and reduce the possibility of contamination. Full Text: PDF This work is licensed under a Creative Commons Attribution 3.0 License. International Journal of Biology   ISSN 1916-9671(Print)   ISSN 1916-968X  (Online) Copyright © Canadian Center of Science and Education To make sure that you can receive messages from us, please add the 'ccsenet.org' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:29:31.000Z
q7p5q6ief6iiiocn6wnz3qcw33n6bkzg
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:25010", "uncompressed_offset": 421802392, "url": "www.eea.europa.eu/events/reforming-the-eu-ets-infrastructure/sendto_form?month%3Aint=1&year%3Aint=2013", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.eea.europa.eu/events/reforming-the-eu-ets-infrastructure/sendto_form?month:int=1&year:int=2013&orig_query=" }
cccc_CC-MAIN-2013-20
Personal tools Sign up now! Get notifications on new reports and products. Currently we have 55485 subscribers. Frequency: 3-4 emails / month. Follow us Twitter Facebook YouTube channel RSS Feeds Notifications archive Write to us For the public: For media and journalists: Contact EEA staff Contact the web team FAQ Call us Reception: Phone: (+45) 33 36 71 00 Fax: (+45) 33 36 71 99 next previous items Skip to content. | Skip to navigation Sound and independent information on the environment You are here: Home / Environmental events calendar / Reforming the EU ETS infrastructure Send this page to someone Fill in the email address of your friend, and we will send an email that contains a link to this page. Address info (Required) The e-mail address to send this link to. (Required) Your email address. A comment about this link. European Environment Agency (EEA) Kongens Nytorv 6 1050 Copenhagen K Denmark Phone: +45 3336 7100
v0
2024-06-03T21:29:47.544Z
2013-05-18T07:13:02.000Z
cqazdd3rmecvbuf6apmp7hjihwvt6v53
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:25012", "uncompressed_offset": 425880096, "url": "www.envirolink.org/resource.html?catid=6&itemid=377", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.envirolink.org/resource.html?itemid=377&catid=6" }
cccc_CC-MAIN-2013-20
advanced search     Category: Publications > Population > Overpopulation World Watch The only magazine that focuses exclusively on those issues that will determine the Earth`s long-term health. Ratings/Review of this resource: Address: World Watch Magazine Worldwatch Institute 1776 Massachusetts Ave N.W. Washington, DC 20036 USA Phone: 202-452-1999 Fax: 202-296-7365 E-Mail: worldwatch@worldwatch.org Website: http://www.worldwatch.org/mag     Detailed Information: World Watch magazine tracks key indicators of the Earth`s well-being. By monitoring global changes in environmental trends, the magazine examines the connections beween human economies and the health of the natural environment upon which they depend. World Watch is dedicated to fostering a sustainable society. The authors analyze alternative means of making progress towards such a society, and highlight the most effective known strategies-whether they be found in the advances of science and technology, the rethinking of traditional economics, or the neglected wisdom of now-threatened indigenous peoples. World Watch is written for a wide spectrum of concerned individual worldwide. It is translated and published bimonthly in English, German, Italian, Japanese, Russian, Chinese, Turkish and Arabic. Resources that may be related: Home | Site Map | About EnviroLink | Advanced Search | Suggest a Resource All content on this website is governed by a Creative Commons license. This site powered by WebDNA Community Information Systems provided by Rhiza Labs
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:19:11.000Z
uwbqc5klhqztzc4hy4oyoh3ohk4aarep
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:25013", "uncompressed_offset": 425885759, "url": "www.envirolink.org/topics.html?catid=1&do=catsearch&topic=Human+Health&topicsku=2002119144601&topictype=topic", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.envirolink.org/topics.html?topic=Human%20Health&topicsku=2002119144601&topictype=topic&do=catsearch&catid=1" }
cccc_CC-MAIN-2013-20
advanced search     Human Health - Educational Resources Subtopics of Human Health: • Asbestos (3) • Asthma (6) • Cancer (23) • Chlorine (7) • Dioxin (21) • Drinking Water (32) • Environmental Psychology (0) • Fluoride (3) • Food Quality (70) • Genetically Modified Foods (39) • Lead (13) • Light Pollution (2) • Mercury (2) • Multiple Chemical Sensitivity (2) • Noise Pollution (3) • Occupational Hazards (4) • Organochlorines (13) • Poverty (13) • Radiation (11) • Radon (3) • Toxins (37) • Categories within Human Health: • Actions You Can Take (10) • Articles (81) • Educational Resources (22) • E-Mail Lists (3) • Events (0) • General Info (11) • Government Resources (4) • Jobs & Volunteering (0) • Organizations (51) • Publications (12) • Displaying 1 - 20 of 22 resources in Human Health and Educational Resources:        Next Page 1. Documentary Film: Not for Sale/No Se Vende Oley, PA, USA From filmmakers Mark Dworkin and Melissa Young, an engaging film abuot the hazards of genetic engineering and patenting life forms and what people all over ... Category: Educational Resources 2. International University of Professional Studies Hilo, HI, USA Category: Educational Resources 3. MS Degree Program Environ. Health and Safety Mgmt. Rochester, NY, USA Info on Rochester Institute of Technology MS Degree Program in Environmental Health and Safety Management. ... Category: Educational Resources 4. World Advocacy Vancouver, BC, Canada Comprehensive list of advocacy sites covering all topics. ... Category: Educational Resources 5. Biology Online - Dictionary, Tutorials, Links and Diagrams Galashiels, Scottish Borders, United Kingdom Biology Online offers biological information in the form of tutorials, diagrams links and an online dictionary. ... Category: Educational Resources 6. BodyEarthSelf Fort Myers, FL, USA BodyEarthSelf contains vital information for self-improvement, better health, environmental awareness, and simplifying your life. The information is designed to provide hope, positive thinking, and encouragement ... Category: Educational Resources 7. Building Models in Ecology USA Used for Studies and Projects of : Environmental Impact, Natural Resources Administration, Ecology and in all those works about the Human - Environment relationship. ... Category: Educational Resources 8. Drinking Water Helpguide Wilkes Barre, PA, USA Drinking water information guide targetted to indivuduals on private water sources or groundwater wells. ... Category: Educational Resources 9. Educator's Toolkit: Food for Thought Brooklyn, NY, USA Category: Educational Resources 10. EPA Student Center USA The student section of the official EPA web site. ... Category: Educational Resources 11. HealingEarth Providence, RI, USA HealingEarth provides innovative educational opportunities that foster reverence for other species, people, and the planet. We empower individuals to connect to their deepest values and ... Category: Educational Resources 12. Local Food Toolkit Berkeley, CA, USA Category: Educational Resources 13. Nicaragua Tropical Studies Madison, WI, USA Nicaragua Tropical Studies Summer Program for high school students. Contribute to conservation efforts along the Nicaragua/Costa Rica biological corridor. ... Category: Educational Resources 14. Non Profit TV Series West Hills, CA, USA Snaptours Productions, a Los Angeles Production Company and Time Warner Communications, together with Non Profit Organizations from around the United States, has launched a new ... Category: Educational Resources 15. Permaculture Design Course Kilcoy Lane, Conondale, QLD, Australia Permaculture Design Course at Crystal Waters College, Queensland Australia. Set within a UN World Habitat Award-winning permaculture village - home to over 220 permanent residents. ... Category: Educational Resources 16. The Compost Resource Page USA This site is intended to serve as a hub of information for anyone interested in the various aspects of composting. ... Category: Educational Resources 17. The Environmental Law Center of Vermont Law School South Royalton, VT, USA Summer Session 2002 offers 30 courses in environmental law for law, graduate, or CLE credit, or to audit. Vermont Law School's degree programs include the ... Category: Educational Resources 18. The Looking-Glass Solar System United Kingdom A non-profit web wonderland that contains an abundance of world healing resources. ... Category: Educational Resources 19. The Sea and the Cities: A History of the Baltic Sea Region Helsinki, Finland Water pollution has played an important role in urban history. For centuries water courses have served for water supply, transportation, waste disposal and recreation.  ... Category: Educational Resources 20. Urhobo Historical Society Environment Page Amherst, NY, USA Urhobo Historical Society's web site makes a comprehensive approach to the environmental problems of Nigeria's Niger Delta. ... Category: Educational Resources Displaying 1 - 20 of 22     |    Next Page Home | Site Map | About EnviroLink | Advanced Search | Suggest a Resource All content on this website is governed by a Creative Commons license. This site powered by WebDNA Community Information Systems provided by Rhiza Labs
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:34:50.000Z
fs2swqqguugbz46xdqght2p2x4if2in2
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:25014", "uncompressed_offset": 426005828, "url": "www.eoearth.org/article/Act_Local,_Start_Now,_Think_Big:_10_%E2%80%9CYes_in_My_Backyard%E2%80%9D_Steps_to_a_More_Sustainable_Community?topic=49569", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.eoearth.org/article/Act_Local,_Start_Now,_Think_Big:_10_%E2%80%9CYes_in_My_Backyard%E2%80%9D_Steps_to_a_More_Sustainable_Community?topic=49569" }
cccc_CC-MAIN-2013-20
  Rate This Article Average: 0/5 Act Local, Start Now, Think Big: 10 Yes in My Backyard Steps to a More Sustainable Community Organizations & Movements: Act Local, Start Now, Think Big: 10 “Yes in My Backyard” Steps to a More Sustainable Community Wendy Tomajko builds a cucumber trellis at the Croton-on-Hudson community garden. This article has been reviewed by the following Topic Editor: Ida Kubiszewski PhD In Carmel, New York, Town Supervisor Ken Schmitt put it this way when we met him: “We’d like to know how we can save money.” After a career in local law enforcement, Schmitt got himself elected supervisor a few years ago only to inherit a municipality with aging infrastructure, outdated codes, and a population very wary of property tax increases. Schmitt leaned forward. “Do you have many wood-fired boilers in Croton? We have folks putting in outdoor wood boilers to save money on heating their homes and water. But some neighbors have been raising strong health concerns over what is coming out of the flues of these wood boilers.” Supervisor Schmitt’s question hit on two major motivators for local communities to measure the environmental impact of their ongoing lifestyles and develop realistic climate action plans: saving money and protecting public health. As much as the climate choir likes to talk to itself about gigatons of carbon dioxide equivalents, the atmospheric message has little application for the average local resident or shopkeeper. But when we shift the discussion to childhood asthma rates, algal blooms in local lakes, or runaway energy costs, everyone’s eager to find solutions. A recently published book, The Climate Solutions Consensus, describes the state of what we know about climate disruption, how to think about solutions, and how to work together with enough scale to make a difference. As the authors of that book, we would like to highlight some steps communities can take toward creating climate solutions. The good news is that natural- and social-science experts agree we have lots of solution paths for adaptation or mitigation to avoid catastrophe. The climate choir needs to turn technical data into social information that allows these solution messages to become “me too!” What we need is a bottom-to-top rethink of how we address climate change, starting in a town near you. Municipalities can and must learn to ask for information, share this knowledge with like-minded groups, and turn data and ideas into action plans. Here are 10 “Yes in My Backyard” (YIMBY) steps to kick-starting your community’s effort to become more sustainable. 