added
stringdate 2024-06-03 18:26:11
2024-06-04 03:14:13
| created
stringdate 2013-04-29 18:49:42
2014-01-03 01:38:26
| id
stringlengths 32
32
| metadata
dict | source
stringclasses 2
values | text
stringlengths 237
356k
| version
stringclasses 1
value |
---|---|---|---|---|---|---|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:12:51.000Z
|
jm4u4sufwta4skrbxbljjn62dc3jryvr
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27525",
"uncompressed_offset": 217634498,
"url": "scienceroll.com/2008/08/29/mynetresearch-the-newest-addition-to-the-squad/",
"warc_date": "2013-11-22T14:54:49.000Z",
"warc_filename": "<urn:uuid:025a7689-87e5-4afd-8204-9a02c7db6f91>",
"warc_url": "http://scienceroll.com/2008/08/29/mynetresearch-the-newest-addition-to-the-squad/"
}
|
cccc_CC-MAIN-2013-20
|
Skip to content
MyNetResearch: The newest addition to the squad
The newest addition to the List of Community Sites for Scientists and Physicians is MyNetResearch.
Our purpose is to assist you in maximizing your research productivity through global collaborations. We all have outstanding colleagues, yet have felt the disappointment of these colleagues not sharing our research interests and passions.
This is not modern research-at least it’s not what research should be in the 21st century. Why be limited to local research collaborations when there are hundreds or even thousands of research experts across the world with whom you could have highly productive collaborations?
About these ads
Follow
Get every new post delivered to your Inbox.
Join 224 other followers
%d bloggers like this:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:18:11.000Z
|
27glrjkcjfbvjyfsayhqz5z35ztmbagj
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27526",
"uncompressed_offset": 217656608,
"url": "scienceroll.com/2012/10/20/empowermetv-features-webicina/?_wpnonce=81a70c627a&like=1",
"warc_date": "2013-11-22T14:54:49.000Z",
"warc_filename": "<urn:uuid:025a7689-87e5-4afd-8204-9a02c7db6f91>",
"warc_url": "http://scienceroll.com/2012/10/20/empowermetv-features-webicina/?like=1&_wpnonce=81a70c627a"
}
|
cccc_CC-MAIN-2013-20
|
Skip to content
emPOWERmeTV Features Webicina!
emPOWERmeTV‘s MD-VOD, a great online show featuring interesting discussions about various medical topics, just mentioned Webicina.com in their newest show (at 2:38).
Check it out:
About these ads
Follow
Get every new post delivered to your Inbox.
Join 224 other followers
%d bloggers like this:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:28:19.000Z
|
djtyeabxsfz2ivpkpe2xskix6hz6fuql
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27573",
"uncompressed_offset": 282277781,
"url": "www.abs.gov.au/AUSSTATS/abs%40.nsf/ProductsbyCatalogue/818300690D6633AECA25722E001A811E",
"warc_date": "2013-11-22T14:54:49.000Z",
"warc_filename": "<urn:uuid:025a7689-87e5-4afd-8204-9a02c7db6f91>",
"warc_url": "http://www.abs.gov.au/AUSSTATS/abs@.nsf/ProductsbyCatalogue/818300690D6633AECA25722E001A811E?OpenDocument"
}
|
cccc_CC-MAIN-2013-20
|
Australian Bureau of Statistics
Celebrating the International Year of Statistics 2013
ABS Home > Statistics > By Catalogue Number
5661.0 - Annual Statistics on Financial Institutions, 1995-96
Latest ISSUE Released at 11:30 AM (CANBERRA TIME) 24/09/1997
Page tools: Print Page Print All RSS Search this Product
• About this Release
Annual; Statistics previously published in 5616.0, 5618.0, 5632.0, 5633.0, 5648.0, 5650.0 are now available as individual tables or complete issues commencing in April 1992. The statistics cover type and amount of assets and liabilities, source of income, type of expenditure and appropriation of profits as previously reported in the above mentioned publications.
This publication has been converted from older electronic formats and does not necessarily have the same appearance and functionality as later releases.
© Commonwealth of Australia 2013
Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:10:28.000Z
|
y37nzbqhxr6soo674ia2bp5miytwgjga
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27576",
"uncompressed_offset": 330792470,
"url": "www.bizsugar.com/SocialMedia/simple-keys-to-getting-started-with-social-media-for-your-business-/",
"warc_date": "2013-11-22T14:54:49.000Z",
"warc_filename": "<urn:uuid:025a7689-87e5-4afd-8204-9a02c7db6f91>",
"warc_url": "http://www.bizsugar.com/SocialMedia/simple-keys-to-getting-started-with-social-media-for-your-business-/"
}
|
cccc_CC-MAIN-2013-20
|
When you are starting out on social media for your business, it can be so overwhelming. Which should I start with? What will be the best ROI? Do I have time for every platform? Don’t stress, it’s okay not to jump on all of them at once and know what you’re doing.
Subscribe
Kelly McCausey @kellymccausey Shows Solo Smarts
Kelly McCausey is used to functioning as the small business equivalent of a one woman show. Her Website SoloSmarts.com … More
Editor's Picks
Shazam! Meet Contributor of the Week Paul Cox...Congrats, Paul!
Got small business blog posts? Register and submit them today!
Add BizSugar buttons and plugins to your small biz toolkit!
See if you're one of our Top 10 Members this week!
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:44:59.000Z
|
i4iylukzvxyt3yf3hkn6xikqolg2krsy
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27579",
"uncompressed_offset": 356180584,
"url": "www.ccsenet.org/journal/index.php/ass/article/view/21494",
"warc_date": "2013-11-22T14:54:49.000Z",
"warc_filename": "<urn:uuid:025a7689-87e5-4afd-8204-9a02c7db6f91>",
"warc_url": "http://www.ccsenet.org/journal/index.php/ass/article/view/21494"
}
|
cccc_CC-MAIN-2013-20
|
Impact of Consumer Awareness and Knowledge to Consumer Effective Behavior
Suraiya Ishak, Nur Faridah M. Zabil
Abstract
This article examines the relationship between consumers’ awareness and knowledge to effective consumers’ behaviors. This study employs survey technique to measure three variables comprises of consumer awareness, knowledge and behaviors. Measurement instruments have been developed in light of Malaysian context and all items attempt to capture basic requirement for food services and/or products in conjunction with Malaysian consumers’ rights. Correlation analysis was used to evaluate the proposed relationships, while differences across gender, location and education level had been examined through t-test independent group analysis. The analysis indicates significant relationship between awareness and effective consumer behavior. The result demonstrates that awareness is prior to effective consumers’ behaviors; while unawareness leads to ignorant and reduction of individual capacity in protecting and upholding their rights against sellers’ expropriations. Nevertheless, consumers’ awareness differs significantly between locations in which the urban dwellers showed lesser awareness compared to the less-urban areas.
Full Text: PDF DOI: 10.5539/ass.v8n13p108
This work is licensed under a Creative Commons Attribution 3.0 License.
Asian Social Science ISSN 1911-2017 (Print) ISSN 1911-2025 (Online)
Copyright © Canadian Center of Science and Education
To make sure that you can receive messages from us, please add the 'ccsenet.org' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:03:37.000Z
|
atahikzcdoy6der75ofwdcbeynwef2xk
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27581",
"uncompressed_offset": 356191880,
"url": "www.ccsenet.org/journal/index.php/jfr/article/view/16747",
"warc_date": "2013-11-22T14:54:49.000Z",
"warc_filename": "<urn:uuid:025a7689-87e5-4afd-8204-9a02c7db6f91>",
"warc_url": "http://www.ccsenet.org/journal/index.php/jfr/article/view/16747"
}
|
cccc_CC-MAIN-2013-20
|
The Hygroscopic Properties and Sorption Isosteric Heats of Different Chinese Wheat Types
Xingjun Li
Abstract
The moisture sorption isotherm data of fourteen Chinese wheat varieties were determined using the static gravimetric method at five different temperatures (10, 20, 25, 30 and 35 °C) and relative humidity ranging from 11.3 to 96%. Eight models, namely Brunauer-Emmett-Teller, CAE, Chen-Clayton, Modified-Chung-Pfost (MCPE), Modified-Henderson, Modified-Guggenheim-Anderson-deBoer, and Modified-Oswin and Strohman-Yoerger, were used to fit the sorption data. MCPE shows the best fitting results. A significant hysteresis effect was found between wheat desorption and adsorption isotherm at lower ERH, but the similar hygroscopic properties remained for different wheat types like hard vs. soft, red vs. white, and winter vs. spring, respectively. The experimental results show that the isosteric heats for both wheat adsorption and desorption, and all the sorption heats for different wheat types decrease rapidly with increasing seed moisture initially, however, after the moisture is more than 15% w.b. they decrease tardily with increasing moisture content. The isosteric heats of wheat desorption were considerably higher than those of adsorption below 17.5% m.c., but the similar sorption isosteric heats were found for wheat types like hard vs. soft, red vs. white, or winter vs. spring, respectively. It is concluded that the wheat grains from different types have similar hygroscopic properties and sorption isosteric heats and can be synchronously dealt with during physical control in storage.
Full Text: PDF DOI: 10.5539/jfr.v1n2p82
Refbacks
• There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.
Journal of Food Research ISSN 1927-0887(Print) ISSN 1927-0895(Online)
Copyright © Canadian Center of Science and Education
To make sure that you can receive messages from us, please add the 'ccsenet.org' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:26:03.000Z
|
5xzberqx2hrwpcx7tukkvnh4ijrqlzhh
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27586",
"uncompressed_offset": 409860705,
"url": "www.eea.europa.eu/soer/europe/marine-and-coastal-environment/key-messages/marine-and-coastal-environment-2014-2",
"warc_date": "2013-11-22T14:54:49.000Z",
"warc_filename": "<urn:uuid:025a7689-87e5-4afd-8204-9a02c7db6f91>",
"warc_url": "http://www.eea.europa.eu/soer/europe/marine-and-coastal-environment/key-messages/marine-and-coastal-environment-2014-2"
}
|
cccc_CC-MAIN-2013-20
|
Personal tools
Sign up now!
Get notifications on new reports and products. Currently we have 55483 subscribers. Frequency: 3-4 emails / month.
Follow us
Twitter
Facebook
YouTube channel
RSS Feeds
Notifications archive
Write to us
For the public:
For media and journalists:
Contact EEA staff
Contact the web team
FAQ
Call us
Reception:
Phone: (+45) 33 36 71 00
Fax: (+45) 33 36 71 99
next
previous
items
Skip to content. | Skip to navigation
Sound and independent information
on the environment
Marine and coastal environment — key message 3
Last modified : Sep 30, 2011 10:29 AM
Unsustainable fishing occurs in all European Seas and is threatening the viability of European fish stocks. 21 to 60% of the commercial fish stocks in the North-East Atlantic, the Baltic Sea and the Mediterranean are considered to be outside safe biological limits.
European Environment Agency (EEA)
Kongens Nytorv 6
1050 Copenhagen K
Denmark
Phone: +45 3336 7100
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:15:09.000Z
|
ipamsfoszsflm4oehentvkngm2ctvoar
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27588",
"uncompressed_offset": 424607327,
"url": "www.familysearch.org/learn/wiki/en/New_Hampshire_Statewide_Deaths_%28FamilySearch_Historical_Records%29",
"warc_date": "2013-11-22T14:54:49.000Z",
"warc_filename": "<urn:uuid:025a7689-87e5-4afd-8204-9a02c7db6f91>",
"warc_url": "http://www.familysearch.org/learn/wiki/en/New_Hampshire_Statewide_Deaths_(FamilySearch_Historical_Records)"
}
|
cccc_CC-MAIN-2013-20
|
New Hampshire Statewide Deaths (FamilySearch Historical Records)Edit This Page
From FamilySearch Wiki
This article describes a collection of historical records available at FamilySearch.org.
Contents
Record Description
This collection includes information for the years 1654 to 1947. However the majority of the records are after 1900.
This collection includes records from the New Hampshire Bureau of Vital Records and Health Statistics as well as records from individual town and country clerks. The earlier records are handwritten. Later records are handwritten or typed on printed forms.
Town clerks began recording deaths as early as 1640. However, the earlier records do not give much information and the information varies depending upon the clerk.
In 1866, the state passed laws requiring the registration of vital events. It is estimated that by 1883 almost half of the population was listed in the vital records with 90 percent coverage by the end of the decade.
The Bureau of Vital Records and Health Statistics was created in 1905. They have copies of records made by the town clerks dating from about 1640 to the present.
Deaths were recorded to better serve public health needs. They were also used in connection with the probate of wills and the administration of estates.
The most reliable information is the date and place of death or burial. Other information will only be as reliable as the informant’s knowledge or memory.
Citation for This Collection
The following citation refers to the original source of the information published in FamilySearch.org Historical Records collections. Sources include the author, custodian, publisher, and archive for the original records.
"New Hampshire Death Records, 1654-1947." Index and Images. FamilySearch. http://FamilySearch.org : accessed 2013. Citing Bureau Vital Records and Health Statistics, Concord.
Suggested citation format for a record in this collection.
Record Content
Key genealogical facts found in New Hampshire Statewide Deaths may include:
• Name of deceased
• Date and place of death
• Age in year, months and days
• Length of residence in community
• Institution where died
• Date and place of birth
• Gender, race, marital status, and occupation
• Cause of death
• Parents names, including maiden name of mother
• Parents' birth place
• Father's occupation
• Name of spouse, if married
• Name of physician or person reporting death and their residence
• Place and date of interment
How to Use the Collection
Begin your search by finding your ancestors in the index. Name indexes to deaths make it possible to access a specific record quickly. Remember that these indexes may contain inaccuracies, such as altered spellings, misinterpretations, and optical character recognition errors if the information was scanned.
When searching the index it is helpful to know the following:
• The place where the death occurred
• The name of the person at the time of death
• The approximate death date
Use the locator information found in the index (such as page, entry, or certificate number) to locate your ancestor in the death records. Some on-line indexes, such as indexes to FamilySearch Historical Records, will take you directly to an image. Compare the information in the death record to what you already know about your ancestor to determine if this is the correct person. You may need to compare the information of more than one person to make this determination.
When you have located your ancestor’s death record, carefully evaluate each piece of information given. These pieces of information may give you new biographical details that can lead you to other records about your ancestors. Add this new information to your records of each family.
For example:
• Use the birth date or age along with the place of birth to find or verify their birth records and parents' names.
• Use the birth date or age along with the place of birth to find the family in census records.
• Use the residence and names of the parents (if the deceased is a child) to locate church and land records.
• Occupations listed can lead you to employment records or other types of records such as military records.
• Use the parent’s birth places to find former residences and to establish a migration pattern for the family.
• The name of the officiator is a clue to their religion or area of residence in the county.
• The name of the undertaker or mortuary could lead you to funeral and cemetery records which often include the names and residences of other family members.
• Compile the entries for every person who has the same surname; this is especially helpful in rural areas or if the surname is unusual.
• Continue to search the records to identify children, siblings, parents, and other relatives of the deceased who may have died or been buried in the same county or nearby. This can help you identify other generations of your family or even the second marriage of a parent. Repeat this process for each new generation you identify.
• When looking for a person who had a common name, look at all the entries for the name before deciding which is correct.
If you are unable to find the ancestors you are looking for, try the following:
• Check for variant spellings of the surnames.
• Check for a different index. There are often indexes at the beginning of each volume.
• Search the indexes and records of nearby counties.
Keep in mind:
• The information in these records is usually reliable, but depends upon the reliability of the informant.
• Earlier records may not contain as much information as the records created after the late 1800s.
• There is also some variation in the information given from one record to another record.
For a summary of this information see the wiki article: United States, How to Use the Records Summary (FamilySearch Historical Records).
Known Issues with This Collection
Problems with this collection?
See a list of known issues, workarounds, tips, restrictions, future fixes, news and other helpful information.
For a full list of all known issues associated with this collection see the attached Wiki article. If you encounter additional problems, please email them to support@familysearch.org. Please include the full path to the link and a description of the problem in your e-mail. Your assistance will help ensure that future reworks will be considered.
Related Web Sites
New Hampshire Cemetery List
Interment.net - Listings of some of the cemeteries in New Hampshire
Related Wiki Articles
Contributions to This Article
We welcome user additions to FamilySearch Historical Records wiki articles. Guidelines are available to help you make changes. Thank you for any contributions you may provide. If you would like to get more involved join the WikiProject FamilySearch Records.
Citing FamilySearch Historical Collections
When you copy information from a record, you should also list where you found the information. This will help you or others to find the record again. It is also good to keep track of records where you did not find information, including the names of the people you looked for in the records.
A suggested format for keeping track of records that you have searched is found in the wiki article Help:How to Cite FamilySearch Collections.
Citation Example for a Record Found in This Collection
"New Hampshire Death Records, 1654-1947." database and digital images, FamilySearch (https://familysearch.org: accessed March 31, 2011). Cora S. Williams, 25 March 1911; FHL film 2131634; New Hampshire Bureau of Vital Records and Health Statistics, Concord, New Hampshire.
Need additional research help? Contact our research help specialists.
Need wiki, indexing, or website help? Contact our product teams.
Did you find this article helpful?
You're invited to explain your rating on the discussion page (you must be signed in).
• This page was last modified on 5 March 2013, at 15:52.
• This page has been accessed 3,520 times.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:31:04.000Z
|
6h3ilccqgeryvlmx5frvg3p5kb7xbttd
|
{
"content_type": "application/xhtml+xml",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27601",
"uncompressed_offset": 473713057,
"url": "www.hindawi.com/journals/ijap/2009/249602/",
"warc_date": "2013-11-22T14:54:49.000Z",
"warc_filename": "<urn:uuid:025a7689-87e5-4afd-8204-9a02c7db6f91>",
"warc_url": "http://www.hindawi.com/journals/ijap/2009/249602/"
}
|
cccc_CC-MAIN-2013-20
|
About this Journal Submit a Manuscript Table of Contents
International Journal of Antennas and Propagation
Volume 2009 (2009), Article ID 249602, 5 pages
doi:10.1155/2009/249602
Research Article
Potential Benefits of Dynamic Beam Synthesis to Mobile Satellite Communication, Using the Inmarsat 4 Antenna Architecture as a Test Example
Department of Sensor Systems, BAE Systems ATC, West Hanningfield Road, Great Baddow, Chelmsford CM2 8HN, UK
Received 22 September 2008; Accepted 17 March 2009
Academic Editor: Giovanni Toso
Copyright © 2009 R. F. E. Guy. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract
Present mobile satellite communication systems use large antennas to provide multiple high-gain beams. Each beam covers a fixed geographic cell on the earth. Spatial frequency reuse is provided by synthesising beams with low-power levels over all cells operating at the same frequency. The performance needs for future systems are steadily increasing, leading to higher-gain requirements, which are met by using larger antennas with narrower beams. So the antenna pointing errors become a significant loss factor. An alternative approach is to abandon the use of fixed beams and dynamically synthesise the beams to optimise the antenna performance in real time. This both increases user gain and lowers cofrequency interference whilst also reducing the effects of pointing errors. Simulations, using the Inmarsat 4 antenna architecture as a test example, show that the spatial isolation performance can be significantly improved by using Dynamic Beam Synthesis.
1. Introduction
The fourth generation of Inmarsat satellites provides a good example of an advanced high-capacity, high-gain fixed beam/cell mobile communication system [1]. The L-band Mobile satellite system utilises a 9 m deployable reflector fed via a 120-element feed array. A digital signal processor (DSP) is used to produce many different beam types that cover the earth and provide different user services. The most demanding of these is the Personal Mobile Communication (PMC) service. This uses ~200 high-gain narrow spot beams to cover the earth. The beams provide spatial frequency reuse; so cocoloured beams are synthesised to have a high degree of isolation between them. The earth is covered by contiguous cells (nominally hexagonal, as viewed from the satellite) that are fixed with respect to geographic locations on the earth. The beams are changed throughout the day so that they remain aligned to these fixed geographic cells even though the satellite orbit is slightly inclined. Users are assigned to a beam that aligns with the geographic cell they occupy.
However, performance requirements for mobile satellite communication systems are steadily increasing, both in terms of higher antenna gain and frequency reuse capacity. In order to provide the edge of cell edge of coverage (EOC) directivity and the beam roll-off rate, required to achieve interbeam isolation, the beam size will need to decrease. So, many more beam/cells will be required to cover a given geographical area. This will lead to far larger reflectors and feed arrays with many more radiating elements. For conventional fixed beam/cell systems, the antenna pointing error is likely to become a dominant loss factor in the link budget. An alternative is to abandon the fixed beam/cell scheme and form beams that are optimised to individual user locations. This paper uses simulations of a “dynamic beam synthesis” (DBS) process to highlight the potential benefits of this approach.
2. Fixed Beam System
The Inmarsat 4 type of antenna system architecture is used as a baseline to compare the fixed beam/cell system to the alternative of dynamically synthesising the beams making use of the individual user locations. The following outlines the antenna system.
2.1. Frequency Reuse
Spatial frequency reuse allocates adjacent beams different frequencies but reuses the same frequency in more distant beams. To do this efficiently requires the use of a regular hexagonal grid of beams. Figure 1 shows 3, 4, and 7 colour schemes. Each colour represents a different frequency. The colouring principal can be extended to higher-colour schemes such as 9, 12, 13, 16, and 19. An interesting property is that the distance between common colour beam centres is the square root of the number of colours. This relationship also holds for a square lattice.
Figure 1: Frequency reuse schemes with 3, 4, and 7 colours.
A typical PMC beamset, which was designed for 7 colour frequency reuse, is shown in Figure 2. This has 228 contiguous, high-gain beams (~38 dBi at edge of coverage). To achieve the isolation requirement the peak to edge gain variation of the beams is ~3 dB.
Figure 2: Example fixed beamset.
2.2. Future Trends
The trend for next generation satellites will be to increase the gain requirements. A 6 dB increase implies doubling the reflector diameter and quadrupling the number of feeds. There will also be pressure to increase the frequency reuse factor. Lowering the frequency colour scheme from 7 to 4 could require the peak to edge gain delta to increase by a further 1 to 2 dB. The exact figure is dependent on the isolation requirement.
2.3. Limitations of a Fixed Beam System
A fixed beam system is limited by the following factors.
(i)Cells fixed at specific geographic location.(ii)Pointing errors are accounted for by expanding the geographic cells by the pointing error. This degrades both EOC gain and isolation.(iii)Orbit inclination distorts the fixed cell grid, requiring resynthesis of the whole beamset and the use of new weights many times a day.(iv) The G/T figure of merit for the satellite is limited by what can be achieved at the worst point at the edge of cell grid, when distorted by the inclination and expanded by the pointing error. This is further reduced by other effects such as vector weight errors.(v)The EIRP figure of merit for the satellite is limited by the same effects.
2.4. Consequences of Pointing Errors
The following points highlight the effect of pointing error in a fixed beam system.
(i)For the example beamset using a 7-colour reuse scheme, pointing error gives ~0.6 dB loss of gain at EOC.(ii)For a scaled system with 6 dB more gain, pointing error gives ~1.2 dB loss.(iii)For a scaled system with 6 dB more gain, using a 4-colour scheme, pointing error gives ~2 dB loss. Assuming the pointing error is not significantly reduced for the larger reflector diameters, then as the gain and frequency reuse factor is increased, still further, the pointing error will start to dominate the loss budget.
2.5. Implications of Using a Fixed Beam System
If a fixed beam system is used to meet future gain and isolation demands, the cell size must reduce, and both the reflector diameter and number of feed elements must increase. A 6 dB gain improvement requires doubling the reflector diameter and quadrupling the number of feeds.
If the reuse scheme falls from 7 to 4 colour, then the additional losses increase by ~3 dB requiring a ~9 dB improvement, which implies about three times the diameter reflector and eight times as many elements.
3. Dynamic Beam System
In a dynamic beam system the beams are not fixed. The beams are synthesised in “real time,” using the known user locations to both maximise individual user gain and minimise interference from other cofrequency users.
3.1. The Synthesis Process
The following outlines the dynamic beam synthesis process.
(1)A fixed geographic cell lattice is used to assign frequencies to users, for example, using 7-colour reuse.(2)At any one time there are likely to be a number of users assigned the same frequency.(3)In any one cell only one user has the same frequency.(4)A new user requests a channel via a global beam, giving their location, (e.g., provided by a GPS receiver). Their geographic location is used to assign an available channel frequency for that user cell.(5)All other users with the same frequency are identified.(6)The beams associated with every one of these users are resynthesised every time a new user is assigned an existing frequency.(7)Each beam is resynthesised to maximise power at the user location and minimise power at the other user locations.(8)The synthesis expands the user locations by the pointing error to provide coverage and isolation in the presence of pointing errors.(9)The pointing error allowance would be further expanded to provide extra margin to cope with vector weight errors,and satellite inclination change.(10)The weights would be resynthesised and updated on a periodic basis to cope with gross inclination changes.
3.2. Simulation of the DBS Process
The simulation program, MAXIM, has been written to simulate the dynamic beam synthesis process. It performs both the synthesis and the analysis to produce plots of directivity and isolation performance. The program works in the following order.
(1)Reads secondary array fed reflector (AFR) element patterns.(2)Reads cell lattice coordinates and reuse colour scheme.(3)Chooses a far-field grid point.(4)Finds associated cell colour and finds all cocoloured cell coordinates.(5)Randomly assigns “N” other users in “N” different cocoloured cells at random points in each cell.(6)Synthesises ideal weights for each cocoloured user, using the inverse of the covariance matrix [2].(7)Calculates beams from the synthesised weights (this step can include vector weight errors if requested).(8)Calculates the directivity of the user with pointing errors.(9)Calculates the isolation of the user with pointing errors.(10)Repeats simulation “M” times and selects requested percentage confidence level performances.(11)Repeats simulation steps (3)–(10) for all grid points.(12)Outputs results.
3.3. Simulation Results
The DBS beams were synthesised to maximise power over the user and minimise power over cocoloured users. To illustrate this, the following example is used. A user is at (, ), and seven other cocoloured user locations are chosen at random. The closest user is in the first cocoloured ring of cells surrounding the coverage cell. Figure 3 shows a maximum directivity beam for (, ), and the locations of the other users are indicated by the vertices of the straight white lines. The beam peak is 43.5 dBi, and the level at the closest user is 25 dBi (i.e., 18.5 dB below the beam peak).
Figure 3: Beam prior to DBS.
Figure 4 shows the synthesised beam with deep nulls over the other user locations. The nulls are below −50 dBi. The peak directivity has fallen by about 0.25 dB. Figure 5 shows the effect of likely vector weight errors. The nulls have filled in; for example, the level of the closest user is −1 dBi (i.e., 26 dB lower than the maximum directivity case). All nulls remain below 0 dBi over an area encompassing the pointing error uncertainty margin and provide ~40 dB isolation.
Figure 4: Synthesised beams with nulls, no errors.
Figure 5: Synthesised beams with nulls, with errors.
A full simulation was carried out over the earth using five trials at each grid point. The worst values, for each grid point, of these five trials were selected. It included vector weight errors, as for the “fixed beamset”, and pointing errors of . Satellite pointing error margin was ; the additional is equivalent to a user location error of 40 Km at the subsatellite point. GPS can give user location to tens of meters or better. The directivity levels are shown in Figure 6. The received isolation over the earth is shown in Figure 7. The received isolation was calculated as the ratio of the sum of the powers received from the cocoloured users to the power of the user. The results presented in this paper are for a 7-colour frequency reuse scheme, with eight cocoloured users.
Figure 6: Minimum directivity of DBS beams biased for isolation, 7 colour, with errors, (scale 35 to 43 dBi).
Figure 7: Minimum isolation of DBS beams biased for isolation, 7 colour, with errors, (scale −31 to −10 dB).
The results show higher directivity levels than the fixed beamset. There are a few areas where the directivity was lower than before. This was due to the synthesis procedure achieving very low nulls at the expense of user directivity. Higher directivity levels can be achieved by relaxing the null depth. Figures 8 and 9 show the directivity and isolation when the synthesis is biased more towards directivity.
Figure 8: Minimum directivity of DBS beams, biased for gain, 7 colour, with errors, (scale 35 to 43 dBi).
Figure 9: Minimum isolation of DBS beams, biased for gain, 7 colour, with errors, (scale −31 to −10 dB).
4. Conclusion
The “dynamic beam synthesis” (DBS) process has the potential to increase both the gain and isolation performance of multibeam, frequency reuse, and satellite communication systems. The simulations show that the isolation performance of dynamic beam synthesis can be an order of magnitude better than using the fixed beam case.
Table 1
References
1. R. F. E. Guy, C. B. Wyllie, and J. R. Brain, “Synthesis of the Inmarsat 4 multibeam mobile antenna,” in Proceedings of the 12th International Conference on Antennas and Propagation (ICAP '03), vol. 1, pp. 90–93, Exeter, UK, March-April 2003.
2. R. T. Compton, Adaptive Antennas, Prentice-Hall, Englewood Cliffs, NJ, USA, 1988.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:33:35.000Z
|
xrekh3cvfqe5lh7zwqzpomcwi5d3iiqa
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27607",
"uncompressed_offset": 497108854,
"url": "www.isfdb.org/cgi-bin/title.cgi",
"warc_date": "2013-11-22T14:54:49.000Z",
"warc_filename": "<urn:uuid:025a7689-87e5-4afd-8204-9a02c7db6f91>",
"warc_url": "http://www.isfdb.org/cgi-bin/title.cgi?846474"
}
|
cccc_CC-MAIN-2013-20
|
Bibliography: Lata czterdzieste / Dyktanda
You are not logged in. If you create a free account and sign in, you will be able to customize what is displayed.
Title: Lata czterdzieste / Dyktanda
Author: Stanisław Lem
Year: 2005
Type: COLLECTION
Language: Polish
ISFDB Record Number: 846474
User Rating: This title has fewer than 5 votes. VOTE
Current Tags: None Add Tags
Publications:
Copyright (c) 1995-2011 Al von Ruff.
ISFDB Engine - Version 4.00 (04/24/06)
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:50:28.000Z
|
v7mjxb6eo6gdw7oy66vh5xmcwmpnxv72
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27617",
"uncompressed_offset": 548792701,
"url": "www.mdpi.com/1660-4601/6/10/2568",
"warc_date": "2013-11-22T14:54:49.000Z",
"warc_filename": "<urn:uuid:025a7689-87e5-4afd-8204-9a02c7db6f91>",
"warc_url": "http://www.mdpi.com/1660-4601/6/10/2568"
}
|
cccc_CC-MAIN-2013-20
|
Int. J. Environ. Res. Public Health 2009, 6(10), 2568-2584; doi:10.3390/ijerph6102568
Review
Preventing and Managing Cardiometabolic Risk: The Logic for Intervention
1 Division of Epidemiology and Community Health, School of Public Health, University of Minnesota, Minneapolis, MN 55454-1015, USA 2 HealthPartners Research Foundation, Minneapolis, MN 55440-1524, USA 3 JourneyWell, Minneapolis, MN 55425, USA 4 America’s Health Insurance Plans, Washington, DC 20004, USA
* Author to whom correspondence should be addressed.
Received: 10 August 2009 / Accepted: 29 September 2009 / Published: 30 September 2009
(This article belongs to the Special Issue Cardiovascular Diseases and Public Health)
Download PDF Full-Text [532 KB, uploaded 30 September 2009 13:44 CEST]
Abstract: Cardiometabolic risk (CMR), also known as metabolic syndrome or insulin resistance syndrome, comprises obesity (particularly central or abdominal obesity), high triglycerides, low HDL, elevated blood pressure, and elevated plasma glucose. Leading to death from diabetes, heart disease, and stroke, the root cause of CMR is inadequate physical activity, a Western diet identified primarily by low intake of fruits, vegetables, and whole grains, and high in saturated fat, as well as a number of yet-to-be-identified genetic factors. While the pathophysiological pathways related to CMR are complex, the universal need for adequate physical activity and a diet that emphasizes fruits and vegetables and whole grains, while minimizing food high in added sugars and saturated fat suggests that these behaviors are the appropriate focus of intervention.
Keywords: cardiometabolic risk; diet; physical activity; treatment; prevention; strategy
Article Statistics
Click here to load and display the download statistics.
Cite This Article
MDPI and ACS Style
Pereira, M.A.; Kottke, T.E.; Jordan, C.; O’Connor, P.J.; Pronk, N.P.; Carreón, R. Preventing and Managing Cardiometabolic Risk: The Logic for Intervention. Int. J. Environ. Res. Public Health 2009, 6, 2568-2584.
AMA Style
Pereira MA, Kottke TE, Jordan C, O’Connor PJ, Pronk NP, Carreón R. Preventing and Managing Cardiometabolic Risk: The Logic for Intervention. International Journal of Environmental Research and Public Health. 2009; 6(10):2568-2584.
Chicago/Turabian Style
Pereira, Mark A.; Kottke, Thomas E.; Jordan, Courtney; O’Connor, Patrick J.; Pronk, Nicolaas P.; Carreón, Rita. 2009. "Preventing and Managing Cardiometabolic Risk: The Logic for Intervention." Int. J. Environ. Res. Public Health 6, no. 10: 2568-2584.
Int. J. Environ. Res. Public Health EISSN 1660-4601 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:08:45.000Z
|
z524wr5t3roggecbrcgei4dg3jazagt3
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27624",
"uncompressed_offset": 593652594,
"url": "www.ohloh.net/accounts/mrmonday",
"warc_date": "2013-11-22T14:54:49.000Z",
"warc_filename": "<urn:uuid:025a7689-87e5-4afd-8204-9a02c7db6f91>",
"warc_url": "http://www.ohloh.net/accounts/mrmonday"
}
|
cccc_CC-MAIN-2013-20
|
Contributions
Full Circle Notifier 56 commits Aug 2010 to Present
Serenity Web Framework 98 commits Apr 2011 to Apr 2012
Phobos (D standard library) 4 commits Jan 2012
LLVM D Compiler 69 commits May 2009 to Nov 2011
TangoCMS 16 commits Dec 2009 to Oct 2010
Location
UK
Ohloh Activity
Joined Ohloh 07 Jun 2008
31 Ohloh website edit(s)
No forum posts.
No project reviewed.
Copyright © 2013 Black Duck Software, Inc. and its contributors, Some Rights Reserved. Unless otherwise marked, this work is licensed under a Creative Commons Attribution 3.0 Unported License . Ohloh ® and the Ohloh logo are trademarks of Black Duck Software, Inc. in the United States and/or other jurisdictions. All other trademarks are the property of their respective holders.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:02:40.000Z
|
rt2dq5rzepq4veo4ydmfqovvwrkt42kb
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27632",
"uncompressed_offset": 597070281,
"url": "www.openwetware.org/index.php?oldid=191118&title=MetaBase",
"warc_date": "2013-11-22T14:54:49.000Z",
"warc_filename": "<urn:uuid:025a7689-87e5-4afd-8204-9a02c7db6f91>",
"warc_url": "http://www.openwetware.org/index.php?title=MetaBase&oldid=191118"
}
|
cccc_CC-MAIN-2013-20
|
MetaBase
From OpenWetWare
Revision as of 07:32, 15 March 2008 by Dan Bolser (Talk | contribs)
Jump to: navigation, search
MetaBase is a user-contributed list of all the biological databases and software resources available on the internet. For this reason, MetaBase can be considered a 'database of databases', hence the name. The database has been built using the same MediaWiki technology that powers Wikipedia. This powerful software has effectively revolutionized the way we use the internet allowing unprecedented levels of user contribution to community driven projects. The MediaWiki system allows users to participate on many different levels, ranging from resource authors and editors to curators and website designers.
Users may contribute to MetaBase without any restrictions.
Article under construction... For the time being please see the MetaBase homepage or the MetaBase article on Wikipedia.
Database Description
In detail, MetaBase aims to fulfill the following list of requirements;
1. As a basic requirement, the MetaBase will contain a list of databases, URLs and descriptions of the most commonly used biological databases currently available on the internet.
2. The MetaBase should be flexible, allowing many users to contribute, update and maintain the data. The data management software should be flexible, allowing a continuous growth of the range and scope of databases and database information.
3. The MetaBase should be 'classifiable'. That is to say that it should not contain just one fixed database classification scheme, but many. Potentially any user could create his or her own classification of databases according to any criteria, and those classifications should be available to everyone.
4. The MetaBase should be extensible, allowing, for example, scientific papers to be linked to the databases through a variety of relationships.
5. The MetaBase should provide an up-to-date source of biological database information, as well as tools for gathering database usage and quality information from the biological community.
6. The MetaBase should facilitate more communication between the database developer and user communities.
7. Potentially the MetaBase could be used as a source of 'genuine' meta-data for data integration projects.
8. The MetaBase should be published in a suitable open access journal.
This list of requirements should not be considered static. The MetaBase aims to be a flexible, user-driven (user-created) resource for the biological database community. The above aims can be constantly revised to meet new requirements as they arise.
Personal tools
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:54:48.000Z
|
en73svfuemfrg6cmau3idnz7xyt2uebb
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27633",
"uncompressed_offset": 597076832,
"url": "www.openwetware.org/index.php?diff=157198&oldid=110326&title=PCR",
"warc_date": "2013-11-22T14:54:49.000Z",
"warc_filename": "<urn:uuid:025a7689-87e5-4afd-8204-9a02c7db6f91>",
"warc_url": "http://www.openwetware.org/index.php?title=PCR&diff=157198&oldid=110326"
}
|
cccc_CC-MAIN-2013-20
|
PCR
From OpenWetWare
(Difference between revisions)
Jump to: navigation, search
(link to PCR techniques)
(links)
Line 30: Line 30:
</biblio>
</biblio>
-
== links ==
+
== See also ==
* [http://en.wikipedia.org/wiki/Primer_%28molecular_biology%29 Wikipedia entry PCR]
* [http://en.wikipedia.org/wiki/Primer_%28molecular_biology%29 Wikipedia entry PCR]
* [http://perlprimer.sourceforge.net primer design: PerlPrimer, GPL Primer Design software for standard, real time, bisulphite, and sequencing primers]
* [http://perlprimer.sourceforge.net primer design: PerlPrimer, GPL Primer Design software for standard, real time, bisulphite, and sequencing primers]
Revision as of 17:12, 9 October 2007
PCR is an acronym for polymerase chain reaction. It is a method for amplifying DNA in vitro.
Contents
overview
• Design primers
• Prepare template
• Prepare PCR mix
• Run PCR cycler program
• Analyse by gel electrophoresis
Designing primers
Designing suitable primers might be the most crucial step in PCR. This is especially true when using genomic DNA as the template. Traditionally, primers were designed using empirical guidelines. Nowadays, various pieces of software help to predict the best primers including algorithms to prevent mispriming, self-complementarity and primer-primer complementarity, and binding in repeat regions. Additionally, software programs automate the use empirical guidelines for primer design. See here for more details...
The general PCR cycle
1. heat template/primer/dNTP/enzyme mix to 95°C for separation of DNA duplexes
2. lower the temperature enough for primers to anneal specifically to the template DNA (e.g. 55°C); lowering the temperature too much increases unspecific annealing
3. raise temperature to optimal elongation temperature of Taq or similar DNA polymerase (72-74°C)
4. repeat from top 20-35 times; less cycles gives less product, too many cycles increases fraction of incomplete and erroneous products
Specific Protocols
Notes
1. A discussion of the amplification efficiencies of different DNA polymerases on templates of varying length and GC content using real-time PCR [1].
References
1. Arezi B, Xing W, Sorge JA, and Hogrefe HH. . pmid:14511688. PubMed HubMed [Arezi-AnalBiochem-2003]
See also
Personal tools
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:21:35.000Z
|
pcka5igpu4g7rbs2xxqaxyfhsiibmhta
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27634",
"uncompressed_offset": 603369153,
"url": "www.panarmenian.net/eng/news/130615/",
"warc_date": "2013-11-22T14:54:49.000Z",
"warc_filename": "<urn:uuid:025a7689-87e5-4afd-8204-9a02c7db6f91>",
"warc_url": "http://www.panarmenian.net/eng/news/130615/"
}
|
cccc_CC-MAIN-2013-20
|
5 soldiers injured in NKR accident transferred to resuscitation department
PanARMENIAN.Net - 15 Armenian servicemen wounded in Karvachar accident have been transferred to Yerevan’s Central Clinical Military Hospital.
“Junior sergeant Artur Yeremyan, born in 1987, is currently reported to be in the most serious condition. 5 soldiers are in resuscitation department and will stay at hospital from a week to a month,” the hospital’s neurosurgery department head Arman Hakobyan said.
A truck carrying Armenian servicemen got involved in an accident on Karvachar-Vardenis road, killing 4 servicemen and wounding 15 others. Investigation is underway.
Partner news
Top stories
Earlier, ArmRosgasprom CJSC addressed Armenia’s Public Services Regulatory Commission with an offer to reconsider natural gas price.
Armenian defense ministry’s spokesman described the maneuvers as ordinary exercises conducted several times a year.
Participants will learn basic skills in protecting IT systems and data as well as how to investigate computer-facilitated crimes.
“I wish to further promote the beauty of Armenian art and its principles of tolerance and respect to diversity,” Mnatsakanyan said.
Partner news
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:21:35.000Z
|
4izttwd55iarmw3sxifpqttarmlydysg
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27643",
"uncompressed_offset": 659161300,
"url": "www.seroundtable.com/archives/017496.html",
"warc_date": "2013-11-22T14:54:49.000Z",
"warc_filename": "<urn:uuid:025a7689-87e5-4afd-8204-9a02c7db6f91>",
"warc_url": "http://www.seroundtable.com/archives/017496.html"
}
|
cccc_CC-MAIN-2013-20
|
Daily Search Forum Recap: June 23, 2008
Jun 23, 2008 • 5:00 pm | (0) by | Filed Under Search Forum Recap
Here is a recap of what happened in the search forums today, through the eyes of the Search Engine Roundtable and other search forums on the web.
Search Engine Roundtable Stories:
• Is Negative SEO Still Possible?
Last year, we looked at the impacts, if any, of negative SEO on websites, a discussion which arose from a Forbes article on the saboteurs of search. One year later, we're still discussing the consequences and seeing if negative SEO is still possible. In a WebmasterWorld thread, we learn that there are still ways to sabotage websites and rankings, from hijacking competitor's DNS to doing it to yourself by killing your URL structure. Now, though,
• Google AdSense Turns Five Years Old
Google AdSense was formally announced on June 18, 2003. Now, it is five years old and still going strong. Within 2 days, WebmasterWorld had its own Google Adsense forum where people are talking about how Google AdSense has helped them. In five years, some have been making enough to earn a decent living off of Google AdSense. Many admit that Google AdSense is the best monetization program for their website. Martinibuster adds: For a program
• Google Reconsiders "Incorrect Maps Location Marker" Reinclusion
In a Google Groups thread, a number of small businesses are noticing that their location marker isn't quite on target; they would like to edit it out. In the past (and unfortunately I don't have a screenshot), there was a feature that would enable users to "edit incorrect marker location." (A similar feature is discussed in our screenshot tour of the "move the map marker".) Google has acknowledged that they removed this, thinking that it
• Screen Shots of More Google AdSense Fonts
Google has confirmed the Google AdSense Fonts tests as being tests at WebmasterWorld. Since then I have tried to compile some real world examples of these fonts in action. Thanks to a DigitalPoint Forums thread, I was able to find a new AdSense font. Here it is: Compare that to the normal fonts: Compare that to comic sans font: Forum discussion continued at WebmasterWorld and DigitalPoint Forums.
• Google Says, Long URLs May Hurt You
We have talked about URL length issues and SEO and if long URLs are spammy in the past. But now we have a Google Groups thread with a Googler, JounMu, actually commented on a specific URL as being a bit too long for comfort. The example URL in question is: http://www.gadgetguy.com.au/small-kitchen-appliances-toaster-kettle-coffee-machine-blender-juicer-channel7-sunrise-australia-42.html John said "Now I'm all for having descriptive URLs, but .... this seems to be taking it a bit too far and I have
• Finally, We Get an API for Google Webmaster Tools, But...
I can't express how happy I am to see a real live API available for Google Webmaster Tools. The announcement came late Friday, telling webmasters and developers that they can now use an API to access and communicate data back and forth to Google for the Webmaster Tools portion of the site. The tool supports some but not all of Webmaster Tools features. It gives you two overall capabilities, one with managing site and the
• Google Trends for Websites : Rather Not Have It? Seriously?
I had the honor of breaking the story on the Google Trends for Websites announcement. In fact, I was on a call with Sundar Pichai (VP, Product Management), R.J. Pittman (Director, Product Management), and Matt Cutts (you know him) of Google the day before. They showed me a tool that shows estimated traffic data for many sites, plus gives you search data and much more. I was very excited about this launch, as you can
• Video Recap of Weekly Search Buzz :: June 22, 2008
In this week's video recap, I announced the special Father's Day winner of the schwag, plus told you how to win this week (it's easy). I showed off the Father's Day logos from Google, Yahoo, Ask.com, Dogpile and others. I discussed the Google Webmaster Live Chat event. Did you know Page Load Time is now a factor in AdWords? I got into the topic of Google Bowling and ended it off with don't make Matt
Other Great Search Forum Threads:
Previous story: Is Negative SEO Still Possible?
blog comments powered by Disqus
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:03:10.000Z
|
q5sfb67ul5liecirv3sieex2mpd5j3en
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27644",
"uncompressed_offset": 659171564,
"url": "www.seroundtable.com/google-facebook-likes-13153.html",
"warc_date": "2013-11-22T14:54:49.000Z",
"warc_filename": "<urn:uuid:025a7689-87e5-4afd-8204-9a02c7db6f91>",
"warc_url": "http://www.seroundtable.com/google-facebook-likes-13153.html"
}
|
cccc_CC-MAIN-2013-20
|
Google: Facebook Likes "Will Not Influence Your Ranking"
Mar 22, 2011 • 8:40 am | (35) by | Filed Under Google Search Engine Optimization
Jack from Google said in a Google Webmaster Help thread that adding a Facebook Like Button to your web pages will have no influence on your Google rankings.
The response needs to be put in context. One webmaster claimed his rankings dropped soon after adding the Facebook Like Button to his web pages. In response to that, Jack said - no, it wouldn't drop.
The thing is, we know that Google uses site speed as a ranking factor. We also know that Facebook Like Buttons, if implemented certain ways, can slow down the load of your page. Does Google specifically make sure to ignore the Facebook Like Buttons in the speed tests? I don't know. But if not, and it slows down your page load time, it may negatively impact your rankings. That being said, it is not specific to Facebook, anything that slows down your page can be detrimental to your rankings.
Going a bit beyond page speed, we also know Google uses social signals for rankings. Right now they use Twitter, Google Reader, and other social sites but currently do not use Facebook. So Facebook has no real direct impact on rankings as of yet.
Forum discussion at Google Webmaster Help .
Previous story: AdSense's "i" Link Replaced By "AdChoices"
blog comments powered by Disqus
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:42:59.000Z
|
viu7tdxm7ivxolc25be6tjdpsgwmykax
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27665",
"uncompressed_offset": 3545800,
"url": "abs.gov.au/AUSSTATS/abs%40.nsf/ProductsbyReleaseDate/20EB16EB33C21140CA2570AF00012EA1",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://abs.gov.au/AUSSTATS/abs@.nsf/ProductsbyReleaseDate/20EB16EB33C21140CA2570AF00012EA1?OpenDocument"
}
|
cccc_CC-MAIN-2013-20
|
Australian Bureau of Statistics
Celebrating the International Year of Statistics 2013
ABS Home > Statistics > By Catalogue Number
5249.0.55.001 - Australian National Accounts: Tailored Tourism Satellite Accounts - Electronic Delivery, 2003
Latest ISSUE Released at 11:30 AM (CANBERRA TIME) 28/08/2003
Page tools: Print Page Print All RSS Search this Product
• About this Release
ABOUT THIS RELEASE
This product is for tailored client requests relating to the TSA provided electronically to clients.
© Commonwealth of Australia 2013
Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:58:06.000Z
|
d3ohatd6e4o7jgpywprcogwwefi7dvq7
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27669",
"uncompressed_offset": 10950381,
"url": "answers.onstartups.com/questions/18838/how-can-we-get-more-sales-for-our-daily-deal-app-not-groupon-clone?answertab=oldest",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://answers.onstartups.com/questions/18838/how-can-we-get-more-sales-for-our-daily-deal-app-not-groupon-clone?answertab=oldest"
}
|
cccc_CC-MAIN-2013-20
|
Tell me more ×
Answers OnStartups is a question and answer site for entrepreneurs looking to start or run a new business. It's 100% free, no registration required.
We've launched our group buying app (no, we're not a Groupon clone) for online retailers about 3 weeks ago. Traffic has been okay, and we have a fair number of sign-ups for the trial. We've only had 2 sales so far, despite our low price point.
I was wondering if you guys have any feedback on our app. How we can improve it, how we can better position it, what might make sense that we might have overlooked, etc.
Thanks a lot!
Our startup: http://www.zuupy.com
share|improve this question
1 Answer
up vote 0 down vote accepted
The application has been out only for 3 weeks, be patient. What is the conversion rate? how many unique visitors compared to the number of signups? for a product that has only been 3 weeks out there, you seem to be doing OK.
I like the idea, the name and the look and feel of the application. If things aren't moving fast enough, keep making changes to the landing page until you get the desired conversion rate.
Note: There is a typo in the sign-up window... "iterally" I think is supposed to read "literally"
UPDATE: Checkout this video on how to increase your landing page conversions from Unbounce's founder: http://mixergy.com/rick-perreault-unbounce-interview/
Good luck!
share|improve this answer
Your Answer
discard
By posting your answer, you agree to the privacy policy and terms of service.
Not the answer you're looking for? Browse other questions tagged or ask your own question.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:21:16.000Z
|
qj6phv6r4ehxufb7qqq646f2vmqiwmdy
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27672",
"uncompressed_offset": 13295049,
"url": "archive.mises.org/14322/a-really-big-show/",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://archive.mises.org/14322/a-really-big-show/"
}
|
cccc_CC-MAIN-2013-20
|
1. Skip to navigation
2. Skip to content
3. Skip to sidebar
Source link: http://archive.mises.org/14322/a-really-big-show/
A Really Big Show
October 21, 2010 by
Or perhaps a “really big shooeeww” as Ed Sullivan may have put it. Mark Edge, Ian Freeman, and Wayne offer up a very relevant program on foreign policy, the free market, and true individual freedom in society today.
Free Talk Live on October 20th, 2010.
It begins to get really good halfway through when Jericho calls in as Mark explains the difference between freedom, intervention, liberty, America, mom, and apple pie and Ian defines who the real “terrorists” are while Wayne provides the historical context…
Previous post:
Next post:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:07:23.000Z
|
dqwfhdzkjytieicm47ovkvkdm63mohcv
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27674",
"uncompressed_offset": 16420150,
"url": "ask.wireshark.org/questions/1039/failed-at-emulating-browsers-packets?focusedAnswerId=1244&page=1",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://ask.wireshark.org/questions/1039/failed-at-emulating-browsers-packets?page=1&focusedAnswerId=1244"
}
|
cccc_CC-MAIN-2013-20
|
Hi,
I'm writing a program with raw-sockets and i'm trying to emulate my browser's "syn" packets to a socks server. My program's packets and my browser's packets are almost alike, but the socks server answers only my browser's packets and not my generated packets. My browser sends 5 or 3 syns (with no or very little delay between each of them), and then the socks server sends the "syn,ack" packet. The only difference between the browsers packets and mine is the timestamp in the TCP layer.
Can anyone help me with that? I can provide a packet file if necessary. Thanks :)
asked 20 Nov '10, 09:09
toothpick
1111
accept rate: 0%
Ok, I compared your traces and the only thing that seems to be "off" in the raw socket version is that the TCP checksum is not correct. This is something that could be a result of TCP Checksum offloading (which is why many people turn off TCP checksum validation in Wireshark), but I think it is the problem in this case. Here's why:
1. your browser trace shows that the SYN packets have a correct TCP checksum
2. your raw socket trace shows that the SYN packets have an incorrect TCP checksum
3. that means that your checksum is not always incorrect, so probably you do not have TCP checksum offloading trouble
4. if we assume your computer is usually sending correct TCP checksums for "normal" browser communication and your raw socket communication doesn't, we can assume (with just some doubt, see last paragraph) that
5. your raw socket program calculates the TCP checksum incorrectly and thus
6. the incorrect checksum is transmitted to the server which then will
7. drop the packet because it has to assume it is damaged and
8. not reply with a SYN/ACK
I hope this makes sense to you. Steps to take are:
1. capture your computer's traffic with another passive computer to verify if incorrect checksums are in fact sent out the NIC for your raw socket program
2. if it turns out they are, you have to
3. fix the raw socket program
If your raw socket program does in fact calculate correct TCP checksums and Wireshark only says they're wrong because of checksum offloading I can't tell why your packets aren't answered, since everything else looks pretty much the same as the browser's packets.
link
answered 04 Dec '10, 13:52
Jasper ♦
10.1k328145
accept rate: 15%
yes, here are the traces of both my program and the browser.
http://rapidshare.com/files/434905180/my-packets http://rapidshare.com/files/434905209/browser
my wireshark saved those files without extension, but I guess they are .cap files.
link
answered 04 Dec '10, 11:51
toothpick
1111
accept rate: 0%
Your answer
toggle preview
Follow this question
By Email:
Once you sign in you will be able to subscribe for any updates here
By RSS:
Answers
Answers and Comments
Markdown Basics
• *italic* or _italic_
• **bold** or __bold__
• link:[text](http://url.com/ "Title")
• image?
• numbered list: 1. Foo 2. Bar
• to add a line break simply add two spaces to where you would like the new line to be.
• basic HTML tags are also supported
Tags:
×464
×94
×7
×5
×1
Asked: 20 Nov '10, 09:09
Seen: 1,608 times
Last updated: 04 Dec '10, 13:52
powered by OSQA
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:01:52.000Z
|
2n3b6xpeekizm6mbhvw6bltazzk74hck
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27689",
"uncompressed_offset": 39427272,
"url": "buffalo.nas-central.org/wiki/Articles/DebianNFSServer",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://buffalo.nas-central.org/wiki/Articles/DebianNFSServer"
}
|
cccc_CC-MAIN-2013-20
|
NFS server in kernelspace
From NAS-Central Buffalo - The Linkstation Wiki
(Redirected from Articles/DebianNFSServer)
Jump to: navigation, search
This article Last edited by frontalot. Originally by ultravelours. at Linkstationwiki.org
MIPSel only
Right now this article is only for the MIPS based LinkStation II, but if you do have NFS kernel modules for the PPC based LinkStation I it should work the same way.
Contents
Prepare your Debian Installation
You need some tools from Debian for your NFS server, things like the portmapper and other RPC tools. Usually it should be enough just to do (as root or with root-permissions)
apt-get install nfs-kernel-server
This will also install the necessary dependencies like 'nfs-common' or 'libwrap'. Now you have to setup your '/etc/exports' to set up the shares you want to mount on other machines (you'll find a lot of tutorials on that topic on the net).
The Files
You can download the latest kernel modules from the downloads area. Install the kernel modules per the README file. Use the latest 'nfs-mods-tools'.
Start the server
With everything in place, simply start the NFS server from the init-scripts with '/etc/init.d/nfs-kernel-server start' and it should work. An 'lsmod' will show 'nfsd', 'lockd' and 'sunrpc' as loaded modules. Now you can try to connect to your fresh NFS server.
Extras
For that special "now that's cool"-effect I also installed mdnsresponder from Debian unstable, but the "official" version from Apple will do it, too. Now you can advertise your exports by adding something like
"LinkStation NFS" _nfs._tcp local. 2049 "path=/share/nfs"
to '/etc/mdnsresponder/mDNSResponder.conf'. On a more recent Mac (with Mac OS X 10.2 or better) all these shares auto-magically show up in the '/Network' directory - no need to configure the automounter, fstab or NetInfo database.
It should also work with the latest Nautilus/Gnome 2.8 or Konqueror and KDE, as they can handle mDNS service discovery (AKA "ZeroConf" - or "Bonjour", formerly known as "Rendezvous")
Originally by ultravelours and edited by frontalot from linkstationwiki.org
Personal tools
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:21:43.000Z
|
pzegxbrpxy4ttbguxn4ujob57kxvilg5
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27692",
"uncompressed_offset": 44030606,
"url": "ccsenet.org/journal/index.php/mas/article/view/7420/0",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://ccsenet.org/journal/index.php/mas/article/view/7420/0"
}
|
cccc_CC-MAIN-2013-20
|
Tetrahydrocarbazole Derivatives as Corrosion Inhibitors for Zinc in HCl Solution
A.S. Fouda, M. Abdallah, S.T. Atwa, M.M. Salem
Abstract
The inhibition of the corrosion of zinc in 0.4 M HCl by (Z)-2-(2-(4-methoxyphenyl)hydrazono)-3-(5,6,7,8-tetrahydrocarbazol-9-yl)-3-oxopropanenitrile(1),(Z)-2-(2-(4-chlorophenyl)hydrazono)-3-(5,6,7,8-tetrahydrocarbazol-9-yl)-3-oxopropanenitrile(2),(Z)-2-(2-phenylhydrazono)-3-(5,6,7,8-tetrahydrocarbazol-9-yl)-3-oxopropanenitrile(3)and (Z)-2-(2-(4-nitrophenyl)hydrazono)-3-(5,6,7,8-tetra hydrocarbazol-9-yl)-3-oxopropanenitrile (4) has been investigated at 30 °C using weight loss, potentiodynamic polarization, electrochemical impedance spectroscopy (EIS) and electrochemical frequency modulation (EFM) measurements. Results obtained show that these investigated compounds are good inhibitors and their inhibition efficiencies (IE %) increase with the increase of inhibitor concentration and with rise of temperature. Moreover, polarization studies clearly reveal that the presence of inhibitors changes the mechanism of hydrogen evolution and that they act as mixed inhibitors. EIS study shows that charge transfer resistance increases with the inhibitor concentration. The adsorption of investigated compounds obeys Langmuir’s adsorption isotherm. Effect of temperature is studied between 30 and 50 °C and determination of activation parameters is also discussed. The mechanism of adsorption had been explained on the basis of chemical structure of the investigated inhibitors. It was found that there is a good agreement between the different tested techniques.
Full Text: PDF
This work is licensed under a Creative Commons Attribution 3.0 License.
Modern Applied Science ISSN 1913-1844 (Print) ISSN 1913-1852 (Online)
Copyright © Canadian Center of Science and Education
To make sure that you can receive messages from us, please add the 'ccsenet.org' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:58:45.000Z
|
jaa3hyb6f63xx2ui6j7fw6bp7ukaqxnl
|
{
"content_type": "application/xhtml+xml",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27698",
"uncompressed_offset": 51405567,
"url": "cnx.org/content/m36113/1.2/content_info",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://cnx.org/content/m36113/1.2/content_info"
}
|
cccc_CC-MAIN-2013-20
|
Connexions
Sections
You are here: Home » Content » The Real and Complex Numbers: The Complex Numbers
About: The Real and Complex Numbers: The Complex Numbers
Module by: Lawrence Baggett. E-mail the author
View the content: The Real and Complex Numbers: The Complex Numbers
Metadata
Name: The Real and Complex Numbers: The Complex Numbers
ID: m36113
Language: English (en)
Summary: Complex numbers are covered, involving i. The fundamental theorem of algebra is referenced. The absolute value of a complex number is defined. The triangle inequality is stated.
Subject: Mathematics and Statistics
Keywords: closed neighborhood, complex numbers, open neighborhood, ordered field, punctured disks
License: Creative Commons Attribution License CC-BY 3.0
Authors: Lawrence Baggett (lawrence.baggett@colorado.edu)
Copyright Holders: Lawrence Baggett (lawrence.baggett@colorado.edu)
Maintainers: Lawrence Baggett (lawrence.baggett@colorado.edu), Daniel Williamson (dcwill@cnx.org), Jared Adler (jca2@rice.edu)
Latest version: 1.2 (history)
First publication date: Sep 9, 2010 12:28 pm -0500
Last revision to module: Dec 9, 2010 5:09 pm -0600
Downloads
PDF: m36113_1.2.pdf PDF file, for viewing content offline and printing. Learn more.
XML: m36113_1.2.cnxml XML that defines the structure and contents of the module, minus any included media files. Can be reimported in the editing interface. Learn more.
Version History
Version: 1.2 Dec 9, 2010 5:09 pm -0600 by Jared Adler
Changes:
links, summary added
Version: 1.1 Nov 23, 2010 5:24 pm -0600 by Jared Adler
Changes:
initial publish
How to Reuse and Attribute This Content
If you derive a copy of this content using a Connexions account and publish your version, proper attribution of the original work will be automatically done for you.
If you reuse this work elsewhere, in order to comply with the attribution requirements of the license (CC-BY 3.0), you must include
• the authors' names: Lawrence Baggett
• the title of the work: The Real and Complex Numbers: The Complex Numbers
• the Connexions URL where the work can be found: http://cnx.org/content/m36113/1.2/
See the citation section below for examples you can copy.
How to Cite and Attribute This Content
The following citation styles comply with the attribution requirements for the license (CC-BY 3.0) of this work:
American Chemical Society (ACS) Style Guide:
Baggett, L. The Real and Complex Numbers: The Complex Numbers, Connexions Web site. http://cnx.org/content/m36113/1.2/, Dec 9, 2010.
American Medical Assocation (AMA) Manual of Style:
Baggett L. The Real and Complex Numbers: The Complex Numbers [Connexions Web site]. December 9, 2010. Available at: http://cnx.org/content/m36113/1.2/.
American Psychological Assocation (APA) Publication Manual:
Baggett, L. (2010, December 9). The Real and Complex Numbers: The Complex Numbers. Retrieved from the Connexions Web site: http://cnx.org/content/m36113/1.2/
Chicago Manual of Style (Bibliography):
Baggett, Lawrence. "The Real and Complex Numbers: The Complex Numbers." Connexions. December 9, 2010. http://cnx.org/content/m36113/1.2/.
Chicago Manual of Style (Note):
Lawrence Baggett, "The Real and Complex Numbers: The Complex Numbers," Connexions, December 9, 2010, http://cnx.org/content/m36113/1.2/.
Chicago Manual of Style (Reference, in Author-Date style):
Baggett, L. 2010. The Real and Complex Numbers: The Complex Numbers. Connexions, December 9, 2010. http://cnx.org/content/m36113/1.2/.
Modern Languages Association (MLA) Style Manual:
Baggett, Lawrence. The Real and Complex Numbers: The Complex Numbers. Connexions. 9 Dec. 2010 <http://cnx.org/content/m36113/1.2/>.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:09:25.000Z
|
rkhbo2v3igpt3vuizhpxo7d2e33vqauj
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27709",
"uncompressed_offset": 63502037,
"url": "daviswiki.org/Davis_at_a_Glance",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://daviswiki.org/Davis_at_a_Glance"
}
|
cccc_CC-MAIN-2013-20
|
Davis at a Glance
Info
Search:
Geography
Size: About 10.5 square miles
Elevation: appx. 50' above sea level
County: Yolo County
Nearest major city: Sacramento
Geography: Not quite flat
Demographics
Population: 65,622 (as of 2010), not including the on-campus population of 5,786 (2010)
UCD Student Population: about 32,500 (appx. 25,000 undergrads and 7,500 grad/professional students)
Median income: $42,454 (source: 2000 US Census)
General political leanings: mostly liberal, 'progressive' in the city core, trailing to other shades of mostly liberal as you head toward the outskirts.
Racial breakdown:
2010: 64.9% White, 2.3% Black or African American, .5% American Indian or Alaska Native, 21.9% Asian, .2% Native Hawaiian and Other Pacific Islander, 5.4% bi/multi-racial, 4.8% other. "Hispanic or Latino" is considered an ethnicity and is supposed to be chosen in addition to one of the previous categories; 12.5% self-identified as Hispanic or Latino.
2000: 70.1% White, 2.3% Black or African American, .7% American Indian or Alaska Native, 17.5% Asian, .2% Native Hawaiian and Other Pacific Islander, 4.9% bi/multi-racial, 4.3% other. In addition, 9.61% self-identified as Hispanic or Latino.
Education: According to a 2006 CNN Money Magazine article, Davis is the second most-educated city in the US with 34.6% of residents having graduate degrees.
People
Mayor: Joe Krovoza
Chancellor of UC Davis: Linda Katehi
History
Year founded: 1866 (as 'Davisville')
Incorporated: 1917
UC Davis opens: 1908
For more info, see Town History and Davis Timeline.
Numbers
Zip Codes: 95616, 95618
Area Code: 530
Weather
Climate: Mediterranean climate
Seasonal
Spring: 60-70 degrees in early spring, to lower 80's in late spring; some rain
Summer: Mid 80's to over 100 degrees; very dry
Fall: 70-80 degrees in early fall, 50-60 degrees in late fall; occasional rain
Winter: 50-60 degrees in early winter, freezes occasionally at night; rainy (snow is rare)
Other Facts
Official designations: "Bike City, USA", "A nuclear-free zone"
Emblem: The old-tyme two-wheeled bicycle, also known as a penny-farthing
Sister Cities: Inuyama, Japan; Qufu, China; Uman, Ukraine; Wuxi, China; Los Banos, The Philippines; Sang-Ju, South Korea; Munoz, The Philippines; Rutilio Grande, El Salvador
Well-known for: UCD, bike-friendliness, Picnic Day, the Toad Tunnel, very flat topography, the Whole Earth Festival, summer heat over 100 degrees
This is a Wiki Spot wiki. Wiki Spot is a 501(c)3 non-profit organization that helps communities collaborate via wikis.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:27:45.000Z
|
6qpvnfi6wvbsitkeyjus3iexwumb57vk
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27730",
"uncompressed_offset": 87712339,
"url": "familysearch.org/learn/wiki/en/Flintstone,_Maryland",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://familysearch.org/learn/wiki/en/Flintstone,_Maryland"
}
|
cccc_CC-MAIN-2013-20
|
Flintstone, MarylandEdit This Page
From FamilySearch Wiki
United States > Maryland > Allegany County > Flintstone
Contents
Quick History
Wikipedia
Geographic location: Google
Resources
Biography
Cemeteries
Church History and Records
History
Land and Property
Maps
Newspapers
Vital Records
Need additional research help? Contact our research help specialists.
Need wiki, indexing, or website help? Contact our product teams.
Did you find this article helpful?
You're invited to explain your rating on the discussion page (you must be signed in).
• This page was last modified on 15 May 2012, at 15:44.
• This page has been accessed 455 times.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:10:12.000Z
|
onturue44fjwhpfxwsxbtcgctltgwqj5
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27785",
"uncompressed_offset": 187923859,
"url": "openwetware.org/index.php?redirect=no&title=E._coli_Automatic_Directed_Evolution_Machine_project",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://openwetware.org/index.php?title=E._coli_Automatic_Directed_Evolution_Machine_project&redirect=no"
}
|
cccc_CC-MAIN-2013-20
|
E. coli Automatic Directed Evolution Machine project
From OpenWetWare
Jump to: navigation, search
Home About Conferences Labs Courses Resources FAQ
iGEM 2009 USTC team project
http://2009.igem.org/Team:USTC/Project
Evolution is more powerful than the God, as Charles Darwin told us 150 years ago. This year, our team is trying to manage the power of evolution, the power of creating everything from biomolecules to ecosystems, by engineering an E. coli Automatic Directed Evolution Machine (E.ADEM).
The ultimate goal is to make E.ADEM a universal framework for evolutionary approaches in synthetic biology. Anything we want in synthetic biology can be automatically created, from promoters, RBS, regulators, receptors, binding partners, aptamers, enzymes and ribozymes, to sensors, logic devices, reporters, metabolic pathways, entire genomes, and even solutions of mathematic problems.
To each evolution object you want it to evolve, a scoring function can be designed to output PoPS as the fitness score to your demand. After that, you can ligate the scoring function device into the E.ADEM plasmid, transform E. coli, culture the cells and wait for them to evolve automatically and robustly, and get what you want at last.
E.ADEM is designed by implementing evolutionary algorithm back into biology. The output of the scoring function is connected to the core of E.ADEM, a self-adaptive controller that can adjust variation rate and selection pressure, base on the fitness score, the population size and the average fitness score calculated by a quorum sensing device. To carry out individual functions, 3 more modules are also designed: a variation function to change the evolution object by mutation or recombination, a selection function to control the survival or death of the cell, and a reporter module to report the score to the user.
We performed comprehensive measurement using constitutive promoter family stimulus signals and modeling of each components. A prototype machine with the self-adaptive controller is built. Modular design and PoPS device boundary standard will ensure the extensibility and universality of the machine.
Personal tools
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:39:11.000Z
|
z4ntcyieyesvzwhgsbwfkssl5cb2t7sa
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27818",
"uncompressed_offset": 204658928,
"url": "quotationsbook.com/quote/34135/",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://quotationsbook.com/quote/34135/"
}
|
cccc_CC-MAIN-2013-20
|
Quotation added by staff
Why not add this quote to your bookmarks?
I think the worst thing this nation could do for humanity would be to leave any uncertainty as to our will, our purpose and our capacity to carry out our purpose. Humphrey, Hubert H.
This quote is about respectability · Search on Google Books to find all references and sources for this quotation.
A bit about Humphrey, Hubert H. ...
Hubert Horatio Humphrey II (May 27, 1911 January 13, 1978) was the 38th Vice President of the United States, serving under President Lyndon Johnson. Humphrey twice served as a United States Senator from Minnesota, and served as Democratic Majority Whip. He was a founder of the Minnesota Democratic-Farmer-Labor Party. He was also elected mayor of Minneapolis, Minnesota. In 1968 Humphrey was the nominee of the United States Democratic Party in the United States presidential election, but lost to Republican Richard M. Nixon.
These people bookmarked this quote:
• Nobody has bookmarked this quote yet.
More on the author
This quote around the web
Loading...
Search Quotations Book
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:40:15.000Z
|
3ipkcumulh72hew6665wnin75x6jcjny
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27819",
"uncompressed_offset": 204665366,
"url": "quotationsbook.com/quote/gift/17241/",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://quotationsbook.com/quote/gift/17241/"
}
|
cccc_CC-MAIN-2013-20
|
It's easy! Just pick the product you like and click-through to buy it from trusted partners of Quotations Book. We hope you like these personalized gifts as much as we do.
Make and then buy your OWN fantastic personalized gift from this quote
If the Almighty were to rebuild the world and asked me for advice, I would have English Channels round every country. And the atmosphere would be such that anything which attempted to fly would be set on fire. Churchill, Winston
Make a fabulous personalised bracelet or other form of jewellery with this quote
Click the banner below to pick the kind of jewellery you'd like ...
Choose something popular ...
Make a custom wrapped canvas ...
Make custom holiday cards ...
Make custom t-shirts ...
Make custom holiday gifts for boys ...
Make custom holiday gifts for girls ...
Make custom holiday gifts for men ...
A selection of more great products and gifts!
212 - The Extra Degree
The one extra degree makes the difference. This simple analogy reflects the ultimate definition of excellence. Because it's the one extra degree of effort, in business and life, that can separate the good from the great. This powerful book by S.L. Parker and Mac Anderson gives great examples, great quotes and great stories to illustrate the 212° concept. A warning - once you read it, it will be hard to forget. Your company will have a target for everything you do ... 212°
Click here to buy this »
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:11:52.000Z
|
yw3hshsizh5nmvdryqy7cvmq5jbjgdhq
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27820",
"uncompressed_offset": 204670942,
"url": "quotationsbook.com/quote/gift/22948/",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://quotationsbook.com/quote/gift/22948/"
}
|
cccc_CC-MAIN-2013-20
|
It's easy! Just pick the product you like and click-through to buy it from trusted partners of Quotations Book. We hope you like these personalized gifts as much as we do.
Make and then buy your OWN fantastic personalized gift from this quote
The shepherd always tries to persuade the sheep that their interests and his own are the same. Stendhal, Henri B.
Make a fabulous personalised bracelet or other form of jewellery with this quote
Click the banner below to pick the kind of jewellery you'd like ...
Choose something popular ...
Make a custom wrapped canvas ...
Make custom holiday cards ...
Make custom t-shirts ...
Make custom holiday gifts for boys ...
Make custom holiday gifts for girls ...
Make custom holiday gifts for men ...
A selection of more great products and gifts!
212 - The Extra Degree
The one extra degree makes the difference. This simple analogy reflects the ultimate definition of excellence. Because it's the one extra degree of effort, in business and life, that can separate the good from the great. This powerful book by S.L. Parker and Mac Anderson gives great examples, great quotes and great stories to illustrate the 212° concept. A warning - once you read it, it will be hard to forget. Your company will have a target for everything you do ... 212°
Click here to buy this »
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:38:44.000Z
|
tul5zs66kxxrczi3i6rs37wq2t4vpqki
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27821",
"uncompressed_offset": 204676461,
"url": "quotationsbook.com/quotes/tag/joy/page=1/",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://quotationsbook.com/quotes/tag/joy/page=1/"
}
|
cccc_CC-MAIN-2013-20
|
Quotes about joy
These are quotes tagged with "joy". You can also search for quotes containing the word joy.
"... focus on the journey, not the destination. Joy is found not in finishing an activity but in doing it."
Anderson, Greg on joy
11 fans of this quote
"Where a man can live, he can also live well."
Aurelius, Marcus on joy
"The best way to pay for a lovely moment is to enjoy it."
Bach, Richard on joy
7 fans of this quote
"The love for work needs to be re-enthroned in our lives. Every family should have a plan for work that touches the life of each family member so that this eternal principle will be ingrained in their lives."
Ballard, M. Russell on joy
"There is nothing better for a man, than that he should eat and drink, and that he should make his soul enjoy good in his labor. [Ecclesiastes 2:24]"
Bible on joy
3 fans of this quote
"Enjoy the journey, enjoy ever moment, and quit worrying about winning and losing."
Biondi, Matt on joy
3 fans of this quote
"Only mediocrity of enjoyment is allowed to man."
Blair, Hugh on joy
"The fact remains that the overwhelming majority of people who have become wealthy have become so thanks to work they found profoundly absorbing. The long term study of people who eventually become wealthy clearly reveals that their Luck arouse from the accidental dedication they had to an area they enjoyed."
Blotnick, Srully on joy
"If you don't like what you're doing, then don't do it."
Bradbury, Ray on joy
4 fans of this quote
"If your capacity to acquire has outstripped your capacity to enjoy, you are on the way to the scrap-heap."
Buck, Glen on joy
"If a man who enjoys a lesser happiness beholds a greater one, let him leave aside the lesser to gain the greater."
Buddha on joy
3 fans of this quote
"He has spent his life best who has enjoyed it most. God will take care that we do not enjoy it any more than is good for us."
Butler, Samuel on joy
3 fans of this quote
This quotation can be viewed in the context of a book
"Live and work but do not forget to play, to have fun in life and really enjoy it."
Caddy, Eileen on joy
5 fans of this quote
"You never achieve real success unless you like what you are doing."
Carnegie, Dale on joy
19 fans of this quote
"I feel sorry for the person who can't get genuinely excited about his work. Not only will he never be satisfied, but he will never achieve anything worthwhile."
Chrysler, Walter on joy
"Chance can allow you to accomplish a goal every once in a while, but consistent achievement happens only if you love what you are doing."
Conner, Bart on joy
"Learn not only to find what you like, learn to like what you find."
D'Angelo, Anthony J. on joy
4 fans of this quote
"The enjoyment of life would be instantly gone if you removed the possibility of doing something."
Depew, Chauncey on joy
"You can't let one bad moment spoil a bunch of good ones."
Earnhardt, Dale on joy
4 fans of this quote
"The biggest mistake people make in life is not trying to make a living at doing what they most enjoy."
Forbes, Malcolm S. on joy
"Inner work is finding joy in work. Our real work is heart work and soul work."
Fox, Matthew on joy
"People who enjoy what they are doing invariably do it well."
Gibbs, Joe on joy
"The more you love what you are doing, the more successful it will be for you."
Gillies, Jerry on joy
"What you do is more important than how much you make, and how you feel about it is more important than what you do."
Gillies, Jerry on joy
"He who enjoys doing and enjoys what he has done is happy."
Goethe, Johann Wolfgang Von on joy
5 fans of this quote
"Enjoy what thou has inherited from thy sires if thou wouldn't really possess it. What we employ and use is never an oppressive burden; what the moment brings forth, that only can it profit by."
Goethe, Johann Wolfgang Von on joy
"Enjoyment is not a goal, it is a feeling that accompanies important ongoing activity."
Goodman, Paul on joy
5 fans of this quote
"As long as I can focus on enjoying what I'm doing, having fun, I know I'll play well."
Graf, Steffi on joy
"To love what you do and feel that it matters -- how could anything be more fun?"
Graham, Katherine on joy
5 fans of this quote
"Like what you do, if you don't like it, do something else."
Harvey, Paul on joy
"Our Creator would never have made such lovely days, and have given us the deep hearts to enjoy them, above and beyond all thought, unless we were meant to be immortal."
Hawthorne, Nathaniel on joy
This quotation can be viewed in the context of a book
"If you always do what interests you, at least one person is pleased."
Hepburn, Katharine on joy
9 fans of this quote
"Everyone enjoys doing the kind of work for which he is best suited."
Hill, Napoleon on joy
"No man can succeed in a line of endeavor which he does not like."
Hill, Napoleon on joy
"As you walk down the fairway of life you must smell the roses, for you only get to play one round."
Hogan, Ben on joy
5 fans of this quote
"To really enjoy the better things in life, one must first have experienced the things they are better than."
Homoka, Oscar on joy
"You've got to love what you're doing. If you love it, you can overcome any handicap or the soreness or all the aches and pains, and continue to play for a long, long time."
Howe, Gordie on joy
"True enjoyment comes from activity of the mind and exercise of the body; the two are ever united."
Humboldt, Karl Wilhelm Von on joy
"Just play. Have fun. Enjoy the game."
Jordan, Michael on joy
4 fans of this quote
"Don't complain because you don't have. Enjoy what you've got."
Judd, H. Stanley on joy
But wait... There are more: 1, 2, 3, 4 next
Take a look at recent activity on QB!
Search Quotations Book
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:19:23.000Z
|
dznhh3yxryvz2ryz2bako2n5ry3vqukv
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27859",
"uncompressed_offset": 260992707,
"url": "thevaultofhorror.blogspot.com/2009/07/universal-monster-sex-yes-naughty.html?showComment=1246721029339",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://thevaultofhorror.blogspot.com/2009/07/universal-monster-sex-yes-naughty.html?showComment=1246721029339"
}
|
cccc_CC-MAIN-2013-20
|
"A REALLY INTELLIGENT INTERVIEWER." -- Lance Henriksen
"QUITE SIMPLY, THE BEST HORROR-THEMED BLOG ON THE NET." -- Joe Maddrey, Nightmares in Red White & Blue
**Find The Vault of Horror on Facebook and Twitter, or download the new mobile app!**
**Check out my other blogs, Standard of the Day, Proof of a Benevolent God and Lots of Pulp!**
Friday, July 3, 2009
Universal Monster Sex! Yes, Naughty Ghouls Need Love Too...
This slice of fried gold came my way via Fangoria Magazine. Apparently, it is a real commercial for Trojan condoms that was cooked up by the obviously brilliant Ronni "Raygun" Thomas (creator of the 2006 horror short Dawn of the Flies). According to the story, the Trojan company was less than pleased with the finished product, since it had originally been envisioned featuring five brain-dead jocks. Wow, a condom ad filled with a bunch of bros--how original!
Anyway, Thomas subsequently lost the account as a result of this brilliant work, and so it most likely will not see the light of day as an actual commercial. So much for boardroom taste. And so, it's our duty to spread it around like the viral sensation it should be. Enjoy!
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:25:33.000Z
|
mrrcq3t3zunx6jbhwuq6vmziakkndt45
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27893",
"uncompressed_offset": 294837210,
"url": "www.abs.gov.au/AUSSTATS/abs%40.nsf/second%2Blevel%2Bview?issue=Mar+2010&prodno=6416.0&prodno=6416.0&tabname=Past+Future+Issues&viewtitle=House+Price+Indexes%3A+Eight+Capital+Cities~Mar+2010~Previous~03%2F05%2F2010",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://www.abs.gov.au/AUSSTATS/abs@.nsf/second+level+view?ReadForm&prodno=6416.0&viewtitle=House%20Price%20Indexes:%20Eight%20Capital%20Cities~Mar%202010~Previous~03/05/2010&tabname=Past%20Future%20Issues&prodno=6416.0&issue=Mar%202010&num=&view="
}
|
cccc_CC-MAIN-2013-20
|
Australian Bureau of Statistics
Celebrating the International Year of Statistics 2013
ABS Home > Statistics > By Release Date
6416.0 - House Price Indexes: Eight Capital Cities, Mar 2010
Previous ISSUE Released at 11:30 AM (CANBERRA TIME) 05/03/2010
Future Releases
• Next Issue: Jun 2013 expected for release on 06/08/2013
Past Releases
© Commonwealth of Australia 2013
Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:25:52.000Z
|
hbdbdjuosvzaqtad3l23dyk6kpeb3jyk
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27898",
"uncompressed_offset": 343464603,
"url": "www.bizsugar.com/user/profile/claymclaughl718",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://www.bizsugar.com/user/profile/claymclaughl718"
}
|
cccc_CC-MAIN-2013-20
|
Personal Information
Username: claymclaughl718
Blog URL: http://claymclaughl718.insanejournal.com/497.html
Interests: Learn more about krill oil benefits by going to my site. http://claymclaughl718.newsvine.com/_news/2012/05/05/11549644-the-benefits-of-krill-oil what is krill oil http://claymclaughl718.bravejournal.com/entry/91585 krill oil benefits http://claymclaughl718.insanejournal.com/497.html krill oil benefits
User Stats
Joined: 2012-05-05
Submitted Stories: 0
Published Stories: 0
Comments: 0
Votes: 0
Published Votes: 0
Karma Score: 10.00
Friends
Oh no! You don't have any Friends yet. Please add some.
Subscribe
Allison Semancik Helps Ideas Sprout @AllieMiami
After years of working to cultivate other people's small business gardens, Allison Semancik decided to plant some seeds … More
Editor's Picks
See if you're one of our Top 10 Members this week!
Got small business blog posts? Register and submit them today!
Shazam! Meet Contributor of the Week Paul Cox...Congrats, Paul!
Add BizSugar buttons and plugins to your small biz toolkit!
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:15:05.000Z
|
mb7id5px5xdbm6oxcaosrlzjkh7ggnl4
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27902",
"uncompressed_offset": 368098824,
"url": "www.ccsenet.org/journal/index.php/ass/article/view/19317",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://www.ccsenet.org/journal/index.php/ass/article/view/19317"
}
|
cccc_CC-MAIN-2013-20
|
Ethnic Identity and Career Aspiration of the Taiwanese Indigenous Students in the Era of Globalization
Shan-Hua Chen, Cheng-Cheng Yang, Hsuan-Fu Ho, Li-Ping Wang
Abstract
This study is endeavored to explore the ethnic identity perceived by elite indigenous students studying at senior high schools, to examine their career aspiration, and to investigate their involvement in traditional cultural activities. The connotations of ethnic identity, four identity statuses theory, model of ethnic identity development and ethnic minority identity were reviewed. The results provided data for analyzing how certain activities may affect the ethnic identification process. Future research might replicate the methodology of this study with a specific focus on different types of high school.
Full Text: PDF DOI: 10.5539/ass.v8n10p23
This work is licensed under a Creative Commons Attribution 3.0 License.
Asian Social Science ISSN 1911-2017 (Print) ISSN 1911-2025 (Online)
Copyright © Canadian Center of Science and Education
To make sure that you can receive messages from us, please add the 'ccsenet.org' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:12:53.000Z
|
mxn2alydi5kdzeqc4v2vdeiuuilgh4ok
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27904",
"uncompressed_offset": 383148723,
"url": "www.comics.org/series/30819/",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://www.comics.org/series/30819/"
}
|
cccc_CC-MAIN-2013-20
|
Avalon Communications, 1998? Series
Published in English (Canada)
Publication Dates:
1998? - 1998
Number of Issues Published:
3 (#1 - #3)
Format:
Standard Modern Age US Size; Colour cover; Black and white interior pages; Saddle-stitched
Series Details:
Publisher's Brands:
Indicia Publishers:
Notes
Dates based on copyright dates found in #s 2 and 3.
Editing
Index Status
Indexed Partially Indexed Pending Approval Reserved Skeleton Data Only
1 2 3
Cover Status
Scan available Needs Replacement No Scan available
1 2 3
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:26:38.000Z
|
3svxwsz2r7pgztzqxvomgnzwwydrdpvw
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27908",
"uncompressed_offset": 422722287,
"url": "www.eea.europa.eu/de/articles/aus-urbanen-herausforderungen-chancen-machen/soer/europe/urban-environment",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://www.eea.europa.eu/de/articles/aus-urbanen-herausforderungen-chancen-machen/soer/europe/urban-environment"
}
|
cccc_CC-MAIN-2013-20
|
Benutzerspezifische Werkzeuge
Nächste
Vorherige
Objekte
Weiter zum Inhalt | Springe zur Navigation
Sound and independent information
on the environment
Sie sind hier: Startseite / The European environment – state and outlook 2010 / Thematic assessments / Urban environment - SOER 2010 thematic assessment
Urban environment - SOER 2010 thematic assessment
State of the environment report No 1/2010
The global population is congregating in our cities. Eighty per cent of the world’s estimated nine billion people in 2050 are expected to live in urban areas. Our cities and urban areas face many challenges from social to health to environmental. The impacts of cities and urban areas are felt in other regions which supply cities with food, water and energy and absorb pollution and waste. However, the proximity of people, businesses and services associated with the very word ‘city’ means that there are also huge opportunities. Indeed, well designed, well managed urban settings offer a key opportunity for sustainable living.
Veröffentlicht von
• EEA (European Environment Agency)
• Veröffentlicht: 28.11.2010
Inhalt
Summary:
Urban areas and quality of life
For the three-quarters of Europe’s population that lives in cities and towns, a good urban environment is a precondition for a good quality of life. It seems, in part, that over the last decade, attitudes to living in cities have been changing. People are no longer moving away from cities (or have returned to them), residential sprawl has slowed and, in a third of cities, the population is concentrating in city centres.
As the major function of cities is to provide places for people to trade, produce, communicate and live, the urban environment needs to be assessed from a very specific human perspective: to provide an agreeable place to live while minimising or balancing negative side effects.
Quality of life in cities relies on a range of components such as social equity, income and welfare, housing, a healthy environment, social relations and education. The environmental elements of good quality of life include good air quality, low noise levels, clean and sufficient water, good urban design with sufficient and high-quality public and green spaces, an agreeable local climate or opportunities to adapt, and social equity. However, urban-specific data are patchy in Europe and, due to different timescales and reporting methods, are seldom directly comparable.
Urban challenges
Many of our cities struggle to cope with social, economic and environmental problems resulting from pressures such as overcrowding or decline, social inequity, pollution and traffic. The environmental impacts of cities also spread well beyond their physical limits as they rely heavily on outside regions to meet demand for energy and resources and to accommodate waste. A study of Greater London estimates that London has a footprint 300 times its geographical area — corresponding to nearly twice the size of the entire UK.
Climate change
Climate change has the potential to influence almost all components of the urban environment and to raise new, complex challenges for the quality of urban life, health and urban biodiversity. Some cities will experience droughts and higher temperatures. Others will experience floods. Climate change will affect many aspects of urban living from air quality to consumption patterns (e.g. energy for air conditioning).
Poor urban design can aggravate the impacts of climate change. Soil sealing, for example, can increase the ‘urban heat island effect’. It may also increase water run-off and lack of drainage during heavy rains leading to floods. However, urban design aimed at tackling climate change could have numerous co-benefits from improved air quality, supporting biodiversity and quality of life.
Urban opportunities
The proximity of people, businesses and services associated with the very word ‘city’ means there are also huge opportunities and benefits associated with urban living especially in terms of sustainability and resource use. Already, population density in cities means shorter journeys to work and services, greater use of walking, cycling or public transport, and living in apartments of multi-family houses or blocks requiring less heating and less ground space per person. As a result, urban dwellers on average consume less energy and land for living per capita than rural residents.
Designing the future
Cities are ecosystems: they are open and dynamic systems which consume, transform and release materials and energy; they develop and adapt; and they interact with humans and with other ecosystems. They must therefore be managed and protected like any other type of ecosystem.
Through rethinking urban design, architecture transport and planning, we can turn our cities and urban landscapes into ‘urban ecosystems’ at the forefront of climate change mitigation (e.g. sustainable transport, clean energy and low consumption) and adaptation (e.g. floating houses, vertical gardens). Furthermore, better urban planning will improve quality of life across the board by designing quiet, safe, clean and green urban space. It create also new employment opportunities by enhancing the market for new technologies and green architecture.
Cities, due to their concentration of people and activities, matter for Europe. Also, the problems of cities cannot be solved at the local level alone. Better policy integration and new governance, involving closer partnership and co-ordination at local, national and European level, are required.
Verwandter Inhalt
Verwendete Zahlen
Meldungen zu dieser Veröffentlichung
Kommentare zu Übersetzungen
Bitte helfen Sie uns, die Qualität der Übersetzungen zu erhöhen.
Europäische Umweltagentur (EUA)
Kongens Nytorv 6
1050 Copenhagen K
Denmark
Telefon: +45 3336 7100
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:12:13.000Z
|
rnd3fveweu6ozcr2sk75mebar6gx6kpw
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27910",
"uncompressed_offset": 427560866,
"url": "www.envirolink.org/topics.html?catid=3&do=catsearch&topic=Veganism&topicsku=2002121142001&topictype=subtopic",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://www.envirolink.org/topics.html?topic=Veganism&topicsku=2002121142001&topictype=subtopic&do=catsearch&catid=3"
}
|
cccc_CC-MAIN-2013-20
|
advanced search
Veganism - General Information
Actions You Can Take (0)
Articles (0)
Educational Resources (0)
E-Mail Lists (14)
Events (0)
General Info (5)
Government Resources (0)
Organizations (11)
Jobs & Volunteer Opportunities (0)
Publications (1)
Displaying 1 - 5 of 5 resources in Veganism and General Information:
1. Dharma Central
Madison, WI, USA
Dharma Central is a site dedicated to the cultural and spiritual traditions of India. ...
Category: General Information
2. Roots Of Compassion
Münster, Münster, Germany
There are already plenty of websites promoting the vegan lifestyle, but we wanted to combine this with human and animal rights and social change. All ...
Category: General Information
3. The Vegetarian/Vegan Society of Queensland
Waterford West, Australia
We aim to encourage vegetarianism as a humane and responsible lifestyle. This site is a guide to vegetarian and vegan recipes, cooking, diet advice, discussion, dining ...
Category: General Information
4. Veganfood Recipe Site
Veganfood has been running for well over a year now, and is packed with a huge number of vegan recipes, a user/comment system, as well ...
Category: General Information
5. Veggies Unite!
Fort Wayne, IN, USA
Your online vegetarian resource guide. Site include recipe exchange, chat, links, more info. ...
Category: General Information
Home | Site Map | About EnviroLink | Advanced Search | Suggest a Resource
All content on this website is governed by a Creative Commons license.
This site powered by WebDNA
Community Information Systems provided by Rhiza Labs
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:35:44.000Z
|
2djt7ea2zlsntfru6fkxjmdg7focs2e3
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27911",
"uncompressed_offset": 427755699,
"url": "www.eoearth.org/article/Atlantic_period?topic=49487",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://www.eoearth.org/article/Atlantic_period?topic=49487"
}
|
cccc_CC-MAIN-2013-20
|
Rate This Article
Average: 3/5
Atlantic period
Environmental History:
Atlantic period
European Middle Neolithic, a flourishing of culture c.4000 BC. Source: Creative Commons
This article has been reviewed by the following Topic Editor: C Michael Hogan
The Atlantic period is a post-Last Glacial Maximum (LGM) European climate regime. This refers to the period from about 6,000-3,000 BC that spans most of the warmest postglacial times. It is also known as the Postglacial Climatic Optimum.
This article is written at a definitional level only. Authors wishing to expand this entry are inivited to expand the present treatment, which additions will be peer reviewed prior to publication of any expansion.
It was preceded by the Boreal period and followed by the Sub-Boreal period.
The Atlantic period is also part of the current geological epoch known as Holocene which began about 11,700 years ago (~9700BC) and continues up to the present.
Divisions of the Holocene
The principal divisions of the Holocene are:
Further Reading
• Jonas Christensen (2004). Warfare in the European Neolithic. Acta Archaeologica 75 (142,144, 136): 129.