1. Tap national and state expertise: Joining ICLEI—Local Governments for Sustainability costs a few hundred dollars and gives a municipality access to experts and tools specifically designed for community-scale implementation. Joining the Climate Registry for a few hundred dollars earns municipalities points in the recent Recovery.gov grant award process and affords access to training and tools as well. Signing the U.S. Conference of Mayors Climate Protection Agreement costs nothing and puts you “on the map.” Taking your state’s climate pledge will give you a good supporting document to append to any grant requests. 2. Tap local expertise: Recruit a team of local citizen-volunteers to advise your municipal leaders on the intersection of energy, the environment, and the economy. Balance the group between gardeners and gearheads to include both biological and physical concerns. As advisory to a mayor or supervisor, the group can be charged to lead the greenhouse gas inventory effort, recommend reduction targets, and develop a climate action plan. Remember to think big. Build a network of like-minded municipalities. For example, the new Northern Westchester Energy Action Consortium (www.nweac.org) has pooled energy-efficiency efforts across 13 municipalities representing 190,000 residents in New York. The consortium has already landed significant state and federal grant funds to create pilot projects for home energy retrofit ramp-ups and to measure emission impacts in order to develop climate action plans for its member municipalities. The use of compost bins reduces the amount of residential waste generated. 3. Measure the easy stuff first: As Lord Kelvin said, “If you cannot measure it, you cannot improve it.” What does your town, school, or business spend on heating, cooling, and lighting its buildings, fueling its fleet, and fertilizing its fields? If we want to save money and enjoy healthier lives, we need to get serious about taking stock of how much we spend on stuff that may have negative impacts. The task can seem daunting, so start with what is most readily at hand. Generally, annual energy costs for a municipal government will be easier to acquire than for an entire residential sector. So start with the more accessible municipal energy bills to measure consumption and estimate emissions. The corollary is to keep track of what you have missed, so you can retrace your steps as better data come your way. For example, the indirect energy and emissions costs embedded in employee commuting, the use of solvents and fertilizers, and the disposal of solid waste may be more difficult to ascertain. If you skip these at the outset, flag them for revisiting later on: they may represent 15 percent or more of actual emissions. 4. Help grow clean energy in your state and region: The bad news is that our years of reliance on building large centralized power plants have created tremendous sunk costs that look more like liabilities than assets these days. The good news is that renewable energy sources are viable in every corner of the continent. Ramping up a locality’s renewable energy portfolio can be accelerated when local governments use their own purchasing power to buy clean local energy. A good source is the Database of State Incentives for Renewables and Efficiency (www.dsireusa.org). 5. Spur clean energy locally: One of the big infrastructure problems we have in North America is heavy reliance on large centralized power plants that use a highly fragmented distribution grid to reach distant markets. Together with conservation and efficiency measures to lower future demand, a key solution is the growth of reliable, decentralized power sources that are closer to local customers. Why not form a regional intermunicipal utility to operate a smart grid that earns by saving? Adjust local codes to avoid penalizing photovoltaic, wind, and geothermal installations. Encourage cogeneration capacity in combined heat and power districts for your business or industrial zones. Develop local smart-grid demonstration projects to help you and your neighbors prepare for the energy Internet revolution and reward collective action. Lobby your state officials to replace net-metering energy policies, in which utilities credit you for any renewable generation, with stable feed-in tariffs¬. Only five U.S. states have some form of a feed-in tariff. Feed-in tariffs guarantee eligible power producers access to the grid with long-term contracts. They also obligate utilities to purchase renewable power at prices related to the base cost of generating that power. Stable contracts at higher prices will offer incentives for locally distributed power generation. 6. Make roads bicycle and pedestrian friendly: Take the transportation sector seriously. Bicycle sharrows—a road lane shared with motor vehicles and marked with an arrow chevron to indicate bicycle traffic—can be designated for little more than the cost of signs and striping. Host an annual bicycle-pedestrian week to highlight the benefits of human-powered transportation. However short, a good walking or bicycle trail will be used if it offers safe passage with pleasant views. A funny thing happens when people walk or bicycle: they wave at each other and sometimes even stop to talk. 7. Aggregate demand for good stuff that saves money: The more that residents compost, the less goes into the municipal solid-waste stream. That saves money. But good compost bins are expensive. If a municipality hosts a compost bin and rain barrel truck-sale day, it can work with vendors to offer bins at much lower costs to consumers. When Croton-on-Hudson does this, residents pay half what they would at retail and get a free, live compost demonstration when they pick up their bins. And thousands of pounds of solid organic waste are diverted from the curb to the yard, saving the village thousands of dollars in solid-waste handling costs. Leo Wiegman walks away from the Croton Bay estuary, which locals use for fishing and boating. 8. Relearn the foodways: Take the taste buds of your town’s residents seriously. The community garden movement has been booming. Create a local community garden program. Relearning how to grow our own fresh food can have a catalyzing impact much deeper than the roots of any particular tomato plant. What are the benefits? Adding a beautiful growing green space to a previously unused parcel. Contributing fresh produce to friends and neighbors and local food banks. Creating educational programs for children and adults about how to garden. Allowing residents with no access to gardens to grow food for their families and for the community. 9. Seeing is believing: Use photos, video, webcams, illustrations, and any other visualization tools at your disposal to create pictures that can capture your various efforts. Every picture tells a story. Images help people remember what they have read. Social media use photos in myriad ways. Ask photographers what kinds of images of local events they think would help get your message across. 10. Adopt smart growth land-use tools: Local governments play a vital role in defining local land uses. From building codes to zoning to such seemingly mundane matters as defining what work you can do from your own home, municipal and county governments can provide incentives to foster more efficient future development. From transit-oriented development concepts to antisprawl measures, from cluster subdivision allowances to mixed-use incentives, the devil is in the details. But those details lie fully within the authority of local governments to update and bring into concert with the community’s long-term resilience. Nobody likes red tape. Green tape is the opposite of red tape. So invent green-tape policies to streamline and modernize local policies in your community. Crafting a sticky message for all stakeholders is so important that we devoted a third of the Climate Solutions book to these social aspects of climate engagement. Today’s climate policy discussions focus on how rapidly we must decelerate the rate at which we add carbon to the atmosphere. The White House’s Cass Sunstein seems to suggest we have more time than 350-proponent Bill McKibben thinks. McKibben postulates it is already too late to avoid steep catastrophic climate-related changes. Under the Obama administration, at least, our federal government is once again allowed to operate based on facts. Washington is putting big money into research, development, demonstration, and deployment of necessary policies and technologies. The stimulus funds are proof of this expanded federal effort. Another positive shift is the realization by federal and state agencies that more funding needs to go to bottom-up information and communication strategies. We have entered the land of try-everything-to-see-what-works. These proactive changes offer municipalities unprecedented grassroots opportunities to create local initiatives. The United States alone has 16,000 local governments. So do YIMBY in your town today! Citation Leo Wiegman, David Blockstein (Lead Author);Solutions Magazine (Content Source);Ida Kubiszewski PhD (Topic Editor) "Act Local, Start Now, Think Big: 10 “Yes in My Backyard” Steps to a More Sustainable Community". In: Encyclopedia of Earth. Eds. Cutler J. Cleveland (Washington, D.C.: Environmental Information Coalition, National Council for Science and the Environment). [First published in the Encyclopedia of Earth October 12, 2010; Last revised Date October 12, 2010; Retrieved May 18, 2013 <http://www.eoearth.org/article/Act_Local,_Start_Now,_Think_Big:_10_%E2%80%9CYes_in_My_Backyard%E2%80%9D_Steps_to_a_More_Sustainable_Community?topic=49569> The Authors A former book publisher, Leo serves as Mayor of the Village of Croton-on-Hudson, New York, and is Vice Chair of the Northern Westchester Energy Action Consortium. Leo is the founder of E to the Fourth Strategic Communications, a firm dedicated to helping environmental groups communicate more effectively. Leo is co-author of The Climate Solutions Consensus with David Blockstein at the National Council on Science and the Environment and of the forthcoming, Heirlooms to Live In: H ... (Full Bio)       David E. Blockstein is a Senior Scientist with the National Council for Science and the Environment, a nonpartisan organization of scientists, environmentalists, business people, and policymakers working to improve the scientific basis of environmental decisionmaking. Dr. Blockstein joined the organization in 1990 and was its first Executive Director. Presently, he organizes NCSE's annual National Conference on Science, Policy and the Environment. Dr. Blockstei ... (Full Bio)
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:23:58.000Z
63axrf75gq7pbl55mubgrxnrlbpti7nw
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:25015", "uncompressed_offset": 434183538, "url": "www.familysearch.org/learn/wiki/en/Talk:Ohio_Vital_Records", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.familysearch.org/learn/wiki/en/Talk:Ohio_Vital_Records" }
cccc_CC-MAIN-2013-20
Talk:Ohio Vital RecordsEdit This Page From FamilySearch Wiki This Article is Selected The FamilySearch Research Wiki is delighted to let you know that the "Ohio Vital Records" article you helped create will be highlighted on the Main page of the Wiki. It will appearMay 20, 2013, and remain for seven days. Thank you for your excellent work – you have given readers/researchers important access to records. Your contributions are appreciated and will assist others in finding their ancestors. You have made a difference in research! Please note: We invite you to do any enhancing, editing or changing to this article before we post it. If you are considering an edit we ask that it be completed by May 19, 2013. If you feel this article is not ready to be highlighted, please let us know. Thank you for your time and effort! Featured Article Committee • This page was last modified on 4 March 2013, at 15:24. • This page has been accessed 177 times.