• Grahame Clark and Stuart Piggott (1967). Prehistoric Societies. New York: Alfred A. Knopf. ISBN 0140211497.
• Hilda Ellis Davidson (1998). Roles of the Northern Goddess. Routledge. ISBN 0415136105.
• Robert W.Ehrich, Editor (1965). Chronologies in Old World Archaeology. Chicago and London: The University of Chicago Press. ISBN 0226194450.
• Marija Gimbutas (1982). The Goddesses and Gods of Old Europe 6500–3500 BC: Myths and Cult Images. Berkeley, Los Angeles: University of California Press. p. 27. ISBN 0520046552.
• Jacquetta Hawkes (1965). Prehistory. New York: the New American Library (a Mentor Book).
• Frank Hibben (1958). Prehistoric Man in Europe. Norman, Oklahoma: University of Oklahoma Press.
• E.O.James (1994). The Cult of the Mother-Goddess. New York: Barnes & Noble. ISBN 1-56619-600-0
• Robert Kertész (2002). Mesolithic Hunter-Gatherers in the Northwestern Part of the Great Hungarian Plain. Praehistoria 3.
• J.P.Mallory (1997). Linear Band Ware Culture. Encyclopedia of Indo-European Culture.
• Fitzroy Dearborn and Arkadiusz Marciniak (2005). Placing Animals in the Neolithic: Social Zooarchaeology of Prehistoric Farming Communities. Routledge Cavendish. ISBN 1844720926.
• Physical Oceanography Index
• H. H. Lamb. Climatic History and the Future. Princeton Univ. Press, 1985. p. 372.
Citation
Steve Baum, Peter Saundry (Contributing Author);C Michael Hogan (Topic Editor) "Atlantic period". In: Encyclopedia of Earth. Eds. Cutler J. Cleveland (Washington, D.C.: Environmental Information Coalition, National Council for Science and the Environment). [First published in the Encyclopedia of Earth March 29, 2010; Last revised Date May 31, 2012; Retrieved May 18, 2013 <http://www.eoearth.org/article/Atlantic_period?topic=49487>
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:04:35.000Z
|
qqapnh6n4lt5iiutuokhpgq7t33rk4yk
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27912",
"uncompressed_offset": 427767830,
"url": "www.eoearth.org/article/Scott",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://www.eoearth.org/article/Scott's_Last_Expedition:_To_Midwinter_Day"
}
|
cccc_CC-MAIN-2013-20
|
Rate This Article
Average: 0/5
Scott's Last Expedition: To Midwinter Day
Scott's Last Expedition: To Midwinter Day
This article has been reviewed by the following Topic Editor: Peter Saundry
Return to Table of Contents of Scott's Last Expedition (e-book)
CHAPTER XI
To Midwinter Day
Thursday, June 1. -- The wind blew hard all night, gusts arising to 72 m.p.h.; the anemometer choked five times -- temperature +9°. It is still blowing this morning. Incidentally we have found that these heavy winds react very conveniently on our ventilating system. A fire is always a good ventilator, ensuring the circulation of inside air and the indraught of fresh air; its defect as a ventilator lies in the low level at which it extracts inside air. Our ventilating system utilises the normal fire draught, but also by suitable holes in the funnelling causes the same draught to extract foul air at higher levels. I think this is the first time such a system has been used. It is a bold step to make holes in the funnelling as obviously any uncertainty of draught might fill the hut with smoke. Since this does not happen with us it follows that there is always strong suction through our stovepipes, and this is achieved by their exceptionally large dimensions and by the length of the outer chimney pipe.
With wind this draught is greatly increased and with high winds the draught would be too great for the stoves if it were not for the relief of the ventilating holes.
In these circumstances, therefore, the rate of extraction of air automatically rises, and since high wind is usually accompanied with marked rise of temperature, the rise occurs at the most convenient season, when the interior of the hut would otherwise tend to become oppressively warm. The practical result of the system is that in spite of the numbers of people living in the hut, the cooking, and the smoking, the inside air is nearly always warm, sweet, and fresh.
There is usually a drawback to the best of arrangements, and I have said 'nearly' always. The exceptions in this connection occur when the outside air is calm and warm and the galley fire, as in the early morning, needs to be worked up; it is necessary under these conditions to temporarily close the ventilating holes, and if at this time the cook is intent on preparing our breakfast with a frying-pan we are quickly made aware of his intentions. A combination of this sort is rare and lasts only for a very short time, for directly the fire is aglow the ventilator can be opened again and the relief is almost instantaneous.
This very satisfactory condition of inside air must be a highly important factor in the preservation of health.
I have to-day regularised the pony 'nicknames'; I must leave it to Drake to pull out the relation to the 'proper' names according to our school contracts![1] Note 18
The nicknames are as follows:
James Pigg
Bones
Michael
Snatcher
Jehu
China
Christopher
Victor
Snippets (windsucker)
Nobby
Keohane
Crean
Clissold
Evans (P.O.)
Hooper
Bowers
Lashly
Friday, June 2. -- The wind still high. The drift ceased at an early hour yesterday; it is difficult to account for the fact. At night the sky cleared; then and this morning we had a fair display of aurora streamers to the N. and a faint arch east. Curiously enough the temperature still remains high, about +7°.
The meteorological conditions are very puzzling.
Saturday, June 3. -- The wind dropped last night, but at 4 A.M. suddenly sprang up from a dead calm to 30 miles an hour. Almost instantaneously, certainly within the space of one minute, there was a temperature rise of nine degrees. It is the most extraordinary and interesting example of a rise of temperature with a southerly wind that I can remember. It is certainly difficult to account for unless we imagine that during the calm the surface layer of cold air is extremely thin and that there is a steep inverted gradient. When the wind arose the sky overhead was clearer than I ever remember to have seen it, the constellations brilliant, and the Milky Way like a bright auroral streamer.
The wind has continued all day, making it unpleasant out of doors. I went for a walk over the land; it was dark, the rock very black, very little snow lying; old footprints in the soft, sandy soil were filled with snow, showing quite white on a black ground. Have been digging away at food statistics.
Simpson has just given us a discourse, in the ordinary lecture series, on his instruments. Having already described these instruments, there is little to comment upon; he is excellently lucid in his explanations.
As an analogy to the attempt to make a scientific observation when the condition under consideration is affected by the means employed, he rather quaintly cited the impossibility of discovering the length of trousers by bending over to see!
The following are the instruments described:
Features
The outside (bimetallic) thermograph.
The inside thermograph (alcohol)
Alcohol in spiral, small lead pipe -- float vessel.
The electrically recording anemometer
Cam device with contact on wheel; slowing arrangement, inertia of wheel.
The Dynes anemometer
Parabola on immersed float.
The recording wind vane
Metallic pen.
The magnetometer
Horizontal force measured in two directions -- vertical force in one -- timing arrangement.
The high and low potential apparatus of the balloon thermograph
Spotting arrangement and difference, see ante.
Simpson is admirable as a worker, admirable as a scientist, and admirable as a lecturer.
Sunday, June 4. -- A calm and beautiful day. The account of this, a typical Sunday, would run as follows: Breakfast. A half-hour or so selecting hymns and preparing for Service whilst the hut is being cleared up. The Service: a hymn; Morning prayer to the Psalms; another hymn; prayers from Communion Service and Litany; a final hymn and our special prayer. Wilson strikes the note on which the hymn is to start and I try to hit it after with doubtful success! After church the men go out with their ponies.
To-day Wilson, Bowers, Cherry-Garrard, Lashly, and I went to start the building of our first 'igloo.' There is a good deal of difference of opinion as to the best implement with which to cut snow blocks. Cherry-Garrard had a knife which I designed and Lashly made, Wilson a saw, and Bowers a large trowel. I'm inclined to think the knife will prove most effective, but the others don't acknowledge it yet. As far as one can see at present this knife should have a longer handle and much coarser teeth in the saw edge -- perhaps also the blade should be thinner.
We must go on with this hut building till we get good at it. I'm sure it's going to be a useful art.
We only did three courses of blocks when tea-time arrived, and light was not good enough to proceed after tea.
Sunday afternoon for the men means a 'stretch of the land.'
I went over the floe on ski. The best possible surface after the late winds as far as Inaccessible Island. Here, and doubtless in most places along the shore, this, the first week of June, may be noted as the date by which the wet, sticky salt crystals become covered and the surface possible for wood runners. Beyond the island the snow is still very thin, barely covering the ice flowers, and the surface is still bad.
There has been quite a small landslide on the S. side of the Island; seven or eight blocks of rock, one or two tons in weight, have dropped on to the floe, an interesting instance of the possibility of transport by sea ice.
Ponting has been out to the bergs photographing by flashlight. As I passed south of the Island with its whole mass between myself and the photographer I saw the flashes of magnesium light, having all the appearance of lightning. The light illuminated the sky and apparently objects at a great distance from the camera. It is evident that there may be very great possibilities in the use of this light for signalling purposes and I propose to have some experiments.
N.B. -- Magnesium flashlight as signalling apparatus in the summer.
Another crab-eater seal was secured to-day; he had come up by the bergs.
Monday, June 5. -- The wind has been S. all day, sky overcast and air misty with snow crystals. The temperature has gone steadily up and to-night rose to + 16°. Everything seems to threaten a blizzard which cometh not. But what is to be made of this extraordinary high temperature heaven only knows. Went for a walk over the rocks and found it very warm and muggy.
Taylor gave us a paper on the Beardmore Glacier. He has taken pains to work up available information; on the ice side he showed the very gradual gradient as compared with the Ferrar. If crevasses are as plentiful as reported, the motion of glacier must be very considerable. There seem to be three badly crevassed parts where the glacier is constricted and the fall is heavier.
Geologically he explained the rocks found and the problems unsolved. The basement rocks, as to the north, appear to be reddish and grey granites and altered slate (possibly bearing fossils). The Cloudmaker appears to be diorite; Mt. Buckley sedimentary. The suggested formation is of several layers of coal with sandstone above and below; interesting to find if it is so and investigate coal. Wood fossil conifer appears to have come from this -- better to get leaves -- wrap fossils up for protection.
Mt. Dawson described as pinkish limestone, with a wedge of dark rock; this very doubtful! Limestone is of great interest owing to chance of finding Cambrian fossils (Archeocyathus).
He mentioned the interest of finding here, as in Dry Valley, volcanic cones of recent date (later than the recession of the ice). As points to be looked to in Geology and Physiography:
1. Hope Island shape.
2. Character of wall facets.
3. Type of tributary glacierscliff or curtain, broken.
4. Do tributaries enter 'at grade'?
5. Lateral gullies pinnacled, &c., shape and size of slope.
6. Do tributaries cut out gullies -- empty unoccupied cirques, hangers, &c.
7. Do upland moraines show tesselation?
8. Arrangement of strata, inclusion of.
9. Types of moraines, distance of blocks.
10. Weathering of glaciers. Types of surface. (Thrust mark? Rippled, snow stool, glass house, coral reef, honeycomb, ploughshare, bastions, piecrust.)
11. Amount of water silt bands, stratified, or irregular folded or broken.
12. Cross section, of valleys 35° slopes?
13. Weather slopes debris covered, height to which.
14. Nunataks, height of rounded, height of any angle in profile, erratics.
15. Evidence of order in glacier delta.
Debenham in discussion mentioned usefulness of small chips of rock -- many chips from several places are more valuable than few larger specimens.
We had an interesting little discussion.
I must enter a protest against the use made of the word 'glaciated' by Geologists and Physiographers.
To them a 'glaciated land' is one which appears to have been shaped by former ice action.
The meaning I attach to the phrase, and one which I believe is more commonly current, is that it describes a land at present wholly or partly covered with ice and snow.
I hold the latter is the obvious meaning and the former results from a piracy committed in very recent times.
The alternative terms descriptive of the different meanings are ice covered and ice eroded.
To-day I have been helping the Soldier to design pony rugs; the great thing, I think, is to get something which will completely cover the hindquarters.
Tuesday, June 6. -- The temperature has been as high as +19° to-day; the south wind persisted until the evening with clear sky except for fine effects of torn cloud round about the mountain. To-night the moon has emerged from behind the mountain and sails across the cloudless northern sky; the wind has fallen and the scene is glorious.
It is my birthday, a fact I might easily have forgotten, but my kind people did not. At lunch an immense birthday cake made its appearance and we were photographed assembled about it. Clissold had decorated its sugared top with various devices in chocolate and crystallised fruit, flags and photographs of myself.
After my walk I discovered that great preparations were in progress for a special dinner, and when the hour for that meal arrived we sat down to a sumptuous spread with our sledge banners hung about us. Clissold's especially excellent seal soup, roast mutton and red currant jelly, fruit salad, asparagus and chocolate -- such was our menu. For drink we had cider cup, a mystery not yet fathomed, some sherry and a liqueur.
After this luxurious meal everyone was very festive and amiably argumentative. As I write there is a group in the dark room discussing political progress with discussions -- another at one corner of the dinner table airing its views on the origin of matter and the probability of its ultimate discovery, and yet another debating military problems. The scraps that reach me from the various groups sometimes piece together in ludicrous fashion. Perhaps these arguments are practically unprofitable, but they give a great deal of pleasure to the participants. It's delightful to hear the ring of triumph in some voice when the owner imagines he has delivered himself of a well-rounded period or a clinching statement concerning the point under discussion. They are boys, all of them, but such excellent good-natured ones; there has been no sign of sharpness or anger, no jarring note, in all these wordy contests! all end with a laugh.
Nelson has offered Taylor a pair of socks to teach him some geology! This lulls me to sleep!
Wednesday, June 7. -- A very beautiful day. In the afternoon went well out over the floe to the south, looking up Nelson at his icehole and picking up Bowers at his thermometer. The surface was polished and beautifully smooth for ski, the scene brightly illuminated with moonlight, the air still and crisp, and the thermometer at -10°. Perfect conditions for a winter walk.
In the evening I read a paper on 'The Ice Barrier and Inland Ice.' I have strung together a good many new points and the interest taken in the discussion was very genuine -- so keen, in fact, that we did not break up till close on midnight. I am keeping this paper, which makes a very good basis for all future work on these subjects. (See Vol. II.)
Shelters to Iceholes
Time out of number one is coming across rediscoveries. Of such a nature is the building of shelters for iceholes. We knew a good deal about it in the Discovery, but unfortunately did not make notes of our experiences. I sketched the above figures for Nelson, and found on going to the hole that the drift accorded with my sketch. The sketches explain themselves. I think wall 'b' should be higher than wall 'a.'
My night on duty. The silent hours passed rapidly and comfortably. To bed 7 A.M.
Thursday, June 8. -- Did not turn out till 1 P.M., then with a bad head, an inevitable sequel to a night of vigil. Walked out to and around the bergs, bright moonlight, but clouds rapidly spreading up from south.
Tried the snow knife, which is developing. Debenham and Gran went off to Hut Point this morning; they should return to-morrow.
Friday, June 9. -- No wind came with the clouds of yesterday, but the sky has not been clear since they spread over it except for about two hours in the middle of the night when the moonlight was so bright that one might have imagined the day returned.
Otherwise the web of stratus which hangs over us thickens and thins, rises and falls with very bewildering uncertainty. We want theories for these mysterious weather conditions; meanwhile it is annoying to lose the advantages of the moonlight.
This morning had some discussion with Nelson and Wright regarding the action of sea water in melting barrier and sea ice. The discussion was useful to me in drawing attention to the equilibrium of layers of sea water.
In the afternoon I went round the Razor Back Islands on ski, a run of 5 or 6 miles; the surface was good but in places still irregular with the pressures formed when the ice was 'young.'
The snow is astonishingly soft on the south side of both islands. It is clear that in the heaviest blizzard one could escape the wind altogether by camping to windward of the larger island. One sees more and more clearly what shelter is afForded on the weather side of steep-sided objects.
Passed three seals asleep on the ice. Two others were killed near the bergs.
Saturday, June 10. -- The impending blizzard has come; the wind came with a burst at 9.30 this morning.
Simpson spent the night turning over a theory to account for the phenomenon, and delivered himself of it this morning. It seems a good basis for the reference of future observations. He imagines the atmosphere A C in potential equilibrium with large margin of stability, i.e. the difference of temperature between A and C being much less than the adiabatic gradient.
In this condition there is a tendency to cool by radiation until some critical layer, B, reaches its due point. A stratus cloud is thus formed at B; from this moment A B continues to cool, but B C is protected from radiating, whilst heated by radiation from snow and possibly by release of latent heat due to cloud formation.
The condition now rapidly approaches unstable equilibrium, B C tending to rise, A B to descend.
Owing to lack of sun heat the effect will be more rapid in south than north and therefore the upset will commence first in the south. After the first start the upset will rapidly spread north, bringing the blizzard. The facts supporting the theory are the actual formation of a stratus cloud before a blizzard, the snow and warm temperature of the blizzard and its gusty nature.
It is a pretty starting-point, but, of course, there are weak spots.
Atkinson has found a trypanosome in the fish -- it has been stained, photographed and drawn -- an interesting discovery having regard to the few species that have been found. A trypanosome is the cause of 'sleeping sickness.'
The blizzard has continued all day with a good deal of drift. I went for a walk, but the conditions were not inviting.
We have begun to consider details of next season's travelling equipment. The crampons, repair of finnesko with sealskin, and an idea for a double tent have been discussed to-day. P.O. Evans and Lashly are delightfully intelligent in carrying out instructions.
Sunday, June 11. -- A fine clear morning, the moon now revolving well aloft and with full face.
For exercise a run on ski to the South Bay in the morning and a dash up the Ramp before dinner. Wind and drift arose in the middle of the day, but it is now nearly calm again.
At our morning service Cherry-Garrard, good fellow, vamped the accompaniment of two hymns; he received encouraging thanks and will cope with all three hymns next Sunday.
Day by day news grows scant in this midwinter season; all events seem to compress into a small record, yet a little reflection shows that this is not the case. For instance I have had at least three important discussions on weather and ice conditions to-day, concerning which many notes might be made, and quite a number of small arrangements have been made.
If a diary can be so inadequate here how difficult must be the task of making a faithful record of a day's events in ordinary civilised life! I think this is why I have found it so difficult to keep a diary at home.
Monday, June 12. -- The weather is not kind to us. There has not been much wind to-day, but the moon has been hid behind stratus cloud. One feels horribly cheated in losing the pleasure of its light. I scarcely know what the Crozier party can do if they don't get better luck next month.
Debenham and Gran have not yet returned; this is their fifth day of absence.
Bowers and Cherry-Garrard went to Cape Royds this afternoon to stay the night. Taylor and Wright walked there and back after breakfast this morning. They returned shortly after lunch.
Went for a short spin on ski this morning and again this afternoon. This evening Evans has given us a lecture on surveying. He was shy and slow, but very painstaking, taking a deal of trouble in preparing pictures, &c.
I took the opportunity to note hurriedly the few points to which I want attention especially directed. No doubt others will occur to me presently. I think I now understand very well how and why the old surveyors (like Belcher) failed in the early Arctic work.
1. Every officer who takes part in the Southern Journey ought to have in his memory the approximate variation of the compass at various stages of the journey and to know how to apply it to obtain a true course from the compass. The variation changes very slowly so that no great effort of memory is required.
2. He ought to know what the true course is to reach one depôt from another.
3. He should be able to take an observation with the theodolite.
4. He should be able to work out a meridian altitude observation.
5. He could advantageously add to his knowledge the ability to work out a longitude observation or an ex-meridian altitude.
6. He should know how to read the sledgemeter.
7. He should note and remember the error of the watch he carries and the rate which is ascertained for it from time to time.
8. He should assist the surveyor by noting the coincidences of objects, the opening out of valleys, the observation of new peaks, &c.Note 19
Tuesday, June 13. -- A very beautiful day. We revelled in the calm clear moonlight; the temperature has fallen to -26°. The surface of the floe perfect for ski -- had a run to South Bay in forenoon and was away on a long circuit around Inaccessible Island in the afternoon. In such weather the cold splendour of the scene is beyond description; everything is satisfying, from the deep purple of the starry sky to the gleaming bergs and the sparkle of the crystals under foot.
Some very brilliant patches of aurora over the southern shoulder of the mountain. Observed an exceedingly bright meteor shoot across the sky to the northward.
On my return found Debenham and Gran back from Cape Armitage. They had intended to start back on Sunday, but were prevented by bad weather; they seemed to have had stronger winds than we.
On arrival at the hut they found poor little 'Mukaka' coiled up outside the door, looking pitifully thin and weak, but with enough energy to bark at them.
This dog was run over and dragged for a long way under the sledge runners whilst we were landing stores in January (the 7th). He has never been worth much since, but remained lively in spite of all the hardships of sledging work. At Hut Point he looked a miserable object, as the hair refused to grow on his hindquarters. It seemed as though he could scarcely continue in such a condition, and when the party came back to Cape Evans he was allowed to run free alongside the sledge.
On the arrival of the party I especially asked after the little animal and was told by Demetri that he had returned, but later it transpired that this was a mistake -- that he had been missed on the journey and had not turned up again later as was supposed.
I learned this fact only a few days ago and had quite given up the hope of ever seeing the poor little beast again. It is extraordinary to realise that this poor, lame, half-clad animal has lived for a whole month by himself. He had blood on his mouth when found, implying the capture of a seal, but how he managed to kill it and then get through its skin is beyond comprehension. Hunger drives hard.
Wednesday, June 14. -- Storms are giving us little rest. We found a thin stratus over the sky this morning, foreboding ill. The wind came, as usual with a rush, just after lunch. At first there was much drift -- now the drift has gone but the gusts run up to 65 m.p.h.
Had a comfortless stroll around the hut; how rapidly things change when one thinks of the delights of yesterday! Paid a visit to Wright's ice cave; the pendulum is installed and will soon be ready for observation. Wright anticipates the possibility of difficulty with ice crystals on the agate planes.
He tells me that he has seen some remarkably interesting examples of the growth of ice crystals on the walls of the cave and has observed the same unaccountable confusion of the size of grains in the ice, showing how little history can be gathered from the structure of ice.
This evening Nelson gave us his second biological lecture, starting with a brief reference to the scientific classification of the organism into Kingdom, Phylum, Group, Class, Order, Genus, Species; he stated the justification of a biologist in such an expedition, as being 'To determine the condition under which organic substances exist in the sea.'
He proceeded to draw divisions between the bottom organisms without power of motion, benthon, the nekton motile life in mid-water, and the plankton or floating life. Then he led very prettily on to the importance of the tiny vegetable organisms as the basis of all life.
In the killer whale may be found a seal, in the seal a fish, in the fish a smaller fish, in the smaller fish a copepod, and in the copepod a diatom. If this be regular feeding throughout, the diatom or vegetable is essentially the base of all.
Light is the essential of vegetable growth or metabolism, and light quickly vanishes in depth of water, so that all ocean life must ultimately depend on the phyto-plankton. To discover the conditions of this life is therefore to go to the root of matters.
At this point came an interlude -- descriptive of the various biological implements in use in the ship and on shore. The otter trawl, the Agassiz trawl, the 'D' net, and the ordinary dredger.
A word or two on the using of 'D' nets and then explanation of sieves for classifying the bottom, its nature causing variation in the organisms living on it.
From this he took us amongst the tow-nets with their beautiful silk fabrics, meshes running 180 to the inch and materials costing 2 guineas the yard -- to the German tow-nets for quantitative measurements, the object of the latter and its doubtful accuracy, young fish trawls.
From this to the chemical composition of sea water, the total salt about 3.5 per cent, but variable: the proportions of the various salts do not appear to differ, thus the chlorine test detects the salinity quantitatively. Physically plankton life must depend on this salinity and also on temperature, pressure, light, and movement.
(If plankton only inhabits surface waters, then density, temperatures, &c., of surface waters must be the important factors. Why should biologists strive for deeper layers? Why should not deep sea life be maintained by dead vegetable matter?)
Here again the lecturer branched off into descriptions of water bottles, deep sea thermometers, and current-meters, the which I think have already received some notice in this diary. To what depth light may extend is the difficult problem and we had some speculation, especially in the debate on this question. Simpson suggested that laboratory experiment should easily determine. Atkinson suggested growth of bacteria on a scratched plate. The idea seems to be that vegetable life cannot exist without red rays, which probably do not extend beyond 7 feet or so. Against this is an extraordinary recovery of Holosphera Firidis by German expedition from 2000 fathoms; this seems to have been confirmed. Bowers caused much amusement by demanding to know 'If the pycnogs (pycnogonids) were more nearly related to the arachnids (spiders) or crustaceans.' As a matter of fact a very sensible question, but it caused amusement because of its sudden display of long names. Nelson is an exceedingly capable lecturer; he makes his subject very clear and is never too technical.
Thursday, June 15. -- Keen cold wind overcast sky till 5.30 P.M. Spent an idle day.
Jimmy Pigg had an attack of colic in the stable this afternoon. He was taken out and doctored on the floe, which seemed to improve matters, but on return to the stable he was off his feed.
This evening the Soldier tells me he has eaten his food, so I hope all be well again.
Friday, June 16. -- Overcast again -- little wind but also little moonlight. Jimmy Pigg quite recovered.
Went round the bergs in the afternoon. A great deal of ice has fallen from the irregular ones, showing that a great deal of weathering of bergs goes on during the winter and hence that the life of a berg is very limited, even if it remains in the high latitudes.
To-night Debenham lectured on volcanoes. His matter is very good, but his voice a little monotonous, so that there were signs of slumber in the audience, but all woke up for a warm and amusing discussion succeeding the lecture.
The lecturer first showed a world chart showing distribution of volcanoes, showing general tendency of eruptive explosions to occur in lines. After following these lines in other parts of the world he showed difficulty of finding symmetrical linear distribution near McMurdo Sound. He pointed out incidentally the important inference which could be drawn from the discovery of altered sandstones in the Erebus region. He went to the shapes of volcanoes:
The massive type formed by very fluid lavas -- Mauna Loa (Hawaii), Vesuvius, examples.
The more perfect cones formed by ash talus -- Fujiama, Discovery.
The explosive type with parasitic cones -- Erebus, Morning, Etna.
Fissure eruption -- historic only in Iceland, but best prehistoric examples Deccan (India) and Oregon (U.S.).
There is small ground for supposing relation between adjacent volcanoes -- activity in one is rarely accompanied by activity in the other. It seems most likely that vent tubes are entirely separate.
Products of volcanoes. -- The lecturer mentioned the escape of quantities of free hydrogen -- there was some discussion on this point afterwards; that water is broken up is easily understood, but what becomes of the oxygen? Simpson suggests the presence of much oxidizable material.
CO2 as a noxious gas also mentioned and discussed -- causes mythical 'upas' tree -- sulphurous fumes attend final stages.
Practically little or no heat escapes through sides of a volcano.
There was argument over physical conditions influencing explosions -- especially as to barometric influence. There was a good deal of disjointed information on lavas, ropy or rapid flowing and viscous -- also on spatter cones and caverns.
In all cases lavas cool slowly -- heat has been found close to the surface after 87 years. On Etna there is lava over ice. The lecturer finally reviewed the volcanicity of our own neighbourhood. He described various vents of Erebus, thinks Castle Rock a 'plug' -- here some discussion -- Observation Hill part of old volcano, nothing in common with Crater Hill. Inaccessible Island seems to have no connection with Erebus.
Finally we had a few words on the origin of volcanicity and afterwards some discussion on an old point -- the relation to the sea. Why are volcanoes close to sea? Debenham thinks not cause and effect, but two effects resulting from same cause.
Great argument as to whether effect of barometric changes on Erebus vapour can be observed. Not much was said about the theory of volcanoes, but Debenham touched on American theories -- the melting out from internal magma.
There was nothing much to catch hold of throughout, but discussion of such a subject sorts one's ideas.
Saturday, June 17. -- Northerly wind, temperature changeable, dropping to -16°.
Wind doubtful in the afternoon. Moon still obscured -- it is very trying. Feeling dull in spirit to-day.
Sunday, June 18. -- Another blizzard -- the weather is distressing. It ought to settle down soon, but unfortunately the moon is passing.
Held the usual Morning Service. Hymns not quite successful to-day.
To-night Atkinson has taken the usual monthly measurement. I don't think there has been much change.
Monday, June 19. -- A pleasant change to find the air calm and the sky clear -- temperature down to -28°. At 1.30 the moon vanished behind the western mountains, after which, in spite of the clear sky, it was very dark on the floe. Went out on ski across the bay, then round about the cape, and so home, facing a keen northerly wind on return.
Atkinson is making a new fish trap hole; from one cause and another, the breaking of the trap, and the freezing of the hole, no catch has been made for some time. I don't think we shall get good catches during the dark season, but Atkinson's own requirements are small, and the fish, though nice enough, are not such a luxury as to be greatly missed from our 'menu.'
Our daily routine has possessed a settled regularity for a long time. Clissold is up about 7 A.M. to start the breakfast. At 7.30 Hooper starts sweeping the floor and setting the table. Between 8 and 8.30 the men are out and about, fetching ice for melting, &c. Anton is off to feed the ponies, Demetri to see the dogs; Hooper bursts on the slumberers with repeated announcements of the time, usually a quarter of an hour ahead of the clock. There is a stretching of limbs and an interchange of morning greetings, garnished with sleepy humour. Wilson and Bowers meet in a state of nature beside a washing basin filled with snow and proceed to rub glistening limbs with this chilling substance. A little later with less hardihood some others may be seen making the most of a meagre allowance of water. Soon after 8.30 I manage to drag myself from a very comfortable bed and make my toilet with a bare pint of water. By about ten minutes to 9 my clothes are on, my bed is made, and I sit down to my bowl of porridge; most of the others are gathered about the table by this time, but there are a few laggards who run the nine o'clock rule very close. The rule is instituted to prevent delay in the day's work, and it has needed a little pressure to keep one or two up to its observance. By 9.20 breakfast is finished, and before the half-hour has struck the table has been cleared. From 9.30 to 1.30 the men are steadily employed on a programme of preparation for sledging, which seems likely to occupy the greater part of the winter. The repair of sleeping-bags and the alteration of tents have already been done, but there are many other tasks uncompleted or not yet begun, such as the manufacture of provision bags, crampons, sealskin soles, pony clothes, &c.
Hooper has another good sweep up the hut after breakfast, washes the mess traps, and generally tidies things. I think it a good thing that in these matters the officers need not wait on themselves; it gives long unbroken days of scientific work and must, therefore, be an economy of brain in the long run.
We meet for our mid-day meal at 1.30 or 1.45, and spend a very cheerful half-hour over it. Afterwards the ponies are exercised, weather permitting; this employs all the men and a few of the officers for an hour or more -- the rest of us generally take exercise in some form at the same time. After this the officers go on steadily with their work, whilst the men do odd jobs to while away the time. The evening meal, our dinner, comes at 6.30, and is finished within the hour. Afterwards people read, write, or play games, or occasionally finish some piece of work. The gramophone is usually started by some kindly disposed person, and on three nights of the week the lectures to which I have referred are given. These lectures still command full audiences and lively discussions.
At 11 P.M. the acetylene lights are put out, and those who wish to remain up or to read in bed must depend on candle-light. The majority of candles are extinguished by midnight, and the night watchman alone remains awake to keep his vigil by the light of an oil lamp.
Day after day passes in this fashion. It is not a very active life perhaps, but certainly not an idle one. Few of us sleep more than eight hours out of the twenty-four.
On Saturday afternoon or Sunday morning some extra bathing takes place; chins are shaven, and perhaps clean garments donned. Such signs, with the regular Service on Sunday, mark the passage of the weeks.
To-night Day has given us a lecture on his motor sledge. He seems very hopeful of success, but I fear is rather more sanguine in temperament than his sledge is reliable in action. I wish I could have more confidence in his preparations, as he is certainly a delightful companion.
Tuesday, June 20. -- Last night the temperature fell to -36°, the lowest we have had this year. On the Ramp the minimum was -31°, not the first indication of a reversed temperature gradient. We have had a calm day, as is usual with a low thermometer.
It was very beautiful out of doors this morning; as the crescent moon was sinking in the west, Erebus showed a heavy vapour cloud, showing that the quantity is affected by temperature rather than pressure.
I'm glad to have had a good run on ski.
The Cape Crozier party are preparing for departure, and heads have been put together to provide as much comfort as the strenuous circumstances will permit. I came across a hint as to the value of a double tent in Sverdrup's book, 'New Land,' and (P.O.) Evans has made a lining for one of the tents; it is secured on the inner side of the poles and provides an air space inside the tent. I think it is going to be a great success, and that it will go far to obviate the necessity of considering the question of snow huts -- though we shall continue our efforts in this direction also.
Another new departure is the decision to carry eiderdown sleeping-bags inside the reindeer ones.
With such an arrangement the early part of the journey is bound to be comfortable, but when the bags get iced difficulties are pretty certain to arise.
Day has been devoting his energies to the creation of a blubber stove, much assisted of course by the experience gained at Hut Point.
The blubber is placed in an annular vessel, A. The oil from it passes through a pipe, B, and spreads out on the surface of a plate, C, with a containing flange; d d are raised points which serve as heat conductors; e e is a tin chimney for flame with air holes at its base.
To start the stove the plate C must be warmed with spirit lamp or primus, but when the blubber oil is well alight its heat is quite sufficient to melt the blubber in And keep up the oil supply -- the heat gradually rises until the oil issues from B in a vaporised condition, when, of course, the heat given off by the stove is intense.
This stove was got going this morning in five minutes in the outer temperature with the blubber hard frozen. It will make a great difference to the Crozier Party if they can manage to build a hut, and the experience gained will be everything for the Western Party in the summer. With a satisfactory blubber stove it would never be necessary to carry fuel on a coast journey, and we shall deserve well of posterity if we can perfect one.
The Crozier journey is to be made to serve a good many trial ends. As I have already mentioned, each man is to go on a different food scale, with a view to determining the desirable proportion of fats and carbohydrates. Wilson is also to try the effect of a double wind-proof suit instead of extra woollen clothing.
If two suits of wind-proof will keep one as warm in the spring as a single suit does in the summer, it is evident that we can face the summit of Victoria Land with a very slight increase of weight.
I think the new crampons, which will also be tried on this journey, are going to be a great success. We have returned to the last Discovery type with improvements; the magnalium sole plates of our own crampons are retained but shod with 1/2-inch steel spikes; these plates are rivetted through canvas to an inner leather sole, and the canvas is brought up on all sides to form a covering to the 'finnesko' over which it is laced -- they are less than half the weight of an ordinary ski boot, go on very easily, and secure very neatly.
Midwinter Day, the turn of the season, is very close; it will be good to have light for the more active preparations for the coming year.
Wednesday, June 21. -- The temperature low again, falling to -36°. A curious hazy look in the sky, very little wind. The cold is bringing some minor troubles with the clockwork instruments in the open and with the acetylene gas plant -- no insuperable difficulties. Went for a ski run round the bergs; found it very dark and uninteresting.
The temperature remained low during night and Taylor reported a very fine display of Aurora.
Thursday, June 22. -- MIDWINTER. The sun reached its maximum depression at about 2.30 P.M. on the 22nd, Greenwich Mean Time: this is 2.30 A.M. on the 23rd according to the local time of the 180th meridian which we are keeping. Dinner to-night is therefore the meal which is nearest the sun's critical change of course, and has been observed with all the festivity customary at Xmas at home.
At tea we broached an enormous Buzzard cake, with much gratitude to its provider, Cherry-Garrard. In preparation for the evening our 'Union Jacks' and sledge flags were hung about the large table, which itself was laid with glass and a plentiful supply of champagne bottles instead of the customary mugs and enamel lime juice jugs. At seven o'clock we sat down to an extravagant bill of fare as compared with our usual simple diet.
Beginning on seal soup, by common consent the best decoction that our cook produces, we went on to roast beef with Yorkshire pudding, fried potatoes and Brussels sprouts. Then followed a flaming plum-pudding and excellent mince pies, and thereafter a dainty savoury of anchovy and cod's roe. A wondrous attractive meal even in so far as judged by our simple lights, but with its garnishments a positive feast, for withal the table was strewn with dishes of burnt almonds, crystallised fruits, chocolates and such toothsome kickshaws, whilst the unstinted supply of champagne which accompanied the courses was succeeded by a noble array of liqueur bottles from which choice could be made in the drinking of toasts.
I screwed myself up to a little speech which drew attention to the nature of the celebration as a half-way mark not only in our winter but in the plans of the Expedition as originally published. (I fear there are some who don't realise how rapidly time passes and who have barely begun work which by this time ought to be in full swing.)
We had come through a summer season and half a winter,and had before us half a winter and a second summer. We ought to know how we stood in every respect; we did know how we stood in regard to stores and transport, and I especially thanked the officer in charge of stores and the custodians of the animals. I said that as regards the future, chance must play a part, but that experience showed me that it would have been impossible to have chosen people more fitted to support me in the enterprise to the South than those who were to start in that direction in the spring. I thanked them all for having put their shoulders to the wheel and given me this confidence.
We drank to the Success of the Expedition.
Then everyone was called on to speak, starting on my left and working round the table; the result was very characteristic of the various individuals -- one seemed to know so well the style of utterance to which each would commit himself.
Needless to say, all were entirely modest and brief; unexpectedly, all had exceedingly kind things to say of me -- in fact I was obliged to request the omission of compliments at an early stage. Nevertheless it was gratifying to have a really genuine recognition of my attitude towards the scientific workers of the Expedition, and I felt very warmly towards all these kind, good fellows for expressing it.
If good will and happy fellowship count towards success, very surely shall we deserve to succeed. It was matter for comment, much applauded, that there had not been a single disagreement between any two members of our party from the beginning. By the end of dinner a very cheerful spirit prevailed, and the room was cleared for Ponting and his lantern, whilst the gramophone gave forth its most lively airs.
When the table was upended, its legs removed, and chairs arranged in rows, we had quite a roomy lecture hall. Ponting had cleverly chosen this opportunity to display a series of slides made from his own local negatives. I have never so fully realised his work as on seeing these beautiful pictures; they so easily outclass anything of their kind previously taken in these regions. Our audience cheered vociferously.
After this show the table was restored for snapdragon, and a brew of milk punch was prepared in which we drank the health of Campbell's party and of our good friends in the Terra Nova. Then the table was again removed and a set of lancers formed.
By this time the effect of stimulating liquid refreshment on men so long accustomed to a simple life became apparent. Our biologist had retired to bed, the silent Soldier bubbled with humour and insisted on dancing with Anton. Evans, P.O., was imparting confidences in heavy whispers. Pat' Keohane had grown intensely Irish and desirous of political argument, whilst Clissold sat with a constant expansive smile and punctuated the babble of conversation with an occasional 'Whoop' of delight or disjointed witticism. Other bright-eyed individuals merely reached the capacity to enjoy that which under ordinary circumstances might have passed without evoking a smile.
In the midst of the revelry Bowers suddenly appeared, followed by some satellites bearing an enormous Christmas Tree whose branches bore flaming candles, gaudy crackers, and little presents for all. The presents, I learnt, had been prepared with kindly thought by Miss Souper (Mrs. Wilson's sister) and the tree had been made by Bowers of pieces of stick and string with coloured paper to clothe its branches; the whole erection was remarkably creditable and the distribution of the presents caused much amusement.
Whilst revelry was the order of the day within our hut, the elements without seemed desirous of celebrating the occasion with equal emphasis and greater decorum. The eastern sky was massed with swaying auroral light, the most vivid and beautiful display that I had ever seen -- fold on fold the arches and curtains of vibrating luminosity rose and spread across the sky, to slowly fade and yet again spring to glowing life.
The brighter light seemed to flow, now to mass itself in wreathing folds in one quarter, from which lustrous streamers shot upward, and anon to run in waves through the system of some dimmer figure as if to infuse new life within it.
It is impossible to witness such a beautiful phenomenon without a sense of awe, and yet this sentiment is not inspired by its brilliancy but rather by its delicacy in light and colour, its transparency, and above all by its tremulous evanescence of form. There is no glittering splendour to dazzle the eye, as has been too often described; rather the appeal is to the imagination by the suggestion of something wholly spiritual, something instinct with a fluttering ethereal life, serenely confident yet restlessly mobile.
One wonders why history does not tell us of 'aurora' worshippers, so easily could the phenomenon be considered the manifestation of 'god' or 'demon.' To the little silent group which stood at gaze before such enchantment it seemed profane to return to the mental and physical atmosphere of our house. Finally when I stepped within, I was glad to find that there had been a general movement bedwards, and in the next half-hour the last of the roysterers had succumbed to slumber.
Thus, except for a few bad heads in the morning, ended the High Festival of Midwinter.
There is little to be said for the artificial uplifting of animal spirits, yet few could take great exception to so rare an outburst in a long run of quiet days.
After all we celebrated the birth of a season which for weal or woe must be numbered amongst the greatest in our lives.
1. ^Officially the ponies were named after the several schools which had subscribed for their purchase: but sailors are inveterate nicknamers, and the unofficial humour prevailed. See Appendix, Note 18.
Citation
Project.gutenberg (Content Source);Peter Saundry (Topic Editor) "Scott's Last Expedition: To Midwinter Day". In: Encyclopedia of Earth. Eds. Cutler J. Cleveland (Washington, D.C.: Environmental Information Coalition, National Council for Science and the Environment). [First published in the Encyclopedia of Earth March 17, 2009; Last revised Date March 17, 2009; Retrieved May 18, 2013 <http://www.eoearth.org/article/Scott's_Last_Expedition:_To_Midwinter_Day>
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:59:33.000Z
|
ke6wvhkjbqcim3u6t63z7nohsm6rtycy
|
{
"content_type": "application/xhtml+xml",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27932",
"uncompressed_offset": 488953893,
"url": "www.hindawi.com/journals/ecam/2012/728281/",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://www.hindawi.com/journals/ecam/2012/728281/"
}
|
cccc_CC-MAIN-2013-20
|
About this Journal Submit a Manuscript Table of Contents
Evidence-Based Complementary and Alternative Medicine
Volume 2012 (2012), Article ID 728281, 7 pages
doi:10.1155/2012/728281
Research Article
A Therapeutic Approach for Wound Healing by Using Essential Oils of Cupressus and Juniperus Species Growing in Turkey
1Department of Forest Products Chemistry, Faculty of Forestry, Bartin University, 74100 Bartin, Turkey
2Department of Pharmacognosy, Faculty of Pharmacy, Gazi University, Etiler, 06330 Ankara, Turkey
3Department of Pathology, Faculty of Veterinary Medicine, Afyon Kocatepe University, 03200 Afyonkarahisar, Turkey
Received 8 June 2011; Accepted 16 July 2011
Academic Editor: Saringat Hj. Baie
Copyright © 2012 Ibrahim Tumen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract
Juniperus and Cupressus genera are mainly used as diuretic, stimulant, and antiseptic, for common cold and wound healing in Turkish folk medicine. In the present study, essential oils obtained from cones of Cupressus and berries of Juniperus were evaluated for their wound healing and anti-inflammatory effects. In vivo wound healing activity was evaluated by linear incision and circular excision experimental wound models, assessment of hydroxyproline content, and subsequently histopathological analysis. The healing potential was comparatively assessed with a reference ointment Madecassol. Additionally acetic-acid-induced capillary permeability test was used for the oils' anti-inflammatory activity. The essential oils of J. oxycedrus subsp. oxycedrus and J. phoenicea demonstrated the highest activities, while the rest of the species did not show any significant wound healing effect. The experimental study revealed that J. oxycedrus subsp. oxycedrus and J. phoenicea display remarkable wound healing and anti-inflammatory activities, which support the folkloric use of the plants.
1. Introduction
Juniperus L. (Cupressaceae) has almost 70 species throughout the world and are mostly distributed in the Northern Hemisphere [1]. The widespread areas extend from Japan and East Asia to Europe, as well as from North and East Africa to North America. In Turkey, the Juniperus genus is represented by 10 taxa under seven speciess and has also been used by Anatolian people since ancient times. Fruits of Juniperus species are used to produce pekmez (a traditional Turkish fruit concentrate), which is rich in nutritional constituents [2]. Juniper berries are used in Northern European countries to impart sharp and clear flavour to the meat dishes [3, 4]. The coniferous parts and leaves of Juniperus are utilized in medicine as an antihelmintic, diuretic, stimulant, and antiseptic and for wound healing. J. excelsa is used against tuberculosis and jaundice [5]. The literature survey indicates that the major phenolic constituents in extracts of Juniperus species are lignans, coumarins, sesquiterpenes, abietane, labdane and pimarane diterpenes, flavonoids, biflavonols, flavone glycosides, and tannins [1].
The genus Cupressus is one of several genera within the family Cupressaceae. Based on genetic and morphological analysis, the Cupressus is found in the Cupressoideae subfamily [6]. They are widespread in the northern hemisphere, including western North America, Central America, north-west Africa, the Middle East, the Himalaya, southern China, and north Vietnam. They are evergreen trees or large shrubs, growing to 5–40 m tall. In Turkish folk medicine, fruits of Cupressus sempervirens are used to treat common cold and cough [7]. In previous studies, the major constituents have been identified in Cupressus species as α-pinene and Δ-3-carene [8]. The leaves and fruits of this plant are quite rich in tannins and flavonoids but they are free from alkaloids and low in saponins [9].
The aim of the present study is to evaluate the wound healing activity of the oils from cones of Cupressus sempervirens var. horizontalis and C. sempervirens var. pyramidalis and berries of J. communis, J. excelsa, J. foetidissima, J. oxycedrus, and J. phoenicea by means of in vivo circular excision and linear incision wound models and anti-inflammatory activity.
2. Materials and Methods
2.1. Plant Material
Berries and cones of 5 different Juniper species and 2 different varieties of Cypress belonging to Cupressaceae family natively growing in Turkey were chosen as the study material. Specimens were taken from each species as 1 kg weight from their growth sites and stored at −24°C until analysis [10]. Species names, sampling site, local name, collection date, and altitude of all specimens are listed in Table 1.
Table 1: Sampling site, local name, date, and altitude of the tree species.
2.2. Hydrodistillation
The essential oils of each sample were obtained by hydrodistillation with a Clevenger apparatus using 250 g (partially crushed) of fresh berries and cones. The essential oils were collected for 3 h and dried over anhydrous sodium sulphate and under refrigeration in a sealed vial until required [11, 12].
2.3. Biological Activity Tests
2.3.1. Animals
Male, Sprague-Dawley rats (160–180 g) and Swiss albino mice (20–25 g) were purchased from the animal breeding laboratory of Saki Yenilli (Ankara, Turkey).
The animals were left for 3 days at room conditions for acclimatization. They were maintained on standard pellet diet and water ad libitum throughout the experiment. A minimum of six animals were used in each group. Throughout the experiments, animals were processed according to the suggested European ethical guidelines for the care of laboratory animals.
2.3.2. Preparation of Test Samples for Bioassay
Incision and excision wound models were used to evaluate the wound healing activity. For the in vivo wound models, test samples were prepared in an ointment base (vehicle) consisting of glycol stearate, 1, 2 propylene glycol, liquid paraffin (3 : 6 : 1) in 1% concentration. 0.5 g of each test ointment was applied topically on the wounded site immediately after wound was created by a surgical blade.
The animals of the vehicle group were treated with the ointment base only, whereas the animals of the reference drug group were treated with 0.5 g of Madecassol (Bayer, 00001199). Madecassol contains 1% extract of Centella asiatica.
For the assessment of anti-inflammatory activity, test samples were given orally to test animals after suspending in a mixture of distilled H2O and 1% Tween 80. The control group animals received the same experimental handling as those of the test groups except that the drug treatment was replaced with appropriate volumes of dosing vehicle. Indomethacin (10 mg/kg) in 1% Tween 80 was used as reference drug.
2.3.3. Wound Healing Activity
Linear Incision Wound Model
Animals, seven rats in each group, were anaesthetized with 0.15 cc Ketalar [13], and the hairs on the dorsal part of the rats were shaved and cleaned with 70% alcohol. Two 5 cm length linear-paravertebral incisions were made with a sterile blade through the shaved skin at the distance of 1.5 cm from the dorsal midline on each side. Three surgical sutures were placed each 1 cm apart.
The ointments prepared with test samples, the reference drug (Madecassol) or ointment base (glycol stearate: propylene glycol: liquid paraffin (3 : 6 : 1)) were topically applied on the dorsal wounds in each group of animals once daily throughout 9 days. All the sutures were removed on the last day, and tensile strength of previously wounded and treated skin was measured by using a tensiometer (Zwick/Roell Z0.5, Germany) [14, 15].
Circular Excision Wound Model
This model was used to monitor wound contraction and wound closure time. Each group of animals (seven animals in each) was anaesthetized by 0.01 cc Ketalar. The back hairs of the mice were depilated by shaving. The circular wound was created on the dorsal interscapular region of each animal by excising the skin with a 5 mm biopsy punch; wounds were left open (Tramontina, Machado, Nogueira Filho Gda, Kim, Vizzioli & Toledo, 2002). Test samples, the reference drug (Madecassol, Bayer) and the vehicle ointments were applied topically once a day till the wound was completely healed. The progressive changes in wound area were monitored by a camera (Fuji, S20 Pro, Japan) every other day. Later on, wound area was evaluated by using AutoCAD program. Wound contraction was calculated as percentage of the reduction in wounded area. A specimen sample of tissue was isolated from the treated skin of each group of mice for the histopathological examination [16].
2.3.4. Hydroxyproline Estimation
Tissues were dried in hot air oven at 60–70°C till consistent weight was achieved. Afterwards, samples were hydrolyzed with 6 N HCl for 4 hours at 130°C. The hydrolyzed samples were adjusted to pH 7 and subjected to chloramine T oxidation. The coloured adduct formed with Ehrlich reagent at 60°C was read at 557 nm [17]. Standard hydroxyproline was also run and values reported as mg/g dry weight of tissue [18].
2.3.5. Histopathology
The skin specimens from each group were collected at the end of the experiment. Samples were fixed in 10% buffered formalin, processed, and blocked with paraffin and then sectioned into 5 micrometer sections and stained with hematoxylin & eosin (HE) and Van Gieson (VG) stains. The tissues were examined by light microscope (Olympus CX41 attached Kameram Digital Image Analyze System) and graded as mild (+), moderate (++), and severe (+++) for epidermal or dermal remodeling. Re-epithelization or ulcer in epidermis, fibroblast proliferation, mononuclear and/or polymorphonuclear cells, neovascularization, and collagen depositions in dermis were analyzed to score the epidermal or dermal remodeling. At the end of the examination, wound healing phases—inflammation, proliferation, and remodeling—were determined for all groups.
2.3.6. Anti-Inflammatory Activity
Acetic-Acid-Induced Increase in Capillary Permeability
Effect of the test samples on the increased vascular permeability induced by acetic acid in mice was determined according to Whittle method [19] with some modifications [20]. Each test sample was administered orally to a group of 10 mice in 0.2 mL/20 g body weight. Thirty minutes after the administration, the tail of each animal was injected with 0.1 mL of 4% Evans blue in saline solution (intravenous) and then we waited for 10 min. Then, 0.4 mL of 0.5% (v/v) AcOH was injected intraperitoneally. After 20 min incubation, the mice were killed by dislocation of the neck, and the viscera were exposed and irrigated with distilled water, which was then poured into 10 mL volumetric flasks through glass wool. Each flask was made up to 10 mL with distilled water, 0.1 mL of 0.1 N NaOH solution was added to the flask, and the absorption of the final solution was measured at 590 nm (Beckmann Dual Spectrometer; Beckman, Fullerton, Calif, USA). A mixture of distilled water and 0.5% CMC was given orally to control animals, and they were treated in the same manner as described above.
2.3.7. Statistical Analysis of the Data
The data on percentage anti-inflammatory and wound healing was statistically analyzed using one-way analysis of variance (ANOVA). The values of were considered statistically significant.
Histopathologic data were considered to be nonparametric; therefore, no statistical tests were performed.
3. Results and Discussion
In the present study, wound healing and anti-inflammatory effects of the oils obtained from Cupressus sempervirens var. horizontalis, C. sempervirens var. pyramidalis J. communis, J. excelsa, J. foetidissima, J. oxycedrus, and J. phoenicea were evaluated. The oils were mixed with glycol stearate, 1,2 propylene glycol, liquid paraffin (3 : 6 : 1) in 1% concentration for the assessment of the wound healing activity. Linear incision and circular excision experimental wound models were employed. Moreover, skin samples were evaluated histopathologically. The experimental results are given in Tables 26.
Table 2: Effects of the essential oils from C. sempervirens var. horizontalis, C. sempervirens var. pyramidalis, J. communis, J. excelsa, J. foetidissima, J. oxycedrus, and J. phoenicea on linear incision wound model.
Table 3: Effects of the essential oils from C. sempervirens var. horizontalis, C. sempervirens var. pyramidalis, J. communis, J. excelsa, J. foetidissima, J. oxycedrus, and J. phoenicea on circular excision wound model.
Table 4: Effect of topical treatment of test ointments for 7 days on hydroxyproline content.
Table 5: Wound healing processes and healing phases of the vehicle, negative control, test ointments, and Madecassol-administered animals.
Table 6: Inhibitory effect of the essential oils from C. sempervirens var. horizontalis, C. sempervirens var. pyramidalis, J. communis, J. excelsa, J. foetidissima, J. oxycedrus, and J. phoenicea on acetic-acid-induced increased capillary permeability.
As shown in Table 2, topical application of the ointment prepared with the oils of aerial parts of J. oxycedrus subsp. oxycedrus and J. phoenicea onto the incised wounds demonstrated the best wound healing activity. On day 10 the tensile strength values were 31.5% and 36.3%, respectively. The rest of the oils did not show any remarkable wound healing activity.
The contraction values of vehicle, negative control, oils and reference drug treated groups were shown in Table 3. The oils obtained from the berries of J. oxycedrus subsp. oxycedrus and J. phoenicea were found to have wound healing potential, while the vehicle and negative control groups and the other oil ointments showed no statistically significant wound healing activity. The wound contractions were determined as 38.99% and 43.10% for J. oxycedrus subsp. oxycedrus and 33.28% and 40.74% for J. phoenicea when compared to reference drug Madecassol (90.78%–100%).
For the assessment of collagen synthesis hydroxyproline levels of treated tissues were evaluated. As shown in Table 4 significant increase in hydroxyproline content was observed for the tissues treated with the essential oils of J. oxycedrus ssp. oxycedrus and J. phoenicea.
Phases in wound healing processes (inflammation, proliferation, and remodeling) were observed and within the experimental groups with different degree (Table 5, Figures 1 and 2). The reference drug, essential oils of J. oxycedrus subsp. oxycedrus and J. phoenicea treated groups demonstrated faster remodeling respectively compared to the other groups which showed delayed wound healing processes. As an evidence of delay, wound-associated tissue debris still remained in the dermal tissues.
Figure 1: Histopathological view of wound healing and epidermal/dermal remodeling in the vehicle, negative control, oils, and reference ointment Madecassol-administered animals. Skin sections show the hematoxylin & eosin- (HE-) stained epidermis and dermis in A and the dermis stained with Van Gieson (VG) in B. The original magnification was ×100 and the scale bars represent 120 μm for figures in A, and the original magnification was ×400 and the scale bars represent 40 μm for B. Data are representative of 6 animals per group. (1) Vehicle group: 10-day-old wound tissue treated with only vehicle, (2) negative control group: 10-day-old wound tissue, untreated group, (3) C. sempervirens var. horizontalis group: 10-day-old wound tissue treated with the essential oil of C. sempervirens var. horizontalis, (4) C. sempervirens var. pyramidalis group, 10 day old wound tissue treated with essential oil of C. sempervirens var. pyramidalis, (5) J. communis group: 10-day-old wound tissue treated with essential oil of J. communis, (6) J. excelsa group: 10-day-old wound tissue treated with essential oil of J. excelsa, (7) J. foetidissima group: 10-day-old wound tissue treated with essential oil of J. foetidissima, (8) J. oxycedrus group: 10-day-old wound tissue treated with essential oil of J. oxycedrus, (9) J. phoenicea group: 10-day-old wound tissue treated with essential oil of J. phoenicea, and (10) reference group: 10-day-old wound tissue treated with Madecassol. Arrows pointing events during wound healing; s: scab, u: ulcer, re: re-epithelization, f: fibroblast, c: collagen, mnc: mononuclear cells, pmn: polymorphonuclear cells, and nv: neovascularization.
Figure 2: Healing phases of the vehicle, negative control, test ointments, and Madecassol-administered animals.
The effect of the extracts on the inflammatory phase of wound healing was examined by using the method of Whittle, based on the inhibition of acetic-acid-induced capillary permeability. As shown in Table 6, the inhibitory activity was observed for the oils from Juniperus oxycedrus ssp. oxycedrus and J. phoenicea at the dose of 200 mg/kg with the highest inhibitory values of 33.1% and 27.3%, respectively, while the essential oils from both species showed no significant effect at the dose of 100 mg/kg. On the other hand the rest of the oils did not show any inhibitory activity.
Previous studies revealed that the essential oils of Juniperus and Cupressus are rich in α-pinene. Particularly J. phoenicea possesses the highest α-pinene content compared to the other species in comparative phytochemical analysis; β-Pinene, sabinene, and limonene are the constituents which are also present in the essential oils of both genera [8, 10]. In a previous study, α-pinene was found to have moderate anti-inflammatory effect at 500 mg/kg dose on carrageenan-induced hind paw edema test [21]. Anti-inflammatory activity is essential for wound healing, since a long duration in the inflammatory phase causes a delay in healing process. In order to shorten the healing period as well as for minimal pain and scar, anti-inflammatory activity is required [22]. Presence of α-pinene in Juniperus species could probably contribute to wound healing activity by providing anti-inflammatory effect. Moreover, limonene is an important monoterpene which has a role in wound healing [23]. In a model of chronic skin inflammation, the researchers have also shown a significant effect of limonene and perillyl alcohol on skin repair and proinflammatory cytokines levels [24]. Furthermore, J. oxycedrus ssp. oxycedrus and J. phoenicea were found to have high flavonoid and phenolic acid content which provide them to show remarkable antioxidant activity [5]. As in many of the diseases, antioxidant activity also helps to promote wound healing process [25].
Collagen is an important extracellular matrix protein which provides strength and integrity to the tissue and plays an important role in haemostasis and epithelisation. High levels of hydroxyproline in regenerated tissue suggest enhanced collagen synthesis. Hence enhanced collagen synthesis by J. oxycedrus ssp. oxycedrus and J. phoenicea may significantly contribute to healing and provide strength to repaired tissue [18].
4. Conclusion
According to the experimental results, the oils from berries of J. oxycedrus ssp. oxycedrus and J. phoenicea were found to have better activity on the wound healing compared to the other essential oils and control groups. This might be due to the synergistic effect of the constituents present in the oils. This study provides a scientific evidence for the folkloric utilization of Juniperus for wound healing activity.
References
1. G. Topçu, R. Erenler, O. Çakmak et al., “Diterpenes from the berries of Juniperus excelsa,” Phytochemistry, vol. 50, no. 7, pp. 1195–1199, 1999. View at Publisher · View at Google Scholar · View at Scopus
2. I. Akinci, F. Ozdemir, A. Topuz, O. Kabas, and M. Canakci, “Some physical and nutritional properties of Juniperus drupacea fruits,” Journal of Food Engineering, vol. 65, no. 3, pp. 325–331, 2004. View at Publisher · View at Google Scholar · View at Scopus
3. P. Montagne, The Concise Larousse Gastronomique, Hamlyn, London, UK, 1999.
4. M. R. Loizzo, R. Tundis, F. Conforti, A. M. Saab, G. A. Statti, and F. Menichini, “Comparative chemical composition, antioxidant and hypoglycaemic activities of Juniperus oxycedrus ssp. oxycedrus L. berry and wood oils from Lebanon,” Food Chemistry, vol. 105, no. 2, pp. 572–578, 2007. View at Publisher · View at Google Scholar · View at Scopus
5. M. Öztürk, I. Tümen, A. Uğur, F. Aydoğmuş-Öztürk, and G. Topçu, “Evaluation of fruit extracts of six Turkish Juniperus species for their antioxidant, anticholinesterase and antimicrobial activities,” Journal of the Science of Food and Agriculture, vol. 91, no. 5, pp. 867–876, 2011. View at Publisher · View at Google Scholar · View at PubMed
6. P. A. Gadek, D. L. Alpers, M. M. Heslewood, and C. J. Quinn, “Relationships within Cupressaceae sensu lato: a combined morphological and molecular approach,” American Journal of Botany, vol. 87, no. 7, pp. 1044–1057, 2000. View at Scopus
7. E. Yeşilada, E. Sezik, G. Honda, Y. Takaishi, Y. Takeda, and T. Tanaka, “Traditional medicine in Turkey IX: folk medicine in north-west Anatolia,” Journal of Ethnopharmacology, vol. 64, no. 3, pp. 195–210, 1999. View at Publisher · View at Google Scholar · View at Scopus
8. I. Tumen, Türkiye’de Yetisen Juniperus spp. Türlerinin Igne Yaprak, Meyve ve Kozalaklarinin Kimyasal Bilesenleri, Doktora Tezi, Zonguldak Karaelmas Üniversitesi, Zonguldak, Turkey, 2005.
9. S. A. Emami, M. H. Khayyat, M. Rahimizadeh, S. B. Fazly-Bazzaz, and J. Assilia, “Chemical constituents of Cupressus sempervirens L. cv. Cereiformis Rehd. essential oils,” Iranian Journal of Pharmaceutical Sciences, vol. 1, no. 1, pp. 39–42, 2004.
10. I. Tumen, H. Hafizoglu, H. Kollmannsberger, B. Zimmermann, A. Keskiner, and H. C. Gultekin, “Essential oil of leaves Juniperus ssp. Natively grown in Turkey,” Pharmacognosy Magazine, vol. 6, pp. 22–137, 2010.
11. I. Tümen and M. Reunanen, “A comparative study on turpentine oils of oleoresins of Pinus sylvestris L. from three districts of Denizli,” Records of Natural Products, vol. 4, no. 4, pp. 224–229, 2010. View at Scopus
12. I. Tumen, H. Hafizoglu, A. Pranovich, and M. Reunanen, “Chemical constituents of cones and leaves of cypress (Cupressus sempervirens L.) grown in Turkey,” Fresenius Environmental Bulletin, vol. 19, no. 10, pp. 2268–2276, 2010. View at Scopus
13. B. S. Shetty, S. L. Udupa, A. L. Udupa, and S. N. Somayaji, “Effect of Centella asiatica L (Umbelliferae) on normal and dexamethasone-suppressed wound healing in Wistar albino rats,” International Journal of Lower Extremity Wounds, vol. 5, no. 3, pp. 137–143, 2006. View at Publisher · View at Google Scholar · View at PubMed · View at Scopus
14. S. Lodhi, R. S. Pawar, A. P. Jain, and A. K. Singhai, “Wound healing potential of Tephrosia purpurea (Linn.) Pers. in rats,” Journal of Ethnopharmacology, vol. 108, no. 2, pp. 204–210, 2006. View at Publisher · View at Google Scholar · View at PubMed · View at Scopus
15. L. Suguna, S. Singh, P. Sivakumar, P. Sampath, and G. Chandrakasan, “Influence of Terminalia chebula on dermal wound healing in rats,” Phytotherapy Research, vol. 16, no. 3, pp. 227–231, 2002. View at Publisher · View at Google Scholar · View at PubMed · View at Scopus
16. F. Sadaf, R. Saleem, M. Ahmed, S. I. Ahmad, and Navaid-ul-Zafar, “Healing potential of cream containing extract of Sphaeranthus indicus on dermal wounds in Guinea pigs,” Journal of Ethnopharmacology, vol. 107, no. 2, pp. 161–163, 2006. View at Publisher · View at Google Scholar · View at PubMed
17. J. F. Woessner, “The determination of hydroxyproline in tissue and protein samples containing small proportions of this imino acid,” Archives of Biochemistry and Biophysics, vol. 93, no. 2, pp. 440–447, 1961.
18. A. M. Rasik, R. Raghubir, A. Gupta et al., “Healing potential of Calotropis procera on dermal wounds in Guinea pigs,” Journal of Ethnopharmacology, vol. 68, no. 1–3, pp. 261–266, 1999. View at Publisher · View at Google Scholar
19. B. A. Whittle, “The use of changes in capillary permeability in mice to distinguish between narcotic and non-narcotic analgesics,” British Journal of Pharmacology and Chemotherapy, vol. 22, pp. 246–253, 1964.
20. E. Yesilada and E. Küpeli, “Clematis vitalba L. aerial part exhibits potent anti-inflammatory, antinociceptive and antipyretic effects,” Journal of Ethnopharmacology, vol. 110, no. 3, pp. 504–515, 2007. View at Publisher · View at Google Scholar · View at PubMed
21. I. Orhan, E. Küpeli, M. Aslan, M. Kartal, and E. Yesilada, “Bioassay-guided evaluation of anti-inflammatory and antinociceptive activities of pistachio, Pistacia vera L,” Journal of Ethnopharmacology, vol. 105, no. 1-2, pp. 235–240, 2006. View at Publisher · View at Google Scholar · View at PubMed
22. R. A. F. Clark, Cutaneous Wound Repair, Oxford University, New York, NY, USA, 1991.
23. S. Adams and T. P. Thrash, “Methods for wound treatment and healing using limonene-based compositions,” International Application WO2010/062933 A1, Patent Cooperation Treaty, 2010.
24. P. L. Stanley, S. Steiner, M. Havens, and K. M. Tramposch, “Mouse skin inflammation induced by multiple topical applications of 12-O-tetradecanoylphorbol-13-acetate,” Skin Pharmacology, vol. 4, no. 4, pp. 262–271, 1991.
25. I. Pesin, U. Koca, H Keleş, and E. K. Akkol, “Wound healing activity of Rubus sanctus Schreber (Rosaceae): preclinical study in animal models,” Evidence Based Complementary and Alternative Medicine, vol. 2011, Article ID 816156, 6 pages, 2011. View at Publisher · View at Google Scholar · View at PubMed
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:25:10.000Z
|
iwykqlefayp3iyjxakhvqqhufss5dmuw
|
{
"content_type": "application/xhtml+xml",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27933",
"uncompressed_offset": 488970706,
"url": "www.hindawi.com/journals/jnt/2012/323145/",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://www.hindawi.com/journals/jnt/2012/323145/"
}
|
cccc_CC-MAIN-2013-20
|
About this Journal Submit a Manuscript Table of Contents
Journal of Nanotechnology
Volume 2012 (2012), Article ID 323145, 6 pages
doi:10.1155/2012/323145
Research Article
Magnetic Nanocomposites as Photocatalyst for the Degradation of Methyl Orange Dye
1Department of Physics, Indian Institute of Technology Guwahati, Guwahati 781039, India
2Central Instrument Facility, Indian Institute of Technology Guwahati, Guwahati 781039, India
Received 23 May 2012; Accepted 10 July 2012
Academic Editor: Mallikarjuna Nadagouda
Copyright © 2012 Debabrata Mishra et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract
We report the investigation of temperature-dependent magnetic properties and photocatalytic activity of magnetic nanocomposites (MNCs) synthesized by hydrothermal process. Room-temperature magnetic hysteresis (M-H) loops result enhanced saturation magnetization of 90 emu/g and coercivity () of 530 Oe for MNCs. With decreasing temperature to 20 K, increases from 500 Oe to 6800 Oe, and the M-H loops exhibit exchange coupling feature between and . Low- and high-temperature-dependent magnetization measurements confirm that the blocking temperature lies above 300 K and the presence of two magnetic phase transitions corresponding to and , respectively. The photocatalytic activity of the MNCs has been examined on the reduction of methyl orange (MO), a colored compound used in dyeing and printing textiles. The observed results suggest that the MNCs act as an excellent photocatalyst on the degradation of organic contaminants and degrade 93% of MO in 5 hours of UV irradiation. The photocatalytic activity of MNCs is attributed to remarkably high band gap energy and small particle size. Also, the MNCs with a reproducible photocatalytic activity are well separable from water media by applying external magnetic field and acts as a promising catalyst for the remediation of textile wastewater.
1. Introduction
The interest in magnetic nanoparticles (MNPs) and nanocomposites (MNCs) has greatly increased in recent years not only because of their broad applications in several technological fields including ferrofluids, magnetic data storage, magnetooptical, magnetic resonance imaging, medicine, and drug delivery systems, but also due to their relevance from the point of fundamental physics [15]. MNPs are also used extensively for catalytic purposes [6]. Photocatalysts utilize photon energy to carry out oxidation and reduction reactions. When irradiated with light energy, an electron (e) is excited from the valence band (VB) to the conduction band (CB) of the photocatalyst, leaving a photogenerated hole (h+). This creates hydroxyl ions in aqueous solution thus facilitating catalytic activities [6, 7]. For a material to qualify as a good photocatalyst needs a relatively large band gap, larger surface area, and nonagglomeration of particles. Agglomeration of particles can be avoided by coating the surface with a surfactant. However, it considerably reduces the magnetic moment of the materials and cannot be reused due to low value of magnetization. That is why development of MNP-based catalyst without surfactant requires greater attention. In particular, tremendous progress has been made in the preparation and processing of MNP-supported catalysts, in view of their high surface area resulting in high catalyst loading capacity [8], high dispersion [9], excellent stability [10], and controllable catalyst recycling without loss in their properties. Magnetic separation renders the recovery of catalyst from liquid-phase reactions much easier and thus dramatically reduces the cost. To fulfill the requirements for various applications, these particles must have suitable magnetic properties (large saturation magnetization (), moderate coercivity (), and high blocking temperature) and also controllable size and shape [11].
Dyes are one of the most notorious contaminants in aquatic environments because of their huge volume of production from industries, slow biodegradation and decoloration, and toxicity [6]. Methyl orange (MO) is a colored compound used in dyeing and printing textiles, and the release of those colored waste waters in the ecosystem is a source of esthetic pollution in the aquatic life. Therefore, the degradation of MO in cost effective ways without any secondary pollution is very much important for the safety environment [12, 13]. There are several traditional physical techniques such as adsorption, ultrafiltration, reverse osmosis, coagulation, chlorination, ozonation, and biodegradation for the removal of dye pollutants [14, 15]. Nevertheless, most of the above techniques transfer organic compound from water to another phase, thus causing secondary pollution. On the other hand, photocatalytic processes are environmentally friendly methods that utilize radiation energy to perform catalysis under ambient conditions and thus appear as the most emerging technology [16, 17]. However, the application of photocatalytic procedures using MNPs/MNCs for remediation of textile waste water is rather limited to only a few investigations.
Among other MNP materials, fine Cobalt ferrite particles have been used as MNP-based catalysts due to their strong interparticle interactions and nonagglomeration behaviors [19]. Also, it has strong anisotropy, high , and moderate along with the good mechanical hardness and chemical stability. The catalytic activities of MNPs can further be enhanced by preparing a suitable hybrid nanocomposite with other MNPs. This facilitates a new composite material with novel magnetic, electrical, and optical properties. Various preparation methods such as sonochemical reactions, mechanochemical synthesis, hydrolysis, hydrothermal, and aqueous coprecipitation have generally been used to make nanocomposites with desired properties [18, 20, 21]. In this study, we have employed hydrothermal process to prepare CoFe2O4–Fe3O4 nanocomposites and investigated their temperature-dependent magnetic properties. Also, the photocatalytic activity of the MNC on the degradation of environmental pollutants (MO) was explored for the first time.
2. Experimental Details
Magnetic nanocomposites of CoFe2O4–Fe3O4 were prepared by hydrothermal method. All the reactants and the reagents used for the preparation of MNCs were high-purity commercially available CoCl2·6H2O (99%), FeCl3·6H2O (99%), NaOH (96%), and PEG-400 (99%) and used as received. In a typical procedure, CoCl2·6H2O (1 g in 50 mL PEG-400, 4.2 mmol) and FeCl3 (1.6 g in 50 mL PEG-400, 10.3 mmol) solutions were mixed and stirred in a magnetic stirrer. Subsequently, NaOH (3 M, 25 mL distilled deionized water) solution was added dropwise and stirred for half an hour at 80°C. Then, the solution (dark brown) was transferred into an autoclave and heated at 200°C for 12 hours. After this, the resulting black precipitate was first washed with alcohols to remove the PEG and with water for the complete removal of NaOH content. Eventually, the product was washed with dried ethanol and dried at 200°C under vacuum. Crystal structure of the as-prepared and annealed samples were examined by X-ray diffraction (XRD) using a Rigaku TTRAX diffractometer with radiation and transmission electron microscopy (TEM) using a JEOL 2100 microscopy. Room temperature and temperature-dependent magnetic properties were measured by vibrating sample magnetometer (VSM, Lake Shore Model 7410). Optical properties were measured by PerkinElmer RXI FT-IR spectrometer in KBr pellet and Varian Cary 50 UV spectrophotometer. The BET surface area of the MNCs was analyzed by the Chemisorb surface area analyzer (Make: Micromeritics, Model: Chemisorb 2720) with pretreatment of 0.03 g of the sample by degassing at 200°C for 3 minutes under helium gas.
3. Results and Discussion
Figure 1 shows bright-field (BF) TEM micrographs and selected area electron diffraction (SAED) pattern of as-prepared CoFe2O4–Fe3O4 MNC. The micrographs show the fine nonagglomerated particles with the average particle size of about 20 nm, which are highly desirable for the catalytic activity. SAED pattern shows that MNCs are crystalline in nature, and the peak profile represents the cubic spinel structure of CoFe2O4 and Fe3O4, which is consistent with the XRD analysis (not shown here). To confirm the spinel structure of the MNCs, infrared (IR) absorption spectra were obtained in the range between 350 cm−1 are 1000 cm−1, and the same are depicted in Figure 2(a). It is found that the spectra consist of two significant absorption bands, first at about 590 cm−1 () and second at about 410 cm−1 (). Absorption bands observed in this range reveal the formation of single phase spinel structure having two sublattices, which are assigned to tetrahedral site () and octahedral site () [22]. In addition, the formation of soft Fe3O4 phase in the nanocomposite has been confirmed by the UV analysis as shown in Figure 2(b). In case of magnetic nanoparticles, the UV absorption band is observed in the region 330–500 nm, which originates primarily from the absorption and scattering of light by the magnetic nanoparticles. The band gap energy was determined from the absorption spectra using Tauc relation [23], as shown in the inset of Figure 2(b), and found to be around 2.8 eV. It should be mentioned here that with higher band gap energy, the recombination rate of electrons and hole pairs are retarded, and photocatalytic properties are enhanced.
Figure 1: BF TEM micrographs and SAED patterns of as-prepared CoFe2O4–Fe3O4 magnetic nanocomposites.
Figure 2: (a) IR and (b) UV-vis spectra of as-prepared CoFe2O4–Fe3O4 magnetic nanocomposites. Inset: Plot of ()2 versus to determine the band gap energy using Tauc relation [18].
To understand the magnetic properties of CoFe2O4–Fe3O4 MNCs, temperature, dependent magnetic hysteresis (M-H) loops were measured in the temperature range from 20 K to 300 K, and the same are displayed in Figure 3. It can be seen that the MNCs exhibit a clear hysteresis at 300 K but do not saturate at 15 kOe applied field due to the strong anisotropy. is about 500 Oe at 300 K. This suggests that the MNCs are not in superparamagnetic state in room temperature, in contrast to the earlier observation in CoFe2O4 nanoparticles [20, 24]. Also, the magnetization value obtained at 15 kOe-applied field () is about 90 emu/g, which is higher than the value (~65 emu/g) reported for CoFe2O4 particles with the similar particle size [25]. This confirms that the intrinsic properties of MNPs can be modified (enhanced) by making MNCs with the properly chosen materials. In the present investigation, the nanocomposite of CoFe2O4 with Fe3O4 was prepared, and the enhancement in can be attributed to large magnetocrystalline anisotropy and higher interparticle interactions in CoFe2O4–Fe3O4 MNCs [19]. It is to be noted that for catalytic applications MNPs should have better magnetic properties for convenient catalyst recycling. On the other hand, with decreasing temperature up to 200 K, the MNCs exhibit almost similar loops, but increases from 500 Oe at 300 K to 2650 Oe at 200 K. On further lowering the temperature, not only the increases to 6600 at 20 K, but also the loops exhibit a kink around the remanence during the magnetization reversal process. This suggests the presence of magnetic exchange coupling between the hard magnetic CoFe2O4 and soft magnetic Fe3O4 MNPs and interparticle interactions in the presently investigated samples [24]. Such a ferromagnetic exchange coupling is desirable for higher magnetization value of composites. Temperature-dependent magnetization measurement measured at a magnetic field of 100 Oe under zero-field-cooled (ZFC) and field-cooled (FC) conditions as shown in Figure 4(a) confirms that the blocking temperature lies about room temperature. On the other hand, high-temperature magnetization data (Figure 4(b)) depicts the presence of two clear phase transitions corresponding to CoFe2O4 and Fe3O4 at 790 K [26] and 840 K [27], respectively.
Figure 3: Magnetic hysteresis of as-prepared CoFe2O4–Fe2O3 magnetic nanocomposites obtained at different temperature between 20 K and 300 K. Inset: Variation of coercivity with temperature.
Figure 4: Temperature dependent magnetization curves measured at an applied field of 200 Oe (a) at low temperatures between 20 and 300 K under ZFC and FC conditions and (b) at high temperatures for as-prepared CoFe2O4–Fe2O3 magnetic nanoparticles. Inset: Plot of thermal derivative of magnetization with temperature.
Photocatalytic activity of prepared MNCs was evaluated by photocatalytic decomposition of MO in aqueous solution at ambient temperature. CoFe2O4–Fe3O4 MNC (0.02 g) was placed into the tubular quartz vessel containing 100 mL of 1 × 10−5 M MO aqueous solutions and mixed by ultrasonication for 10 min. Subsequently, the mixture was stirred in dark to obtain adsorption/desorption equilibrium until the concentration of MO was constant and then illuminated with a UV lamp. The absorption spectra, obtained using UV-vis spectrophotometer, are illustrated in Figure 5. It can be seen that a maximum absorbance was observed around 465 nm for two cases: (i) for the mixture of MO and water in as-mixed state and (ii) for the mixture of MO and water exposed to UV light for five hours. Also, the as-mixed mixture of MO, water, and MNCs without irradiation showed a maximum absorbance around 465 nm. These results suggest that no MO degradation occurs in these mixtures. However, a typical run performed for the mixture containing MO, water, and the MNCs without UV radiation in dark for 5 hours has revealed a minor change in the maximum absorption around 465 nm (less than 5%), as compared to the initial absorbance of the as-mixed mixture of MO, water, and the MNCs. This is mainly due to the sorption of dye molecules by the MNCs. On the other hand, the maximum absorbance almost disappears for the mixture containing MO, water, and MNCs subjected to UV irradiation for 5 hours. These results confirm that the effective degradation of the dye occurs only in the presence of UV irradiation, and this is the first time we are reporting CoFe2O4–Fe3O4 MNC as a new photocatalyst to degrade MO organic contaminant. The photocatalytic degradation percentage of MO was calculated using where is the initial absorbance of MO before degradation, and is the absorbance after time . The degradation percentage of MO by MNC is 93% in 5 h of UV irradiation at a pH range of 5 to 6. This can be attributed to (a) high band gap energy (2.8 eV) for the MNCs as the photocatalytic effect depends on the enhancement in electron-hole separation [28], and (b) small particle size which is associated with high surface area. The BET surface area of the CoFe2O4–Fe3O4 MNCs analyzed using chemisorb surface area analyzer was found to be 112 m2/g with a total pore volume of 0.0565 m2/g. This is significantly larger for this type of magnetic materials, and hence it accounts for one of the reasons for the presently observed high photocatalytic activities. Also, the pH value of the dye solution plays a major role in the photodegradation of the dye, as the adsorption of the dye molecules on the catalyst surface is pH dependent [29, 30]. For the presently studied system, we have obtained the optimum degradation of the dye in the low acidic pH (pH ~5-6).The degradation of MO using TiO2-, and ZnS-based semiconductors has also been reported [31, 32]. However, the shape of the nanoparticles poses a limit in the photocatalytic activity, and an efficient technique is needed for the facile separation of the catalyst. On the other hand, the MNCs can be synthesized easily with the better control of size and shape, and well separated from the media by applying the external magnetic field.
Figure 5: Absorbance spectra of methyl orange loaded with and without MNCs/water and UV irradiation for 5 hours. The irradiation was carried out with a 12 mW Xenon lamp with a main wavelength of 400 nm.
4. Conclusion
CoFe2O4–Fe3O4 magnetic nanocomposites with the average particle size of 20 nm were synthesized by hydrothermal process, and the formation of nanocomposites was confirmed through TEM, XRD, IR, and UV-vis spectroscopy studies. Enhanced magnetization of 90 emu/g and a coercivity of 500 Oe were obtained at room temperature. The blocking temperature of the nanocomposites was found to be above room temperature. Low- and high-temperature magnetization measurements confirmed the existence of magnetic exchange coupling between CoFe2O4 and Fe3O4 and their phase transitions, respectively. Photocatalytic activity of the MNCs was confirmed on methyl orange under UV irradiation and found to be effective on degrading the methyl orange at ambient temperature. MNCs could also be well separated magnetically without losing its photocatalytic activity.
Acknowledgments
This work was financially supported by DAE-BRNS, India, vide project no. 2005/20/34/1/BRNS/376. Infrastructural facilities (XRD, VSM, and TEM), provided by DST vide project nos SR/FST/PII-020/209, SR/S2/CMP-19/2006, and SR/S5/NM-108/2006, are gratefully acknowledged.
References
1. M. V. Berkovsky, F. V. Medvedev, and S. M. Krakov, Magnetic Fluids: Engineering Applications, Oxford University Press, Oxford, UK, 1993.
2. M. H. Kryder, “Ultrahigh-density recording technologies,” MRS Bulletin, vol. 21, no. 9, pp. 17–19, 1996. View at Scopus
3. A. P. Alivisatos, “Semiconductor clusters, nanocrystals, and quantum dots,” Science, vol. 271, no. 5251, pp. 933–937, 1996. View at Scopus
4. K. V. P. M. Shafi, A. Gedanken, R. Prozorov, and J. Balogh, “Sonochemical preparation and size-dependent properties of nanostructured CoFe2O4 particles,” Chemistry of Materials, vol. 10, no. 11, pp. 3445–3450, 1998. View at Scopus
5. Y. Zhu, L. P. Stubbs, F. Ho et al., “Magnetic nanocomposites: a new perspective in catalysis,” ChemCatChem, vol. 2, no. 4, pp. 365–374, 2010. View at Publisher · View at Google Scholar
6. E. Casbeer, V. K. Sharma, and X.-Z. Li, “Synthesis and photocatalytic activity of ferrites under visible light: a review,” Separation and Purification Technology, vol. 87, pp. 1–14, 2012. View at Publisher · View at Google Scholar
7. H. Zhang, G. Chen, and D. W. Bahnemann, “Photoelectrocatalytic materials for environmental applications,” Journal of Materials Chemistry, vol. 19, no. 29, pp. 5089–5121, 2009. View at Publisher · View at Google Scholar · View at Scopus
8. P. D. Stevens, J. Fan, H. M. R. Gardimalla, M. Yen, and Y. Gao, “Superparamagnetic nanoparticle-supported catalysis of Suzuki cross-coupling reactions,” Organic Letters, vol. 7, no. 11, pp. 2085–2088, 2005. View at Publisher · View at Google Scholar · View at Scopus
9. A.-H. Lu, E. L. Salabas, and F. Schüth, “Magnetic nanoparticles: synthesis, protection, functionalization, and application,” Angewandte Chemie, vol. 46, pp. 1222–1244, 2007. View at Publisher · View at Google Scholar
10. M. A. G. Soler, E. C. D. Lima, S. W. Da Silva et al., “Aging investigation of cobalt ferrite nanoparticles in low pH magnetic fluid,” Langmuir, vol. 23, no. 19, pp. 9611–9617, 2007. View at Publisher · View at Google Scholar · View at Scopus
11. V. F. Puntes, K. M. Krishnan, and A. P. Alivisatos, “Colloidal nanocrystal shape and size control: the case of cobalt,” Science, vol. 291, no. 5511, pp. 2115–2117, 2001. View at Publisher · View at Google Scholar · View at Scopus
12. H. Kyung, J. Lee, and W. Choi, “Simultaneous and synergistic conversion of dyes and heavy metal ions in aqueous TiO2 suspensions under visible-light illumination,” Environmental Science and Technology, vol. 39, no. 7, pp. 2376–2382, 2005. View at Publisher · View at Google Scholar
13. H. Zollinger, Color Chemistry: Synthesis, Properties and Applications of Organic Dyes and Pigments, VCH Publishers, New York, NY, USA, 1987.
14. H. Lachheb, E. Puzenat, A. Houas et al., “Photocatalytic degradation of various types of dyes (Alizarin S, Crocein Orange G, Methyl Red, Congo Red, Methylene Blue) in water by UV-irradiated titania,” Applied Catalysis B, vol. 39, no. 1, pp. 75–90, 2002. View at Publisher · View at Google Scholar · View at Scopus
15. W. S. Kuo and P. H. Ho, “Solar photocatalytic decolorization of methylene blue in water,” Chemosphere, vol. 45, no. 1, pp. 77–83, 2001. View at Publisher · View at Google Scholar · View at Scopus
16. S. Vaidyanathan, K. R. Ryan, and E. W. Eduardo, “Synthesis and UV-visible-light photoactivity of noble-metal-SrTiO3 composites,” Industrial and Engineering Chemistry Research, vol. 45, no. 7, pp. 2187–2193, 2006.
17. D. L. Liao and B. Q. Liao, “Shape, size and photocatalytic activity control of TiO2 nanoparticles with surfactants,” Journal of Photochemistry and Photobiology A, vol. 187, no. 2-3, pp. 363–369, 2007.
18. S. Bhattacharyya, J. P. Salvetat, R. Fleurier, A. Husmann, T. Cacciaguerra, and M. L. Saboungi, “One step synthesis of highly crystalline and high coercive cobalt-ferrite nanocrystals,” Chemical Communications, no. 38, pp. 4818–4820, 2005. View at Publisher · View at Google Scholar · View at Scopus
19. C. R. Vestal, Q. Song, and Z. J. Zhang, “Effects of interparticle interactions upon the magnetic properties of CoFe2O4 and MnFe2O4 nanocrystals,” Journal of Physical Chemistry B, vol. 108, no. 47, pp. 18222–18227, 2004. View at Publisher · View at Google Scholar · View at Scopus
20. F. Bensebaa, F. Zavaliche, P. L'Ecuyer, R. W. Cochrane, and T. Veres, “Microwave synthesis and characterization of Co-ferrite nanoparticles,” Journal of Colloid and Interface Science, vol. 277, no. 1, pp. 104–110, 2004. View at Publisher · View at Google Scholar · View at Scopus
21. R. T. Olsson, G. Salazar-Alvarez, M. S. Hedenqvist, U. W. Gedde, F. Lindberg, and S. J. Savage, “Controlled synthesis of near-stoichiometric cobalt ferrite nanoparticles,” Chemistry of Materials, vol. 17, no. 20, pp. 5109–5118, 2005. View at Publisher · View at Google Scholar · View at Scopus
22. R. D. Waldron, “Infrared spectra of ferrites,” Physical Review, vol. 99, no. 6, pp. 1727–1735, 1955.
23. J. Tauc, Amorphous and Liquid Semiconductor, Plenum, New York, NY, USA, 1974.
24. S. Ammar, A. Helfen, N. Jouini et al., “Magnetic properties of ultrafine cobalt ferrite particles synthesized by hydrolysis in a polyol medium,” Journal of Materials Chemistry, vol. 11, no. 1, pp. 186–192, 2001. View at Publisher · View at Google Scholar · View at Scopus
25. Z. Gu, X. Xiang, G. Fan, and F. Li, “Facile synthesis and characterization of cobalt ferrite nanocrystals via a simple reduction-oxidation route,” Journal of Physical Chemistry C, vol. 112, no. 47, pp. 18459–18466, 2008. View at Publisher · View at Google Scholar
26. S. T. Alone and K. M. Jadhav, “Structural and magnetic properties of zinc- and aluminum-substituted cobalt ferrite prepared by co-precipitation method,” Pramana, vol. 70, no. 1, pp. 173–181, 2008. View at Publisher · View at Google Scholar
27. A. Chakraborty, “Kinetics of the reduction of hematite to magnetite near its Curie transition,” Journal of Magnetism and Magnetic Materials, vol. 204, no. 1, pp. 57–60, 1999. View at Publisher · View at Google Scholar
28. J. Yu, J. Xiong, B. Cheng, and S. Liu, “Fabrication and characterization of Ag-TiO2 multiphase nanocomposite thin films with enhanced photocatalytic activity,” Applied Catalysis B, vol. 60, no. 3-4, pp. 211–221, 2005.
29. I. K. Konstantinou and T. A. Albanis, “TiO2-assisted photocatalytic degradation of azo dyes in aqueous solution: kinetic and mechanistic investigations: a review,” Applied Catalysis B, vol. 49, no. 1, pp. 1–14, 2004. View at Publisher · View at Google Scholar · View at Scopus
30. H. Lachheb, E. Puzenat, A. Houas et al., “Photocatalytic degradation of various types of dyes (Alizarin S, Crocein Orange G, Methyl Red, Congo Red, Methylene Blue) in water by UV-irradiated titania,” Applied Catalysis B, vol. 39, no. 1, pp. 75–90, 2002. View at Publisher · View at Google Scholar · View at Scopus
31. T. Puangpetch, T. Sreethawong, S. Yoshikawa, and S. Chavade, “Synthesis and photocatalytic activity in methyl orange degradation of mesoporous-assembled SrTiO3 nanocrystals prepared by sol–gel method with the aid of structure-directing surfactant,” Journal of Molecular Catalysis A, vol. 287, p. 70, 2008.
32. C. Wang, X. Wang, B.-Q. Xu et al., “Enhanced photocatalytic performance of nanosized coupled ZnO/SnO2 photocatalysts for methyl orange degradation,” Journal of Photochemistry and Photobiology A, vol. 168, pp. 47–52, 2004. View at Publisher · View at Google Scholar
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:59:00.000Z
|
k45pxwv5j6zwde6e3vwkq4cw3okqr3us
|
{
"content_type": "application/xhtml+xml",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27934",
"uncompressed_offset": 488988515,
"url": "www.hindawi.com/journals/mpe/2011/389803/",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://www.hindawi.com/journals/mpe/2011/389803/"
}
|
cccc_CC-MAIN-2013-20
|
About this Journal Submit a Manuscript Table of Contents
Mathematical Problems in Engineering
Volume 2011 (2011), Article ID 389803, 21 pages
doi:10.1155/2011/389803
Research Article
mBm-Based Scalings of Traffic Propagated in Internet
1School of Information Science & Technology, East China Normal University, No. 500, Dong-Chuan Road, Shanghai 200241, China
2University of Macau, Av. Padre Tomás Pereira, Taipa, Macau, China
3College of Computer Science, Zhejiang University of Technology, Hangzhou 310023, China
Received 20 October 2010; Accepted 29 November 2010
Academic Editor: Cristian Toma
Copyright © 2011 Ming Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract
Scaling phenomena of the Internet traffic gain people's interests, ranging from computer scientists to statisticians. There are two types of scales. One is small-time scaling and the other large-time one. Tools to separately describe them are desired in computer communications, such as performance analysis of network systems. Conventional tools, such as the standard fractional Brownian motion (fBm), or its increment process, or the standard multifractional fBm (mBm) indexed by the local Hölder function may not be enough for this purpose. In this paper, we propose to describe the local scaling of traffic by using on a point-by-point basis and to measure the large-time scaling of traffic by using E on an interval-by-interval basis, where E implies the expectation operator. Since E is a constant within an observation interval while is random in general, they are uncorrelated with each other. Thus, our proposed method can be used to separately characterize the small-time scaling phenomenon and the large one of traffic, providing a new tool to investigate the scaling phenomena of traffic.
1. Introduction
Consider an application that sends a series of packets from the source to the destination through the Internet. Suppose a traffic series passes through servers from the first server with the service curve to the th server with the service curve to reach the destination. Then, the communication from the first server to the th one can be expressed by Figure 1 (Li and Zhao [1], Li [2]), where is the arrival traffic accumulated within the time interval and is the departure traffic within .
Figure 1: Packets passing through a series of servers from source to destination.