v0
2024-06-03T21:29:47.544Z
2013-05-18T07:21:22.000Z
suvus7ji5uj4tgzgeytvvvch74j746cc
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:25019", "uncompressed_offset": 448248365, "url": "www.forensicswiki.org/w/index.php?diff=12715&oldid=6654&title=Xplico", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.forensicswiki.org/w/index.php?title=Xplico&diff=12715&oldid=6654" }
cccc_CC-MAIN-2013-20
Error Jump to: navigation, search 2 revisions of this difference (6654 and 12715) were not found. This is usually caused by following an outdated diff link to a page that has been deleted. Details can be found in the deletion log. Personal tools Namespaces Variants Actions Navigation: About forensicswiki.org: Toolbox
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:48:50.000Z
ualowzpcpcaqtd5a54vpb5o7rcodhhjk
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:25040", "uncompressed_offset": 554595921, "url": "www.mariowiki.com/Trampoline_Terror", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.mariowiki.com/Trampoline_Terror" }
cccc_CC-MAIN-2013-20
Trampoline Terror From the Super Mario Wiki Jump to: navigation, search Trampoline Terror Trampoline Terror is one of Mario's minigames in Super Mario 64 DS. This game is very similar to Trampoline Time, except Mario must earn points going across rainbow rings. Both minigames use Super Mario Sunshine's secret level music. [edit] Gameplay The game begins with a long line appearing at the bottom of the touch screen, turning into a large trampoline. If Mario bounces off it two times, the carpet will turn yellow, and then red. The third time that Mario bounces off it, the carpet disappears. The player can draw more trampolines using the Stylus, so Mario can bounce over them to get through the rings that appear on both screens. If the plumber loses all of his three Lives, the minigame ends, showing the scores. [edit] In-Game Instructions Only players with superb stylus skills will be able to make Mario bounce through the rings! [edit] Trivia Personal tools
v0
2024-06-03T21:29:47.544Z
2013-05-18T08:09:52.000Z
rik6mtbun62xzgufd7et3otuyfurx5qb
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:25043", "uncompressed_offset": 561157467, "url": "www.mepis.org/docs/en/index.php?title=File%3ABoot-method.png", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.mepis.org/docs/en/index.php?title=File:Boot-method.png" }
cccc_CC-MAIN-2013-20
File:Boot-method.png From MEPIS Documentation Wiki Jump to: navigation, search Select the boot method. File history Click on a date/time to view the file as it appeared at that time. Date/TimeThumbnailDimensionsUserComment current02:06, 15 March 2009543×264 (16 KB)Marvin02 (Talk | contribs) (Select the boot method.) The following page links to this file: Personal tools
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:08:29.000Z
d375g3rxn5xmnq7yabt2owq4civbtwga
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:25047", "uncompressed_offset": 605034950, "url": "www.openbible.info/topics/achievements", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.openbible.info/topics/achievements" }
cccc_CC-MAIN-2013-20
40 Bible Verses about Achievements 1 John 4:1 ESV / 7 helpful votes Beloved, do not believe every spirit, but test the spirits to see whether they are from God, for many false prophets have gone out into the world. 1 John 2:15 ESV / 5 helpful votes Do not love the world or the things in the world. If anyone loves the world, the love of the Father is not in him. 1 Corinthians 2:9 ESV / 4 helpful votes But, as it is written, “What no eye has seen, nor ear heard, nor the heart of man imagined, what God has prepared for those who love him”— Romans 1:16 ESV / 3 helpful votes For I am not ashamed of the gospel, for it is the power of God for salvation to everyone who believes, to the Jew first and also to the Greek. John 15:12 ESV / 3 helpful votes “This is my commandment, that you love one another as I have loved you. Matthew 25:14-30 ESV / 3 helpful votes “For it will be like a man going on a journey, who called his servants and entrusted to them his property. To one he gave five talents, to another two, to another one, to each according to his ability. Then he went away. He who had received the five talents went at once and traded with them, and he made five talents more. So also he who had the two talents made two talents more. But he who had received the one talent went and dug in the ground and hid his master's money. ... Isaiah 1:1-31 ESV / 3 helpful votes The vision of Isaiah the son of Amoz, which he saw concerning Judah and Jerusalem in the days of Uzziah, Jotham, Ahaz, and Hezekiah, kings of Judah. Hear, O heavens, and give ear, O earth; for the Lord has spoken: “Children have I reared and brought up, but they have rebelled against me. The ox knows its owner, and the donkey its master's crib, but Israel does not know, my people do not understand.” Ah, sinful nation, a people laden with iniquity, offspring of evildoers, children who deal corruptly! They have forsaken the Lord, they have despised the Holy One of Israel, they are utterly estranged. Why will you still be struck down? Why will you continue to rebel? The whole head is sick, and the whole heart faint. ... James 5:12 ESV / 2 helpful votes But above all, my brothers, do not swear, either by heaven or by earth or by any other oath, but let your “yes” be yes and your “no” be no, so that you may not fall under condemnation. James 1:11 ESV / 2 helpful votes For the sun rises with its scorching heat and withers the grass; its flower falls, and its beauty perishes. So also will the rich man fade away in the midst of his pursuits. James 1:10-11 ESV / 2 helpful votes And the rich in his humiliation, because like a flower of the grass he will pass away. For the sun rises with its scorching heat and withers the grass; its flower falls, and its beauty perishes. So also will the rich man fade away in the midst of his pursuits. Hebrews 13:17 ESV / 2 helpful votes Obey your leaders and submit to them, for they are keeping watch over your souls, as those who will have to give an account. Let them do this with joy and not with groaning, for that would be of no advantage to you. 1 Timothy 3:16 ESV / 2 helpful votes Great indeed, we confess, is the mystery of godliness: He was manifested in the flesh, vindicated by the Spirit, seen by angels, proclaimed among the nations, believed on in the world, taken up in glory. 1 Timothy 2:4 ESV / 2 helpful votes Who desires all people to be saved and to come to the knowledge of the truth. Colossians 2:8 ESV / 2 helpful votes See to it that no one takes you captive by philosophy and empty deceit, according to human tradition, according to the elemental spirits of the world, and not according to Christ. Ephesians 5:25 ESV / 2 helpful votes Husbands, love your wives, as Christ loved the church and gave himself up for her, Romans 3:23 ESV / 2 helpful votes For all have sinned and fall short of the glory of God, John 14:6 ESV / 2 helpful votes Jesus said to him, “I am the way, and the truth, and the life. No one comes to the Father except through me. John 8:1-59 ESV / 2 helpful votes But Jesus went to the Mount of Olives. Early in the morning he came again to the temple. All the people came to him, and he sat down and taught them. The scribes and the Pharisees brought a woman who had been caught in adultery, and placing her in the midst they said to him, “Teacher, this woman has been caught in the act of adultery. Now in the Law Moses commanded us to stone such women. So what do you say?” ... John 3:16 ESV / 2 helpful votes “For God so loved the world, that he gave his only Son, that whoever believes in him should not perish but have eternal life. John 1:14 ESV / 2 helpful votes And the Word became flesh and dwelt among us, and we have seen his glory, glory as of the only Son from the Father, full of grace and truth. John 1:1-5 ESV / 2 helpful votes In the beginning was the Word, and the Word was with God, and the Word was God. He was in the beginning with God. All things were made through him, and without him was not any thing made that was made. In him was life, and the life was the light of men. The light shines in the darkness, and the darkness has not overcome it. Luke 11:2-4 ESV / 2 helpful votes And he said to them, “When you pray, say: “Father, hallowed be your name. Your kingdom come. Give us each day our daily bread, and forgive us our sins, for we ourselves forgive everyone who is indebted to us. And lead us not into temptation.” Luke 2:1-52 ESV / 2 helpful votes In those days a decree went out from Caesar Augustus that all the world should be registered. This was the first registration when Quirinius was governor of Syria. And all went to be registered, each to his own town. And Joseph also went up from Galilee, from the town of Nazareth, to Judea, to the city of David, which is called Bethlehem, because he was of the house and lineage of David, to be registered with Mary, his betrothed, who was with child. ... Mark 16:16 ESV / 2 helpful votes Whoever believes and is baptized will be saved, but whoever does not believe will be condemned. Mark 16:15 ESV / 2 helpful votes And he said to them, “Go into all the world and proclaim the gospel to the whole creation. Mark 16:9 ESV / 2 helpful votes [[Now when he rose early on the first day of the week, he appeared first to Mary Magdalene, from whom he had cast out seven demons. Mark 15:19 ESV / 2 helpful votes And they were striking his head with a reed and spitting on him and kneeling down in homage to him. Daniel 7:1-28 ESV / 2 helpful votes In the first year of Belshazzar king of Babylon, Daniel saw a dream and visions of his head as he lay in his bed. Then he wrote down the dream and told the sum of the matter. Daniel declared, “I saw in my vision by night, and behold, the four winds of heaven were stirring up the great sea. And four great beasts came up out of the sea, different from one another. The first was like a lion and had eagles' wings. Then as I looked its wings were plucked off, and it was lifted up from the ground and made to stand on two feet like a man, and the mind of a man was given to it. And behold, another beast, a second one, like a bear. It was raised up on one side. It had three ribs in its mouth between its teeth; and it was told, ‘Arise, devour much flesh.’ ... Daniel 4:30 ESV / 2 helpful votes And the king answered and said, “Is not this great Babylon, which I have built by my mighty power as a royal residence and for the glory of my majesty?” Daniel 2:1-49 ESV / 2 helpful votes In the second year of the reign of Nebuchadnezzar, Nebuchadnezzar had dreams; his spirit was troubled, and his sleep left him. Then the king commanded that the magicians, the enchanters, the sorcerers, and the Chaldeans be summoned to tell the king his dreams. So they came in and stood before the king. And the king said to them, “I had a dream, and my spirit is troubled to know the dream.” Then the Chaldeans said to the king in Aramaic, “O king, live forever! Tell your servants the dream, and we will show the interpretation.” The king answered and said to the Chaldeans, “The word from me is firm: if you do not make known to me the dream and its interpretation, you shall be torn limb from limb, and your houses shall be laid in ruins. ... Isaiah 53:12 ESV / 2 helpful votes Therefore I will divide him a portion with the many, and he shall divide the spoil with the strong, because he poured out his soul to death and was numbered with the transgressors; yet he bore the sin of many, and makes intercession for the transgressors. Isaiah 53:4 ESV / 2 helpful votes Surely he has borne our griefs and carried our sorrows; yet we esteemed him stricken, smitten by God, and afflicted. Isaiah 53:3 ESV / 2 helpful votes He was despised and rejected by men; a man of sorrows, and acquainted with grief; and as one from whom men hide their faces he was despised, and we esteemed him not. Isaiah 40:1-31 ESV / 2 helpful votes Comfort, comfort my people, says your God. Speak tenderly to Jerusalem, and cry to her that her warfare is ended, that her iniquity is pardoned, that she has received from the Lord's hand double for all her sins. A voice cries: “In the wilderness prepare the way of the Lord; make straight in the desert a highway for our God. Every valley shall be lifted up, and every mountain and hill be made low; the uneven ground shall become level, and the rough places a plain. And the glory of the Lord shall be revealed, and all flesh shall see it together, for the mouth of the Lord has spoken.” ... Job 26:7 ESV / 2 helpful votes He stretches out the north over the void and hangs the earth on nothing. Genesis 1:2 ESV / 2 helpful votes The earth was without form and void, and darkness was over the face of the deep. And the Spirit of God was hovering over the face of the waters. Genesis 1:1-31 ESV / 2 helpful votes In the beginning, God created the heavens and the earth. The earth was without form and void, and darkness was over the face of the deep. And the Spirit of God was hovering over the face of the waters. And God said, “Let there be light,” and there was light. And God saw that the light was good. And God separated the light from the darkness. God called the light Day, and the darkness he called Night. And there was evening and there was morning, the first day. ... Genesis 1:1 ESV / 2 helpful votes In the beginning, God created the heavens and the earth. Matthew 10:33 ESV / 1 helpful vote But whoever denies me before men, I also will deny before my Father who is in heaven. Matthew 6:24 ESV / 1 helpful vote “No one can serve two masters, for either he will hate the one and love the other, or he will be devoted to the one and despise the other. You cannot serve God and money. Suggest a Verse Enter a Verse Reference (e.g., John 3:16-17) Visit the Bible online to search for words if you don’t know the specific passage your’re looking for.
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:26:55.000Z
d7yufc2mv7ccmi2uj55bsi463kli5a4p
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:25056", "uncompressed_offset": 611814720, "url": "www.panarmenian.net/eng/news/112149/", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.panarmenian.net/eng/news/112149/" }
cccc_CC-MAIN-2013-20
Egyptians vote in run-off presidential election PanARMENIAN.Net - Egyptians began voting on Saturday, June 16 in a run-off presidential election that offers them a stark choice between a conservative Islamist and a former top military officer who was the last prime minister of ousted President Hosni Mubarak. It is a novelty for ordinary Egyptians, who are choosing their leader for the first time in a history that stretches back to the pharaohs. Polling stations opened to 50 million eligible voters for the first of two days of voting at 8 am, Reuters reported. Partner news  Top stories Jorge Rafael Videla, an austere former army commander, led Argentina during the bloodiest days of its Dirty War dictatorship. According to the United Nations, April was Iraq's bloodiest month for almost five years, with 712 people killed. Reports suggest the rebel fighters may have tried to blow up the walls of the prison, which holds some 4,000 inmates. Moscow has condemned other nations for supporting rebel forces and failing to condemn what it describes as terrorist attacks on the Syrian regime. Partner news
v0
2024-06-03T21:29:47.544Z
2013-05-18T08:09:05.000Z
aoslv3mtcfop4fvqm6fklqfpgmiqk3lw
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:25057", "uncompressed_offset": 611825112, "url": "www.panarmenian.net/eng/news/127765/", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.panarmenian.net/eng/news/127765/" }
cccc_CC-MAIN-2013-20
Armenian envoy, Bulgarian parliament head discuss Karabakh issue PanARMENIAN.Net - Armenian ambassador to Bulgaria Arsen Shoyan met October 15 with the chairwoman of Bulgarian National Assembly Tsetska Dangovska. Armenian-Bulgarian relations and inter-parliamentary cooperation were in the focus of the discussion. The Armenian envoy briefed the Bulgarian official on the latest developments in the Nagorno Karabakh process and the release of Azerbaijani axe-killer Ramil Safarov. The parties further underscored the role of Bulgarian Armenian community in the country’s development and strengthening of bilateral ties, RA MFA press service reported. Partner news  Top stories Possible ways to advance the peaceful settlement of Nagorno Karabakh conflict were in the focus of the discussion. A meeting between Edward Nalbandian and Azerbaijani FM Elmar Mammadyarov will be held on the sidelines of the event. Bergen began by recounting his 1997 meeting with Bin Laden in Afghanistan after a long process of negotiations. Arman Kirakosyan urged Azerbaijan to accept suggestions of Minsk Group to achieve a breakthrough in Karabakh settlement. Partner news
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:30:11.000Z
vu6cu2faypgx3v6uhsa7uwqkyxb6wacw
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:25059", "uncompressed_offset": 618990632, "url": "www.perseus.tufts.edu/hopper/text?doc=urn%3Acts%3AgreekLit%3Atlg0086.tlg025.perseus-eng1%3A11.1060a", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.perseus.tufts.edu/hopper/text?doc=urn:cts:greekLit:tlg0086.tlg025.perseus-eng1:11.1060a" }
cccc_CC-MAIN-2013-20