Let be instantaneous arrival traffic, implying the bytes of a packet at time from connection at the input port of the server with the service curve . Then, the accumulated function regarding in the time interval is given by We now consider the aggregated traffic . By aggregated traffic, we mean the following: where is the positive number representing all connections at the input port of the server . In this research, traffic time series is in the sense of (1.2). The accumulated traffic within the interval is given by
In the field of traffic modeling, there are two categories of traffic models. One is deterministic modeling, more precisely, bounded modeling, and the other is stochastic modeling, see Li and Borgnat [3], Michiel and Laevens [4]. Scaling plays a role in all types of traffic models, see, for example, Willinger et al. [5], Feldmann et al. [6], Jiang [7], and Papagiannaki et al. [8]. There are two types of scaling phenomena in traffic. One is the small-time scaling and the other is large-time one, see, for example, Paxson and Floyd [9]. This paper aims at investigating two types of scaling phenomena of traffic for either the bounded modeling, say , and the stochastic modeling of .
Note that a commonly used model of in the wide sense stationarity is the self-similar process, that is, fractional Gaussian noise (fGn), see, for example, Stalling [10], McDysan [11], Pitts and Schormans [12], Leland et al. [13], Beran et al. [14], Tsybakov and Georganas [15], Willinger and Paxson [16], and Adas [17]. However, there is a limitation in fGn for the analysis of two scaling phenomena, namely, small scaling and large one, since it is indexed by a single parameter called the Hurst parameter , see Paxson and Floyd [9], Tsybakov and Georganas [15], Ayache et al. [18], Li and Lim [19, 20], and Li [2124]. Therefore, two-parameter models of traffic are needed.
In this paper, we address two types of traffic models. One is the multifractional Brownian motion (mBm), see Li et al. [25]. The other is the 2-parameter bounded model introduced by Cruz, see [26, 27], Li and Zhao [28], Raha et al. [29], Jiang and Liu [30], and Boudec and Thiran [31]. The contributions of this paper are in two aspects. (i)We claim the small-time scaling phenomenon is independent of the large-time one and vice versa based on the model of Cruz.(ii)We propose the point of view to use mBm to analyze the scaling phenomena of traffic in this way. Describing the small-time scaling phenomenon by using on a point-by-point basis and to characterize the large-time scaling one by using on an interval-by-interval basis.
The rest of the paper is organized as follows. We will give the preliminaries regarding conventional time series in Section 2, aiming at pointing out why scaling is a topic in traffic of the fractal type. We will describe the reason why the small-scaling phenomenon of traffic is independent of its large-time one in Section 3. In Section 4, we will introduce a two-parametric model of mBm towards the scaling analysis of traffic based on the local Hölder function . Finally, Section 5 concludes the paper.
2. Preliminaries
Traffic time series on old telephony networks is in the class of the Poisson processes, such as the Poisson one and its compound ones, see Erlang [32] and Brockmeyer et al. [33]. It has been successfully used in the design of infrastructure of old telephony networks for years, see, for example, Bojkovic et al. [34], Le Gall [35], Lin et al. [36], Manfield and Downs [37], and Reiser [38]. It is such a success on old telephony networks that it has almost been taken as an axiom for modelling traffic in communication systems, see Gibson [39], Cooper [40], and Akimaru and Kawashima [41]. Due to unsatisfactory performances of the Internet, such as traffic congestions, people began doubting about the models of the Poisson type. Accordingly, they began measuring and analyzing the traffic at different sites in the Internet during different periods of times for the purpose of reevaluating general patterns of traffic, see [9, 13, 14], Paxson [42, 43], and Traffic Archive at http://www.sigcomm.org/ITA/. Experimental processing real-traffic traces exhibited that traffic is in the class of fractal time series.
The early fractal model used for traffic modelling is the self-similar process with long-range dependence (LRD), that is, fGn with LRD. For this reason, we will address the preliminaries in this section in the aspects of conventional time series, stationary self-similar process, that is, fGn, and LRD processes.
2.1. Conventional Time Series
Let be a 2-order stationary random process, where is the th sample function of the process, where is the set of real numbers. We use to represent the process without confusion causing. Its mean in the wide sense can be expressed by Its autocorrelation function (ACF) can be written by In (2.1) and (2.2), the superscript implies that the mean and the ACF are computed by using spatial average. The mean and the ACF of a process expressed by time average are written by where the superscript indicates that the mean and the ACF are computed by time average.
The process is said to be ergodic if (2.5) holds, In what follows, we simply use to represent a random function in general.
Denote by the probability density function (PDF) of . Then, the probability is given by The mean and the ACF of based on PDF are given by (2.7) and (2.8), respectively, Let be the variance of . Then,
If , then it has the following properties.
Note 1. The PDF is light tailed. By light tailed, we mean that the integrals in (2.7) and (2.8) are convergent in the domain of ordinary functions.
Note 2. There exist and for if the PDF of is light tailed.
The Poisson distribution is an instance of light-tailed distribution, which expresses the probability of a number of events occurring in a fixed period of time if these events occur with a known average rate and independently of the time since the last event. In communication networks, one is interested in the work focused on certain random variables that count, among other things, a number of discrete occurrences (sometimes called “arrivals”) that take place during a time interval of a given length. Denote the expected number of occurrences in this interval by a positive real number . Then, the probability that there are exactly occurrences is given by the Poisson distribution below
Note 3. The ACF of with a light-tailed PDF decays fast. By “decays fast,” we mean that is integrable in the continuous case and summable in the discrete case in the domain of ordinary functions.
Denote by the power spectrum density (PSD) of . Then,
Thus, we have Note 4 below, which is a consequence of Note 3.
Note 4. exists in the domain of ordinary functions.
The results in Notes 14 are usually assumptions for conventional time series as can be seen from Fuller [44], Box et al. [45], Mitra and Kaiser [46], and Bendat and Piersol [47]. We will explain below that all in Notes 14 may be no longer valid for LRD traffic.
2.2. Scaling Measures for Conventional Gaussian Time Series
A Gaussian process is completely determined by its second-order properties, more precisely, its mean and ACF, see Papoulis [48] and Doob [49]. Note that the mean of is a measure of the global property of . On the other side, the variance of measures its local property. These two points can be easily inferred from (2.3) and (2.9). For a Gaussian process with mean zero, one has Therefore, mean and variance or ACF are two essential numeric characteristics of a Gaussian process. In fact, if is Gaussian, then However, or mean of traffic time series may not exist in general due to LRD, see Li [22], which is a particular point of a time series with LRD (Beran [50, 51]). A simple explanation about this is in (2.13). In the case of , in (2.13) is indeterminate. Therefore, variance and mean are no longer suitable for measuring the local property and the global one of LRD traffic.
2.3. Correlation Time of Conventional Time Series
Correlation time is defined by (Nigam [52, page 74]) It is a measure relating to the scaling of a random function . It implies that the correlation can be neglected if , where is the time scale of interest [52]. As traffic is LRD, both the numerator and denominator on the right side of (2.14) do not exist. Therefore, correlation time that is a useful measure in conventional time series is inappropriate to be used in LRD traffic.
2.4. Brief of LRD Time Series
One says that is asymptotically equivalent to under the limit if and are such that (Murray [53]), that is, where can be infinity. It has the property expressed by In this sense, is called slowly varying function if for all .
A random function is said to be LRD if its ACF is nonintegrable, while it is called short-range dependent (SRD) if is integrable. This implies that is LRD if where can be either a constant or a slowly varying function. It is SRD if
Theoretically, any series whose ACF is nonintegrable are LRD. In the field of telecommunications, however, the term of LRD traffic usually corresponds to a hyperbolically decayed ACF. Its asymptotic expression for is often indexed by the Hurst parameter . That is,
Note 5. The tail of the PDF of LRD traffic is heavy according to Taqqu’s theorem, see Abry et al. [54].
According to the Fourier transform in the domain of generalized functions (Kanwal [55], Gelfand and Vilenkin [56]), one immediately obtains the Fourier transform of the right side of (2.17) given by where stands for the operator of the Fourier transform. Therefore, for LRD traffic, we have
Note 6. LRD traffic is in the class of noise (Li [57]).
In summary, from the point of view of the assumption of Gaussian distribution, we say that the tail of the PDF of LRD traffic may be so heavy that its and do not exist. Owing to this meaning of the heavy tails, the ACF of traffic decays so slow in a hyperbolical manner such that it is nonintegrable. Consequently, a random variable that represents a traffic time series can be no longer considered to be independent, hence, LRD or long memory. On the other hand, the PSD of LRD traffic obeys a power law, see (2.21), hence, noise.
2.5. Brief of Self-Similar Time Series
A random function is said to be self-similar if it satisfies the definition of self-similarity given by where denotes equality in the sense of probability distribution.
Note 7. The concept of LRD differs from that of self-similarity (Li [23]).
Note 8. The self-similarity described by (2.22) is in the global sense.
The commonly used self-similar model of traffic is fGn in the stationary case and fBm in the nonstationary case. We will brief them in the next subsection.
2.6. fGn and fBm for Traffic with LRD
fGn is an only stationary increment process with self-similarity (Samorodnitsky and Taqqu [58]). We discuss it in this subsection towards exhibiting the limitation of fGn in describing two types of scaling phenomena of traffic.
Let be Brownian motion (Bm). Let be the fBm of the Weyl integral type with the Hurst parameter . Let be the Gamma function. Then,
The function has the following properties.(i).(ii)The increments are Gaussian.(iii), where .(iv). (v).
Thus, the ACF of , denoted by , is given by where
Denote by the PSD of . Then (Flandrin [59]) From the above, we see that either the ACF or the PDF of is time varying. Therefore, is nonstationary.
Note that is self-similar because it satisfies the definition of self-similarity. In fact, where denotes equality in the sense of probability distribution.
From (2.26), one sees that the PSD of is divergent at , exhibiting a case of noise, see Csabai [60] for the early work of noise in traffic theory. The relationship between the fractal dimension of fBm, denoted by , and its Hurst parameter, denoted by , is given by
Note that the increment series, , is fGn. Thus, the ACF of the discrete fGn (dfGn) is given by Since the ACF is an even function, we have where . Denote by the ACF of fGn in the continuous case. Then, where is used by smoothing fBm so that the smoothed fBm is differentiable.
The PSD of dfGn was derived out quite early by Sinaĭ [61]. It is given by where and . The PSD of fGn is (see Li and Lim [62]) which exhibits that fGn belongs to the class of noises.
Note that can be approximated by , in fact, that is, the finite second-order difference of . Approximating it with the second-order differential of yields
From the above, one immediately sees that fGn contains three subclasses of time series. In the case of , the ACF is nonsummable and the corresponding series is of LRD. For , the ACF is summable and fGn in this case is of SRD. FGn reduces to white noise when .
Among LRD processes, fGn has its advantage in traffic modeling. For example, it can be used to easily represent two types of traffic series, namely, self-similar process and processes with LRD. Note that LRD is a global property of traffic. However, in principle, self-similarity is a local property of traffic, which is measured by fractal dimension .
Denote and the fractal dimension and the Hurst parameter of fGn, respectively. Then, one has (Li [23]) Therefore, one gets (Li et al. [63]) Hence, for fGn type traffic, the local properties of traffic happen to be reflected in the global ones as noticed in mathematics by Mandelbrot [64].
The above discussions exhibit that the standard fGn as well as fBm has its limitation in traffic modeling because it uses a single parameter to characterize two different phenomena, that is, small-time scaling and large-time one. The former is a local property and the latter is a global one.
3. Large-Time Scaling of Traffic Is Independent of Its Small-Time One
Traffic is greater than zero, that is, The above holds because is arrival traffic. In addition, where and are constants restricted by the IEEE standard without technical reasons except the need to limit delays. For instance, the Ethernet protocol forces all packets of to have bytes and bytes without considering the Ethernet preamble and header (Stalling [10]).
Due to the functionality of TCP, traffic appears “burstiness” (see Tobagi et al. [65]) or intermittency and non-Poisson (Jain and Routhier [66], Jiang and Dovrolis [67], and Papagiannaki [8]). The burstiness has considerable effects on system performances, see, for example, Nain [68], Draief and Mairesse [69], Németh et al. [70], Li and Zhao [71], Jiang et al. [72], Wang et al. [73], and Starobinski and Sidi [74].
The following measure introduced by Cruz [26, 27] characterizes the bound of the burstiness of traffic The integral expressed in (3.3) does not make sense if for the continuous even in the field of Lebesgue’s integrals, see Bartle and Sherbert [75] and Trench [76]. However, it makes sense when it is considered in the domain of generalized functions. A simple way to explain (3.3) is where and is the Dirac- function. Equation (3.3) represents the burstiness bound of , which is a local behavior of traffic.
Note that is dependent. Therefore, we may rewrite (3.3) by the following expression: The above exhibits that traffic has highly local irregularity or high burstiness as observed by Feldmann et al. [6], Papagiannaki et al. [8], Paxson and Floyd [9], Jiang and Dovrolis [67], Willinger et al. [77], and Estan and Varghese [78]. Such a local irregularity considerably affects the polices or performances of telecommunication systems, such as queuing (see, e.g., Nain [68] and Draief and Mairesse [69]), end-to-end delay, see, for example, Németh et al. [70], Li and Zhao [71], Jiang et al. [72], Wang et al. [73], and Starobinski and Sidi [74], resource allocation (see, e.g., Gravey et al. [79]), anomaly detection (Tian and Li [80]), and admission control (Knightly and Shroff [81], Raha et al. [82], and Jia et al. [83]), just naming a few.
Another measure introduced by Cruz [26, 27] describes the bound of the average rate of traffic. It is given by Note that the bound of the average rate expressed above describes a global property of traffic. It implies that the bound of the average rate of traffic is robust as is a constant. This is in agreement with the experimental observations stated by Feldmann et al. [6], Willinger et al. [22], and Paxson and Floyd [9].
The above exhibits, taking into account (3.5) and (3.6) together, that the accumulated traffic within is bounded by Equation (3.7) implies that traffic has scaling phenomena in two folds. One is small-time scaling and the other large one.
Note 1. Parameter is independent of .
Note 2. From Note 1, we see that the small-time scaling of traffic is independent of the large-time one.
We now further explain the point in Note 2 from the point of view of fractal time series. Denote the autocorrelation function (ACF) of traffic by where is the lag. Then, for small lags, more precisely, for , if is sufficiently smooth on , is given by where is a constant and is the fractal index of . The fractal dimension of , denoted by , is given by see Adler [84], Hall and Roy [85], Chan et al. [86], Kent and Wood [87], Gneiting and Schlather [88], Lim and Li [89], and Li et al. [90]. The parameter is used to describe the local irregularity of traffic. It is in terms of small-time scaling of traffic, see Li [2124] and Li and Lim [19, 20]. From (2.19), we have The parameter is utilized to characterize the global property, more precisely, LRD, of traffic from a view of fractals.
Note 3. Generally, is independent of .
Note 4. Owing to Note 3, we infer that the small-time scaling of traffic is independent of the large-time one in general.
The above discussions exhibit that it may be more flexible to characterize two types of scaling phenomena of traffic by using two independent parameters. One is for large-time scaling and the other for small-time scaling.
4. Applying mBm to the Scaling Analysis of Traffic
From the previous discussions, we suggest that it is natural to use two independent measures to describe two types of scaling phenomena that are independent of each other. Conventionally, fBm as well as its increment process, that is, fGn, is indexed by a single parameter , alternatively by . Thus, there is a limitation for them to independently characterize the scaling phenomena of two. This limitation was empirically noticed by Paxson and Floyd [9]. Lately, it was noticed by Ayache et al. [18] from the point of view of the multifractional Brownian motion (mBm).
In this research, we are interested in the work in mBm by Peltier and Levy-Vehel [91, 92] as well as Benassi et al. [93] to generalize the standard fBm by replacing the constant with the Hölder function . Li et al. [94] applied to describe the multifractality of traffic. Although [9193, 95] explained the local self-similarity characterized by using and Ayache et al. [18] discussed their method to measure the LRD of a random function, those works may not be enough for traffic because the small-time scaling is independent of the large-time one as we explained previously. As a matter of fact, it is quite awkward to use to describe two scaling phenomena of traffic because is linearly correlated with the fractal dimension with the expression [91, 92]. To overcome the difficulty to capture the large scaling phenomena of traffic in the global sense, we introduce the measure expressed by . Based on this, we propose our opinion like this; using to represent the small scaling of traffic on a point-by-point basis and to characterize the large scaling of traffic in the global sense, respectively. The key point of our opinion is that and are independent of each other.
In the rest of this section, we will brief the mBm in Section 4.1. Then, in Section 4.2, we will demonstrate the applications of and to real-traffic traces.
4.1. mBm of Type
Note that the above (2.27) implies that the local irregularity of a random function is globally the same. That, nevertheless, may not meet the real case of traffic. As a matter of fact, if of a traffic function is a constant, of in (3.3) is a constant too. This is a unifractal case, which is obviously in contradiction with real traffic as is time dependent, see (3.5).
One simple way to investigate the multifractality of traffic is to use mBm. Replacing the constant with a time-dependent function , where and is also called the local Hölder exponent, see Peltier and Levy-Vehel [91, 92] and Benassi et al. [93], yields where is the standard Bm. The variance of is given by where Without lose of generality, one may normalize such that by replacing with .
Unless otherwise stated, denotes the normalized process in what follows. The explicit expression of the covariance of can be calculated by where With the assumption that is -Hölder function such that one may have for . Thus, the local covariance function of the normalized mBm has the following limiting form for : The variance of the increment process for becomes which implies that the increment processes of mBm are locally stationary. It follows that the local Hausdorff dimension of the graphs of mBm is given by for each interval .
Regarding the computation of , we need a sequence expressed by the local growth of the increment process, where is the largest integer not exceeding . The local Hölder function at point is given by (see Peltier and Levy-Vehel [91], Muniandy et al. [95], and Li et al. [94]) The local box or Hausdorff dimension denoted by is equal to That is,
4.2. Scaling Analysis of Traffic Using mBm
The function in (4.14) characterizes the local irregularity of traffic on a point-by-point basis or the small-time scaling of traffic.
Note that may be used to describe the LRD of traffic on a point-by-point basis, see Peltier and Levy-Vehel [91]. From a view of applications, it is desired to represent the LRD, which is a global property of traffic at large time scales, on an interval-by-interval basis. As a matter of fact, from a practical view of the Internet traffic, one is interested in the LRD measure, say , to investigate how traffic at time is correlated with that at apart from . Thus, the LRD at time on a point-by-point basis, that is, , may be difficult to be used in practice. In addition to this, since the local irregularity of traffic is independent of its LRD while linearly correlates to (see (4.13)), may be unsatisfactory to characterize the LRD property of traffic. Therefore, we propose the following expression to describe the LRD of traffic: where the subscript implies the mean.
Note 1. should be understood on an interval-by-interval basis.
Note 2. is uncorrelated with . Denote by corr as a correlation operator. Then, considering that is a constant, we have
Note 3. According to (4.13), we have Equation (4.17) exhibits that is completely correlated with .
We show two demonstrations of real-traffic traces named DEC-PKT-1.TCP and DEC-PKT-2.TCP that were recorded at Digital Equipment Corporation (DEC) in March 1995. Figure 2 plots its first 1025 data of traffic DEC-PKT-1.TCP, which is denoted by to imply the size of the th packet . Figure 3 shows its of the first 8193 data points. The value of for DEC-PKT-1.TCP equals to 0.756 in the range of . Figures 4 and 5 are plots for DEC-PKT-2.TCP, where . The plots in Figures 3 and 5 exhibit that traffic has highly local irregularity as discussed by Li and Lim [19] on an interval-by-interval basis.
Figure 2: Traffic trace DEC-PKT-1.TCP in packet size.
Figure 3: of DEC-PKT-1.TCP for . .
Figure 4: Traffic trace DEC-PKT-2.TCP in packet size.
Figure 5: of DEC-PKT-2.TCP for . .
5. Conclusions
The key idea in this paper is to describe small-time scaling and large-time one of traffic, separately. Following this idea, we have explained the limitation of the standard mBm in this regard because the local irregularity of traffic because of mBm linearly relates to its . To relax this restriction, we suggest to use to describe the local irregularity of traffic on a point-by-point basis for the small scaling phenomenon and propose to use , instead of , to represent the LRD of traffic for the large scaling phenomenon on an interval-by-interval basis, providing a promising candidate to study the scaling phenomena of traffic. The present results, in methodology, may be applied to random data in related issues, for example, those in [96111], for the scaling analysis.
Acknowledgments
This work was partly supported by the National Natural Science Foundation of China (NSFC) under the Project Grant nos. 60573125, 60873264, 61070214, and 60870002, the 973 plan under the Project no. 2011CB302800/2011CB302802, NCET, and the Science and Technology Department of Zhejiang Province (nos. 2009C21008, 2010R10006, 2010C33095, Y1090592).
References
1. M. Li and W. Zhao, “Sufficient condition for min-plus deconvolution to be closed in the service-curve set in computer networks,” International Journal of Computers, vol. 1, no. 3, pp. 163–166, 2007.
2. M. Li, “Recent results on the inverse of min-plus convolution in computer networks,” International Journal of Engineering and Interdisciplinary Mathematics, vol. 1, no. 1, pp. 1–9, 2009. View at Publisher · View at Google Scholar
3. M. Li and P. Borgnat, “Foreword to the special issue on traffic modeling, its computations and applications,” Telecommunication Systems, vol. 43, no. 3-4, pp. 145–146, 2010. View at Publisher · View at Google Scholar · View at Scopus
4. H. Michiel and K. Laevens, “Teletraffic engineering in a broad-band era,” Proceedings of the IEEE, vol. 85, no. 12, pp. 2007–2033, 1997. View at Publisher · View at Google Scholar · View at Scopus
5. W. Willinger, R. Govindan, S. Jamin, V. Paxson, and S. Shenker, “Scaling phenomena in the internet: critically examining criticality,” Proceedings of the National Academy of Sciences of the United States of America, vol. 99, no. 1, pp. 2573–2580, 2002. View at Publisher · View at Google Scholar · View at PubMed · View at Scopus
6. A. Feldmann, A. C. Gilbert, W. Willinger, and T. G. Kurtz, “The changing nature of network traffic: scaling phenomena,” ACM SIGCOMM Computer Communication Review, vol. 28, no. 2, pp. 5–29, 1998. View at Scopus
7. Y. Jiang, “Per-domain packet scale rate guarantee for expedited forwarding,” IEEE/ACM Transactions on Networking, vol. 14, no. 3, pp. 630–643, 2006. View at Publisher · View at Google Scholar · View at Scopus
8. K. Papagiannaki, R. Cruz, and C. Diot, “Network performance monitoring at small time scales,” in Proceedings of the 2003 ACM SIGCOMM Internet Measurement Conference (IMC '03), pp. 295–300, Miami, Fla, USA, October 2003. View at Scopus
9. V. Paxson and S. Floyd, “Wide area traffic: the failure of Poisson modeling,” IEEE/ACM Transactions on Networking, vol. 3, no. 3, pp. 226–244, 1995. View at Publisher · View at Google Scholar · View at Scopus
10. W. Stalling, High-Speed Networks: TCP/IP and ATM Design Principles, Prentice Hall, Upper Saddle River, NJ, USA, 2nd edition, 2002.
11. D. McDysan, QoS & Traffic Management in IP & ATM Networks, McGraw-Hill, Chicago, Ill, USA, 2000.
12. J. M. Pitts and J. A. Schormans, Introduction to ATM Design and Performance: with Applications Analysis Software, John Wiley & Sons, New York, NY, USA, 2nd edition, 2000.
13. W. E. Leland, M. S. Taqqu, W. Willinger, and D. V. Wilson, “On the self-similar nature of Ethernet traffic (extended version),” IEEE/ACM Transactions on Networking, vol. 2, no. 1, pp. 1–15, 1994. View at Publisher · View at Google Scholar · View at Scopus
14. J. Beran, R. Sherman, M. S. Taqqu, and W. Willinger, “Long-range dependence in variable-bit-rate video traffic,” IEEE Transactions on Communications, vol. 43, no. 234, pp. 1566–1579, 1995. View at Publisher · View at Google Scholar · View at Scopus
15. B. Tsybakov and N. D. Georganas, “Self-similar processes in communications networks,” IEEE Transactions on Information Theory, vol. 44, no. 5, pp. 1713–1725, 1998. View at Zentralblatt MATH · View at Scopus
16. W. Willinger and V. Paxson, “Where mathematics meets the internet,” Notices of the American Mathematical Society, vol. 45, no. 8, pp. 961–970, 1998. View at Zentralblatt MATH
17. A. Adas, “Traffic models in broadband networks,” IEEE Communications Magazine, vol. 35, no. 7, pp. 82–89, 1997. View at Scopus
18. A. Ayache, S. Cohen, and J. Levy Vehel, “Covariance structure of Multifractional Brownian motion, with application to long range dependence,” in Proceedings of the IEEE Interntional Conference on Acoustics, Speech, and Signal Processing (ICASSP '00), vol. 6, pp. 3810–3813, June 2000. View at Scopus
19. M. Li and S. C. Lim, “Modeling network traffic using generalized Cauchy process,” Physica A, vol. 387, no. 11, pp. 2584–2594, 2008. View at Publisher · View at Google Scholar · View at Scopus
20. M. Li and S. C. Lim, “Power spectrum of generalized Cauchy process,” Telecommunication Systems, vol. 43, no. 3-4, pp. 219–222, 2010. View at Publisher · View at Google Scholar · View at Scopus
21. M. Li, Teletraffic Modeling Relating to Generalized Cauchy Process: Empirical Study, VDM, Saarbrücken, Germany, 2009.
22. M. Li, “Generation of teletraffic of generalized Cauchy type,” Physica Scripta, vol. 81, no. 2, Article ID 025007, 10 pages, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
23. M. Li, “Self-Similarity and long-range dependence in teletraffic,” in Proceedings of the 9th WSEAS International Conference on Multimedia Systems and Signal Processing, pp. 19–24, Hangzhou, China, May 2009.
24. M. Li, “Essay on teletraffic models (I),” in Proceedings of the 9th WSEAS International Conference on Applied Computer and Computational Science (ACACOS '10), pp. 130–135, Hangzhou, China, April 2010.
25. M. Li, S. C. Lim, and H. Feng, “A novel description of multifractal phenomenon of network traffic based on generalized cauchy process,” in Proceedings of the 7th International Conference on Computational Science (ICCS '07), Y. Shi, van Albada, Sloot, and Dongarra, Eds., vol. 4489 of Lecture Notes in Computer Science, pp. 1–9, Springer, May 2007.
26. R. L. Cruz, “A calculus for network delay—I: network elements in isolation,” IEEE Transactions on Information Theory, vol. 37, no. 1, pp. 114–131, 1991. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
27. R. L. Cruz, “A calculus for network delay. II. Network analysis,” IEEE Transactions on Information Theory, vol. 37, no. 1, pp. 132–141, 1991.
28. M. Li and W. Zhao, “Representation of a stochastic traffic bound,” IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 9, pp. 1368–1372, 2010. View at Publisher · View at Google Scholar · View at Scopus
29. A. Raha, S. Kamat, X. Jia, and W. Zhao, “Using traffic regulation to meet end-to-end deadlines in ATM networks,” IEEE Transactions on Computers, vol. 48, no. 9, pp. 917–935, 1999. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
30. Y.-M. Jiang and Y. Liu, Stochastic Network Calculus, Springer, Berlin, Germany, 2008.
31. J.-Y. Le Boudec and P. Thiran, Network Calculus, vol. 2050 of Lecture Notes in Computer Science, Springer, Berlin, German, 2001. View at Publisher · View at Google Scholar
32. A. K. Erlang, “Telefon-ventetider. et stykke sandsynlighedsregning,” Matematisk Tidsskrift B, pp. 25–42, 1920.
33. E. Brockmeyer, H. L. Halstrøm, and A. Jensen, “The life and works of A. K. Erlang,” Transactions of the Danish Academy of Technical Sciences, vol. 1948, no. 2, pp. 23–100, 1948. View at Zentralblatt MATH
34. Z. Bojkovic, M. Bakmaz, and B. Bakmaz, “Originator of teletraffic theory,” Proceedings of the IEEE, vol. 98, no. 1, pp. 123–127, 2009. View at Publisher · View at Google Scholar · View at Scopus
35. F. Le Gall, “One moment model for telephone traffic,” Applied Mathematical Modelling, vol. 6, no. 6, pp. 415–423, 1982. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
36. P. M. Lin, B. J. Leon, and C. R. Stewart, “Analysis of circuit-switched networks employing originating-office control with spill-forward,” IEEE Transactions on Communications, vol. 26, no. 6, pp. 754–765, 1978. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
37. D. R. Manfield and T. Downs, “On the one-moment analysis of telephone traffic networks,” IEEE Transactions on Communications, vol. 27, no. 8, pp. 1169–1174, 1979. View at Publisher · View at Google Scholar · View at Scopus
38. M. Reiser, “Performance evaluation of data communication systems,” Proceedings of the IEEE, vol. 70, no. 2, pp. 171–196, 1982. View at Publisher · View at Google Scholar · View at Scopus
39. J. D. Gibson, Ed., The Communications Handbook, IEEE Press, 1997.
40. R. B. Cooper, Introduction to Queueing Theory, North-Holland, New York, NY, USA, 2nd edition, 1981.
41. H. Akimaru and K. Kawashima, Teletraffic: Theory and Applications, Springer, Berlin, Germany, 1993.
42. V. Paxson, Measurements and analysis of end-to-end internet dynamics, Ph.D. thesis, University of California, Berkeley, Calif, USA, 1997.
43. V. Paxson, “Growth trends in wide-area TCP connections,” IEEE Network, vol. 8, no. 4, pp. 8–17, 1994.
44. W. A. Fuller, Introduction to Statistical Time Series, Wiley Series in Probability and Statistics: Probability and Statistics, John Wiley & Sons, New York, NY, USA, 2nd edition, 1996.
45. G. E. P. Box, G. M. Jenkins, and G. C. Reinsel, Time Series Analysis, Prentice Hall, Englewood Cliffs, NJ, USA, 3rd edition, 1994.
46. S. K. Mitra and J. F. Kaiser, Handbook for Digital Signal Processing, John Wiley & Sons, New York, NY, USA, 1993.
47. J. S. Bendat and A. G. Piersol, Random Data: Analysis and Measurement Procedure, John Wiley & Sons, New York, NY, USA, 3rd edition, 2000.
48. A. Papoulis, Probability, Random Variables, and Stochastic Processes, McGraw-Hill Series in Electrical Engineering. Communications and Information Theory, McGraw-Hill, New York, NY, USA, 1997.
49. J. L. Doob, “The elementary Gaussian processes,” Annals of Mathematical Statistics, vol. 15, pp. 229–282, 1944. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
50. J. Beran, Statistics for Long-Memory Processes, vol. 61 of Monographs on Statistics and Applied Probability, Chapman and Hall, New York, NY, USA, 1994.
51. J. Beran, “Statistical methods for data with long-range dependence,” Statistical Science, vol. 7, no. 4, pp. 404–416, 1992. View at Publisher · View at Google Scholar
52. N. C. Nigam, Introduction to Random Vibrations, The MIT Press, Cambridge, Mass, USA, 1983.
53. J. D. Murray, Asymptotic Analysis, vol. 48 of Applied Mathematical Sciences, Springer, New York, NY, USA, 2nd edition, 1984.
54. P. Abry, P. Borgnat, F. Ricciato, A. Scherrer, and D. Veitch, “Revisiting an old friend: on the observability of the relation between long range dependence and heavy tail,” Telecommunication Systems, vol. 43, no. 3-4, pp. 147–165, 2010. View at Publisher · View at Google Scholar · View at Scopus
55. R. P. Kanwal, Generalized Functions: Theory and Applications, Birkhäuser, Boston, Mass, USA, 3rd edition, 2004.
56. I. M. Gelfand and K. Vilenkin, Generalized Functions, vol. 1, Academic Press, New York, NY, USA, 1964.
57. M. Li, “Fractal time series—a tutorial review,” Mathematical Problems in Engineering, vol. 2010, Article ID 157264, 26 pages, 2010. View at Zentralblatt MATH
58. G. Samorodnitsky and M. S. Taqqu, Stable Non-Gaussian Random Processes, Stochastic Modeling, Chapman & Hall, New York, NY, USA, 1994.
59. P. Flandrin, “On the spectrum of fractional Brownian motions,” IEEE Transactions on Information Theory, vol. 35, no. 1, pp. 197–199, 1989. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
60. I. Csabai, “1/f noise in computer network traffic,” Journal of Physics A, vol. 27, no. 12, article 004, pp. L417–L421, 1994. View at Publisher · View at Google Scholar · View at Scopus
61. Y. G. Sinaĭ, “Self-similar probability distributions,” Theory of Probability and Its Applications, vol. 21, no. 1, pp. 63–80, 1976. View at Zentralblatt MATH
62. M. Li and S. C. Lim, “A rigorous derivation of power spectrum of fractional Gaussian noise,” Fluctuation and Noise Letters, vol. 6, no. 4, pp. C33–C36, 2006. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
63. M. Li, W. Zhao, and S. Chen, “FGN based telecommunication traffic models,” WSEAS Transactions on Computers, vol. 9, no. 7, pp. 706–715, 2010.
64. B. B. Mandelbrot, The Fractal Geometry of Nature, W. H. Freeman, San Francisco, Calif, USA, 1982.
65. F. A. Tobagi, R. W. Peebles, and E. G. Manning, “Modeling and measurement techniques in packet communication networks,” Proceedings of the IEEE, vol. 66, no. 11, pp. 1423–1447, 1978. View at Publisher · View at Google Scholar · View at Scopus
66. R. Jain and S. A. Routhier, “Packet trains-measurements and a new model for computer network traffic,” IEEE Journal on Selected Areas in Communications, vol. 4, no. 6, pp. 986–995, 1986. View at Publisher · View at Google Scholar · View at Scopus
67. H. Jiang and C. Dovrolis, “Why is the internet traffic bursty in short time scales?” in Proceedings of the International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS '05), vol. 33, pp. 241–252, June 2005. View at Publisher · View at Google Scholar · View at Scopus
68. P. Nain, “Impact of bursty traffic on queues,” Statistical Inference for Stochastic Processes, vol. 5, no. 3, pp. 307–320, 2002. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
69. M. Draief and J. Mairesse, “Services within a busy period of an M/M/1 queue and dyck paths,” Queueing Systems, vol. 49, no. 1, pp. 73–84, 2005. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
70. F. Németh, P. Barta, R. Szabó, and J. Bíró, “Network internal traffic characterization and end-to-end delay bound calculus for generalized processor sharing scheduling discipline,” Computer Networks, vol. 48, no. 6, pp. 910–940, 2005. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
71. C. Li and W. Zhao, “Stochastic performance analysis of non-feedforward networks,” Telecommunication Systems, vol. 43, no. 3-4, pp. 237–252, 2010. View at Publisher · View at Google Scholar · View at Scopus
72. Y. Jiang, Q. Yin, Y. Liu, and S. Jiang, “Fundamental calculus on generalized stochastically bounded bursty traffic for communication networks,” Computer Networks, vol. 53, no. 12, pp. 2011–2021, 2009. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
73. S. Wang, D. Xuan, R. Bettati, and W. Zhao, “Toward statistical QoS guarantees in a differentiated services network,” Telecommunication Systems, vol. 43, no. 3-4, pp. 253–263, 2010. View at Publisher · View at Google Scholar · View at Scopus
74. D. Starobinski and M. Sidi, “Stochastically bounded burstiness for communication networks,” IEEE Transactions on Information Theory, vol. 46, no. 1, pp. 206–212, 2000. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
75. R. G. Bartle and D. R. Sherbert, Introduction to Real Analysis, John Wiley & Sons, New York, NY, USA, 3rd edition, 2000.
76. W. F. Trench, Introduction to Real Analysis, Pearson Education, 2003.
77. W. Willinger, M. S. Taqqu, R. Sherman, and D. V. Wilson, “Self-similarity through high-variability: statistical analysis of Ethernet LAN traffic at the source level,” IEEE/ACM Transactions on Networking, vol. 5, no. 1, pp. 71–86, 1997. View at Publisher · View at Google Scholar · View at Scopus
78. C. Estan and G. Varghese, “New directions in traffic measurement and accounting: focusing on the elephants, ignoring the mice,” ACM Transactions on Computer Systems, vol. 21, no. 3, pp. 270–313, 2003. View at Publisher · View at Google Scholar · View at Scopus
79. A. Gravey, J. Boyer, K. Sevilla, and J. Mignault, “Resource allocation for worst case traffic in ATM networks,” Performance Evaluation, vol. 30, no. 1-2, pp. 19–43, 1997. View at Publisher · View at Google Scholar · View at Scopus
80. K. Tian and M. Li, “A reliable anomaly detector against low-rate DDOS attack,” International Journal of Electronics and Computers, vol. 1, no. 1, pp. 1–6, 2009.
81. E. W. Knightly and N. B. Shroff, “Admission control for statistical QoS: theory and practice,” IEEE Network, vol. 13, no. 2, pp. 20–29, 1999. View at Publisher · View at Google Scholar · View at Scopus
82. A. Raha, W. Zhao, S. Kamat, and W. Jia, “Admission control for hard real-time connections in ATM LANs,” IEE Proceedings, vol. 148, no. 4, pp. 1–12, 2001. View at Publisher · View at Google Scholar · View at Scopus
83. X. Jia, W. Zhao, and J. Li, “An integrated routing and admission control mechanism for real-time multicast connections in ATM networks,” IEEE Transactions on Communications, vol. 49, no. 9, pp. 1515–1519, 2001. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
84. R. J. Adler, The Geometry of Random Fields, John Wiley & Sons, Chichester, UK, 1981, Wiley Series in Probability and Mathematical Statistic.
85. P. Hall and R. Roy, “On the relationship between fractal dimension and fractal index for stationary stochastic processes,” The Annals of Applied Probability, vol. 4, no. 1, pp. 241–253, 1994. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
86. G. Chan, P. Hall, and D. S. Poskitt, “Periodogram-based estimators of fractal properties,” The Annals of Statistics, vol. 23, no. 5, pp. 1684–1711, 1995. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
87. J. T. Kent and A. T. A. Wood, “Estimating the fractal dimension of a locally self-similar gaussian process by using increments,” Journal of the Royal Statistical Society Series B, vol. 59, no. 3, pp. 679–699, 1997. View at Zentralblatt MATH · View at Scopus
88. T. Gneiting and M. Schlather, “Stochastic models that separate fractal dimension and the hurst effect,” SIAM Review, vol. 46, no. 2, pp. 269–282, 2004. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
89. S. C. Lim and M. Li, “A generalized Cauchy process and its application to relaxation phenomena,” Journal of Physics A, vol. 39, no. 12, pp. 2935–2951, 2006. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
90. M. Li, W. Jia, and W. Zhao, “A whole correlation structure of asymptotically self-similar traffic in communication networks,” in Proceedings of the 1st International Conference on Web Information Systems Engineering (WISE '00), pp. 461–466, Hong Kong, June 2000. View at Publisher · View at Google Scholar
91. R. F. Peltier and J. Levy-Vehel, “A new method for estimating the parameter of fractional Brownian motion,” Tech. Rep. RR 2696, INRIA, 1994.
92. R. F. Peltier and J. Levy-Vehel, “Multifractional Brownian motion: definition and preliminaries results,” Tech. Rep. RR 2645, INRIA, 1995.
93. A. Benassi, S. Jaffard, and D. Roux, “Elliptic gaussian random processes,” Revista Matematica Iberoamericana, vol. 13, no. 1, pp. 19–90, 1997. View at Zentralblatt MATH · View at Scopus
94. M. Li, S. C. Lim, and W. Zhao, “Investigating multi-fractality of network traffic using local Hurst function,” Advanced Studies in Theoretical Physics, vol. 2, no. 10, pp. 479–490, 2008.
95. S. V. Muniandy, S. C. Lim, and R. Murugan, “Inhomogeneous scaling behaviors in Malaysian foreign currency exchange rates,” Physica A, vol. 301, no. 1–4, pp. 407–428, 2001. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
96. M. Scalia, G. Mattioli, and C. Cattani, “Analysis of large-amplitude pulses in short time intervals: application to neuron interactions,” Mathematical Problems in Engineering, vol. 2010, Article ID 895785, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
97. C. Cattani, “Fractals and hidden symmetries in DNA,” Mathematical Problems in Engineering, vol. 2010, Article ID 507056, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
98. C. Cattani, “Harmonic wavelet approximation of random, fractal and high frequency signals,” Telecommunication Systems, vol. 43, no. 3-4, pp. 207–217, 2010. View at Publisher · View at Google Scholar · View at Scopus
99. E. G. Bakhoum and C. Toma, “Dynamical aspects of macroscopic and quantum transitions due to coherence function and time series events,” Mathematical Problems in Engineering, vol. 2010, Article ID 428903, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
100. E. G. Bakhoum and C. Toma, “Mathematical transform of traveling-wave equations and phase aspects of quantum interaction,” Mathematical Problems in Engineering, vol. 2010, Article ID 695208, 15 pages, 2010. View at Zentralblatt MATH
101. D. She and X. Yang, “A new adaptive local linear prediction method and its application in hydrological time series,” Mathematical Problems in Engineering, vol. 2010, Article ID 205438, 15 pages, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
102. M. Humi, “Assessing local turbulence strength from a time series,” Mathematical Problems in Engineering, vol. 2010, Article ID 316841, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
103. M. Dong, “A tutorial on nonlinear time-series data mining in engineering asset health and reliability prediction: concepts, models, and algorithms,” Mathematical Problems in Engineering, vol. 2010, Article ID 175936, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
104. M. Li and J.-Y. Li, “On the predictability of long-range dependent series,” Mathematical Problems in Engineering, vol. 2010, Article ID 397454, 9 pages, 2010. View at Zentralblatt MATH
105. Z. Liu, “Chaotic time series analysis,” Mathematical Problems in Engineering, vol. 2010, Article ID 720190, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
106. G. Toma, “Specific differential equations for generating pulse sequences,” Mathematical Problems in Engineering, vol. 2010, Article ID 324818, 11 pages, 2010. View at Zentralblatt MATH
107. O. M. Abuzeid, A. N. Al-Rabadi, and H. S. Alkhaldi, “Fractal geometry-based hypergeometric time series solution to the hereditary thermal creep model for the contact of rough surfaces using the Kelvin-Voigt medium,” Mathematical Problems in Engineering, vol. 2010, Article ID 652306, 22 pages, 2010. View at Publisher · View at Google Scholar
108. M. Li, “Change trend of averaged Hurst parameter of traffic under DDOS flood attacks,” Computers and Security, vol. 25, no. 3, pp. 213–220, 2006. View at Publisher · View at Google Scholar · View at Scopus
109. C. Zhang, X. Bai, J. Teng, D. Xuan, and W. Jia, “Constructing low-connectivity and full-coverage three dimensional sensor networks,” IEEE Journal on Selected Areas in Communications, vol. 28, no. 7, pp. 984–993, 2010. View at Publisher · View at Google Scholar
110. M. Li, C. Cattani, and S.-Y. Chen, “Viewing sea level by a one-dimensional random function with long memory, accepted for publication,” Mathematical Problems in Engineering, vol. 2011, Article ID 654284, 13 pages, 2011. View at Publisher · View at Google Scholar
111. M. Li, “A class of negatively fractal-dimensional Gaussian random functions,” Mathematical Problems in Engineering, vol. 2011, Article ID 291028, 18 pages, 2011.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:02:22.000Z
|
qqa45u567atnlt5geu77w2c7wq3mxa7m
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27944",
"uncompressed_offset": 511261569,
"url": "www.isfdb.org/cgi-bin/pl.cgi",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://www.isfdb.org/cgi-bin/pl.cgi?58708"
}
|
cccc_CC-MAIN-2013-20
|
Publication Listing
You are not logged in. If you create a free account and sign in, you will be able to customize what is displayed.
Cover art hosted by ISFDB
Contents (view Concise Listing)
Verification Status
Reference Status
Primary Verified by Cayer1886 on 2009-06-20 08:33:57
Clute/Nicholls Not Verified
Clute/Grant Not Verified
Contento1 (anth/coll) Not Verified
Locus1 Not Verified
Reginald1 Not Verified
Reginald3 Not Verified
Tuck Not Verified
Miller/Contento Not Verified
Bleiler1 (Gernsback) Not Verified
Currey Not Verified
Primary (Transient) Verified by Swfritter on 2008-04-09 17:54:53
Bleiler78 Not Verified
OCLC/Worldcat Not Verified
Primary2 Not Verified
Primary3 Not Verified
Primary4 Not Verified
Primary5 Not Verified
Copyright (c) 1995-2011 Al von Ruff.
ISFDB Engine - Version 4.00 (04/24/06)
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:59:06.000Z
|
ekd5thjrogtzn52zk6rwdqxa2ojn7rgo
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27965",
"uncompressed_offset": 629152820,
"url": "www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A2001.05.0122%3Achapter%3D6.42%3Asection%3Dc.6.42.68%3Apage%3D166",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A2001.05.0122%3Achapter%3D6.42%3Asection%3Dc.6.42.68%3Apage%3D166"
}
|
cccc_CC-MAIN-2013-20
|
[166] After crossing Pearl river I was under the immediate command of General Jackson, and was marching in the rear or flank of the enemy for several days, and became again engaged with him near Meridian on the 14th ult. The First Mississippi was placed in line on the road leading from Meridian to Demopolis, and a mounted squadron from the Twenty-eighth Mississippi regiment on right of road near hospital, and skirmished briskly with them at that point, when they fell back to a position in the rear of the Twenty-eighth Mississippi regiment, which was formed in line dismounted. This regiment then engaged them and fell back in rear of Ballentine's regiment, which was formed in line mounted; the enemy in the mean time keeping up a brisk fire from his artillery and infantry.
I then withdrew my brigade and formed it in line on the west side of the railroad, their right resting on it, which position I held until the enemy had advanced in force, when I withdrew my command on the road leading from Meridian to Demopolis and skirmished with him there; when compelled to fall back, did so on the road leading from Meridian towards Lauderdale Springs, and bivouaced for the night at------. My artillery was not present this day, having been ordered back towards Enterprise by General Jackson, they not being able to keep up with the column, which was moving rapidly towards Meridian, in order to reach that point before the enemy. I remained in the vicinity of Meridian for three days, and then proceeded to Lauderdale Springs via Almucha, moving from that point to Starksville via Macon to meet the column advancing down the Mobile and Ohio railroad, from Tennessee, under command of Generals Smith and Grierson. Upon arrival at Starksville it was found that they had been driven back by General Forrest.
I was then ordered by General Jackson to move my brigade to the vicinity of Sharon and Canton, via Kosciusko, which I did, arriving at Sharon on the 27th ultimo. I saw no more of the enemy until my arrival there, and as their column was marching on the road leading from Ratcliff's Ferry to Canton, which passes within a short distance of this place, my advance guard soon became engaged with him. I sent forward Ballentine's regiment, who commenced skirmishing with him, but a superior force coming up, soon compelled it to fall back, which it did in good order, and I left a squadron of the First Mississippi regiment in the edge of the town to cover its retreat and fell back to a good position about one mile to the rear, where I had placed my artillery (a section of King's battery), and there formed a line of battle. This position I held until dark, when I fell back five miles for water
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License.
An XML version of this text is available for download, with the additional restriction that you offer Perseus any modifications you make. Perseus provides credit for all accepted changes, storing new additions in a versioning system.
hide People (automatically extracted)
Sort people alphabetically, as they appear on the page, by frequency
Click on a person to search for him/her in this document.
W. H. Jackson (3)
Jonathan Ballentine (2)
Kirby Smith (1)
King (1)
Grierson (1)
Forrest (1)
hide Dates (automatically extracted)
Sort dates alphabetically, as they appear on the page, by frequency
Click on a date to search for it in this document.
27th (1)
14th (1)
hide Display Preferences
Greek Display:
Arabic Display:
View by Default:
Browse Bar:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:11:31.000Z
|
ilpam5ekts5wbkqj7iidnuvpogv7ran2
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27966",
"uncompressed_offset": 629184479,
"url": "www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A2001.05.0174%3Achapter%3D2.23%3Apage%3D374",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A2001.05.0174%3Achapter%3D2.23%3Apage%3D374"
}
|
cccc_CC-MAIN-2013-20
|
[374]
Chapter 57: the Ku-Klux Klan
After Congress had overthrown President Johnson's plan and had completed the formal reconstruction of the insurrectionary States according to its own views, the political disabilities of the late Confederates deprived them of suffrage and placed the political control of these States in a new party, composed of Southern Union men, Northern men who at the end of the war settled in the South, and the negroes.
Politicians of the Republican Party hoped through this combination to keep the Southern States Republican on national issues and secure the rights of complete citizenship to the new voters.
The negroes were generally very ignorant and not wisely led, and even if they had been the wisest of rulers the opposition of the whites to being ruled by their late slaves would have been naturally very fierce.
The opposition, as yet powerless at the polls, was greatly strengthened by the course, hostile to Congress, which President Johnson had pursued, and early in 1868 began to show itself in the operations here and there of certain secret organizations. The primary object of these associations was undoubtedly political, in some places avowed to be in opposition to the Union Leagues, that favored strong national control in the South, leagues which not only took form in Northern
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License.
An XML version of this text is available for download, with the additional restriction that you offer Perseus any modifications you make. Perseus provides credit for all accepted changes, storing new additions in a versioning system.
hide Places (automatically extracted)
View a map of the most frequently mentioned places in this document.
Visualize the most frequently mentioned Pleiades ancient places in this text.
Download Pleiades ancient places geospacial dataset for this text.
hide People (automatically extracted)
Sort people alphabetically, as they appear on the page, by frequency
Click on a person to search for him/her in this document.
Andrew Johnson (2)
hide Dates (automatically extracted)
Sort dates alphabetically, as they appear on the page, by frequency
Click on a date to search for it in this document.
1868 AD (1)
hide Display Preferences
Greek Display:
Arabic Display:
View by Default:
Browse Bar:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:20:48.000Z
|
33foftetyxr6263rvj52rsmjtvewq3mp
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27967",
"uncompressed_offset": 629212982,
"url": "www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A2001.05.0093%3Achapter%3D111",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://www.perseus.tufts.edu/hopper/text?doc=Perseus:text:2001.05.0093:chapter=111"
}
|
cccc_CC-MAIN-2013-20
|
Doc. 108.-rebel retaliation.
In the Virginia State Senate on March tenth, Mr. Grice offered the following:
Whereas, The General Assembly of Virginia have learned that the Reverend George M. Bain, Cashier of the Portsmouth Savings Bank Society, and William H. H. Hodges, Cashier of the Merchants and Mechanics' Savings Bank, citizens of Portsmouth, Virginia, the first-named being over sixty years of age, and the other a cripple, have been arrested and sentenced to hard labor at Hatteras, North-Carolina, by order of Major-General Butler, or some other officer of the Federal Government, for alleged fraudulent disposal of the funds of their banks; and that the Reverend John I. Ringfield, Rector of Trinity Episcopal Church, Portsmouth, had been put to hard labor in the public streets of that city, with a ball and chain to his leg, because he refused to renounce his allegiance to his native State; therefore,
Be it enacted by the General Assembly, That the Governor of the Commonwealth be, and he is hereby requested to invite the attention of the confederate government to the arrest and sentence of these three worthy citizens of this State, and to respectfully ask that the facts may be investigated; and, if found as stated and believed, that three citizens of the Federal States (if there be such in the hands of the confederate authorities) be held at hard labor, one with ball and chain, on the public streets, as hostages for Messrs. Bain, Hodges, and Wingfield.
The rules having been suspended, the preamble and resolution were unanimously passed and ordered to be communicated to the House.
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License.
An XML version of this text is available for download, with the additional restriction that you offer Perseus any modifications you make. Perseus provides credit for all accepted changes, storing new additions in a versioning system.
hide Places (automatically extracted)
View a map of the most frequently mentioned places in this document.
Sort places alphabetically, as they appear on the page, by frequency
Click on a place to search for it in this document.
Portsmouth, Va. (Virginia, United States) (2)
Trinity (Texas, United States) (1)
Cape Hatteras (North Carolina, United States) (1)
Visualize the most frequently mentioned Pleiades ancient places in this text.
Download Pleiades ancient places geospacial dataset for this text.
hide People (automatically extracted)
Sort people alphabetically, as they appear on the page, by frequency
Click on a person to search for him/her in this document.
William H. H. Hodges (2)
George M. Bain (2)
Wingfield (1)
John I. Ringfield (1)
Grice (1)
Doc (1)
J. A. Butler (1)
hide Dates (automatically extracted)
Sort dates alphabetically, as they appear on the page, by frequency
Click on a date to search for it in this document.
March 10th (1)
hide Display Preferences
Greek Display:
Arabic Display:
View by Default:
Browse Bar:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:21:02.000Z
|
44szmcmwv3x2limutg4jqkkbmgv3vtwd
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27968",
"uncompressed_offset": 629233401,
"url": "www.perseus.tufts.edu/hopper/text?doc=urn%3Acts%3AgreekLit%3Atlg0526.tlg001.perseus-eng1%3A6.170",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://www.perseus.tufts.edu/hopper/text?doc=urn:cts:greekLit:tlg0526.tlg001.perseus-eng1:6.170"
}
|
cccc_CC-MAIN-2013-20
|
[170] NOW the Philistines gathered themselves together again no very long time afterward; and having gotten together a great army, they made war against the Israelites; and having seized a place between Shochoh and Azekah, they there pitched their camp. Saul also drew out his army to oppose them; and by pitching his own camp on a certain hill, he forced the Philistines to leave their former camp, and to encamp themselves upon such another hill, over-against that on which Saul's army lay, so that a valley, which was between the two hills on which they lay, divided their camps asunder. Now there came down a man out of the camp of the Philistines, whose name was Goliath, of the city of Gath, a man of vast bulk, for he was of four cubits and a span in tallness, and had about him weapons suitable to the largeness of his body, for he had a breastplate on that weighed five thousand shekels: he had also a helmet and greaves of brass, as large as you would naturally suppose might cover the limbs of so vast a body. His spear was also such as was not carried like a light thing in his right hand, but he carried it as lying on his shoulders. He had also a lance of six hundred shekels; and many followed him to carry his armor. Wherefore this Goliath stood between the two armies, as they were in battle array, and sent out aloud voice, and said to Saul and the Hebrews, "I will free you from fighting and from dangers; for what necessity is there that your army should fall and be afflicted? Give me a man of you that will fight with me, and he that conquers shall have the reward of the conqueror and determine the war; for these shall serve those others to whom the conqueror shall belong; and certainly it is much better, and more prudent, to gain what you desire by the hazard of one man than of all." When he had said this, he retired to his own camp; but the next day he came again, and used the same words, and did not leave off for forty days together, to challenge the enemy in the same words, till Saul and his army were therewith terrified, while they put themselves in array as if they would fight, but did not come to a close battle.
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License.
An XML version of this text is available for download, with the additional restriction that you offer Perseus any modifications you make. Perseus provides credit for all accepted changes, storing new additions in a versioning system.
load focus Greek (B. Niese, 1892)
hide Places (automatically extracted)
View a map of the most frequently mentioned places in this document.
Visualize the most frequently mentioned Pleiades ancient places in this text.
Download Pleiades ancient places geospacial dataset for this text.
hideData/Identifiers
Citation URN: urn:cts:greekLit:tlg0526.tlg001.perseus-eng1:6.170
Document URN: urn:cts:greekLit:tlg0526.tlg001.perseus-eng1
hide Display Preferences
Greek Display:
Arabic Display:
View by Default:
Browse Bar:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:50:03.000Z
|
uhwl7lpk2iaqwbg7nepcnspz22tqj2yn
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27976",
"uncompressed_offset": 676609696,
"url": "www.seroundtable.com/adsense-ie-security-warning-14707.html",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://www.seroundtable.com/adsense-ie-security-warning-14707.html"
}
|
cccc_CC-MAIN-2013-20
|
Google AdSense Causing IE8 Security Warnings
Feb 10, 2012 • 8:14 am | (0) by | Filed Under Google AdSense
There are reports at WebmasterWorld and Google AdSense Help of users of Internet Explorer 8 having issues viewing pages with Google AdSense on them.
On user explained:
Windows XP visitors using IE 8 on several of my Adsense sites see an error message "Internet Explorer has blocked this website from displaying content with security certificate errors."
Without AdSense loaded there is no error. Turns out you have to update the root certificates for your computer at windows update manually if you have an XP computer. Windows doesn't automatically update these certificates for XP users.
This is supposedly only happening on a specific version of Internet Explorer and only happening one web sites that contain Google AdSense.
It might be related to a Google change or maybe a Microsoft change. It is unclear at this point.
Forum discussion at WebmasterWorld and Google AdSense Help.
Previous story: Daily Search Forum Recap: February 9, 2012
blog comments powered by Disqus
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:14:33.000Z
|
23ktp5c2bj7l5o4upwb6bfn5lx3armpo
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27977",
"uncompressed_offset": 676618343,
"url": "www.seroundtable.com/archives/001391.html",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://www.seroundtable.com/archives/001391.html"
}
|
cccc_CC-MAIN-2013-20
|
Google AdWords Allows the Sale of "Low Priced Women"
Jan 14, 2005 • 8:29 am | (2) by | Filed Under Legal Issues in Search
It seems as if Google AdWords is allowing (unknowingly) for companies such as eBay to purchase ads (unknowingly) for the "sale of women". Do a search in Google on Women for Sale and look towards the ads on the right. You should see the following ad:
A member at Search Engine Watch Forums is very disturbed by this. This member did a search on women and anger, I believe in the UK, and received an ad that read "Women For Sale Low Priced Women. Big Selection! (aff) - ebay.co.uk". The member asks several questions:
- How is it possible that a company which refuses to use its "relevant" textual advertising on websites that use bad or foul language, would consider an advert for the sale of human beings inoffensive or somehow relevant to its users?
- If I had searched for "africans and anger" would I have been offered Africans for sale at ebay.co.uk too?
- Am I correct in my presumption that there is a mechanism in place that forbids the combination of certain words within your "relevant" advertising that would be deemed inappropriate?
- As in, I will not be offered the sale of Africans via an on-line auction house no matter what search I perform, will I?
- If so, why is there no such mechanism in place to forbid the advertising of the sale of women through your website?
- Is it because you consider women to be off less importance than Africans?
- Have you ever heard of the word misogyny?
- What is your opinion of that word and the societal framework that supports it?
- Why was it that, after my initial complaint, only the text of the offending advertisement was changed and not the link itself? Effectively you are still advertising the sale of women through an on-line auction, only using less overt language.
- Since, in the automated response I received, google states that I miraculously saw the advert in the very short space of time between the upload to your site by ebay and its review by your editorial staff, do you not think this a very dangerous practise? This seems like a rather large loophole in which anyone could open an account and upload any manner of malicious, hateful, prejudiced and downright illegal ads. Do you think you should change this policy?
Previous story: SEO Project Management Software Tools
blog comments powered by Disqus
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:29:31.000Z
|
b5y2pgajdmn6zkuzptog7w3jjs4wnivp
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27984",
"uncompressed_offset": 775792805,
"url": "www.werelate.org/wiki/Person:John_Starnes_%281%29",
"warc_date": "2013-11-22T14:52:42.000Z",
"warc_filename": "<urn:uuid:6c23763f-aa51-42d5-a822-3f09c118f4d8>",
"warc_url": "http://www.werelate.org/wiki/Person:John_Starnes_(1)"
}
|
cccc_CC-MAIN-2013-20
|
Person:John Starnes (1)
Watchers
Browse
John Starnes
Facts and Events
Name John Starnes
Gender Male
Contents
Starnes Tapestry
Register
Data.
Notebooks
Analysis
Bibliography
Graphics
YDNA
Index.
The Tapestry
Families Old Chester OldAugusta Germanna
New River SWVP Cumberland Carolina Cradle
The Smokies Old Kentucky
__________________________
Overview
See Starnes Family in Southwest Virginia for source data.
Personal Data
Personal Data
VitaDatumSource/Basis/Comment
DOB:
POB:
DOD:
POD:
Father:Person:Leonard Starnes (1)
Mother:
Spouse:
DOM:
POM:
Children
Name DOB POB DOD POD Spouse DOM POM Dispersion and Notes
Bibliography
See: Leonard Starnes
Footnotes
Image Gallery
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:35:43.000Z
|
ipbjsayphimfe34ncgztoeu53ivt7imv
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:27997",
"uncompressed_offset": 13327007,
"url": "answers.onstartups.com/questions/30579/proper-equity-share-for-very-early-level-startup",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://answers.onstartups.com/questions/30579/proper-equity-share-for-very-early-level-startup"
}
|
cccc_CC-MAIN-2013-20
|
Tell me more ×
Answers OnStartups is a question and answer site for entrepreneurs looking to start or run a new business. It's 100% free, no registration required.
I was offered a position of software engineer at a company of 3 people, but it's technically just one (more on that later). I was offered just about market value for an entry software engineer in my area and about 1% of ISO over a 4 year vesting period.
Here's the catch: The majority of the salary is deferred until they secure the entire seed round of investing they were looking for (currently they have 1/3rd). Two of the co-founders are no longer there (full-time job and school) but are said to continue "helping out when possible". I'd basically be one of two people working on the product full-time.
Is it fair to ask for a little more equity? I had something in the range of 3-5% in mind before they gave me an offer. Is there a better form of equity to ask for other than ISO? If I leave the company in 2 years, do I keep the stock I own but forfeit the 2 additional years that haven't vested?
share|improve this question
2 Answers
First, make sure you read this: Forming a new software startup, how do I allocate ownership fairly? Lots of good stuff in there (and in the comments too).
There's a big question about time and effort. How much has gone into it already? If not that much, then you should get a bigger share.
Is the product live? If it's still in development, pre-launch, then you should get more (perhaps even be considered a founder). It all depends on those pesky little details which only you (and they) know.
If they want to defer a big chunk of your salary, then you have to ask what guarantee you'll have of getting it. For example, if they fail to get all their funding, will you get paid? I'm guessing not. So, in that case you have a massive gamble on their efforts. They also gamble on yours (they need you to build something to get the money). At this point, you're looking more and more like a founder. You certainly should get more options if you have no guarantee of getting paid your deferred salary.
As far as the vesting, yes, that's how it works. If you vest over four years (sounds reasonable to me) and you leave after two, then you get what is vested and you lose what is not. Remember, you're getting options, not stock. You're getting the right to purchase at some price, not actual shares in the company. So, you'll keep those options not that stock. The options will expire at some point if you don't exercise them (maybe 10 years or so - check the terms).
share|improve this answer
Let me add these points:
The two co-founders who aren't working for the company full-time: are their Founder's Shares subject to vesting? If not, then there is a high risk they won't contribute equally to the company's future growth. If so, then if they don't wind up working for the company, their shares should accrue back to the company and accrete to all other stock-holders equally.
It would be a major red-flag for me if the Founder's Equity weren't subject to vesting. I'd insist that it be. This is a critical question that needs answering.
With regard to your deferred compensation, I would ask either -
• that it be paid back in full at Closing. I would also try to negotiate additional equity or options in exchange for deferring your comp: you should be paid for your risk or not getting paid; or,
• should it not be paid in cash, be paid in the class of stock being issued at Closing. You should try and negotiate some discount to the equity price paid by the investors, say, 20% or so, similar to how discounts offered to purchasers of Convertible Notes work.
If you believe in the product and the market and, most importantly, your ability to deliver the product, then it might be a great opportunity, especially if you can resolve these issues.
share|improve this answer
Your Answer
discard
By posting your answer, you agree to the privacy policy and terms of service.
Not the answer you're looking for? Browse other questions tagged or ask your own question.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:08:56.000Z
|
v5iayxcbpjuwoygylvztzs7erzrvqrsl
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28003",
"uncompressed_offset": 16416018,
"url": "archive.mises.org/11446/property-the-great-problem-solver/",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://archive.mises.org/11446/property-the-great-problem-solver/"
}
|
cccc_CC-MAIN-2013-20
|
1. Skip to navigation
2. Skip to content
3. Skip to sidebar
Source link: http://archive.mises.org/11446/property-the-great-problem-solver/
Property: The Great Problem Solver
January 13, 2010 by
When a man is required to “rent” his own property from the government by paying property taxes on it, he is being forbidden to fully exercise his right of ownership. Although he owns the property, he is forced into the position of a lessee. FULL ARTICLE by Morris and Linda Tannehill
Previous post:
Next post:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:50:56.000Z
|
eibxvbwqef7dukb4mjoypvt6ako4hvso
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28014",
"uncompressed_offset": 31014127,
"url": "blog.mrmeyer.com/?m=201006&paged=2",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://blog.mrmeyer.com/?m=201006&paged=2"
}
|
cccc_CC-MAIN-2013-20
|
Posts
Comments
Get Posts by E-mail
Archive for June, 2010
Dissent Of The Day
Johanna, commenting on my departure from classroom teaching for graduate study:
I am going to be the gadfly in your comments nook. Why? Because I think it’s sad when leaving the classroom is considered a step up. Because your students are losing one heck of a teacher. Because too many inspirational teachers leave the classroom, burn out, or check out.
I don’t know where we got the idea that leaving students to some (possibly) less-able teacher is so laudable. I see this time and again. Stellar teachers come, they leave. Each rung above Direct Student Instruction comes ribboned with the prize called “Increased Status”. Just look at the comments on this thread. You’re leaving the classroom, and it’s as if you’ve won the lottery!
You’ll have time now to rare back in a comfortable chair and think. The bell won’t ring, papers won’t pile up, you don’t have small kids of your own to pick up. All well and good, no fault there. But you left the classroom. Too many good teachers do. Why you did, and what that gesture means for the rest of the teaching profession has implications far beyond a newsletter goodbye.
I don't foresee any slack to these features when I'm in grad school. Math is just too fascinating; problem solving is just too fun.
What fascinating math can you find in these scans? What fun problems could we solve here? Are these multimedia in any way superior to the annulus problems in your Geometry textbook? Are they just shinier?
Tickets
CDs
Toilet Paper
Dental Floss
Breaking Bad
Breaking Bad closed out its third season last night standing shoulder-to-shoulder with the all-time great TV dramas. Here's showrunner Vince Gilligan describing (allegorically) what's so exhilarating about classroom teaching:
Television is a great job for a writer in the way that movies used to be, way before my time. Back when writers in Hollywood were on staff or under contract at any given studio and you’d write movie scripts and then the movies would get made within a few weeks, such that you could be a working writer in the movie business back in the '30s and '40s and '50s and have a hand in writing five or six movies a year that actually got produced. The only thing remotely like that in the 21st century here in Hollywood is working in the TV business. My writers and I sit around and dream this stuff up and then we see it executed a week or even days later, and it’s a wonderful feeling and it’s magical.
Though, with teaching, that timeframe shrinks to hours when you're improving a lesson you taught first period for use in your third period class.
BTW: Here's a bonus remark from Donna Bowman's season finale review, celebrating television and rebuking the cultural Chicken Littles:
People living through a golden age often don't know it. Extraordinary flowerings of art, technology, culture, or knowledge are obscured by intractable problems, crises, declines in other parts of the society. [..] It's easy to look at television, with its 500 channels worth of endless crappy versions of the same empty ideas, and conclude that everything's gone to shit. I have plenty of friends who are proud to proclaim the dreary, inevitable decline of entertainment, and answer my protests to the contrary with assertions that searching for the few worthwhile nuggets in that morass is a pointless waste of their time. Ironically, this pronouncement coincides with the greatest flowering of televised drama and comedy in the medium's history. Freed by the proliferation of basic cable channels with a yen for signature programming, emboldened by the example of HBO, bolstered by fanatic followings and critical praise, the best television ever is on the air right now, in this decade. Throw in the DVR, the essential cure for the channel-surfing that hollows out the soul with its endless evidence of the wasteland, and suddenly your eyes are refocused above muck-level, where a profusion of flowers blooms.
Testify.
From the student newspaper (apologies to Andrew Kuo):
At the end of every year I've worked at this school, I've either been laid off or I've quit, which means that no one really believes I'm leaving now. I was offered a doctoral fellowship at Stanford starting next fall, lasting the better part of a decade, and emphasizing "curriculum design and teacher education." If I've made my motivations for teaching and blogging clear at all these last few years, you'll understand this wasn't an offer I could turn down.
If I'll admit to any buyer's remorse, though, it's right now, a few hours after saying goodbye to some of the coolest human beings of any age I've had the good luck to meet. I'm feeling too melancholy to write at length about any of this, which is probably a good turn for humanity, but these would have been the general themes:
1. the opportunity cost of teaching, the time that planning for functional teaching has cost me every day for six years; how not teaching will allow me to start banking some time and concentration towards longer projects.
2. some frivolous concern for the future of this blog; uncertainty that I'll have any time or energy to write anything here during my doctoral studies, much less anything of any insight into the classrooms I've abandoned; concern that I've now become the sort of egghead I found it so easy to ignore when I was a teacher.
3. some really frivolous remarks about blogging as career propellant.
For now, I'm going to see how fast I can hit the bottom of this bottle; I'm going to tell my wife as many stories about those kids as she can stand; and I'm going to hope my next job is half as rewarding as the last.
I got a lot better from teaching than I gave. Never let me tell you otherwise.
It's my fallen nature to blog about successes more often than failures. The balance with WCYDWT, though, is especially out of whack. I had a productive conversation with Jackie Ballarini at NCTM earlier this year that reminded me to rein in certain misconceptions.
So I'd like to clear my throat here. I hope to assure you that I'm just as much of a hack as anybody with this stuff, though I'm a really happy hack.
Here are the facts:
We don't do WCYDWT every day in my classes.
Most of my teaching strays only four or five degrees from the path beaten by my textbooks. We do a full WCYDWT unit — the kind of home run that I post here — perhaps once every two weeks. Naturally, that pace picks up every school year as I swap out old parts for new and as more of y'all do that hard work for me.
We do tell mathematical stories every day, though they're often brief.
For example, we did a few problems with standard form lines last week. I put up an empty graph, a table of coordinate pairs, and a standard form equation. “Who is the imposter?” I asked. “Who doesn’t belong?” The students then had two methods (graphing or evaluating) for determining the villain.
That’s probably the smallest unit of math storytelling I can offer. I didn't shoot videos. I didn't take photographs. I just reoriented my textbook’s existing activity towards drama.
You can do that tomorrow.
The home runs take a really long time.
If I posted it on this blog, it took me (on average) three hours spread out over three weeks. Some take a lot longer. Most require research.
For instance, I was in Chicago in early May with my family and we took a fantastic architecture tour. The tour guide offered me a gem of a WCYDWT idea so I interviewed him afterward. That led me to track down an expired building code from Chicago c. 1930. I'm now hunting down a book that's out of print and absent from every public and commercial collection in Santa Cruz County. I can't buy it. I can't borrow it. I'm going to get it.
I file this in my day planner under "leisure time." The process exhilarates me. My teaching is my life, in the healthiest possible sense of the expression.
Home Runs : Triples : Doubles :: 1 : 5 : 30
I have a document in Google with a few hundred WCYDWT ideas. I add to it weekly. Most additions contain just a sentence and a link.
Then I have several dozen folders on my Mac. Each folder contains images, videos, Photoshop documents, Geogebra applets, and other files contributing to a story from the Google document that had to be told in greater detail, a story that was compelling enough to demand more of my time and attention.
For every thirty entries in the Google document and every five folders on my Mac, I post one WCYDWT entry here.
Of those three venues, the Google document is the most dear to me. It's where I put inspiration. It's how I convert inspiration into something, clearing it from my mental queue, freeing up room for more.
You can do that tomorrow.
« Prev - Next »
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:31:26.000Z
|
jhxmnkzjseqp247t54a2xvsl65cogrhm
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28050",
"uncompressed_offset": 97046572,
"url": "eunis.eea.europa.eu/habitats/98/other",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://eunis.eea.europa.eu/habitats/98/other"
}
|
cccc_CC-MAIN-2013-20
|
Skip to content. Skip to navigation
Sign up now!
Get notifications on new reports and products. Currently we have 32837 subscribers. Frequency: 3-4 emails / month.
Follow us
Twitter
Facebook
YouTube channel
RSS Feeds
Notifications archive
Write to us
For the public:
For media and journalists:
Enquiry web form
Contact EEA staff
Contact the web team
Call us
Reception:
Phone:
(+45) 33 36 71 00
Fax: (+45) 33 36 71 99
EEA
Arborescent matorral
Document Actions
Expand All | Collapse All
• Altitude zones (terrestrial and marine) (no records)
• Marine depth zones, more detailed than altitude zones (no records)
• Climate zones (no records)
• Geomorphology types (no records)
• Substrate types (no records)
• Dominant life formsHabitat type other information (1 records)
• Percentage cover by vegetation (no records)
• Characteristics of wetness/drynessHabitat type other information (1 records)
• Characteristics of water flow, source and quality (no records)
• Salinity values, for marine habitats only (no records)
• Exposure types (no records)
• Acidity, salinity, trophic status (no records)
• Characterising temperature (no records)
• Light intensity (no records)
• Spatial parameters of size and shape (no records)
• Temporal parameters (no records)
• Human activities and impacts (no records)
• Levels of habitat usage (no records)
EUNIS
General information
User operations
European Environment Agency, Kongens Nytorv 6, DK - 1050 Copenhagen K, Denmark - Phone: +45 3336 7100
The European Environment Agency (EEA) is an agency of the European Union.
Comments to EEA Web Team.
Code and API for developers, Legal notice, Disclaimer, Privacy policy
This site conforms to the following standards:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:22:19.000Z
|
yvjvooaskmgfjmk3pw5yb2imkvkidt5z
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28051",
"uncompressed_offset": 99614671,
"url": "familysearch.org/learn/wiki/en/Minnesota_County_Births_%28FamilySearch_Historical_Records%29",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://familysearch.org/learn/wiki/en/Minnesota_County_Births_(FamilySearch_Historical_Records)"
}
|
cccc_CC-MAIN-2013-20
|
Minnesota County Births (FamilySearch Historical Records)Edit This Page
From FamilySearch Wiki
This article describes a collection of historical records available at FamilySearch.org.
Contents
Record Description
This collection covers the years 1863 to 1983. However, most of the county’s records end before 1950.
The collection consists of digital images of birth records from various county courthouses.
Notes about this collection:
• The year range will vary by county
• Confidential information (illegitimate births and adoptions) has been masked from this collection
• Some of the records in this collection may be duplicated in the collection “Minnesota City and Township Birth Records 1871-1947.”
Some counties and towns began recording births as soon they were incorporated with some as early as 1864. However because there was no law requiring births to be recorded, compliance was not good in the early years.
In 1901, Congress passed a resolution asking states to gather information about the births and deaths that occur within their borders. Many states responded, but because Congress did not fund the request, it took several years until all the states were keeping these records consistently. Birth records were usually filled out by a witness, midwife, or a medical professional. The certificate was then sent to the county, and the county sent a copy to the state.
For a list of records by localities and dates currently published in this collection, select the Browse link from the collection landing page.
Births were recorded to better serve public health needs.
The information recorded about the birth is usually reliable.
Citation for This Collection
The following citation refers to the original source of the information published in FamilySearch.org Historical Record collections. Sources include the author, custodian, publisher, and archive for the original records.
"Minnesota, County Birth Records, 1863-1983." Images. FamilySearch. http://FamilySearch.org : accessed 2013.
Suggested citation format for a record in this collection.
Record Content
Birth entries usually include the following genealogical information:
• Date and place of birth
• Full name and gender of child
• Legitimacy
• Father's name
• Mother's maiden name
• Parents' residence, age and race
• Parents' birth place
• Parents' occupation
• Number of births for mother
• Number of children living
• Name of person attending birth such as midwife or doctor
How to Use the Record
To search the collection, select "Browse through images" on the initial collection page ⇒ Select the County ⇒ Select the Record Type, Date Range and Volume which takes you to the images.
Look at the images one by one comparing the information with what you already know about your ancestors to determine which one is your ancestor. You may need to compare the information about more than one person to make this determination.
To begin your search it is helpful to know the following:
• Child's name
• Other identifying information such as birth date and place or parent's names
Fill in the requested information in the initial search page. This search will return a list of possible ancestors. Compare the information in the list to what you already know about your ancestor to determine which individual is your ancestor. You may need to compare the information of more than one person to make this determination. Next, click on your ancestor's name. This will take you to a descriptive page with a link to the image.
Using the Information
When you have located your ancestor’s birth record, carefully evaluate each piece of information about them. These pieces of information may give you new biographical details that can lead you to other records about your ancestors. For example:
• Use the birth date along with the place of birth to find the family in census records.
• Use the residence and names of the parents to locate church and land records.
• The father’s occupation can lead you to other types of records such as employment or military records.
• The parents' birth places can tell you former residences and can help to establish a migration pattern for the family.
Tips to Keep in Mind
• It is often helpful to extract the information on all children with the same parents. If the surname is unusual, you may want to compile birth entries for every person of the same surname and sort them into families based on the names of the parents. Continue to search the birth records to identify siblings, parents, and other relatives in the same or other generations who were born in the same county or nearby.
• The information in birth records is usually reliable, but depends upon the reliability of the informant.
• Earlier records may not contain as much information as the records created after the late 1800s.
• There is also some variation in the information given from record to record.
• If you are unable to locate your ancestor, try searching various spellings of the names.
For a summary of this information see the wiki article: United States, How to Use the Records Summary (FamilySearch Historical Records).
Known Issues with This Collection
Problems with this collection?
See a list of known issues, workarounds, tips, restrictions, future fixes, news and other helpful information.
For a full list of all known issues associated with this collection see the attached Wiki article. If you encounter additional problems, please email them to support@familysearch.org. Please include the full path to the link and a description of the problem in your e-mail. Your assistance will help ensure that future reworks will be considered.
Related Websites
Related Wiki Articles
Contributions to This Article
We welcome user additions to FamilySearch Historical Records wiki articles. Guidelines are available to help you make changes. Thank you for any contributions you may provide. If you would like to get more involved join the WikiProject FamilySearch Records.
Citing FamilySearch Historical Collections
When you copy information from a record, you should also list where you found the information. This will help you or others to find the record again. It is also good to keep track of records where you did not find information, including the names of the people you looked for in the records.
A suggested format for keeping track of records that you have searched is found in the wiki article Help:How to Create FamilySearch Collections
Citation Example for a Record Found in This Collection
"Minnesota, County Birth Records, 1863-1983" digital images, FamilySearch (https://famiysearch.org https/: accessed 27 March 2012), Minnesota, County Birth Records, 1863-1983 > Freeborn, Carlston > Births, Deaths 1873-1899, vol. A > , image 20 of 49, Sarah Mates, born, April 8, 1884; citing birth records; entry 174; County Courthouse, Freeborn County, Albert Lea, Minnesota, United States.
Need additional research help? Contact our research help specialists.
Need wiki, indexing, or website help? Contact our product teams.
Did you find this article helpful?
You're invited to explain your rating on the discussion page (you must be signed in).
• This page was last modified on 30 April 2013, at 16:06.
• This page has been accessed 4,484 times.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:57:03.000Z
|
t4mdb627vfxxsmyaytdjglz6ax3fk6dz
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28079",
"uncompressed_offset": 147201046,
"url": "journals.tdl.org/icce/index.php/icce/article/view/5524",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://journals.tdl.org/icce/index.php/icce/article/view/5524"
}
|
cccc_CC-MAIN-2013-20
|
STABALIZING BEACHES DOWNCOAST OF HARBOR EXTENSIONS
John R.C. Hsu, Richard Silvester
Abstract
In geomorphological terms, the sandy shoreline of a bay downcoast of a harbor may be stable or in static equilibrium, or could be in dynamic condition, if sediment is still being supplied from upcoast or from downcoast to form a salient predicted by a static bay shape equation. Should commercial expansion demand a larger port, the general solution is to run a breakwater from the headland or existing structure. This has the potential to create a new static equilibrium beach, often with accretion in the lee which is at the expense of beach erosion downcoast. It is strongly recommended that geomorphic approach be incorporated to stabilize downcoast beaches early in the planning stage of a harbor, or as remedial measures. By creating bay beaches in static equilibrium, the potential beach erosion downcoast of a harbor will be kept to a minimum or may be prevented completely.
Keywords
harbor; harbor extension; stabalized beach
Full Text: PDF
This work is licensed under a Creative Commons Attribution 3.0 License.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:19:57.000Z
|
ktixpullwcsvxg4mrwyhnqh25u5uya3x
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28088",
"uncompressed_offset": 159271666,
"url": "linuxaria.com/article/secure-deletion-of-data-in-linux?lang=en",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://linuxaria.com/article/secure-deletion-of-data-in-linux?lang=en"
}
|
cccc_CC-MAIN-2013-20
|
Jun 192012
I think that every user that has some skill know that a simple rm of a file or deleting it via any file manager is not enough to really remove it from your hard disk.
In Linux there are some tools that can offer you way more secure to really delete your files: DBAN if you need to erase completely a hard disk o partition or if you just have to delete some files you can use Shred or Wipe
Shred
The nice thing of this little program is that is already present in your computer, from its man page:
Overwrite the specified FILE(s) repeatedly, in order to make it harder for even very expensive hardware probing to recover the data.
This means that the shred command is a good starting point to give us some privacy. Basically it goes back and forth on the content of the file by overwriting it several times and making it unrecoverable. If used without specifying anything, the steps are 3.
The basic syntax is shred filename this will just cover the file without deleting it.
I think that an example will help much more than a long explanation:
$ echo "this is my bank password: qwerty12" > mysecret.txt
$ cat mysecret.txt
this is my bank password: qwerty12
$ shred mysecret.txt
$ cat mysecret.txt
XW/h/]g$iU5qt41...
.....
....
a lot of binary garbage
To delete the file after the shredding, you can just add the -u option and to see all the steps you can add the -v (verbose) flag.
$shred -vu mysecret.txt
shred: mysecret.txt: pass 1/3 (random)...
shred: mysecret.txt: pass 2/3 (random)...
shred: mysecret.txt: pass 3/3 (random)...
shred: mysecret.txt: removing
shred: mysecret.txt: renamed to 000000000000
shred: 000000000000: renamed to 00000000000
shred: 00000000000: renamed to 0000000000
shred: 0000000000: renamed to 000000000
shred: 000000000: renamed to 00000000
shred: 00000000: renamed to 0000000
shred: 0000000: renamed to 000000
shred: 000000: renamed to 00000
shred: 00000: renamed to 0000
shred: 0000: renamed to 000
shred: 000: renamed to 00
shred: 00: renamed to 0
shred: mysecret.txt: removed
And if you want to do more than 3 passes you can use the option -n “number of passes”, so writing shred -n 50 myfile, will do 50 times the random pass on myfile.
CAUTION: Note that shred relies on a very important assumption: that the file system overwrites data in place. This is the traditional way to do things, but many modern file system designs do not satisfy this assumption, for example In the case of ext3 file systems, the disclaimer applies (and shred is thus of limited effectiveness) only in data=journal mode, which journals file data in addition to just metadata. In both the data=ordered (default) and data=writeback modes, shred works as usual.
Wipe
Wipe is a secure file wiping utility. There are some low level issues that must be taken into consideration. One of these is that there must be some sort of write barrier between passes. Wipe uses fdatasync(2) (or fsync(2)) as a write barrier, or if fsync(2) isn’t available, the file is opened with the O_DSYNC or O_SYNC flag. For wipe to be effective, each pass must be completely written. To ensure this, the drive must support some form of a write barrier, write cache flush, or write cache disabling. SCSI supports ordered command tags. IDE/ATA drives support write cache flushes and write cache disabling. Unfortunetly, not all drives actually disable write cache when asked to. Those drives are broken. Write caching should always be disabled, unless your system is battery backed and always powers down cleanly.
A first quality of Wipe compared to shred is that it has the -r option that makes it delete recursively the contents of a directory, thus facilitating the removal of many files. In normal mode, 34 patterns are used (of which 8 are random) to overwrite the file.
Unlike shred is not usually installed by default but it can be easily found in the repositories of most Linux distributions.
Other useful options that you can use are:
-f (force; disable confirmation query) By default wipe will ask for confirmation, indicating the number of regular and special files and directories specified on the command line. This disable it.
-r (recurse into subdirectories) Will allow the removal of the entire directory tree. Symbolic links are not followed.
-q (quick wipe) If this option is used, wipe will only make (by default) 4 passes on each file, writing random data. See option -Q
-Q Sets the number of passes for quick wiping. Default is 4.
So for example I could use:
wipe -rfq -Q15 mysecret.txt
To delete the file with 15 random passes.
Conclusions
These tools will make your files harder to be recovered, i suggest to read this document, to have more information on this topic
Popular Posts:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:12:08.000Z
|
e2qqjl2fauyb5kivreojgeirrypa5uw3
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28090",
"uncompressed_offset": 159666414,
"url": "listarchives.documentfoundation.org/www/discuss/msg03258.html",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://listarchives.documentfoundation.org/www/discuss/msg03258.html"
}
|
cccc_CC-MAIN-2013-20
|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [tdf-discuss] Re: A proposal for effective, volunteer-friendly user support in LibreOffice
On 11/23/2010 02:50 PM, Ian Lynch wrote:
> On 23 November 2010 21:25, Andy Brown <andy@the-martin-byrd.net> wrote:
>
>> On Tue Nov 23 2010 12:36:35 GMT-0800 (PST) Robert Derman wrote:
>>
>> Assuming that it is, I think the primary users manual should focus on
>>> Writer, with just one chapter on each of the other modules, and a pointer to
>>> where to download a more extensive manual on each. Where I disagree with
>>> most who write in, is that I think that a basic manual like I describe
>>> *should be in the download package*. In order to keep it small for that
>>> reason, it should be in ODF format not PDF, and it should be formatted for
>>> an 8.5x11 page rather than the usual 5x7 so that it would be practical for
>>> the user to print out without the horrendous paper waste of the 5x7 format.
>>> (Remember all printer paper comes in 8.5x11 or similar) Also keeping it to
>>> 100 pages or less will both keep the download size down, and encourage users
>>> to actually print a hard copy. (a hard copy is very useful because you can
>>> read in the manual while using the software) I find help often less than
>>> helpful simply because it can be difficult to both read how to do a thing
>>> and simultaneously do it. I recognize that a much longer and more
>>> detailed manual is required to completely cover subjects like Styles, but
>>> for all beginners, and most other users a manual like I just described is
>>> what's needed. Probably organized with an introduction to the most used
>>> commands, then a tutorial, then a reference section.
>>>
>>
>> There are two of your points I would like to comment on.
>>
>> First, use ODF instead of PDF. If a person wishes to view the installation
>> part of the document before they install the software then they are out of
>> luck.
>>
>> Second, where do you get the idea that the documents are formated to 5x7
>> paper size? None of the documents I have seen have been formated for that
>> size paper. All the docs from the OOoAuthors site are in fact formated for
>> paper size A4. The PDFs can be printed two-up on 8.5x11 paper.
>>
>>
> There are some good manuals for OOo - Gabriel Gurley's "A conceptual Guide
> to OpenOffice.org 3" and the OpenOffice.org Authors publications. However, I
> think what is needed is an on-line tutorial system that leads to
> certification. That is really what we will be aiming at with the LO
> certification that we are meeting about in Berlin. If we can get EU funding,
> we can produce an on-line tutorial system for each of the components of LO
> in several languages with links to screen casts to demonstrate how to do
> things. Link those to the assessment criteria and you have a fully supported
> learning system. There is then the possibility of linking the LO help system
> to this. Make it free for all to use but charge people who need
> certification a small amount for the certification part and you have an
> income to make it sustainable and to contribute back for development.
I think I like this proposal of yours. Basically, you're saying the
training is free, but the certification costs. That would definitely
make it accessible to people like me.
--
Unsubscribe instructions: E-mail to discuss+help@documentfoundation.org
Archive: http://www.documentfoundation.org/lists/discuss/
*** All posts to this list are publicly archived for eternity ***
Privacy Policy | Impressum (Legal Info) | Copyright information: Unless otherwise specified, all text and images on this website are licensed under the Creative Commons Attribution-Share Alike 3.0 License. This does not include the source code of LibreOffice, which is licensed under the GNU Lesser General Public License (LGPLv3). "LibreOffice" and "The Document Foundation" are registered trademarks of their corresponding registered owners or are in actual use as trademarks in one or more countries. Their respective logos and icons are also subject to international copyright laws. Use thereof is explained in our trademark policy.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:14:58.000Z
|
xynoluagaqlllvbsk4pfxk62hqfbayqe
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28127",
"uncompressed_offset": 213737588,
"url": "quotationsbook.com/quote/27945/",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://quotationsbook.com/quote/27945/"
}
|
cccc_CC-MAIN-2013-20
|
Quotation added by staff
Why not add this quote to your bookmarks?
The control of nature is a phrase conceived in arrogance, born of the Neanderthal age of biology and the convenience of man. Carson, Rachel
This quote is about nature · Search on Google Books to find all references and sources for this quotation.
A bit about Carson, Rachel ...
Rachel Louise Carson (May 27, 1907 April 14, 1964) was a Pittsburgh, Pennsylvania-born zoologist and biologist whose landmark book, Silent Spring, is often credited with having launched the global environmental movement. Silent Spring had an immense effect in the United States, where it spurred a reversal in national pesticide policy.
These people bookmarked this quote:
More on the author
This quote around the web
Loading...
Search Quotations Book
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:44:50.000Z
|
6zp5nyde3nytzw75i4jeiuzhkr4y3oin
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28130",
"uncompressed_offset": 234989748,
"url": "scholarship.rice.edu/handle/1911/10158",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://scholarship.rice.edu/handle/1911/10158"
}
|
cccc_CC-MAIN-2013-20
|
Home Browse About Contact Help
On the Roof of a Coptic Monastery.
Files in this item
File Description
Need help?
About this item
Title: On the Roof of a Coptic Monastery.
Author: Leeder, S.H.
Summary: Domed structures seen through the branches of palm trees. Black- and- white photograph.
Citable link to this page: http://hdl.handle.net/1911/10158
Date: 1918
Original Source From: Leeder, S.H. "Modern Sons of the Pharaohs". Hodder and Stoughton: London, 1918.p 272.
Subject Church of Egypt
Related Resource Browse more TIMEA resources related to this location
Related Resource Locate TIMEA places on a GIS map
Related Resource Find more information on sites that appear in TIMEA
Related Resource Find the complete text of the book in which this image appears
About This Resource: Forms part of the Travelers in the Middle East Archive (TIMEA)
Citation
Leeder, S.H. On the Roof of a Coptic Monastery. (1918).
From Travelers in the Middle East Archive (TIMEA). http://hdl.handle.net/1911/10158
For more on properly formatting citations, see Citing TIMEA Resources.
This item appears in the following Collection(s)
• TIMEA Visual Materials [1769]
This collection contains book illustrations, postcards, stereocards, photographs, and ephemera related to travel in the Middle East, primarily Egypt.
Show full item record
Rice Scholarship Archive Navigation
Browse
My Account
Statistics
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:31:02.000Z
|
lurdrf2uqmkwxdnqrqzcmxv6gvzrlccs
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28175",
"uncompressed_offset": 293667559,
"url": "wikitravel.org/en/Alishan",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://wikitravel.org/en/Alishan"
}
|
cccc_CC-MAIN-2013-20
|
Help Wikitravel grow by contributing to an article! Learn how.
Alishan
From Wikitravel
Jump to: navigation, search
Trail through the cypress forests
Alishan National Scenic Area (阿里山國家風景區 Ālǐshān guójiā fēngjǐng qū) [1] [2] is in Chiayi County, southern Taiwan.
[edit] Understand
Alishan — "Mount Ali" — is Taiwan's most-visited national park.
[edit] History
The area has been settled by Taiwanese aborigines since time immemorial, but ethnic Chinese began settling only in the 19th century. Development really took off only when the Japanese completed the Alishan Forest Railway (1912), a remarkable narrow-gauge train originally built for logging the area's giant cedars. By the 1970s, logging had pretty much ended and tourism had become the area's primary earner, and the entire area was declared a "national scenic area" in 2001.
[edit] Landscape
Alishan is not a single mountain, but a range on Taiwan's spine, averaging 2,500 meters in height and with the highest peak Datashan (大塔山) reaching 2,663 meters. Taiwan's highest mountain, Yushan (3,952m) is easily visible from Alishan.
[edit] Flora and fauna
Due to its elevation, Alishan's flora are more temperate/alpine than tropical, and the slow transition from bananas and palms to evergreens on the way up is interesting to watch. The dominant feature are giant Taiwanese red cypresses (Chamaecyparis formosensis), some of which have been growing in the area for well over 2,000 years, although most are now managed forests for logging. In spring, crowds flock to view cherry blossoms, while in summer the mountainsides are blanketed with orange montbretia blossoms.