[1060a] [1] because that which involves the destruction of something else is a principle. These and other similar points are those which cause us perplexity. Again, ought we to assume the existence of something else besides particular things, or are they the objects of the science which we are seeking?1 It is true that they are infinite in number; but then the things which exist besides particulars are genera or species, and neither of these is the object of the science which we are now seeking. We have explained2 why this is impossible.Indeed, in general it is a difficult question whether we should suppose that there is some substance which exists separately besides sensible substances (i.e. the substances of our world), or that the latter constitute reality, and that it is with them that Wisdom is concerned. It seems that we are looking for some other kind of substance, and that this is the object of our undertaking: I mean, to see whether there is anything which exists separately and independently, and does not appertain to any sensible thing.But again, if there is another kind of substance besides sensible substances, to what kind of sensible things are we to suppose that it corresponds? Why should we suppose that it corresponds to men or horses rather than to other animals, or even to inanimate objects in general? And yet to manufacture a set of eternal substances equal in number to those which are sensible and perishable would seem to fall outside the bounds of plausibility.Yet if the principle which we are now seeking does not exist in separation from bodies, [20] what can we suppose it to be if not matter? Yes, but matter does not exist actually, but only potentially. It might seem rather that a more appropriate principle would be form or shape; but this is perishable3; and so in general there is no eternal substance which exists separately and independently.But this is absurd, because it seems natural that there should be a substance and principle of this kind, and it is sought for as existing by nearly all the most enlightened thinkers. For how can there be any order in the universe if there is not something eternal and separate and permanent? Again, if there is a substance and principle of such a nature as that which we are now seeking, and if it is one for all things, i.e. the same for both eternal and perishable things, it is a difficult question as to why, when the principle is the same, some of the things which come under that principle are eternal, and others not; for this is paradoxical.4 But if there is one principle of perishable things, and another of eternal things, if the principle of perishable things is also eternal, we shall still have the same difficulty; because if the principle is eternal, why are not the things which come under that principle eternal? And if it is perishable, it must have another principle behind it, and that principle must have another behind it; and the process will go on to infinity. On the other hand, if we posit the principles which seem most unchangeable, Being and Unity,5(a) unless each of them denotes a particular thing and a substance, 1 Cf. Aristot. Met. 3.1.11, Aristot. Met. 3.4.1-8. 2 Aristot. Met. 11.1.11-13 3 Forms which are induced in matter are perishable, although not subject to the process of destruction; they are at one time and are not at another (cf. Aristot. Met. 7.15.1). The only pure form (i.e., the only form which is independent of matter in any and every sense) is the prime mover (Aristot. Met. 12.7). 4 Cf. Aristot. Met. 3.1.12, Aristot. Met. 3.4.11-23. 5 Cf. Aristot. Met. 3.1.13, Aristot. Met. 3.4.24-34. This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License. An XML version of this text is available for download, with the additional restriction that you offer Perseus any modifications you make. Perseus provides credit for all accepted changes, storing new additions in a versioning system. load focus Greek (1924) hide Places (automatically extracted) View a map of the most frequently mentioned places in this document. Visualize the most frequently mentioned Pleiades ancient places in this text. Download Pleiades ancient places geospacial dataset for this text. hide References (8 total) • Cross-references in notes from this page (8): hideData/Identifiers Citation URN: urn:cts:greekLit:tlg0086.tlg025.perseus-eng1:11.1060a Document URN: urn:cts:greekLit:tlg0086.tlg025.perseus-eng1 hide Display Preferences Greek Display: Arabic Display: View by Default: Browse Bar:
v0
2024-06-03T21:29:47.544Z
2013-05-18T07:21:10.000Z
35uqbhs4hvrn66s6rirybr4wpf62xr2k
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:25060", "uncompressed_offset": 619001883, "url": "www.perseus.tufts.edu/hopper/text?doc=urn%3Acts%3AgreekLit%3Atlg0526.tlg004.perseus-eng1%3A3.340", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.perseus.tufts.edu/hopper/text?doc=urn:cts:greekLit:tlg0526.tlg004.perseus-eng1:3.340" }
cccc_CC-MAIN-2013-20
[340] AND now the Romans searched for Josephus, both out of the hatred they bore him, and because their general was very desirous to have him taken; for he reckoned that if he were once taken, the greatest part of the war would be over. They then searched among the dead, and looked into the most concealed recesses of the city; but as the city was first taken, he was assisted by a certain supernatural providence; for he withdrew himself from the enemy when he was in the midst of them, and leaped into a certain deep pit, whereto there adjoined a large den at one side of it, which den could not be seen by those that were above ground; and there he met with forty persons of eminency that had concealed themselves, and with provisions enough to satisfy them for not a few days. So in the day time he hid himself from the enemy, who had seized upon all places, and in the night time he got up out of the den and looked about for some way of escaping, and took exact notice of the watch; but as all places were guarded every where on his account, that there was no way of getting off unseen, he went down again into the den. Thus he concealed himself two days; but on the third day, when they had taken a woman who had been with them, he was discovered. Whereupon Vespasian sent immediately and zealously two tribunes, Paulinus and Gallicanus, and ordered them to give Josephus their right hands as a security for his life, and to exhort him to come up. This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License. An XML version of this text is available for download, with the additional restriction that you offer Perseus any modifications you make. Perseus provides credit for all accepted changes, storing new additions in a versioning system. load focus Greek (B. Niese, 1895) hide Places (automatically extracted) View a map of the most frequently mentioned places in this document. Visualize the most frequently mentioned Pleiades ancient places in this text. Download Pleiades ancient places geospacial dataset for this text. hideData/Identifiers Citation URN: urn:cts:greekLit:tlg0526.tlg004.perseus-eng1:3.340 Document URN: urn:cts:greekLit:tlg0526.tlg004.perseus-eng1 hide Display Preferences Greek Display: Arabic Display: View by Default: Browse Bar:
v0
2024-06-03T21:29:47.544Z
2013-05-18T05:56:23.000Z
xxwatd55gail6ohmgz5wz5q5pxlnvhct
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:25063", "uncompressed_offset": 630532676, "url": "www.pressreleasepoint.com/denise-glyn-borders-lead-sri-international%E2%80%99s-education-division", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.pressreleasepoint.com/denise-glyn-borders-lead-sri-international%E2%80%99s-education-division" }
cccc_CC-MAIN-2013-20
Denise Glyn Borders to Lead SRI International’s Education Division Printer-friendly versionPDF version MENLO PARK, Calif.,-February 4, 2013-Denise Glyn Borders, Ed.D., has joined SRI International as vice president of its Education Division, a multidisciplinary group of researchers focused on improving education and learning and outcomes from early childhood through college and into the workforce. In her new role, Borders will drive strategy and planning for SRI's education research, and develop business opportunities that help clients solve complex education challenges. Borders' career includes experience in academia, for-profit, nonprofit, and government sectors. She has held senior positions in a broad range of areas that she will also lead at SRI, including management, business operations and development, and research, evaluation, and implementation of education and workforce programs. "Improving education outcomes is one of today's most critical global challenges," said Curtis R. Carlson, Ph.D., SRI International's president and CEO. "Denise's background as an educator, administrator, and executive will be important to SRI's clients. We welcome her as a valuable addition to SRI's leadership team." Prior to joining SRI, Borders was senior vice president and director of the U.S. Education and Workforce Development (USEWD) Group at FHI 360, a nonprofit organization focused on global health and development needs. Before FHI 360, Borders was a senior vice president at AED (formerly the Academy for Educational Development), where she oversaw U.S. program operations in education, early childhood development, research and evaluation, and education policy and practice. Previously, she was president and CEO of The McKenzie Group and was associate director, Accountability, Assessment, Research and Evaluation, Education and Professional Development for the Department of Defense Education Activity. She has been chief of Educational Accountability and Assistant Superintendent for Baltimore City Public Schools and a National/Federal Government Evaluation Consultant at CTB/McGraw-Hill Publishing. In addition, Borders has been a curriculum specialist, teacher supervisor, classroom teacher, and university lecturer. Borders has an Ed.D. in psycholinguistics and research, an Ed.M. in curriculum and teaching, and an M.A. in urban education from Teacher's College, Columbia University. She also earned an M.S. in elementary education from the State University of New York Cortland/Cornell University.   News Source : Denise Glyn Borders to Lead SRI International’s Education Division Copy this html code to your website/blog and link to this press release.