[edit] Climate
Moss on a tree stump
Due to its elevation, Alishan is considerably cooler than the coast, with daytime highs averaging 14-24°C in summer and 5-16°C in winter. Even for a mountain, Alishan's weather is extraordinarily rapidly changing: an average day starts with a cloudless morning, theatrically dense clouds of rolling mist by noon and ends with a lightning storm and torrents of rain before repeating all over the next day. Humidity is always very high, and indeed most surfaces in the park seem to be covered with a layer of luxuriant green moss.
[edit] Get in
Alishan and its transport links were severely damaged by Typhoon Morakot. Most of the railway is closed until late 2011. However, two popular tourist lines within the recreation area re-opened in June 2010.
[edit] By train
Please be advised that the Alishan Mountain Railway from Chiayi has been permanently closed. We were advised this by our travel guide in Alishan on 23 April 2013. Apparently the washouts and landslides in 2010 took out too much of the track areas and it has proven uneconomical to repair. The only other option is by coach or van private tour. Coach situation is bad - we counted mover 100 coaches at Alishan before we left at 9am in morning and stopped counting at 100 more on road down to Chiayi. You need a strong constitution for that 3 hours of very winding mountainous road. The "Alishan Forest Railway" (in the hills around Alishan township) is still operating normally but can be very crowded - especially on the two "view the Sunrise" specials at 4am in morning ! Be warned -"cloudy - cannot see sunrise"
Alishan Forest Railway
Take the famous Alishan Forest Railway narrow-gauge train from Chiayi station (the old one, not the new HSR station at Taibao). A one-way costs NTD$399 (about US$13) and takes around 3.5 hours. The train passes through the scenic village of Fencihu (奮起湖) halfway up and the village of Ruili (瑞里) is also accessible (several km away) from Jiaoliping (交力坪) station. Don't miss this trip, especially if you're a train or architecture buff, as the line is largely the same as it was before WW2 — but you might want to consider a bus for the way back (it takes about 4.5 hours for the return trip).
As of 2009, there are two daily departures from Chiayi at 9 AM and 1 PM, returning from Alishan at 11 AM and noon. The railway will happily sell standing room tickets and during peak periods like summer and the cherry blossom season trains can get very crowded, so book ahead by calling operator Hungtu Alishan at (05)225-1978, preferably in Chinese, and show up at least 30 min before departure to collect your tickets. Alternatively, there are usually "scalpers" standing outside the ticket window selling tickets at-cost, in the hope that you will also book a room in the hotel they work for. In Chiayi station, note that the Alishan ticket counter is on the outside of the building, separate from the ordinary TRA counters.
Note: As of December 2009, the railroad was closed due to major repairs after a typhoon struck. In June 2010, the Jhushan Sunrise-Watching Line (祝山觀日線) and the Divine Tree Line (神木線) within the recreation area re-opened, but the line down the mountain is not expected to re-open until late 2011. [3] [4] Update (Oct 2011): Locals state that the re-opening of the railway from Chiayi to Alishan will take an additional 1-2 years.
[edit] By bus
Very comfortable buses from Chiayi to Alishan leave roughly hourly, take just over two hours and cost NT$221 each way. However, the route isn't quite as scenic, with more tea plantations and small villages than cliffs and mountains. The bus ride can also be quite windy, so be careful if you have motion sickness.Buses stop at Ruili on the way. Note: The last bus to Alishan from Chaiyi is at 2PM. After that the only way to get to Alishan is by taxi which will cost $1600NT.
The last bus back to Chiayi leaves at 17:10. Buses leave from the 7-11 store across from the tourist information center. Tickets are also purchased inside the 7-11.
Note: Most take bus from Chiayi rail station to Alishan. As of Oct 2011, there is a direct bus service from Chiayi HSR station to Alishan. Only two buses a day, between 10 am to 1130am. Go to the visitors information counter at Chiayi HSR station for more info. Cost is less than NT$300 one way, takes about 2.5 hrs. If you get the driver who drives like a Daytona driver (by the name of Mr Luo), get ready the motion sickness pills and the journey is about 2 hrs including the toilet breaks.
[edit] Fees/Permits
Entry to Alishan costs NT$150 per person if arriving on public transport, NT$200 if arriving by car, charged on arrival.
If you show a student ID the cost is NT$100.
[edit] Get around
[edit] By train
The Alishan Forest Railway has three very popular spur lines.
• Sacred Tree Line, from Alishan to Shermuh (神木). This is actually just an hourly extra service running along the final stretch of the main line. Service was disrupted after an accident in May 2011 but was resumed on 27th October 2011
• Jhushan Line (祝山線), from Alishan to Jhushan (祝山). Has a daily departure very early in the morning (the exact time varies by season) so you can catch the sunrise over Jade Mountain (玉山). Like the Sacred Tree Line, this service was resumed on 27th October 2011 after the disruption in May 2011.
• Mianyuei Line (眠月線), from Alishan to The Stone Monkey (石猴). Closed due to earthquake damage in 1999. Local people state that this railway will not be rebuilt because the main attraction of this line (The Stone Monkey) was also destroyed in the earthquake.
[edit] On foot
Trails around Alishan are ridiculously well signposted: every intersection of two paths not only has signs in Chinese and English, but a map pinpointing your exact location and all possible routes. You can also pick up an English map from the tourist office. All the main routes are very well maintained, with stairs for steeper sections, guard rails, etc.
A newly opened trail, about 4 hours one way, connects Fengcihu and Ruili through a scenic bamboo forest straight out of a kung-fu movie.
[edit][add listing] See
View from Jhushan just before dawn
Tree Spirit Pagoda
Sights around Alishan are signposted in Chinese, English and Japanese, and as you walk around the trails you'll find that nearly every tree of size, age or unusual shape has been dubbed with a fanciful moniker like "Elephant Trunk" or "Three Generation Tree".
• Jhushan (祝山), (train from Alishan station). The top attraction in Alishan, everybody crowds aboard the predawn trains for the half-hour trip to this peak on the east side of Alishan, where you can see the sun rise over Yushan. There's a viewing platform right next to the station, but it's worth it to hike an extra 15-20 minutes past the helicopter pad to the very top, where the crowds are a little thinner. As the sun is already up behind the mountain, the sky is already quite light by the time you get to the top, and the sun is very bright when rising up -- hawkers sell disposable $10 eclipse-style filtered glasses, but it's better to not stare at all. On the way back, skip the train and walk back instead, it's a pleasant 3-4 km downhill hike. edit
• Giant Trees Trail, (near Shermuh station). There are in fact two of these, both near Shermuh station, and they can be walked in a pleasant half-hour loop. True to the name, the cypresses here are giant indeed, and many have been growing for well over a millennium. The small Cihyun Temple, originally built by the Japanese, and the Tree Spirit Pagoda are along the way. The trail is particularly spooky when the mist rolls in. edit
• Shoujhen Temple (受鎮宮). The largest temple in Alishan and definitely worth a visit. The exterior and first floor are imposing enough, but don't miss a visit to the second floor, featuring an incredibly ornate golden altar and a surreal room with 10,000 miniature Buddhas, each lit up with its own LED. edit
• Two Sisters Pond (姊妹潭). Two scenic little ponds in the forest. The Elder Sister Pond, the larger of the two, has a much-photographed octagonal little pavilion in the middle. The (demanding) trail to Tashan starts from here. edit
[edit][add listing] Do
The hardcore hiker or sports enthusiast will likely find Alishan's offerings rather too tame, and might do better to go conquer Yushan next door instead.
If you stay overnight in Alishan, you can avoid crowds of tourists who do day trips. You should pretty much have the place to yourself by late afternoon. Wear comfortable shoes with good traction as the steps can be wet and mossy.
[edit][add listing] Buy
Alishan is famous for all sorts of mountain produce, notably tea (see Drink) and wasabi, as well as carvings and handicrafts made from red cypress. Souvenir shops also sell tasty cookies and pastries flavored with ashitaba (明日葉), a medicinal herb reputed to give long life. The name is Japanese for "tomorrow leaf", as (according to legend) if you pluck a leaf early in the morning, a new one will replace it by the next day.
[edit][add listing] Eat
[edit] Budget
For a meal on the train, don't miss the Fencihu lunch box (奮起湖便當 fencihu biendang), which has a deep-fried cutlet, Taiwanese sausage and a selection of mountain veggies on rice. Vendors come onto the train to sell them at Fencihu station (NTD100 a pop).
Stalls selling noodles, rice dishes and basic street food can be found at the Alishan main square, at Jhushan and the Jhoushen Temple.
While you are waiting for the sun to rise, a hot drink from the vendor will warm your hands. Also try the egg crepe, scallion pancakes and French toast. Hot Clear soup with blood rice cake is also available. Hot Sakura flavoured honey in the early morning is great too.
[edit] Mid-range
Alishan's main square has half a dozen largely identical restaurants specializing in hotpot (火鍋), using mountain vegetables and mountain game like deer and wild boar. Most cater mostly to groups and thus offer vast spreads (eg. 10 dishes for $1000), but if you stick to the menu, a "small" pot for two-three goes for around $300.
• Juh Shan Yuan Restaurant (玉山園餐廳), (behind clocktower on main square). One of Alishan's many hotpot restaurants. English menu (well, kinda), reasonably priced and tasty. edit
[edit][add listing] Drink
Alishan is famous for High Mountain Oolong (高山烏龍 Gau-shan wulong) tea and you'll see plenty of plantations on the way up. There are a number of tea shops in the main village that will serve up a pot the traditional way for $200 or so. They will also let you try a number of teas for sale, and this is a good way to pass the evening. But this is with the expectation that you will buy something. Teas are mostly sold in vacuum sealed bags of 150g, and usually will cost between $400-$800, although some can be as high as $3000 for this amount.
Nightlife in any sense is virtually nonexistent, but all restaurants are happy to sell you a beer and you can pick your own poison at the convenience stores.
[edit][add listing] Sleep
[edit] Lodging
Most of Alishan's accommodation is clustered around the main Alishan railway station, which is very convenient for eating and shopping, but means a one to two km hike (or short train ride) for visiting the park itself. They can be found in the hotel area, which is behind the visitor center, the stairs down can be found just to the left of the building. While touts meet incoming trains, it is best to reserve the hotels ahead of time, since on weekends (Fri, Sat) and holidays most rooms will be booked almost every day of the summer. Weekday rates are much lower.
• Dafeng Hotel (阿里山大峰渡假山莊), No.46, Jhongjheng Village, Alishan Township, Chiayi County, 05-2679769 (fax: 05-2679577), [5]. Complimentary wifi internet access in the lobby, and also reaches most nearby rooms, for those traveling with laptops. The rooms don't have heat unless it gets very cold, although the beds have electric blankets. Also there was no hot water, but I got the feeling this is par for the course at the cheaper hotels in the area. $1600/2600 weekday/weekend. edit
• Gao Shan Ching Hotel (高山青大飯店), No.43, Jhongjheng Village, Alishan Township, Chiayi County, 05-2679716 (fax: 05-2679780), [6]. Large resort. $1800/3000 weekday/weekend. edit
• Shermuh House (神木賓館), No.50, Jhongjheng Village, Alishan Township, Chiayi County, 05-2679666 (fax: 05-2679667), [7]. Recently renovated 5-story hotel. Rooms are pleasant enough, but they're stingy with the heating, which is only turned on when temperature in the rooms falls below 7°C! 5 min on foot downhill from the railway station. $1600/3200 weekday/weekend. edit
A few hotels can be found elsewhere in the park.
• Alishan House (阿里山賓館), No.16, Xianlin Village, Alishan Township, Chiayi County, 05-2679811 (fax: 05-2679596), [8]. checkout: 11 AM. The grand old lady of Alishan's hotels, with both a traditional Chinese wing and a very modern, slick new wing. The best views in Alishan and well-located for venturing into the park. Free shuttle bus from railway station. Breakfast and dinner included, but watch out for the dinner, as it is not very good. From $3800, up to $5000 for the largest rooms with the most beautiful view. edit
• Fencihu Hotel (奮起湖大飯店), 05-256-1888, [9]. Also known as Fancylake Hotel, this is the only larger hotel in Fencihu, a stone's throw from the train station. $2400/3200. edit
• Alishan Gou Hotel (阿里山閣大飯店), 05-2679611 (fax: 05-2679614), [10]. Free shuttle bus from the train station. Coats can be rented for $100, if you came dressed for summer, and don't want to get chilled to the bone while waiting for the sunrise. Price includes Taiwanese style breakfast in the hotel restaurant. $2200 and up. edit
[edit] Camping
Camping is not permitted anywhere within the Alishan Scenic Area. If you have your own car, there are a few campgrounds within striking distance outside the park, notably at Dinghu (頂湖).
[edit] Stay safe
There are no dangerous animals or unusual health risks around Alishan. Be prepared for rain at any time and bear in mind that, especially outside summer, it can be quite cold. It is about 10C colder in Alishan than Chiayi.
At the risk of stating the obvious, while the trails are exceptionally well guided during the daytime, there is next to no lighting — so head back when the night starts to fall.
[edit] Get out
Getting out pretty much requires going back to Chiayi, but you could do worse than continue onto the hot springs of Guanzihling from there.
As of 10 Oct 2011, there is a direct bus service from Alishan to Sun Moon Lake and vice-versa. 2 buses a day, leaves Alishan at around 2pm and 3pm. Cost is less than NT$300 one way. Check with Alishan Visitors Centre for more info. You can also choose to arrange for a cab there. A cab from Alishan to Sun Moon Lake is NT$3000 one way.
This is a guide article. It has a variety of good, quality information about the park including attractions, activities, lodging, campgrounds, restaurants, and arrival/departure info. Plunge forward and help us make it a star!
Personal tools
Namespaces
Variants
Actions
Navigation
feeds
Destination Docents
Toolbox
In other languages
other sites
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:52:03.000Z
|
rpd2asmwtklkrpwhkaogmg2dznts3l7n
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28176",
"uncompressed_offset": 293686972,
"url": "wikitravel.org/en/South_Corsica",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://wikitravel.org/en/South_Corsica"
}
|
cccc_CC-MAIN-2013-20
|
Help Wikitravel grow by contributing to an article! Learn how.
South Corsica
From Wikitravel
Jump to: navigation, search
South Corsica, Corse-du-Sud is a department of France.
[edit] Cities
[edit] Other destinations
[edit] Understand
[edit] Talk
[edit] Get in
[edit] Get around
[edit][add listing] See
[edit] Itineraries
[edit][add listing] Do
[edit][add listing] Eat
[edit][add listing] Drink
[edit] Stay safe
[edit] Get out
This article is an outline and needs more content. It has a template, but there is not enough information present. Please plunge forward and help it grow!
Personal tools
Namespaces
Variants
Actions
Navigation
feeds
Destination Docents
Toolbox
In other languages
other sites
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:08:54.000Z
|
ovwyusrc5wyax7ahdkffperqtw4ylyx5
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28177",
"uncompressed_offset": 293738647,
"url": "wikitravel.org/wiki/en/index.php?oldid=1469754&title=Fuji-Hakone-Izu_National_Park",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://wikitravel.org/wiki/en/index.php?title=Fuji-Hakone-Izu_National_Park&oldid=1469754"
}
|
cccc_CC-MAIN-2013-20
|
Help Wikitravel grow by contributing to an article! Learn how.
Fuji-Hakone-Izu National Park
From Wikitravel
Asia : East Asia : Japan : Kanto : Fuji-Hakone-Izu National Park
Revision as of 05:18, 3 June 2010 by Kabushikigaisyaoh (Talk | contribs)
Jump to: navigation, search
Mt. Fuji at sunrise, seen from the Fuji Five Lakes
Fuji-Hakone-Izu National Park (富士箱根伊豆国立公園) straddles Yamanashi, Shizuoka, Kanagawa and Tokyo prefectures.
Understand
The Fuji-Hakone-Izu National Park is a sprawling 1200 sq.km. zone that covers not only Mount Fuji itself, but also the Fuji Five Lakes, Hakone, parts of the Izu Peninsula and all of the Izu Islands, stretching several hundred kilometers south from the Japanese mainland.
Mammious rocks
Landscape
Owakudani, Hakone
While the park is dominated by Mount Fuji, which is (in good weather) visible from all parts except the southernmost islands, the local landscape is in entirety volcanic. In particular, a number of the volcanoes on the Izu Islands are still active.
Flora and fauna
Climate
Get in
Routes vary widely depending on where exactly you're going, but it's safe to say that the most common starting point is Tokyo. Cities near the park include Odawara, Fuji, and Numazu.
Fees/Permits
Get around
Do
The volcanic activity of the park means that there are hot springs galore. Those in Hakone are the easiest accessed from Tokyo, but the Izu Peninsula is also a popular weekend getaway.
Drink
Sleep
• Fuji Lake Hotel, 1, Funatsu, Fuji-kawaguchiko-machi, Minamitsuru-gun, Yamanashi 401-0301, Japan (About 10 minutes walk from Kawaguchiko Station.), 0555-72-2209, [1]. checkin: 3:00pm; checkout: 10:00am. Guests can enjoy the view of Mt. Fuji from both room and bathroom. The chartered barrier-free open-air baths are also popular.
• Kozantei Ubuya, 10 Asakawa, Fujikawaguchiko-machi, Minamitsuru-gun, Yamanashi, Japan (About 30 minutes walk from Kawaguchiko Station.), 0555-72-1145, [2]. checkin: 2:00pm; checkout: 11:00am. A high class Japanese-style inn with views of Mt.Fuji and Kawaguchiko from both the bedrooms and the large bathrooms. The bathrooms also feature an open-air bath.
• Kasuitei-Ooya, 4025 Funatsu, Fujikawaguchiko-machi, Minamitsuru-gun, Yamanashi, Japan (About 10 minutes walk from Kawaguchiko Station.), 0555-72-1212, [3]. checkin: 3:00pm; checkout: 10:00am. Kasuitei Ooya is contemporary Japanese style inn standing just on the shore of Lake Kawaguchi. It has renovated rooms with private open-air bath and observation bathroom. Guests can enjoy more hot springs than ever before.
• Fuji-View Hotel, 511 Katsuyama, Fujikawaguchiko-machi, Minamitsuru-gun, Yamanashi, Japan (8 min by taxi from Kawaguchiko Station.), 0555-83-2211, [4]. checkin: 2:00pm; checkout: 11:00am. The Fuji View Hotel stands just on the shore of Kawaguchiko. Guests can appreciate natural beauties including the garden in the hotel property. The garden accommodates gorgeous view of blossoms of over 300 cherry trees in over 99,000 square meters (110,000 square yards).
• Shuhokaku Kogetsu, 2312, Kawaguchi, Fuji Kawaguchiko-machi, Minamitsuru-gun, Yamanashi-ken, 401-0304 (Take the Retro Bus Kawaguchiko Line to Kubota Kazutake Bijyutsukan or call at the front desk for a pickup bus.), 0555-76-8888, [5]. checkin: 3:00pm; checkout: 10:00am. This hotel is located near Kawaguchiko and All rooms and hot springs have a magnificent view of Mt. Fuji. Guests can enjoy the beautiful Mt. Fuji changing its feature from season to season.
Stay safe
Get out
This article is an outline and needs more content. It has a template, but there is not enough information present. Please plunge forward and help it grow!
Personal tools
Namespaces
Variants
Actions
Navigation
feeds
Destination Docents
Toolbox
In other languages
other sites
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:20:37.000Z
|
um2xtpbrqodfw7hl74fgvn4yckgmaoef
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28178",
"uncompressed_offset": 293750490,
"url": "wikitravel.org/wiki/en/index.php?oldid=1980980&title=Portpatrick",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://wikitravel.org/wiki/en/index.php?title=Portpatrick&oldid=1980980"
}
|
cccc_CC-MAIN-2013-20
|
Help Wikitravel grow by contributing to an article! Learn how.
Portpatrick
From Wikitravel
Revision as of 09:04, 13 January 2013 by Karenmargaret (Talk | contribs)
Jump to: navigation, search
Portpatrick is in Dumfries and Galloway.
Understand
Get in
Get around
See
Do
Buy
Eat
• Waterfront Hotel and Bistro, 7 North Crescent, Portpatrick, DG9 8SX, 01776 810800, [1]. Three Star hotel and bistro on the seafront overlooking Portpatrick harbour. Featuring restaurant, bar and terrace.
• Campbell's Restaurant, 1 South Crescent, Portpatrick, 01776810314, [2]. Tues-Sat, 12pm-2.30pm, 6pm-9.30pm; Sun, 12.30pm-2.30pm, 6.30pm-9.30pm. Seafood restaurat overlooking the harbour. A la Carte menu available for lunch and dinner six days a week, also a lunch menu, Sunday Special, vegetarian options and Christmas menu available from beginning of December. Closed Christmas and New Year.
Drink
Sleep
Contact
Get out
This article is an outline and needs more content. It has a template, but there is not enough information present. Please plunge forward and help it grow!
Personal tools
Namespaces
Variants
Actions
Navigation
feeds
Destination Docents
Toolbox
In other languages
other sites
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:07:11.000Z
|
227tgdhexortzkfxpjlwnsypqetpihrl
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28185",
"uncompressed_offset": 305987727,
"url": "www.abs.gov.au/AUSSTATS/abs%40.nsf/DetailsPage/8731.0Jun%201996",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://www.abs.gov.au/AUSSTATS/abs@.nsf/DetailsPage/8731.0Jun%201996?OpenDocument"
}
|
cccc_CC-MAIN-2013-20
|
Australian Bureau of Statistics
Celebrating the International Year of Statistics 2013
ABS Home > Statistics > By Release Date
8731.0 - Building Approvals, Australia, Jun 1996
Previous ISSUE Released at 11:30 AM (CANBERRA TIME) 30/07/1996
Page tools: RSS Search this Product
Help for : Adobe PDF.
Publications
8731.0 - Building Approvals, Australia
© Commonwealth of Australia 2013
Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:20:25.000Z
|
mxpg5w4bgetgy4sktrjthxykko7vyq3s
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28186",
"uncompressed_offset": 305994119,
"url": "www.abs.gov.au/AUSSTATS/abs%40.nsf/Lookup/4172.0Abbreviations12012",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://www.abs.gov.au/AUSSTATS/abs@.nsf/Lookup/4172.0Abbreviations12012?OpenDocument"
}
|
cccc_CC-MAIN-2013-20
|
Australian Bureau of Statistics
Celebrating the International Year of Statistics 2013
ABS Home > Statistics > By Catalogue Number
4172.0 - Arts and Culture in Australia: A Statistical Overview, 2012
Latest ISSUE Released at 11:30 AM (CANBERRA TIME) 30/01/2013
Page tools: Print Page Print All RSS Search this Product
• Abbreviations
ABBREVIATIONS
'000 thousand
$m million dollars
AbaF Australia Business Arts Foundation
ABC Australian Broadcasting Corporation
ABN Australian Business Number
ABS Australian Bureau of Statistics
ACLC Australian Culture and Leisure Classifications
ACMA Australian Communications and Media Authority
ACT Australian Capital Territory
AMOL Australian Museums and Galleries OnLine
AMPAG Australian Major Performing Arts Group
ANA Australian National Accounts
ANZSCO Australian and New Zealand Standard Classification of Occupations
ANZSIC Australian and New Zealand Standard Industrial Classification
ARIA Australian Recording Industry Association
ASCO Australian Standard Classification of Occupations
Aust. Australia
BAS Business Activity Statement
cat. no. Catalogue number
CMC Cultural Ministers Council
CMC SWG Cultural Ministers Council Statistics Working Group
DEEWR Australian Government Department of Education, Employment and Workplace Relations
DEWHA Australian Government Department of the Environment, Water, Heritage and the Arts
DVD digital versatile disc
GST goods and services tax
IVA industry value added
IVS International Visitors Survey
LGPC Local Government Purpose Classification
nec not elsewhere classified
nfd not further defined
no. number
NATSISS National Aboriginal and Torres Strait Islander Social Survey
NCCRS National Centre for Culture and Recreation Statistics
NCVER National Centre for Vocational Education Research
NSW New South Wales
NT Northern Territory
NVS National Visitors Survey
OECD Organisation for Economic Co-operation and Development
OPBT operating profit before tax
OzTAM Australian Television Audience Measurement
PDF portable document format
Qld Queensland
RSE relative standard error
SA South Australia
SAR Special Administrative Region
SBS Special Broadcasting Service
SIS Service Industry Survey
SWG Statistics Working Group
Tas. Tasmania
TAFE Technical and Further Education
TRA Tourism Research Australia
UK United Kingdom
USA United States of America
Vic. Victoria
WA Western Australia
© Commonwealth of Australia 2013
Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:24:23.000Z
|
cuakfsmtax7xsj2olvtb3qvlzpkrw52p
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28187",
"uncompressed_offset": 306001988,
"url": "www.abs.gov.au/ausstats/abs%40.nsf/Lookup/by%2BSubject/1367.0~2012~Main%2BFeatures~Building%2BApprovals~9.32",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://www.abs.gov.au/ausstats/abs@.nsf/Lookup/by+Subject/1367.0~2012~Main+Features~Building+Approvals~9.32"
}
|
cccc_CC-MAIN-2013-20
|
Australian Bureau of Statistics
Celebrating the International Year of Statistics 2013
ABS Home > Statistics > By Catalogue Number
1367.0 - State and Territory Statistical Indicators, 2012
Latest ISSUE Released at 11:30 AM (CANBERRA TIME) 04/06/2012 Final
Page tools: Print Page Print All RSS
BUILDING APPROVALS
• In April 2012 the number of dwelling unit approvals in the ACT decreased by 0.7% in trend terms.
• The number of dwelling units approved in April 2012 was 53.3% lower, in trend terms, than in April 2011.
• Over the year, in trend terms, all States and Territories recorded declines, ranging between 1.8% (Queensland) and 56.3% (NT).
Footnote(s): (a) Seasonally adjusted data not available
Source(s): Building Approvals. Australia (cat. no. 8731.0)
Useful Links
More About Building Approvals
Building approvals statistics include the number and value of new building work approved by administrative bodies in the collection period. They relate to the construction of new residential buildings, renovations and additions valued at $10,000 or more and the construction of non-residential buildings valued at $50,000 or more. Approvals of engineering works for roads, bridges or railways are not included in these statistics.
© Commonwealth of Australia 2013
Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:28:52.000Z
|
rvmymm5bnzpq4jz4sgr73dcwc2p7bab3
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28188",
"uncompressed_offset": 306010543,
"url": "www.abs.gov.au/ausstats/abs%40.nsf/Products/1297.0~2008~Chapter~GROUP%2B1501%2BACCOUNTING,%2BAUDITING%2BAND%2BACCOUNTABILITY",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://www.abs.gov.au/ausstats/abs@.nsf/Products/1297.0~2008~Chapter~GROUP+1501+ACCOUNTING,+AUDITING+AND+ACCOUNTABILITY?OpenDocument"
}
|
cccc_CC-MAIN-2013-20
|
Australian Bureau of Statistics
Celebrating the International Year of Statistics 2013
ABS Home > Statistics > By Catalogue Number
1297.0 - Australian and New Zealand Standard Research Classification (ANZSRC), 2008
Latest ISSUE Released at 11:30 AM (CANBERRA TIME) 31/03/2008
Page tools: Print Page RSS Search this Product
Contents >> Fields of Research >> DIVISION 15 COMMERCE, MANAGEMENT, TOURISM AND SERVICES >> GROUP 1501 ACCOUNTING, AUDITING AND ACCOUNTABILITY
This group covers accounting, auditing and accountability.
This group has eight fields:
150101 Accounting Theory and Standards
150102 Auditing and Accountability
150103 Financial Accounting
150104 International Accounting
150105 Management Accounting
150106 Sustainability Accounting and Reporting
150107 Taxation Accounting
150199 Accounting, Auditing and Accountability not elsewhere classified
Exclusions:
a) The economics of taxation are included in Group 1402 Applied Economics.
b) Taxation law is included in Group 1801 Law.
Previous PageNext Page
© Commonwealth of Australia 2013
Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:51:04.000Z
|
2otqbtziqmyryxc44tgorwgffz5ht7lz
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28190",
"uncompressed_offset": 324260184,
"url": "www.appropedia.org/Appropedia:Porting_formatted_content_to_MediaWiki",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://www.appropedia.org/Appropedia:Porting_formatted_content_to_MediaWiki"
}
|
cccc_CC-MAIN-2013-20
|
Appropedia:Porting formatted content to MediaWiki
From Appropedia
Jump to: navigation, search
Suggestion: Merge with the manual on Mediawiki.org
Formatted text, or "rich text," including HTML, Word or OpenOffice documents, can be converted to MediaWiki markup, with formatting.
There are a few techniques which are now being trialed. It may be that wikEd is better for HTML files and OpenOffice is better for Word/rtf files (and Word/rtf files converted from PDF).[verification needed]
If you are starting with a PDF document, it must first be converted to formatted text in another application, before it can be converted to MediaWiki: see Help:Porting PDF files to MediaWiki.
Contents
[edit] Online conversion
The best solution is often diberri's HTML2Wiki online converter. Insert the url (or raw HTML), and remember to select MediaWiki as the Wiki dialect.
Advantages:
• No need to set anything up
Disadvantages:
• In the output, you have to search past the header, sidebar code etc to find the actual content you're looking for in the wiki output. (Just a little inconvenient. Do a search, ctrl+f, for the title of the page, and it should bring you to the start.)
• Image links are not converted correctly, assuming you want to convert the embedded images to links. However if the images are all stored in the one folder on the website.(If you want to have the images on Appropedia, make sure the licenses are also suitably licensed before uploading, and cite the source and license properly.)
Magnus' HTML2Wiki Converter requires pasting the HTML (view source of the page to be converted) i.e. doesn't allow using a url. However it converts images without mangling the link.
Advantages:
• No need to set anything up.
• Converts image links without mangling. (If you want the images actually on Appropedia, see note above.)
Disadvantages:
• In the output, you have to search past the header, sidebar code etc to find the actual content you're looking for in the wiki output. (Just a little inconvenient. Do a search, ctrl+f, for the title of the page, and it should bring you to the start.)
• Requires pasting the raw HTML - less convenient.
[edit] wikEd
Another method is to use wikEd. It may be best to install this on another wiki you only use for this purpose You must install this on the account there, then convert the content there, then paste to Appropedia. (E.g. I use Wiki Species, and a sandbox in my userspace, i.e. User:Chriswaterguy/sandbox - but I don't actually save the page there. --Chriswaterguy 11:05, 23 September 2009 (UTC))
Otherwise install on your Appropedia account - (but does this clash with our new WYSIWYG editor? --Chriswaterguy 11:05, 23 September 2009 (UTC)) you can easily copy formatted text to the edit box, hit [w] ("wikify"), and you're most of the way there.
This seems to work well with HTML - how does it work with text pasted from various Wordprocessors? (I seem to recall having problems with this. --Chriswaterguy 03:35, 28 October 2009 (UTC))
[edit] Handling images in HTML2Wiki and wikEd
Image links are not converted correctly:
• If you want to have the actual images on the wiki page, make sure the images are also suitably licensed (sometimes the text is, but the images are not). Then upload with a suitable name, and use the same name to display it in the wiki page.
• If you want to convert the embedded images to links (a good temporary option for some wikis, especially when converting many pages):
• If the images are actually from a different domain than the content, then they should be converted correctly to links.
• If they're on the same server as the content, the links will display as [[Image:imagefilename.jpg]] (or .png...). However if the images are all stored in the one folder on the website, you can do a search and replace, ( [[Image: for [http://domain.org/images/foldername/ ) either in a Wordprocessor or using the replace function in the wikEd toolbar.
[edit] OpenOffice
OpenOffice can open Word documents as well as Open Document Format and other wordprocessor formats.
[edit] From local installation of OOO
• Open the file or copy the content in OpenOffice 2.3 or greater;
• Export to MediaWiki format: File menu -> Export -> Under format type choose MediaWiki - this exports wikimarkup as a txt file.
(If this is inadequate (e.g. for dealing with images and references) then we have to work out some VB macro code, we will post everything we know. First need to upgrade and try out the feature. --Chriswaterguy · talk 16:52, 7 February 2008 (PST))
Update: I can't get this function to work in OOO 2.5 for Linux. --Chriswaterguy 03:35, 28 October 2009 (UTC)
Images: Are images saved automatically during file export from OpenOffice? Tags to indicate image location?
[edit] OpenOffice extension
OpenOffice extension for Mediawiki.
Once you install it, you just send your document to the Mediawiki of your choice. It prompts you for the URL and your ID and Password, and posts it.
Status: untested. Info supplied by Mark Johnson markvector-group
[edit] Rich text editors for the wiki
In the medium to long term, Appropedia:Rich text editing (i.e. WYSIWYG or some variation on that) might make this easier. There are problems, including fears that this will lead to non-standard markup being entered, and excess use of HTML tags if they are not converted effectively.
FCKEditor is already working well on Appropedia, however it doesn't allow pasting of formatted text (probably to avoid the problems mentioned above).
[edit] Spreadsheets
• csv2wp is a little script for converting tables from the comma-separated values (CSV) file format to wiki-tables.
(There may be better ones around - I haven't looked. --Chriswaterguy 10:58, 24 February 2010 (UTC))
[edit] Other methods
These haven't been tried yet:
[edit] Interwiki links
Some may be useful:
[edit] See also
[edit] Interwiki links
Personal tools
Collaborators
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:26:02.000Z
|
rzbgkccghlfbadsohqyqk7ftct42w2mz
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28195",
"uncompressed_offset": 379869464,
"url": "www.ccsenet.org/journal/index.php/ijbm/article/view/21625/0",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://www.ccsenet.org/journal/index.php/ijbm/article/view/21625/0"
}
|
cccc_CC-MAIN-2013-20
|
Towards a Stakeholder Perspective on Competitive Advantage
Minyu Wu
Abstract
Competitive advantage and stakeholder management are two important research streams that have attracted
much attention during the past few decades. Distinctive approaches to studies on competitive advantage exhibit
differences in their assumptions, units of analysis, and strategic implications; however, none of them can
individually explain the whole concept of competitive advantage. Although competitive advantage is the core
issue of strategic management in which stakeholder management is rooted, the two topics have developed
seemingly independently in the literature. By focusing on value creation, value protection, and value capture, this
paper suggests a theoretical framework that employs a stakeholder perspective, linking three approaches on
competitive advantage—the resource-based view, the relational view, and the activity-position view. This
framework provides insight to an incomplete picture of competitive advantage in the extant literature.
Full Text: PDF DOI: 10.5539/ijbm.v8n4p20
This work is licensed under a Creative Commons Attribution 3.0 License.
International Journal of Business and Management ISSN 1833-3850 (Print) ISSN 1833-8119 (Online)
Copyright © Canadian Center of Science and Education
To make sure that you can receive messages from us, please add the 'ccsenet.org' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:21:38.000Z
|
qcu57sg5k25knx4mshnnix4rgl2nbegg
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28203",
"uncompressed_offset": 454388242,
"url": "www.familysearch.org/learn/wiki/en/Congleton_Moss_Holy_Trinity",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://www.familysearch.org/learn/wiki/en/Congleton_Moss_Holy_Trinity"
}
|
cccc_CC-MAIN-2013-20
|
Congleton Moss Holy TrinityEdit This Page
From FamilySearch Wiki
England Cheshire Cheshire Parishes Congleton Moss or Mossley
Contents
Chapel History
Congleton Moss or Mossley, was a chapelry built and in operation by the year 1845. Like all of Congleton's chapelries, it lay within the ancient parish boundary of Astbury St Mary and founded as the church for the Mossley district of Congleton township.[1]
Further parishes in Congleton with their own page are:
Congleton St Stephen, Cheshire, Brook Street. A separate district chapelry from 1845 serving part of Congleton township.
Congleton St James,Cheshire, West Street. A separate district chapelry from 1844 serving part of Congleton township (no burials here).
Congleton St Peter, Cheshire. A parochial chapelry over the Congleton chapels of ease (chapelries) and attached to the ancient or mother parish, of Astbury St Mary's Parish.
Resources
Civil Registration
Birth, marriages and deaths were kept by the government, from July 1837 to the present day. The civil registration article tells more about these records. There are several Internet sites with name lists or indexes. A popular site is FreeBMD.
Registration Districts
• Congleton (1837–1937)
• Macclesfield (1937–74)
• Congleton and Crewe (1974–88)
• South Cheshire (1988–98)
• Cheshire East (post1998) Online events may be found Cheshire BMD
Church records
Congleton Moss Holy Trinity Chapelry registers of christenings, marriages and burials have been indexed by the following groups:
FS PR's =FamilySearch Parish Registers
FS BT's = FamilySearch Bishops Transcripts
Congleton Moss Holy Trinity Chapelry Online Records
Baptisms
Marriages
Burials
Indexes Images Indexes Images Indexes Images
FS PR's NONE
NONE
NONE
NONE
NONE
NONE
FS BT'S NONE
NONE
NONE
NONE
NONE
NONE
To find the names of the neighbouring parishes, use England Jurisdictions 1851. In this site, search for the name of the parish, click on the location "pin", click Options and click List contiguous parishes.
Bishop's transcripts for Congleton Moss Holy Trinity begin from 1851 and the parish (chapelry) registers, from 1845.
Other church registers for this township include:
St. Peter's Church, Congleton, 1745-1796. An index for Cheshire, Church of England, Bishop’s transcripts is available online at FamilySearch Historical Records (formerly Record Search). Here is a list of church records on microfilm at the Family History Library in Salt Lake City:
Bishop's Transcripts Content FHL Film
Baptisms, burials, 1745, 1749-1750, 1753-1787, 1789-1793, 1796. BRITISH 1655596 Item 2
Registers of Baptisms 1719–1975, Marriages 1719–1772 & 1839–1931, and Burials 1719–1913 have been deposited at the Cheshire Record Office call number P 260 (see Astbury St Mary)
Non-Conformist Churches
• Congleton, St. Mary (Roman Catholic), West Road. Founded 1821, the present church was opened in 1826. Registers of baptisms 1822–1965, marriages 1856–1962 and burials 1856–1947 are at the Cheshire Record Office.
• Congleton, Friends' Meeting House (Quakers). Closed in 1741. Some records are at the Cheshire Record Office.
• Congleton, Methodist (Trinity) Chapel (Wesleyan), Wagg Street. Founded 1766, rebuilt in 1808 and 1967. Registers of baptisms 1838–98 and marriages 1845–56 are at the Cheshire Record Office.
• Congleton, Methodist Chapel (Primitive). Built in 1821 on Lawton Street, rebuilt in 1890 in Kinsey Street.
• Congleton, Methodist Chapel (Lady Huntingdon's Connexion). Founded 1822. Registers 1822–1837 are at the Cheshire Record Office.
• Congleton Edge, Methodist Chapel (Wesleyan). Built in 1833, rebuilt in 1889.
• Congleton, Methodist Chapel (Wesleyan), Brook Street. Built in 1834, closed in 1966. Registers of baptisms 1929–1966 are at the Cheshire Record Office.
• Congleton, Methodist Chapel (New Connexion), Queen Street. Built in 1836, closed in 1969. Registers of baptisms 1898–1968 are at the Cheshire Record Office.
• Congleton, Methodist Chapel (Primitive), Biddulph Road. Built in 1840.
• Congleton, Methodist Chapel (Wesleyan), Rood Lane. Founded 1861, rebuilt in 1886.
• Congleton, Unitarian Chapel, Cross Street. Founded 1687 by the Dane Bridge, moved to Cross Street in 1733. The present building was built in 1883 and closed in 1978. Records of baptisms 1936–74, marriages 1940–74 and burials 1934–77 are at the Cheshire Record Office.
• Congleton, United Reformed Church (Independent/Congregational). Built in 1790 on Mill Street, rebuilt in 1876 on Antrobus Street. Registers 1785–1837 are at the Cheshire Record Office.
Non-Conformist Churches
Cheshire Record Office Document Reference ERC 20 Title Congleton St Mary Catholic Church
Date 1822-1965
Description registers of baptism 1822-1965, marriage 1831-1962, death 1856-1932, 1948
URL http://www.nationalarchives.gov.uk/a2a/records.aspx?cat=017-erc20&cid=0
Society of Friends. Cheshire Monthly Meeting (Mobberley, Cheshire) Burials, 1655-1831 Microfilm of original records at the London Public Record Office, London. Also includes records for Congleton. RG-6 nos. 1603, 1329, 97, 98, 214
Other Content FHL Film
Burials, 1655-1831 BRITISH 814840
Church records for the Queen Street New Connexion Methodist Chapel, Congleton, 1898-1944 Cheshire Record Office call number EMS 74/1/1.
Other Content FHL Film
Baptisms, 1898-1944. VAULT BRITISH 2299419 Item 7
Census records
Index for the Census may be searched at FamilySearch Historical Records
Probate records
Records of wills, administrations, inventories, indexes, etc. were filed by the court with jurisdiction over this parish. Go to Cheshire Probate Records to find the name of the court having primary jurisdiction. Scroll down in the article to the section Court Jurisdictions by Parish.
Poor Law Unions
Maps and Gazetteers
Maps are a visual look at the locations in England. Gazetteers contain brief summaries about a place.
Web sites
References
1. Lewis, Samuel A., A Topographical Dictionary of Englan'd (1848), pp. 675-678. Date accessed: 15 January 2013.
Bibliography
Clifton-Taylor, Alec (1974), English Parish Churches as Works of Art, London: Batsford,p 8 ISBN 0 7134 2776 0
Richards, Raymond (1947), Old Cheshire Churches, London: B. T Batsford, pp. 137–141
Morant, Roland W. (1989), Cheshire Churches, Birkenhead: Countyvise, pp. 126–127, ISBN 0 907768 18 0
Pevsner, Nikolaus; Edward Hubbard (2003) [1971], The Buildings of England: Cheshire, New Haven: Yale University Press, p. 182, ISBN 0 300 09588 0
Need additional research help? Contact our research help specialists.
Need wiki, indexing, or website help? Contact our product teams.
Did you find this article helpful?
You're invited to explain your rating on the discussion page (you must be signed in).
• This page was last modified on 18 January 2013, at 20:25.
• This page has been accessed 89 times.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:00:28.000Z
|
ixgckqzq5dcpe3im3m3uiqudmd5ge7mv
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28204",
"uncompressed_offset": 460745327,
"url": "www.fides.org/en/news/29706?idnews=29706&lan=eng",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://www.fides.org/en/news/29706?idnews=29706&lan=eng"
}
|
cccc_CC-MAIN-2013-20
|
http://www.fides.org
Africa
2011-08-27
AFRICA/LIBYA - "The situation in Tripoli is calmer but we still have to be careful when leaving the house", says Mgr. Martinelli
Rome (Agenzia Fides) - "The situation seems calmer. We are heading towards improvement, but we still have to be very careful when leaving the house", says His Exc. Mgr Giovanni Innocenzo Martinelli, Apostolic Vicar of Tripoli, who is in Italy for medical appointments, but in the morning he contacted the responsible of the Apostolic Vicariate in the Libyan capital. "I am sure that with time everything will return back to normal," said Mgr. Martinelli, who does not hide however the difficulties that arise. One of these, as reported by Peter Bouckaert, director for the Human Rights Watch emergencies, is the presence of huge amounts of weapons lying in the arsenals of Gaddafi’s military regime. "It is a serious problem, these weapons must be put in a safe place and made inactive, because if they fall into the wrong hands the consequences can be severe and risk the outbreak of uncontrolled violence", agrees Mgr. Martinelli. (L.M.) (Agenzia Fides 27/08/2011)
Share: Facebook Twitter Google Blogger Altri Social Network
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:57:45.000Z
|
7ti3fvnelw4tcqh4bmmhhf4axlwlajk6
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28213",
"uncompressed_offset": 489126636,
"url": "www.go4expert.com/forums/summer-training-students-btech-noida-t21206/",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://www.go4expert.com/forums/summer-training-students-btech-noida-t21206/"
}
|
cccc_CC-MAIN-2013-20
|
Summer Training for Students of BE/Btech at Noida, Lucknow, Roorkee
Newbie Member
5Mar2010,13:03 #1
CETPA Infotech a globally recognized and Northern India’s oldest & first ISO certified Engineers Training Company announces its 8th Summer Training Program for engineering students ranging for all the branches.
CETPA was formed to promote cutting edge technologies among students & professionals by the medium of training, workshops, and seminars. In the past 8 years CETPA has won many national & international meritorious awards and formed a strong steam of competent engineers and adopted a unique practical oriented training methodology which makes a CETPA a well renowned place to learn.
As we are committed to provide quality education and best possible learning experience to our students & that’s why CETPA has once again revised its approach and course material to suit the demands and needs of students better. This summer camp course is not just to equip students with a training certificate but it aims to provide students with strong foundation with practical hands on knowledge & experience so that they can make their own projects without hesitation.
Technologies you can opt for your Training: Embedded System, .NET, JAVA, VLSI design (VHDL), CATIA, AutoCAD, MATLAB, Advanced Embedded System, PHP, Web Designing, Web Hosting, C & C++
Training Duration: 4 weeks & 6 weeks
Training Location: Greater Noida, Noida, Lucknow, Roorkee & Meerut
Training fees: Refer Website for details
Registration deadline: Limited seats, strictly on first come first serve basis (Online registration is already started)
CETPA Advantages:
1.CETPA is globally recognized & 8 years of technology training experience.
2.Practical learning based Training Program.
3.Good training infrastructure.
4.Learning Books & CD’s
5.Summer Training Certificate which is globally accepted.
Accommodation: Assitance in securing a place will be provided - please ensure you inform us that you will need accommodation.