v0
2024-06-03T21:29:47.544Z
2013-05-18T08:07:14.000Z
43kibogue5fd4udvrvsfbzputnfcs4wf
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:25069", "uncompressed_offset": 679328271, "url": "www.sourcewatch.org/index.php?title=USAID_Promotion_of_Agricultural_Biotechnology", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.sourcewatch.org/index.php?title=USAID_Promotion_of_Agricultural_Biotechnology" }
cccc_CC-MAIN-2013-20
CMD sent two reporters to track ALEC in Oklahoma Click here to help support our future investigations. USAID Promotion of Agricultural Biotechnology From SourceWatch Jump to: navigation, search USAID Promotion of Agricultural Biotechnology describes the ways in which the U.S. Agency for International Development (USAID) promotes agricultural biotechnology, including genetically modified organisms (GMOs). Contents USAID Strategic Plan The FY 2007-2012 Department of State and USAID Strategic Plan states its support of biotechnology as follows:[1] "Agriculture: The United States has strong political, economic, and humanitarian interests in supporting agricultural growth in poorer countries. We will support: agricultural trade and market systems that link producers to markets, add value to products, and increase rural incomes and opportunities; scientific and technological applications, including biotechnology, that harness new technology to raise agricultural productivity and provide a more stable, nutritious, and affordable food supply; local organizations that provide services and give political voice to producers; integration of vulnerable groups into development processes; development of human capital and institutions in and for agriculture; reduced negative environmental impacts; and natural resource management that contributes to rural sector growth. As women are the major food producers in many regions, we will work to ensure that women benefit from investments in technology and strengthening of markets." A previous document, 2004-2009 joint U.S. State Department and USAID strategic plan, spells out this support in more detail:[2] "The United States needs a stable, resilient, and growing world economy to secure prosperity at home and abroad. As the world’s largest economy and trading nation, total U.S. trade is equivalent to about one-quarter of our nation’s income. Over the past decade, exports accounted for one-quarter of our economic growth. One out of every three acres of our farmland is devoted to exports, as is one out of five jobs in manufacturing. U.S. firms and households have more than $6 trillion invested abroad. "The rules-based trading system has been a principal driver of growth since the end of the Second World War. More than 50 years of post-war history demonstrates that countries that remove barriers to trade succeed in raising growth and reducing poverty, while countries that remain closed are left behind. Open markets, and the prosperity that ensues, generate resources to support public services, such as health and education, and promote accountable governments. "Our diplomacy and development assistance will advance economic security, growth, and open markets, and will help developing countries participate more fully in the rising tide of prosperity. As we apply financial, technological, and human resources to achieve our goals, we must ensure that those resources are used wisely and effectively, and that they produce measurable outcomes. We will work to ensure that our efforts effectively target women, the majority of the world’s poor. "Growth and Open Markets: We must advance global prosperity by increasing economic growth through expanded trade and investment. The Department and USAID will work with other federal agencies and foreign governments to secure ambitious reductions to barriers to trade in the World Trade Organization (WTO), the Free Trade Area of the Americas (FTAA), Asian Pacific Economic Cooperation (APEC), and through bilateral initiatives. Building on existing U.S. free trade agreements in the Middle East, we will intensify our efforts to increase trade and investment ties with Middle Eastern countries and promote economic reform to implement the President's Middle East Free Trade Area proposal. We will strengthen the capacity of developing and transitional countries to participate in, and benefit from, trade by enhancing their ability to respond positively to global trade opportunities while observing internationally recognized labor standards. We will work to achieve Chinese fulfillment of its WTO commitments and Russian accession to the WTO. Working with foreign governments and civil society organizations, we will seek to gain broad acceptance of biotechnology as a means to improve nutrition, increase agricultural productivity, and advance environmental protection. We will support the critical role of technological innovation and entrepreneurship in sustainable economic development and will advocate information and communications technologies (ICTs) policies that promote expanded access and fair competition for U.S. companies. We will support U.S. firms as they trade and invest abroad by pressing governments to open markets, promote responsible business practices, and help resolve individual disputes. Through the G-8 and bilateral exchanges, we will urge Europe to remove structural impediments to growth and Japan to restore its banking system to health. [emphasis added] "Economic Development: In 2002, at the UN Conference on Financing for Development in Monterrey, the United States helped forge a new international consensus on development that ties increased assistance to performance and accountability. We will promote sound governance and market-oriented economic growth that will enable other countries to become increasingly prosperous and interconnected with the United States, and will focus on the following strategies:... "Promote agricultural development. A productive agricultural sector is a critical engine for economic growth in many developing countries, particularly in Africa. It also is critical for food security, improved nutrition and health, and environmental sustainability and security both in developing and transition countries. We will promote the adoption in low-income countries of new technologies deriving from agricultural research and development by mobilizing science and technology from developed as well as developing countries. We will seek new techniques for producing food without eroding the natural resource base. As women are the major food producers in many regions, we will work to ensure that women benefit from investments in technology and strengthening of markets. We will work with partner countries to strengthen the operation of local, regional, and global markets in agricultural products, employing public diplomacy as well as development assistance approaches to gain broad acceptance of biotech products in these markets while assuring the maintenance of acceptable food safety standards." [emphasis added] Amount Spent on Biotechnology Funding of biotechnology at USAID began as early as 1991. According to a 1995 article, agricultural biotechnology was funded at $12.7 million per year in 1993 and 1994.[3] Of that amount, 60 percent was allocated to public institutions, and 40 percent to private companies. "Private companies are funded by USAID to prioritize research projects of importance to developing countries, but not of top significance to private companies. The majority of USAID's agricultural biotechnology programmes are implemented through their global bureau in Washington D.C. and their regional missions." However, according to a July 2000 Congressional testimony, "USAID spends roughly $7 million a year on agricultural biotechnology in developing countries."[4] Agricultural Biotechnology Support Project (ABSP) I "began in 1991 as a six­year programme with a total funding of US$ 6 million."[3] A 2005 article in GRAIN says that USAID spent $13 million on during the 12 years of the ABSP I project (1991-2003).[5] The GRAIN article adds that the first five years of the Program for Biosafety Systems (PBS) was funded at a level of $15 million.[5] A more complete analysis of the USAID budget is available for fiscal years 2004 and 2005. During 2004, USAID's Office of Environment and Science Policy (EGAT/ESP) was allocated $7,079,000 to its biotechnology program and an additional $24,853,000 for international research, which may include biotechnology as well.[6] The use of the funding is described as follows:[6] Biotechnology: "EGAT/ESP will provide oversight and management for USAID’s biotechnology programs, including the Collaborative Agricultural Biotechnology Initiative (CABIO), which helps developing countries safely access and manage the tools of modern biotechnology to improve agricultural productivity, environmental sustainability and nutrition. EGAT/ESP will support HarvestPlus to increase the nutritional quality of crops; cereal genomics research; and the African Agricultural Technology Foundation (AATF), a public-private partnership that helps smallholder farmers gain access to agricultural technology. Partners: Cornell University, Michigan State University, the International Service for National Agricultural Research, the CGIAR, and Kansas State University." International Research: "Funds provided to the international agriculture and natural resource research centers of the Consultative Group on International Agricultural Research (CGIAR) will support: increased agricultural productivity; reduced hunger and food costs; increased smallholder incomes; and a conserved natural resource base. This will result in the dissemination of new, higher-yielding, more pest-resistant and stress-tolerant food crop varieties; improved agricultural and natural resource management policies; and increased incomes from sustainable management of resources. Partners: the international research centers of the CGIAR and the World Bank." In 2005, the budgets for these programs were $6,930,000 for biotechnology and $25,000,000 for international research. The programs were described as follows:[6] Biotechnology: "EGAT/ESP will to continue to fund biotechnology research and policy activities. This will include a shift from biotechnology research to field trials in Africa and Asia, implementation of the first round of public-private sector collaborations under the African Agricultural Technology Foundation, and further development of nutritionally-enhanced mustard, maize, and rice varieties. In collaboration with the National Science Foundation and USDA, EGAT/ESP also plans to launch a jointly-funded competitive grants initiative in the area of cereal genomics. Partners are the same as above." International Research: "Support to the CGIAR will continue for long-term research that improves the livelihoods of poor producers and consumers while protecting and conserving the natural resource base. Drought-tolerant, disease-resistant and improved varieties of crops will be released and disseminated. Efforts to increase water productivity will be expanded. Conservation of in-situ agro-biodiversity will continue, and ex-situ conservation will begin through the Global Crop Diversity Trust, a public-private alliance to ensure that genetic diversity is conserved and characterized. Partners are the same as above. 1991-2003: Agricultural Biotechnology Support Project (ABSP) I Agricultural Biotechnology Support Project (ABSP) I ran from 1991 to 2003. The program was run out of Michigan State University. The goals of the program were developing GMOs for introduction in various countries in the Global South and helping those countries write and pass regulations for GMOs that would allow their introduction and would permit them to trade with the United States, which grows and exports GM crops. For more information, see the article on Agricultural Biotechnology Support Project (ABSP) I. 2002-Present: Agricultural Biotechnology Support Project (ABSP) II For more information, see the article on Agricultural Biotechnology Support Project (ABSP) II. Outcomes of USAID Work A 2004-2005 budget document describes USAID's achievements as follows: "Through the CABIO Initiative, a memorandum of agreement on biotechnology cooperation was signed with the Government of India. Activities also helped to develop the AATF partnership, which will leverage private sector engagement in providing agricultural technology and know-how to smallholder farmers in Africa. USAID partnerships with African organizations such as the Forum on Agricultural Research in Africa and the governments of Kenya, Uganda and Nigeria were strengthened to build a common vision of integrating biotechnology into African development."[6] Biotech Crop Projects USAID is developing genetically modified crops (GMOs) for use in various African and Asian countries.[7] In each case, they work with national agricultural research systems in the host country along with "other in-country partners" to develop the GMOs and to provide "training and material support." As of June 2012, none of their projects have yielded commercially viable GMOs. Specific GMO projects they are currently working on as of 2012 include:[8] However, as of 2012, funding has been discontinued for:[8] • Multiple Virus Resistant Tomato in Indonesia, Philippines • Tomato Virus Resistance for West Africa in Mali • Tobacco Streak Virus Resistant Groundnut in India A previous (2011) report on ABSP II's projects also listed:[7] • Virus resistant cassava in Kenya and Uganda. The cassava will resist cassava mosaic virus and brown streak virus. • Insect resistant cowpeas in Nigeria. • Bt potato in South Africa. • Nitrogen use efficient, salt tolerant, and drought tolerant rice in Sub-Saharan Africa. • Stress tolerant wheat in South Asia. • "Biofortified crops" - USAID works with the Harvest Plus consortium to develop staple crops like cassava, maize, rice, and millet that are fortified with zinc, iron, and vitamin A. The best known example of this is Golden Rice. USAID Biotechnology Team As of 2011:[9] Previous biotechnology staff: As of 2005:[13] Articles and Resources Related SourceWatch Articles References 1. [FY 2007-2012 Department of State and USAID Strategic Plan], Strategic Goal 4: Promoting Economic Growth and Prosperity, May 2007, Accessed October 20, 2011. 2. EXCERPTS Relevant to RCSA from State-USAID Joint Strategic Plan, Appendix A: Strategic Planning Framework, FY 2004-2009 Department of State and USAID Strategic Plan, Accessed October 20, 2011. 3. 3.0 3.1 Gigi Manicad, "Agricultural Biotechnology Projects within USAID," Biotechnology and Development Monitor, September 1995. 4. Full Hearing Transcript for "The Role of Biotechnology in Combating Hunger", Subcommittee on International Economic Policy, Export, and Trade Promotion, Committee on Foreign Relations, U.S. Senate, July 12, 2000. 5. 5.0 5.1 USAID: Making the World Hungry for GM Crops, GRAIN, April 25, 2005, Accessed October 16, 2011. 6. 6.0 6.1 6.2 6.3 EGAT - Environment and Science Policy, Accessed October 21, 2011. 7. 7.0 7.1 Biotechnology Programs, USAID, 2011. 8. 8.0 8.1 The Agricultural Biotechnology Support Project (ABSPII) Product Summaries, June 2012. 9. USAID Staff Directory, Accessed October 21, 2011. 10. The Role of USAID in Enhancing Agricultural Growth in the Developing World, Symposium--Global Footprints: Adding Value to Agriculture in the Developing World, ASA-CSSA-SSSA, November 3, 2009, Accessed October 21, 2011. 11. AAAS Fellows, Accessed October 21, 2011. 12. [fellowships.aaas.org/PDFs/AnnualReview/2008-2009Water.pdf 2008—2009 AAAS Science and Technology Policy Fellowships Annual Review], Accessed October 21, 2011. 13. USAID Biotech Update, April 27, 2005, Accessed October 21, 2011. External Resources USAID Fact Sheets External Articles Personal tools Namespaces Variants Actions Navigation How To Other Info Other Policies Google AdSense Toolbox
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:56:06.000Z
v36x3axm3hw7qkopxiqeetqeyllremcy
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:25077", "uncompressed_offset": 765635851, "url": "www.werelate.org/wiki/Place:Deep_River_Center,_Middlesex,_Connecticut,_United_States", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.werelate.org/wiki/Place:Deep_River_Center,_Middlesex,_Connecticut,_United_States" }
cccc_CC-MAIN-2013-20
Place:Deep River Center, Middlesex, Connecticut, United States Watchers NameDeep River Center TypeCensus-designated place Located inMiddlesex, Connecticut, United States the text in this section is copied from an article in Wikipedia Deep River (formerly known as Saybrook) is a town in Middlesex County, Connecticut, United States. The population was 4,629 at the 2010 census. The town center is also designated by the U.S. Census Bureau as a census-designated place (CDP). Deep River is part of what the locals call the "Tri-town Area" made up of Deep River, Chester, and Essex, Connecticut. Every year on the third Saturday in July, Deep River hosts the Deep River Ancient Muster. It is the largest one day gathering of fife and drum corps in the world. Research Tips This page uses content from the English Wikipedia. The original content was at Deep River Center, Connecticut. The list of authors can be seen in the page history. As with WeRelate, the content of Wikipedia is available under the Creative Commons Attribution/Share-Alike License.
v0
2024-06-03T21:29:47.544Z
2013-05-18T07:20:54.000Z
eqnpuli27sohyfwgrlaoqisxv577ywi4
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:25078", "uncompressed_offset": 765641849, "url": "www.werelate.org/wiki/Place:Dundalk,_County_Louth,_Republic_of_Ireland", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.werelate.org/wiki/Place:Dundalk,_County_Louth,_Republic_of_Ireland" }
cccc_CC-MAIN-2013-20
Place:Dundalk, County Louth, Republic of Ireland Watchers NameDundalk Alt namesDún Dealgansource: Canby, Historic Places (1984) I, 257 Dún Dealgansource: Wikipedia TypeTown Coordinates54.017°N 6.417°W Located inCounty Louth, Republic of Ireland source: Getty Thesaurus of Geographic Names source: Family History Library Catalog the text in this section is copied from an article in Wikipedia Dundalk is the county town of County Louth in Ireland. It is situated where the Castletown River flows into Dundalk Bay. The town is close to the border with Northern Ireland and equidistant from Dublin and Belfast. The town's name, which was historically written as Dundalgan, has associations with the mythical warrior Cú Chulainn. The town's crest reads Mé do rug Cú Chulainn Cróga, meaning "I gave birth to brave Cú Chulainn". It was granted its charter in 1189. It is the largest town in Ireland with a population in 2011 of 37,816 and is also the largest by area. In 2003 Dundalk was amongst nine cities and towns to be designated Gateway status in the Irish Government's National Spatial Strategy. History the text in this section is copied from an article in Wikipedia The Dundalk area has been inhabited since at least 3500 BC, when Neolithic farmers first came to Ireland. A tangible reminder of their presence can still be seen in the form of the Proleek Dolmen, the eroded remains of a megalithic tomb located at Ballymascanlon a few miles to the north of Dundalk. Celtic culture arrived in Ireland around 500 BC. According to the legendary historical accounts, the group settled in North Louth were known as the Conaille Muirtheimhne and took their name from Conaill Carnagh, legendary chief of the Red Branch Knights of Ulster. Their land now forms upper and lower Dundalk. Dundalk had been originally developed as an unwalled (meaning village; translates literally as "Street Townland"). The streets passed along a gravel ridge which runs from the present day Bridge Street in the North, through Church Street to Clanbrassil Street to Earl Street, and finally to Dublin Street. In 1169 the Normans arrived in Ireland and set about conquering large areas. By 1185 a Norman nobleman named Bertram de Verdun erected a manor house at Castletown Mount and subsequently obtained the town's charter in 1189. Another Norman family, the De Courcys, led by John de Courcy, settled in the Seatown area of Dundalk, the "Nova Villa de Dundalke". Both families assisted in the fortification of the town, building walls and other fortification in the style of a Norman fortress. The town of Dundalk was developed as it lay close to an easy bridging point over the Castletown River and as a frontier town, the northern limit of The Pale. In 1236 Bertram’s granddaughter, Rohesia commissioned Castle Roche to fortify the region, and to offer protection from the Irish territory of Ulster. Further, the town was sacked in 1315, during the Bruce campaign. The modern town of Dundalk largely owes its form to Lord Limerick (later James Hamilton, 1st Earl of Clanbrassil) in the 17th century. He was responsible for the construction of streets leading to the town centre; his ideas came from many visits to Europe. In addition to the demolition of the old walls and castles, he had new roads laid out eastwards of the principal streets. The most important of these new roads connected a newly laid down Market Square, which still survives, with a linen and cambric factory at its eastern end, adjacent to what was once an army cavalry and artillery barracks (now Aiken Military Barracks). In the 19th century the town grew in importance and many industries were set up in the local area. This development was helped considerably by the opening of railways, the expansion of the docks area or 'Quay' and the setting up of a board of commissioners to run the town. The partition of Ireland in May 1921 turned Dundalk into a border town and the DublinBelfast main line into an international railway. The Irish Free State opened customs and immigration facilities at Dundalk to check goods and passengers crossing the border by train. The Irish Civil War of 1922-23 saw a number of confrontations in Dundalk. The local Fourth Northern Division of the Irish Republican Army under Frank Aiken tried to stay neutral but 300 of them were arrested by the new Irish Army in August 1922. However, a raid on the barrack freed Aiken and two weeks later he took Dundalk barracks and captured its garrison before freeing the remaining republican prisoners there. Aiken did not try to hold the town, however, and before withdrawing he called for a truce in a meeting in the centre of Dundalk. For several decades after the end of the Civil War, Dundalk continued to function as a market town, a regional centre, and a centre of administration and manufacturing. Its position close to the border gave it considerable significance during the "Troubles" of Northern Ireland. Many people were sympathetic to the cause of the Provisional Irish Republican Army and Sinn Féin. It was in this period that Dundalk earned the nickname 'El Paso', after the Texan border town of the same name on the border with Mexico. Dundalk suffered economically when Irish membership of the European Economic Community in the 1970s exposed local manufacturers to foreign competition that they were ill equipped to cope with. The result was the closure of many local factories, resulting in the highest unemployment rate in Leinster, Ireland's richest province. High unemployment produced serious social problems in the town that were only alleviated by the advent of the Celtic Tiger investment boom at the start of the 21st century. Dundalk's economy has developed rapidly since 2000. Today many international companies have factories in Dundalk, from food processing to high-tech computer components. Harp Lager, a beer produced by Diageo, is brewed in the Great Northern Brewery, Dundalk. The Earls of Roden had property interests in Dundalk for over three centuries, and at an auction in July 2006 the 10th Earl sold his freehold of the town, including ground rents, mineral rights, manorial rights, the reversion of leases and the freehold of highways, common land, and the fair green. Included in the sale were many documents, such as a large 18th century estate map. The buyer was undisclosed. Research Tips This page uses content from the English Wikipedia. The original content was at Dundalk. The list of authors can be seen in the page history. As with WeRelate, the content of Wikipedia is available under the Creative Commons Attribution/Share-Alike License.
v0
2024-06-03T21:29:47.544Z
2013-05-18T07:22:50.000Z
n466rjzojmyhozp3u6wufro2s6heaf6f
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:25079", "uncompressed_offset": 765651740, "url": "www.werelate.org/wiki/Place:Northampton,_Pennsylvania,_United_States", "warc_date": "2013-11-22T14:55:48.000Z", "warc_filename": "<urn:uuid:324bf42a-ddc6-41f5-8b84-dccfa184e06b>", "warc_url": "http://www.werelate.org/wiki/Place:Northampton,_Pennsylvania,_United_States" }
cccc_CC-MAIN-2013-20
Place:Northampton, Pennsylvania, United States Watchers Contained Places Unknown Lower Mount Bethel Borough Bangor Bath Chapman East Bangor Freemansburg Glendon Hellertown Nazareth North Catasauqua Northampton Pen Argyl Portland Roseto Stockertown Tatamy Walnutport West Easton Wilson Wind Gap Census-designated place Eastlawn Gardens Middletown Old Orchard Palmer Heights Plainfield Deserted settlement Welagamika Inhabited place Ackermanville Altonah Aluta Apps Arndts Baynard Park Beersville Belfast Junction Belfast Benders Junction Berlinsville Bethlehem ( 1700 - ) Bingen Bossards Corner Boulton Brodhead Browntown Bushkill Center Butztown Cherry Hill Cherryville Chestnut Hill Christian Springs Churchville Clearfield Clyde Coffeetown Coilton Copella Crossroads Danielsville Dannersville Delabole Delps Delta Manor Didier Dietrichtown Douglassville Easton Edelman Edgemont Emanuelsville Factoryville Farmersville Filetown Five Points Flicksville Franks Corner Friedenthal Georgetown Grand Central Gruvertown Hanover Hanoverville Harpers Hartzells Ferry Haynes Mill Hecktown Highland Park Hill Yard Hokendauqua Hollo Howersville Howertown Indianland Iron Hill Jacksonville Jacobsburg Jamesville Katellen Kesslersville Kirchberg Klecknersville Knechts Kreidersville Leithsville Lerchs Lime Ridge Lincoln Terrace Lockport Lower Saucon Marlin Hills Marshfield Station Martins Creek Junction Martins Creek Miller Manor Millers Moorestown Mount Bethel Mount Hope Mount Pleasant Mutchlertown New Centerville Newburg Homes Newburg North Bangor Northampton Heights Northwood Heights Odenweldertown Palmer Park Paxinosa Penn Allen Pennsville Petersville Point Phillip Polk Valley Prospect Park Rasleytown Raubsville Redington Richmond Rismiller Riverton Rockville Sandts Eddy Saucon Schoeneck Schoenersville Seemsville Seidersville Shernerville Shimer Shimerville Sister Slate Valley Slatefield Slateford Smoketown Sours Mills South Bethlehem Specktown Spring Valley Star Village Steel City Stier Station Stier Stone Church Stouts Tadmor Treichlers Uhlers Crossing University Heights Uttsville Wagnerville Walnut Acres Walnutport Acres Walters Wassergass Weaversville Weiders Crossing Werkheiser West Bangor West Pen Argyl Westgate Hills William Penn Manor Williamsport Wydnor Youngsville Zucksville Township Allen (township) Bethlehem (township) Bushkill East Allen Forks Lower Nazareth Lower Saucon (township) Lynn Moore Palmer Plainfield (township) Upper Mount Bethel Williams Unknown Allen Penn Siegfried South Easton source: Getty Thesaurus of Geographic Names source: Family History Library Catalog the text in this section is copied from an article in Wikipedia Northampton County is a county located in the U.S. state of Pennsylvania. It was formed in 1752 from parts of Bucks County with the county seat of Easton. Its namesake was Northamptonshire and the country house, Easton Neston. As of 2010, the population was 297,735. Northampton County is located in Pennsylvania's Lehigh Valley. Its northern edge borders The Poconos. The eastern section of the county borders the Delaware River, which divides Pennsylvania and New Jersey. It is bordered on the west by Lehigh County, Pennsylvania, the Lehigh Valley's more highly populated county. The county is industrially-oriented, producing anthracite coal, cement, and other industrial products. Bethlehem Steel, once one of the world's largest manufacturers of steel, was located there prior to its closing in 2003. Contents Timeline Date Event Source 1752 County formed Source:Red Book: American State, County, and Town Sources 1752 Land records recorded Source:Red Book: American State, County, and Town Sources 1752 Probate records recorded Source:Red Book: American State, County, and Town Sources 1790 First census Source:Population of States and Counties of the United States: 1790-1990 1850 No significant boundary changes after this year Source:Population of States and Counties of the United States: 1790-1990 Population History source: Source:Population of States and Counties of the United States: 1790-1990 Census Year Population 1790 24,250 1800 30,062 1810 38,145 1820 31,765 1830 39,482 1840 40,996 1850 40,235 1860 47,904 1870 61,432 1880 70,312 1890 84,220 1900 99,687 1910 127,667 1920 153,506 1930 169,304 1940 168,959 1950 185,243 1960 201,412 1970 214,368 1980 225,418 1990 247,105 Research Tips External links • Outstanding guide to Northampton County family history and genealogy resources (FamilySearch Research Wiki). Birth, marriage, and death records, censuses, wills, deeds, county histories, cemeteries, churches, newspapers, libraries, and genealogical societies. • www.northamptoncounty.org/ This page uses content from the English Wikipedia. The original content was at Northampton County, Pennsylvania. The list of authors can be seen in the page history. As with WeRelate, the content of Wikipedia is available under the Creative Commons Attribution/Share-Alike License.
v0
2024-06-03T21:29:47.544Z
2013-05-18T06:59:16.000Z
mpabncn2ijfkbuejoczohyjlkqd4lrr3
{ "content_type": "text/html", "provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:25094", "uncompressed_offset": 11253583, "url": "answers.onstartups.com/questions/42261/how-can-i-encourage-participation-in-a-survey/42270", "warc_date": "2013-11-22T14:53:00.000Z", "warc_filename": "<urn:uuid:0ceeecef-ec06-44f1-8878-a1cae43d8d65>", "warc_url": "http://answers.onstartups.com/questions/42261/how-can-i-encourage-participation-in-a-survey/42270" }
cccc_CC-MAIN-2013-20
Tell me more × Answers OnStartups is a question and answer site for entrepreneurs looking to start or run a new business. It's 100% free, no registration required. I am about to do a customer development survey, which will be promoted either via AdWords or via an email campaign (maybe both). I did a few tests with AdWords ads and it seems like responses level is below what I anticipated. I am assuming this is because when people click link to the survey, they do not see what's in it for them to answer my 10 questions. But because this is only a customer development survey with a goal to establish that my product has market potential, and because I am on a budget, I can't offer people who click anything in return immediately. I said that if they reply, and leave their email, they will receive an alert once (if) the product is about to hit the retailers, to get it at a low promo price. But this seems to be too indefinite. And it really is, because there is no guarantee that survey will prove that the product can be marketed, and that it will ever be manufactured. Also I was thinking I might use some cause to encourage participation, e.g. "help the community of whatever by participating in this survey" but this sounds even more weak and not real. I would appreciate any constructive ideas. share|improve this question 6 Answers up vote 6 down vote accepted Surveys suck and nobody really likes to answer them, not even you. If the "goal to establish that my product has market potential" then you might also need to consider other avenues to reach that critical objective. I imagine the reason you're wondering if there's a market for your product is that there's nothing on the market that looks like your product? If your product is a B2B offering, how difficult would it be to find 10 potential future buyers and sit down with them for 15-20 minutes? And if it's for consumers, how difficult would it be to find 30 random people to talk to by just walking into a Starbucks? Instead of focusing on quantity with a large-scale online survey, focus on the quality of the feedback: talk to a few people, in person. Tech is for what people can't do better. Good luck. share|improve this answer Free gifts always work in surveys , or use content locker for this purpose. User always do it. share|improve this answer Agree totally with frenchie Survey Sucks and Nobody Likes Them. But I think you can give some user a prize and attract them to fill the survey. While promoting your product ad a line "Daily a lucky winner will get movie ticket( or any cheap prize)". For sure the response will improve. No one hates the free stuff. Also I would suggest get some live user if your product is developed. Show them the product ask them to use it and take the live feedback. Talk to them directly. But believe me that prize stuff will definitely work. Just put the keywords in the proper place and check it. share|improve this answer Offer free gift to some people who does the survey. share|improve this answer I think you really need to give us some more details if you want an effective answer. Since you are putting a survey behind a Google ad, I will assume that you are interested in learning more about a particular segment of the world that is already searching for something. Since you are apparently not satisfied knowing just that they have clicked on the ad (validating that demand exists), I assume you want to know more details about who are the people who clicked on the ad. The people who clicked on the ad, presumably wanting a thing or service, are not interested in taking a survey. I would propose, based on my assumptions, that you continue down the adwords campaign, but direct customers to a special landing page advertising the apparent product or service, offering a quote or pamphlet to potential customers who supply their phone number or email address, a common scenario in b2b SW sales. Having hopefully obtained some responses by having a more clear "what's in it for me" for the customer to leave some information, you can directly call these people to interview them and understand whatever it is you wanted to learn. You should, by the way, have some sort of a pamphlet/offering to back this up. These people may become your earlyvangelists, and you don't want to violate their trust and alienate them this early in the process! During or after your interview, disclose the fact that your product is not ready to launch, and you can give them a pamphlet describing your current plans and intentions and ask them for feedback. If they ask you how soon they can buy it then you know you've got a winner. share|improve this answer Why don't you try Amazon Mechanical Turk? It's very often used for surveys. Here's are some links of people using it for surveys. share|improve this answer Your Answer   discard By posting your answer, you agree to the privacy policy and terms of service. Not the answer you're looking for? Browse other questions tagged or ask your own question.
v0