List of Some premier institutions from where students join us for our Summer Training Program every year
IIT-BHU, Varanasi, MNIT-Allahabad, NIT-Agartala, NIT-Hamirpur, NIT-Durgapur, NIT-Patna, NIT-Jalandhar, NIT-Raipur, NIT-Rourkela, NIT-Suratkhal, NIT-Durgapur, Indian School of Mines-Dahanbad, HBTI-Kanpur, Birla Institute of Technology-Mesra,Ranchi, Birla Institute of Technology-Patna , SRM-University-Chennai, Vellore Institute of Technology- Vellore, National Institute of Science & Technology- Behrampur, Sikkim Manipal Institute of Technology- Sikkim , Jaypee Institute of Technology, (Guna, Solan & Noida) Purvanchal University- Jaunpur, Institute of Engineering & Technology- Lucknow , MMMEC- Gorakhpur, KNIT- Sultanpur ,BIET- Jhansi, Maulana - Azad National Institute of Technology Bhopal, Krishna Institute of Engineering & Technology- Ghaziabad, BBDNITM- Lucknow,NIEC- Lucknow, SRMCEM- Lucknow, NIET- Greater Noida, GNIT- Greater Noida, Hindustan College of Science & Technology- Mathura, Anand Engineering College- Agra, Hindustan Institute of Technology- Greater Noida , ABES- Ghaziabad, RKGIT- Ghaziabad, AKGEC Ghaziabad,Institute of Management & Technology- Gurgaon, PESIT- Bangalore, Garhwal University- Srinagar, Radha Raman Institute of Science & Technology- Bhopal, GLAITM- Mathura, SITM- Lucknow, AIET- Lucknow , KIT-Kanpur, Jabalpur Engineering College- Jabalpur, UCER- Allahabad, Lovely Professional University, Jalandhar
And many more.... (235+ different Engineering colleges students participated in our summer training program 2009)
For More details on Summer Training details like fees, registration, course structure and others please contact:
Contact: 0120-64564074, 9212172692, 9258017974, 9219602769
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:43:02.000Z
|
i2ndqabrtxecuxbtva6atm3bshj62yck
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28232",
"uncompressed_offset": 579128851,
"url": "www.mariowiki.com/Penguin_Suit",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://www.mariowiki.com/Penguin_Suit"
}
|
cccc_CC-MAIN-2013-20
|
Penguin Suit
From the Super Mario Wiki
Jump to: navigation, search
Penguin Suit
Description
A penguin-like suit.
• First Appearance
New Super Mario Bros. Wii (2009)
• Latest Appearance
New Super Mario Bros. U (2012)
• Effect on Player
Turns Mario into Penguin Mario.
The Penguin Suit is an item in the game, New Super Mario Bros. Wii; as its name suggests, it is a suit that resembles a penguin. This item first appears in World 3, and from then on it is found in Toad houses as well. It allows players to turn into their Penguin form, that has a blue or black body with short, colored trousers. The suit lets the player throw Ice Balls at enemies, freezing them (just like the Ice Flower); this not only prevents them from hurting the player, but the frozen enemies can also be used as platforms. It also improves traction, making players not slip while on ice. In addition, the Penguin Suit lets the player swim more efficiently underwater, and even slide on ice and water without sinking, breaking any blocks they collide with. It is even able to defeat enemies, but will bounce off a sliding Cooligan unhurt. It is introduced along with the Propeller Mushroom as the newest power-ups in the game.
The Penguin Suit reappears in New Super Mario Bros. U and acts the same way it did in New Super Mario Bros. Wii, though the player must get it through a Power-Up Toad House in Superstar Road. Additionally, Penguin Bowling allows use of the Penguin Suit. It can also be used in the Penguin Pack from Boost Rush Mode.
[edit] Gallery
[edit] Trivia
• The Penguin Suit seems to mimic the shell dash function of the Blue Shell from New Super Mario Bros. as both items allow the wearer to slide along surfaces at faster speeds than running.
• The Penguin Suit is rather similar to the penguin suit in the Wii Fit game "Penguin Slide".
• When a character obtains a Penguin Suit, the sound effect is slightly different from other power-ups. A sound similar to a duck quacking is played along with the normal power-up sound.
[edit] Names in Other Languages
Language Name Meaning
Spanish (NOA) Traje de Pingüino Penguin Suit
Spanish (NOE) Traje Polar Polar Suit
French (NOA) Tuxédo de Pingouin
French (NOE) Costume de Pingouin
Dutch Pinguïnpak Penguin Suit
Portuguese Traje de Pinguin Penguin Suit
Personal tools
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:20:54.000Z
|
cowsii5ip7abu5rihcj4ebevzxcdlxzn
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28240",
"uncompressed_offset": 624857913,
"url": "www.ohloh.net/licenses/WTFPL_2_0",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://www.ohloh.net/licenses/WTFPL_2_0"
}
|
cccc_CC-MAIN-2013-20
|
Generous License
FOR THE SAKE OF HUMANITY FREEDOM LICENSE
Version 1, May 2013
No Copyright @ 2013 Fikri Ferdian
Petamburan, 10260 Jakarta, Indonesia
Everyone is permitted WHATEVER they want to use this licensed material.
Whatever your first think about WHATEVER, there is only one native and textual meaning on it, whatever you going to use it, it's your Own Responsibility, So there's only one advice base on concern for humanity, Use it for Useful Thing, for your self or others.
Go Generous, it shall be useful while you in this world or another.
NO NEED TO ASK ANY KIND OF PERMISSION
If you want to contact the author, for a 'Thanks' its very nice, but if you do not, there is no problem at all, nothing to do with ethics nor moral and never mention laws in this case, because the owner already put the material in Public, so they expect & realize it would be useful for Everyone.
Do whatever you like, to put this text license or give the link or any information transfer method in any distribution, or you choose to not transfer this information it is your own decision.
TAKES WHATEVER YOU THINK SIMPLE AND AS EASY AS POSSIBLE AND NO BURDEN AT ALL.
RESTRICTION FOR THE SAKE OF HUMAN FREEDOM, DO NOT PUT ANY LICENSE FOR ANY MATERIAL YOU USE EXCEPT 'GRSL' ONE.
ONLY GOD MAY TERMINATE THIS LICENSE
Read more about this license at http://freetexthost.com/txfaiewq62
Copyright © 2013 Black Duck Software, Inc. and its contributors, Some Rights Reserved. Unless otherwise marked, this work is licensed under a Creative Commons Attribution 3.0 Unported License . Ohloh ® and the Ohloh logo are trademarks of Black Duck Software, Inc. in the United States and/or other jurisdictions. All other trademarks are the property of their respective holders.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:56:07.000Z
|
owsxxxfpwizseabc2m3sf7fbflq25eyh
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28254",
"uncompressed_offset": 628433910,
"url": "www.openwetware.org/wiki/User:Melissa_Novy/Notebook/CHEM-572",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://www.openwetware.org/wiki/User:Melissa_Novy/Notebook/CHEM-572"
}
|
cccc_CC-MAIN-2013-20
|
User:Melissa Novy/Notebook/CHEM-572
From OpenWetWare
Jump to: navigation, search
Search this Project
Customize your entry pages
Project Description
• Antimicrobial films and coatings inhibit bacterial growth and have practical applications in public environments. Because bacteria can develop resistance to antibiotics, an alternative is to use silver. Studies indicate that silver cations diffuse through the bacterial membrane and cause cell death by disrupting DNA replication and ATP production. Polymer films containing silver-loaded montmorillonite are a good candidate to study biocidal effects, because they are more durable than polymers that lack fillers and possibly better control the delivery of silver cations.
• The antimicrobial effect of films of PLA2002D containing Laponite co-exchanged with Ag+ is being tested. Films will be soaked in pure H2O to monitor the rate at which Ag+ leaches from the matrix. Films will also be incorporated into inoculated LB media to determine their antimicrobial effect against DH5α-T1 cells over a period of 15 h.
Recent changes
Personal tools
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:59:30.000Z
|
46337ma5544oty5l62u7452uowgni6c5
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28256",
"uncompressed_offset": 640385775,
"url": "www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A2001.05.0061%3Achapter%3D5%3Apage%3D112",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A2001.05.0061%3Achapter%3D5%3Apage%3D112"
}
|
cccc_CC-MAIN-2013-20
|
[112] sacrificed, show his deep faith and his deep satisfaction in his aggressive, indomitable general. In August he writes: “The particulars of your campaign I neither know nor seek to know. I wish not to intrude any restraints or constraints upon you.” Grant's reply unites a modesty and a self-reliance that Lincoln had not heard until this general came: “Should my success be less than I desire or expect, the least I can say is the fault is not yours.” No wonder Lincoln liked his new commander! He writes again, when less firm spirits at Washington had been counselling a halt: “I have seen your despatch expressing your unwillingness to break your hold where you are. Neither am I willing. Hold on with a bull-dog grip, and chew and choke as much as possible.”
The withers of the South were being wrung. Side failures did nothing to obscure the looming end. The great blows of Sherman, Sheridan, and Thomas sent
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License.
An XML version of this text is available for download, with the additional restriction that you offer Perseus any modifications you make. Perseus provides credit for all accepted changes, storing new additions in a versioning system.
hide Places (automatically extracted)
View a map of the most frequently mentioned places in this document.
Sort places alphabetically, as they appear on the page, by frequency
Click on a place to search for it in this document.
Washington (United States) (1)
Visualize the most frequently mentioned Pleiades ancient places in this text.
Download Pleiades ancient places geospacial dataset for this text.
hide People (automatically extracted)
Sort people alphabetically, as they appear on the page, by frequency
Click on a person to search for him/her in this document.
Lincoln (2)
Thomas (1)
John Sherman (1)
Sheridan (1)
U. S. Grant (1)
hide Dates (automatically extracted)
Sort dates alphabetically, as they appear on the page, by frequency
Click on a date to search for it in this document.
August (1)
hide Display Preferences
Greek Display:
Arabic Display:
View by Default:
Browse Bar:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:21:10.000Z
|
oguczofhczy7xloavkiadkzarlrwkp37
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28257",
"uncompressed_offset": 640406012,
"url": "www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A2006.05.0274%3Aarticle%3D5",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A2006.05.0274%3Aarticle%3D5"
}
|
cccc_CC-MAIN-2013-20
|
Army of the Potomac.
the hostile armies — the flags — the Abolitionists of Fairfax --their fate.
[Correspondence of the Richmond Dispatch]
Mason's Hill, Sept. 12, 1861.
In sight of Alexandria and Washington, and in the midst of ‘"war's alarms"’ on every side of me, the eye detects emblems of hostility. The rattling sabres and loaded muskets of our own soldiers meet it wherever it turns; the fierce steel of Federal bayonets is gleaming in the grey distance; and the flags of both nations fling deflantly their Stare and Bars and Stars and Stripes upon the breeze. The banner of the United States is waving in plain view from an eminence near Alexandria and gazing upon this badge of tyranny, and remembering the foul disgrace into which it has fallen, we feel like pointing our eager soldiers to the spot where it floats and invoking them to tear down the mocking emblem and trample it 'neath their feet. Nothing, however, remains of it but the outward form; each Star and Stripe blazes as of yore, but the spirit has forever fied, and where victory was once proud to perch, now sit engraven infamy and defeat.
A dark shade seems resting upon this portion of the State, and truly has the abolition fiend compelled his unhappy victims to drain the cup of ruin to its dregs. The country immediately around here was owned almost exclusively by Northern men who emigrated to it a number of years ago, bought cheaply our lands, were soon admitted to the high name and privileges of true natives; but, adder-like, after being warmed into life and wealth, sought to inflict upon their country a mortal blow. A large majority of these settlers voted openly for Lincoln, and confident of our quick subjugation and enslavement, have been giving to the enemy all the aid and comfort in their power. They assisted liberally the grand army in its advance, protected and sheltered the flying fugitives in their flight; and now, that the whole country has been abandoned to our arms, have been obliged to fly from their homes and property into the barren inhospitable regions of the North. Confiscation will of course fall upon their estates, and indeed their household furniture, their gardens, the unripe corn in their fields, and all the portable effects they owned, have been appropriated by our soldiers, whose plan of confiscation in such cases embraces no dull routine of legal forms, but like Greeley's war, is ‘ "short, sharp and decisive."’ A mile below Mason's Hill, on the road to Alexandria, resided two of these creatures named Barcrofts. The elder one--the father — had accumulated considerable wealth, and upon his well cultivated farm had just reared a handsome dwelling, highly convenient in its construction, and supplied with all the comforts and luxuries of a country residence.--The younger one was a practitioner of medicine, and resided near his father. Their smothered abolitionism burst forth upon the suceess of Lincoln; and when the mighty uprising of the North, that followed the bombardment of Fort Sumter occurred, proclaimed themselves in favor of subjugation. Both would have fied after the battle of Manassa, but as large bodies of the Federals still hovered near, asserting their determination to hold the country as outposts, they remained.
We attacked the enemy, driving him from beyond Mason's, which so precipitated their flight that everything was left including even their private letters and papers. The Doctor left a valuable and extensive library, which, to preserve for his future information, a squad of our soldiers kindly took possession of. Beck's Medical Jurisprudence and other valuable books have been presented to me Many besides the Barcrofts had the audacity to remain here until quite recently, but the clash of arms at their doors, and the invariable rout of their Northern forces, falling upon their ears like the warning of Lot fleeing from Sodom, have at last, Allah' be praised, rid the country of its accursed settlers. Droves of horses, hogs and cows, remain upon many farms, which the Quartermaster of the Government has only to take possession of and credit to their account of wrongs committed against the State. In many of the deserted houses were found copies of the Helper Book, New York Herald, Tribune and other vile productions, whose moral and political lessons, like The Apples of the Dead Sea, have turned to ashes on the tips and plunged their fellows into one dark guif of penury and ruin. Ithuriel.
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License.
An XML version of this text is available for download, with the additional restriction that you offer Perseus any modifications you make. Perseus provides credit for all accepted changes, storing new additions in a versioning system.
hide Places (automatically extracted)
View a map of the most frequently mentioned places in this document.
Sort places alphabetically, as they appear on the page, by frequency
Click on a place to search for it in this document.
United States (United States) (1)
Sodom (Israel) (1)
hide People (automatically extracted)
Sort people alphabetically, as they appear on the page, by frequency
Click on a person to search for him/her in this document.
Lincoln (2)
Mason (1)
Greeley (1)
Fairfax (1)
Beck (1)
hide Dates (automatically extracted)
Sort dates alphabetically, as they appear on the page, by frequency
Click on a date to search for it in this document.
September 12th, 1861 AD (1)
hide Display Preferences
Greek Display:
Arabic Display:
View by Default:
Browse Bar:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:29:52.000Z
|
wj7mip5iclg43negegjfem6e2kqv24un
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28258",
"uncompressed_offset": 640416977,
"url": "www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A1999.01.0239%3Abook%3D12%3Achapter%3D3%3Asection%3D39&ie_sort=token",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://www.perseus.tufts.edu/hopper/text?doc=Perseus:text:1999.01.0239:book=12:chapter=3:section=39&ie_sort=token"
}
|
cccc_CC-MAIN-2013-20
|
[39]
My native city, Amaseia, lies in a deep and extensive valley, through which runs the river Iris.1 It is indebted to nature and art for its admirable position and construction. It answers the double purpose of a city and a fortress. It is a high rock, precipitous on all sides, descending rapidly down to the river: on the margin of the river, where the city stands, is a wall, and a wall also which ascends on each side of the city to the peaks, of which there are two, united by nature, and completely fortified with towers. In this circuit of the wall are the palace, and the monuments of the kings. The peaks are connected together by a very narrow ridge, in height five or six stadia on each side, as you ascend from the banks of the river, and from the suburbs. From the ridge to the peaks there remains another sharp ascent of a stadium in length, which defies the attacks of an enemy. Within the rock are reservoirs of water, the supply from which the inhabitants cannot be deprived of, as two channels are cut, one in the direction of the river, the other of the ridge. Two bridges are built over the river, one leading from the city to the suburbs, the other from the suburbs to the country beyond; for near this bridge the mountain, which overhangs the rock, terminates.
A valley extends from the river; it is not very wide at its commencement, but afterwards increases in breadth, and forms the plain called the Chiliocomon (The Thousand Villages). Next is the Diacopene, and the Pimolisene, the whole of which is a fertile district extending to the Halys.
These are the northern parts of the country of the Amasenses, and are in length about 500 stadia. Then follows the remainder, which is much longer, extending as far as Babanomus, and the Ximene,2 which itself reaches to the Halys. The breadth is reckoned from north to south, to the Zelitis and the Greater Cappadocia, as far as the Trocmi.3 In Ximene there is found fossile salt, (ἄλες, Hales,) from which it is supposed the river had the name of Halys. There are many ruined fortresses in my native country, and large tracts of land made a desert by the Mithridatic war. The whole of it, however, abounds with trees. It affords pasture for horses, and is adapted to the subsistence of other animals; the whole of it is very habitable. Amaseia was given to the kings, but at present it is a (Roman) province. 40. There remains to be described the country within the Halys, belonging to the province of Pontus, and situated about the Olgassys,4 and contiguous to the Sinopic district. The Ol- gassys is a very lofty mountain, and difficult to be passed. The Paphlagonians have erected temples in every part of this mountain. The country around, the Blæne, and the Domanitis, through which the river Amnias5 runs, is sufficiently fertile. Here it was that Mithridates Eupator entirely destroyed6 the army of Nicomedes the Bithynian, not in person, for he himself happened to be absent, but by his generals. Nicomedes fled with a few followers, and escaped into his own country, and thence sailed to Italy. Mithridates pursued him, and made himself master of Bithynia as soon as he entered it, and obtained possession of Asia as far as Caria and Lycia. Here is situated Pompeiopolis,7 in which city is the Sandaracurgium,8 (or Sandaraca works,) it is not far distant from Pimolisa, a royal fortress in ruins, from which the country on each side of the river is called Pimolisene. The Sandaracurgium is a mountain hollowed out by large trenches made by workmen in the process of mining. The work is always carried on at the public charge, and slaves were employed in the mine who had been sold on account of their crimes. Besides the great labour of the employment, the air is said to be destructive of life, and scarcely endurable in consequence of the strong odour issuing from the masses of mineral; hence the slaves are short-lived. The mining is frequently suspended from its becoming unprofitable, for great expense is incurred by the employment of more than two hundred workmen, whose number is continually diminishing by disease and fatal accidents.
So much respecting Pontus.
1 Tusanlu-su, a branch of the Ieschil Irmak.
2 West of Koseh Dagh.
3 Situated between the Kizil Irmak and the river Delidsche Irmak, a tributary of the former.
4 Alkas-Dagh.
5 Gok-Irmak, or Kostambul Tschai, flowing between the mountain ridges. Jeralagoz-Dagh and Sarikawak-Dagh.
6 B. C. 88.
7 Tasch-Kopri.
8 Pliny, xxxiv. c. 18.
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License.
An XML version of this text is available for download, with the additional restriction that you offer Perseus any modifications you make. Perseus provides credit for all accepted changes, storing new additions in a versioning system.
load focus English (1924)
load focus Greek (1877)
hide Dates (automatically extracted)
Sort dates alphabetically, as they appear on the page, by frequency
Click on a date to search for it in this document.
88 BC (1)
hide References (4 total)
hideData/Identifiers
Citation URN: urn:cts:greekLit:tlg0099.tlg001.perseus-eng2:12.3.39
Document URN: urn:cts:greekLit:tlg0099.tlg001.perseus-eng2
hide Display Preferences
Greek Display:
Arabic Display:
View by Default:
Browse Bar:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:00:41.000Z
|
gg5eobhxqqmubg2gyi6jnachponhczp5
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28259",
"uncompressed_offset": 640454235,
"url": "www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A1999.04.0060%3Aalphabetic+letter%3DI%3Aentry+group%3D28%3Aentry%3Dintingo&toc=Perseus%3Atext%3A1999.04.0060%3Aalphabetic+letter%3DI%3Aentry+group%3D31",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://www.perseus.tufts.edu/hopper/text?doc=Perseus:text:1999.04.0060:alphabetic%20letter=I:entry%20group=28:entry=intingo&toc=Perseus%3Atext%3A1999.04.0060%3Aalphabetic+letter%3DI%3Aentry+group%3D31"
}
|
cccc_CC-MAIN-2013-20
|
(in-tingō or in-tinguō —, inctus, ere,
to dip, soak.—Only P. perf.: intinctae (faces sanguine), O.
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License.
An XML version of this text is available for download, with the additional restriction that you offer Perseus any modifications you make. Perseus provides credit for all accepted changes, storing new additions in a versioning system.
hide Dictionary Entry Lookup
Use this tool to search for dictionary entries in all lexica.
Search for in
hide Display Preferences
Greek Display:
Arabic Display:
View by Default:
Browse Bar:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:11:18.000Z
|
lbgdo76fiambgvtkt5gttlyu5dzpak3k
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28260",
"uncompressed_offset": 640465067,
"url": "www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A1999.04.0060%3Aalphabetic+letter%3Dc%3Aentry+group%3D5%3Aentry%3Dcaseus&toc=Perseus%3Atext%3A1999.04.0060%3Aalphabetic+letter%3Dc%3Aentry+group%3D1",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://www.perseus.tufts.edu/hopper/text?doc=Perseus:text:1999.04.0060:alphabetic%20letter=c:entry%20group=5:entry=caseus&toc=Perseus%3Atext%3A1999.04.0060%3Aalphabetic+letter%3Dc%3Aentry+group%3D1"
}
|
cccc_CC-MAIN-2013-20
|
cāseus ī, m
cheese, Cs.: abundare lacte: Pinguis, V.
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License.
An XML version of this text is available for download, with the additional restriction that you offer Perseus any modifications you make. Perseus provides credit for all accepted changes, storing new additions in a versioning system.
hide Dictionary Entry Lookup
Use this tool to search for dictionary entries in all lexica.
Search for in
hide Display Preferences
Greek Display:
Arabic Display:
View by Default:
Browse Bar:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:09:34.000Z
|
g5sf7aalvqpcehr3isk4iprq7n5f2q2g
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28261",
"uncompressed_offset": 640503035,
"url": "www.perseus.tufts.edu/hopper/text?doc=urn%3Acts%3AgreekLit%3Atlg0099.tlg001.perseus-eng2%3A7.3.5",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://www.perseus.tufts.edu/hopper/text?doc=urn:cts:greekLit:tlg0099.tlg001.perseus-eng2:7.3.5"
}
|
cccc_CC-MAIN-2013-20
|
[5]
For it is said that one of the nation of the Getæ, named Zamolxis,1 had served Pythagoras, and had acquired with this philosopher some astronomical knowledge, in addition to what he had learned from the Egyptians, amongst whom he had travelled. He returned to his own country, and was highly esteemed both by the chief rulers and the people, on account of his predictions of astronomical phenomena, and eventually persuaded the king to unite him in the government, as an organ of the will of the gods. At first he was chosen a priest of the divinity most revered by the Getæ, but afterwards was esteemed as a god, and having retired into a district of caverns, inaccessible and unfrequented by other men, he there passed his life, rarely communicating with any- body except the king and his ministers. The king himself assisted him to play his part, seeing that his subjects obeyed him more readily than formerly, as promulgating his ordinances with the counsel of the gods. This custom even continues to our time; for there is always found some one of this character who assists the king in his counsels, and is styled a god by the Getæ. The mountain likewise [where Zamolxis retired] is held sacred, and is thus distinguished, being named Cogæonus,2 as well as the river which flows by it; and at the time when Byrebistus, against whom divus Cæsar prepared an expedition, reigned over the Getæ, Decæneus held that honour: likewise the Pythagorean precept to abstain from animal food, which was originally introduced by Zamolxis, is still observed to a great extent.
1 ζάλμοξις is the reading of the Paris manuscript, No. 1393, and we should have preferred it for the text, as more likely to be a Getæn name, but for the circumstance of his being generally written Zamolxis.
2 D'Anville imagines that this is the modern mountain Kaszon, and the little river of the same name on the confines of Transylvania and Moldavia.
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License.
An XML version of this text is available for download, with the additional restriction that you offer Perseus any modifications you make. Perseus provides credit for all accepted changes, storing new additions in a versioning system.
load focus English (1924)
load focus Greek (1877)
hide Dates (automatically extracted)
Sort dates alphabetically, as they appear on the page, by frequency
Click on a date to search for it in this document.
1393 AD (1)
hideData/Identifiers
Citation URN: urn:cts:greekLit:tlg0099.tlg001.perseus-eng2:7.3.5
Document URN: urn:cts:greekLit:tlg0099.tlg001.perseus-eng2
hide Display Preferences
Greek Display:
Arabic Display:
View by Default:
Browse Bar:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:50:08.000Z
|
izohzidvrxjcx64cur3bxvnokgpa6hkz
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28268",
"uncompressed_offset": 693497669,
"url": "www.seroundtable.com/archives/001068.html",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://www.seroundtable.com/archives/001068.html"
}
|
cccc_CC-MAIN-2013-20
|
MSN Tech Preview Missing Next Button
Oct 26, 2004 • 9:29 am | (0) by | Filed Under Bing Search
There are reports that MSN Tech Preview Search is sometimes missing the "Next" button, to go to the second page of the results. This seems to be an intermittent issue, I personally have not seen it myself, yet.
Previous story: Supplemental Result Are Keyword Based
blog comments powered by Disqus
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:10:30.000Z
|
2yooyuzqn5f3qgg5jtpknu4qsgnxnirs
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28287",
"uncompressed_offset": 790849029,
"url": "www.werelate.org/wiki/Place:Allegheny,_Somerset,_Pennsylvania,_United_States",
"warc_date": "2013-11-22T14:51:57.000Z",
"warc_filename": "<urn:uuid:fdd59b7c-eedd-484b-be45-f4a86c2cf9ac>",
"warc_url": "http://www.werelate.org/wiki/Place:Allegheny,_Somerset,_Pennsylvania,_United_States"
}
|
cccc_CC-MAIN-2013-20
|
Place:Allegheny, Somerset, Pennsylvania, United States
Watchers
NameAllegheny
Alt namesAlleghenysource: WeRelate abbreviation
TypeTownship
Located inSomerset, Pennsylvania, United States
Contained Places
Cemetery
Mount Zion Cemetery
source: Family History Library Catalog
the text in this section is copied from an article in Wikipedia
Allegheny Township is a township in Somerset County, Pennsylvania, United States. The population was 654 at the 2000 census. It is part of the Johnstown, Pennsylvania United States metropolitan area.
Research Tips
This page uses content from the English Wikipedia. The original content was at Allegheny Township, Somerset County, Pennsylvania. The list of authors can be seen in the page history. As with WeRelate, the content of Wikipedia is available under the Creative Commons Attribution/Share-Alike License.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:44:01.000Z
|
ngewmmaqjv6jfg6afqvvrzxjdxy5gipk
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28295",
"uncompressed_offset": 3117229,
"url": "abs.gov.au/AUSSTATS/abs%40.nsf/mediareleasesbyReleaseDate/D8323D77E07B82FACA25701F007C53A0",
"warc_date": "2013-11-22T14:53:38.000Z",
"warc_filename": "<urn:uuid:e0f67319-036e-496b-ae2e-e057cfd2ca93>",
"warc_url": "http://abs.gov.au/AUSSTATS/abs@.nsf/mediareleasesbyReleaseDate/D8323D77E07B82FACA25701F007C53A0?OpenDocument"
}
|
cccc_CC-MAIN-2013-20
|
Australian Bureau of Statistics
Celebrating the International Year of Statistics 2013
ABS Home > Statistics > By Release Date
1344.8.55.001 - ACT Stats, 2005
Previous ISSUE Released at 11:30 AM (CANBERRA TIME) 14/06/2005
Page tools: Print Page RSS Search this Product
MEDIA RELEASE
June 14, 2005
Embargoed: 11:30 AM (AEST)
72/2005
25,000 Small Business Operators in the ACT: ABS
There were 25,000 small business operators in the ACT last June and two-thirds of them worked from home, according to analysis released by the Australian Bureau of Statistics (ABS) today.
More than two-thirds (68% or 17,000) of these operators were men.
More than half (54%) of all small business operators in the ACT were aged between 30-50 (up from 49% in June 2003). A further 34% were over 50 years and 13% were under 30 years.
The ACT matched the national average with most (44%) small business operators working 35-50 hours in June 2004.
Male small business operators were more likely to work full-time than part-time (77% and 23% respectively). The reverse was true for female small business operators who worked part-time more than full-time (66% and 34% respectively).
ACT small businesses use of computers (77%) and access to the internet (72%) was greater than small businesses in any other state or territory.
Further details are available in ACT Stats: Characteristics of a Small Business (cat. no. 1344.0.8.55.001).
© Commonwealth of Australia 2013
Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:35:35.000Z
|
6dgkwuxahovfxvbailfvdtj7fha32ysx
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28303",
"uncompressed_offset": 10770042,
"url": "answers.onstartups.com/questions/11365/project-accounting-software-for-an-ad-agency/14178",
"warc_date": "2013-11-22T14:53:38.000Z",
"warc_filename": "<urn:uuid:e0f67319-036e-496b-ae2e-e057cfd2ca93>",
"warc_url": "http://answers.onstartups.com/questions/11365/project-accounting-software-for-an-ad-agency/14178"
}
|
cccc_CC-MAIN-2013-20
|
Tell me more ×
Answers OnStartups is a question and answer site for entrepreneurs looking to start or run a new business. It's 100% free, no registration required.
I am working with a startup ad agency that has some very large clients for some large, complex projects.
Many of their projects are subcontracted to other vendors and to crowdsourcing platforms, which makes the management of their invoicing/revenue recognition/etc process pretty complicated.
Anyone have any ideas for good project accounting software? Thanks much in advance..
Jim
share|improve this question
5 Answers
You might want to look at http://www.freshbooks.com/. They offer invoicing, time tracking and accounting. They also offer different packages and you can try them out for free. It's a good choice to get started.
share|improve this answer
Find an ad agency project management application (with subcontractor capability) that interfaces with an accounting program (Quick Books may be a candidate because of the popularity.). This gives you the best of both tools and minimizes any duplicate data entry.
share|improve this answer
Quickbooks does have a product line for this. It is the Quickbooks Contractors version.
share|improve this answer
Check out aACE Accounting/CRM/ERP suite. The company AGIS, LLC just released version 4 and it is fantastic.
I've worked for them and they are extremely passionate about their product. aACE can be (and often is) customized to fit very specific workflows. Check it out, it is totally worth a close look.
www.AGISLLC.com
share|improve this answer
it sounds like you are dealing with a lot of different people doing a lot of different things, that all need to be kept track of for accounting purposes. Without knowing the rest of your system specs, Jeff may have the best advice, which would be to find a local technology expert who specializes in accounting software. I'd almost recommend a Cloud type of alternative which would allow users in multiple locations to update billing, but that may be more hassle in the long run.
Best of luck to you tho, and sorry I couldn't have been more help. I will be curious to see what you decide on.
share|improve this answer
protected by Zuly Gonzalez Dec 16 '11 at 16:01
This question is protected to prevent "thanks!", "me too!", or spam answers by new users. To answer it, you must have earned at least 10 reputation on this site.
Not the answer you're looking for? Browse other questions tagged or ask your own question.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:35:09.000Z
|
rl5jdezd6bntyuf5xod3tm2bo2n6xkst
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28304",
"uncompressed_offset": 10782437,
"url": "answers.onstartups.com/questions/69/do-single-founder-companies-ever-get-funded/714",
"warc_date": "2013-11-22T14:53:38.000Z",
"warc_filename": "<urn:uuid:e0f67319-036e-496b-ae2e-e057cfd2ca93>",
"warc_url": "http://answers.onstartups.com/questions/69/do-single-founder-companies-ever-get-funded/714"
}
|
cccc_CC-MAIN-2013-20
|
Tell me more ×
Answers OnStartups is a question and answer site for entrepreneurs looking to start or run a new business. It's 100% free, no registration required.
Most companies I see funded usually have two or more founders. Do investors, angels or VCs, look down on one-man-companies? Are there many that get funded?
Or is it just that it's rare to have one guy that can do it all?
share|improve this question
15 Answers
It's true that often they look for multiple founders, because you'll need multiple people and it's nice to see the team is already there, rather than having to fill a key function (like CTO).
But don't let that stop you. Just make it clear that you know the holes in your knowledge and that you expect them to plug them with people they like.
VCs and angels always have folks in the wings who have done this before.
share|improve this answer
Paul Graham said he looks for companies with at least two founders, because it proves that the idea was good enough to convince at least one person. That reasoning make sense to me: if you haven't been able to convince one person that your idea is going to work, your chances are significantly dimmer.
share|improve this answer
show 1 more comment
I think the reason single-founder-startups rarely get funded is that if the problem you're trying to tackle is "small" enough for you to be able to solve it reasonably well on your own, you're probably not VC-material.
VCs care about BIG problems that can make them MILLIONS of dollars. If your idea is BIG like that you'll likely not be able to even get to alpha on your own, you'll need people right off the bat.
If instead your idea is nice and focused and your end goal is to make a comfortable living with it, I'd say bootstrap it up, it's fun! :)
FWIW, I'm a single-founder and have been approached by a few VCs lately. I'm not interested right now so I don't know if they would have really made an offer in the end, but I guess it's not impossible to get funded even if you started by yourself.
share|improve this answer
Single founder companies do get funded. All the time. I've angel-invested in a few myself.
Having said that, I'd still advise finding one or two co-founders. Even if you are exceptional at various things (sales, product, marketing, finance, etc.), startups can become a lonely business and it's nice to have someone you like, trust and respect to work alongside with.
It also sends a positive signal to others that you were able to convince at least one other person to join your cause.
share|improve this answer
Mint.com had one founder: Aaron Patzer.
share|improve this answer
It doesn't matter how many "founders" there are. What matters to VCs (I am one) is that you have a team by the time you approach us and that there is enough equity allocated to your senior management team (both present and planned).
If you're looking for seed funding you can get away with just one senior person (you). For an A round I think you'll struggle without a good team behind you.
share|improve this answer
There's several good reasons why single-person startups have a harder time or a lower chance of success. Still, each of them may turn out to not matter. What is relevant to your investors, I think depends a lot on the chemistry going on between the VC or angel and you, and on what you and they emphasize.
"Bus factor"
If I'm hit by a bus, my company is gone. That has already stopped a big customer from buying my product. It certainly is a valid concern, though I would like to see how big a danger for your investment car accidents are vs. screwing up the product or the marketing or vs. some competitor eating your lunch. I have heard of dozens of companies failing for all sorts of reasons, but I've never heard of one that failed because the founder actually died.
"Too hard", technically
I'm a one-man show, so far, and it is a lot of work which can be hard to do alone. But there's always something you can do. I outsource practically everything but programming and customer acquisition, and I can handle that. Also, it's sometimes surprising how many things you can get away with just not doing.
"Too hard", emotionally
I often feel that it would be a lot more fun if there was a second person on board who could share the fears, the joy, the problems and the successes. It's just very lonely sometimes. I'm lucky to have a wife who can share some of the experience without us actually working together, so it's OK.
"Couldn't convince anybody"
Although this is at the core of PG's reasoning for YCombinator, and I certainly respect him a lot, I think this one just isn't true. I know many people who think my product is a great idea, but I wouldn't get any of them to start a company with me, because they simply don't like the idea of being entrepreneurs, they explicitly prefer to be employed. On the other hand, the entrepreneurial people I know have a chock-full pipeline of their own ideas that they want to execute on.
I'm actively looking for partners and it's hard to find someone who is just in between those two scenarios, and is good enough, and you like each other, and you're both at an appropriate point in life (if you just took a job, it's different than when you just quit a job). Some of these things might be a lot easier if you're just out of college, so this argument may make more sense for YCombinator's main target audience.
share|improve this answer
I agree on what Paul Graham says, 2 is the best combination although it's not always possible to find the second person.
It's not the case of other person is not believing in your idea, it's you who doesn't find a worthy person to be your partner. (technically, or business-wise or ambition-wise)
Personally my one-man-company get successfully funded and even accepted by 2 different investor groups, so I chose the one I like among them.
share|improve this answer
Jesse,
I run a single-founder company, but I'm not seeking VC so I cannot speak directly to your needs. I don't think I could partner up with someone on a startup, but maybe I just haven't found the right partner yet. I am very independent and an introvert, which I think would make partnering even more difficult. If you are passionate and confident about your startup, don't feel pressured into finding a co-founder for the sole purpose of seeking VC.
I've seen firsthand many businesses fail because of clashes between partners. You have to trust your partner with your life and be confident in their abilities to lead the company just as you want it to be led. If it's your conception, it could be very hard sharing the company with someone else. After all, it's difficult enough sharing equity with investors!
share|improve this answer
My first startup was solely founded by myself. We ended up raising almost 1mil in angel money before the company was sold. The question of me being the only founder never came up. The focus was on the product, team and vision.
Rick
share|improve this answer
Getting funded is hard to do even in the best of times. Anything that causes an investor’s eyebrow to go up, that causes them to pause to think, is an added hurdle that must be overcome. Can a single founder get funded? Sure, I have even invested in one. That said it is the exception not the rule. Making the buy decision easy for you customer - and that is exactly what an investor is to a start-up, a customer and the widget you are trying to sell is your business – is making it easy for yourself. Too many moving parts for any single person to be able to do it, and it is generally a huge red flag for me when the founder thinks they can do it all. I can’t begin to count the number of times I have said NO to a great engineer that believes he is also a great salesperson, great accountant, great marketing person, great executive, great manager. Even if there is someone out there somewhere who is great at each of those skills, they just won’t have enough hours in a day to get there from here. A team of founders cost less than a single founder with employees, (read more runway for the same dollars) a team of founders is more motivated than a team of employees, (read greater likelihood of success). Multiple founders is an EASIER bet to make as an investor. When trying to get funded – easy is a good thing.
Charles
share|improve this answer
In fact, I've heard investors express that they look for startups with FEWER founders. Their thinking is that they want the founders to have enough equity to be highly motivated (after dilution from investors, senior staff, employees, etc). With too many founders, it's harder for each to maintain a "motivating" stake as several rounds of funding creates more and more dilution for them.
share|improve this answer
It'd be very hard to do it alone.
Even if you can do everything your business needs - code, market, sell, administer - you're going to need to be able to do them all at once. That's a big ask!
If you can get funded really fast and get the team in, that'd work, but if you've got a long drag before you can scale up, then it might get a bit grim.
share|improve this answer
You're a single-founder company and get funded. What are you going to do with the money? You're going to hire people? Uhm! That doesn't look like a startup.
I think you have to work with at least one co-founder in order to build the first prototype - It's hard to play alone. And potential early investors will dismiss you faster than well armed teams.
Maybe there are single-founder companies that got funded in the past and were successful but the odds are against you.
Look for a co-founder and good luck!
share|improve this answer
Having a second founder indicates a) that you can sell to at least one other person and b) that you understand that you can't do everything yourself.
share|improve this answer
Your Answer
discard
By posting your answer, you agree to the privacy policy and terms of service.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:59:18.000Z
|
ksw3zodgukci66xd5mhfpxzp2tcqpos6
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28305",
"uncompressed_offset": 10801593,
"url": "answers.onstartups.com/users/2747/sharon-drew?sort=class&tab=badges",
"warc_date": "2013-11-22T14:53:38.000Z",
"warc_filename": "<urn:uuid:e0f67319-036e-496b-ae2e-e057cfd2ca93>",
"warc_url": "http://answers.onstartups.com/users/2747/sharon-drew?tab=badges&sort=class"
}
|
cccc_CC-MAIN-2013-20
|
Sharon Drew
Unregistered less info
957 reputation
38
bio website pkjlaw.com
location
age
visits member for 3 years, 2 months
seen Feb 10 '11 at 17:27
stats profile views 467
Partner at Perry, Krumsiek & Jack, LLP. US and international experience in public companies and with international venture capital firm. Private equity, securities, corporate transactional and strategic advice to public and private companies with a focus on meeting the needs of serial entrepreneurs in small to mid-size companies.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:26:07.000Z
|
txswj4jisfousg6uquu5omb4dqhca7te
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28309",
"uncompressed_offset": 13426078,
"url": "archive.mises.org/6135/ethics-of-liberty-audiobook-podcast/",
"warc_date": "2013-11-22T14:53:38.000Z",
"warc_filename": "<urn:uuid:e0f67319-036e-496b-ae2e-e057cfd2ca93>",
"warc_url": "http://archive.mises.org/6135/ethics-of-liberty-audiobook-podcast/"
}
|
cccc_CC-MAIN-2013-20
|
1. Skip to navigation
2. Skip to content
3. Skip to sidebar
Source link: http://archive.mises.org/6135/ethics-of-liberty-audiobook-podcast/
Ethics of Liberty Audiobook Podcast
January 12, 2007 by
Murray Rothbard’s greatest contribution to the politics of freedom is now available as an audiobook podcast.
Hans Hoppe’s introduction to The Ethics of Liberty, as well as Part I of the book, an introduction to the Natural Law tradition, are now available for download.
Point your podcatcher to this URL:
http://mises.org/ethicsRSS.xml
(Copy and paste it.)
Or download the files individually here.
The book is read by Jeff Riggenbach, who also read the two previous Rothbard audiobooks: For a New Liberty: The Libertarian Manifesto and What Has Government Done to Our Money?
Previous post:
Next post:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:29:35.000Z
|
mnl4w3ltb4sw3tjep3inzomy2eig62tr
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28330",
"uncompressed_offset": 42939412,
"url": "ccsenet.org/journal/index.php/ijbm/article/view/16155/0",
"warc_date": "2013-11-22T14:53:38.000Z",
"warc_filename": "<urn:uuid:e0f67319-036e-496b-ae2e-e057cfd2ca93>",
"warc_url": "http://ccsenet.org/journal/index.php/ijbm/article/view/16155/0"
}
|
cccc_CC-MAIN-2013-20
|
The Differences in Corporate Environmental Disclosures on Websites and in Annual Reports: A Case Study of Companies Listed in Thailand
Muttanachai Suttipun, Patricia Stanton
Abstract
This study investigates the corporate environmental disclosure practices of companies on the Stock Exchange of
Thailand in annual reports and websites. Content analysis by word count is used to determine the amount of
disclosures on 50 sampled websites and annual reports. Statistical analysis (descriptive, paired samples T-tests,
and independent samples T-tests), is employed to analyse the differences between environmental disclosures
measured by word count in annual reports and on websites. Initial findings indicated that 96 percent of the
sampled Thai listed companies provided environmental disclosures in their annual reports and 88 percent on
websites. Companies providing the most words of environmental information were in the resources business
group in both media; the smallest word counts were in the services business group on websites, but in the
technology business group in annual reports. Commonly environmental disclosures were found in the corporate
social responsibility section of the websites but in the corporate governance section of the annual reports. The
three most common themes were environmental spending and activity, waste management, and environmental
policy in both annual reports and websites. Statistically significant differences were found between high and low
profile companies as well as government and private companies. However, this study could not find different
amount of environmental disclosures made in annual report and on websites. The study has implications in
enhancing the understanding the differences between disclosures in annual reports and on websites particularly
in developing countries. The usual limitations associated with sampling, and content analysis apply. Disclosure
quality was not considered.
Full Text: PDF DOI: 10.5539/ijbm.v7n14p18
This work is licensed under a Creative Commons Attribution 3.0 License.
International Journal of Business and Management ISSN 1833-3850 (Print) ISSN 1833-8119 (Online)
Copyright © Canadian Center of Science and Education
To make sure that you can receive messages from us, please add the 'ccsenet.org' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:28:35.000Z
|
dmfzwwuc7hrxmzmukjvhaksipcmut4gf
|
{
"content_type": "application/xhtml+xml",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28338",
"uncompressed_offset": 50142141,
"url": "cnx.org/content/m11259/latest/content_info",
"warc_date": "2013-11-22T14:53:38.000Z",
"warc_filename": "<urn:uuid:e0f67319-036e-496b-ae2e-e057cfd2ca93>",
"warc_url": "http://cnx.org/content/m11259/latest/content_info"
}
|
cccc_CC-MAIN-2013-20
|
Connexions
Sections
You are here: Home » Content » Karhunen-Loeve Expansion
About: Karhunen-Loeve Expansion
Module by: Don Johnson. E-mail the author
View the content: Karhunen-Loeve Expansion
Metadata
Name: Karhunen-Loeve Expansion
ID: m11259
Language: English (en)
Subject: Science and Technology
Document Type: -//CNX//DTD CNXML 0.5 plus MathML//EN
License: Creative Commons Attribution License CC-BY 1.0
Authors: Don Johnson (dhj@rice.edu)
Copyright Holders: Don Johnson (dhj@rice.edu)
Maintainers: Jeffrey Silverman (JSilverman@astro.berkeley.edu), Kevin Duh (kevinduh@rice.edu), Elizabeth Gregory (elizabeth.gregory@gmail.com), Don Johnson (dhj@rice.edu), Eileen Krause (erkrause@rice.edu), Mariyah Poonawala (mariyah@rice.edu), Matthew Jeanes (mjeanes@rice.edu), Kyle Clarkson (kclarks@gmail.com)
Latest version: 1.3 (history)
First publication date: May 21, 2003 7:00 pm -0500
Last revision to module: Aug 8, 2003 5:44 pm -0500
Downloads
PDF: m11259_1.3.pdf PDF file, for viewing content offline and printing. Learn more.
XML: m11259_1.3.cnxml XML that defines the structure and contents of the module, minus any included media files. Can be reimported in the editing interface. Learn more.
Version History
Version: 1.3 Aug 8, 2003 5:44 pm -0500 by Charlet Reedstrom
Changes:
fixed typos, fixed markup of 2nd derivative, added equation tags
Version: 1.2 Jul 7, 2003 12:00 am -0500 by Elizabeth Gregory
Changes:
Adding Jeff as a maintainer
Version: 1.1 Jun 10, 2003 12:00 am -0500 by Elizabeth Gregory
Changes:
adding Jeff as a maintainer (document not completed)
How to Reuse and Attribute This Content
If you derive a copy of this content using a Connexions account and publish your version, proper attribution of the original work will be automatically done for you.
If you reuse this work elsewhere, in order to comply with the attribution requirements of the license (CC-BY 1.0), you must include
• the authors' names: Don Johnson
• the title of the work: Karhunen-Loeve Expansion
• the Connexions URL where the work can be found: http://cnx.org/content/m11259/1.3/
See the citation section below for examples you can copy.
How to Cite and Attribute This Content
The following citation styles comply with the attribution requirements for the license (CC-BY 1.0) of this work:
American Chemical Society (ACS) Style Guide:
Johnson, D. Karhunen-Loeve Expansion, Connexions Web site. http://cnx.org/content/m11259/1.3/, Aug 8, 2003.
American Medical Assocation (AMA) Manual of Style:
Johnson D. Karhunen-Loeve Expansion [Connexions Web site]. August 8, 2003. Available at: http://cnx.org/content/m11259/1.3/.
American Psychological Assocation (APA) Publication Manual:
Johnson, D. (2003, August 8). Karhunen-Loeve Expansion. Retrieved from the Connexions Web site: http://cnx.org/content/m11259/1.3/
Chicago Manual of Style (Bibliography):
Johnson, Don. "Karhunen-Loeve Expansion." Connexions. August 8, 2003. http://cnx.org/content/m11259/1.3/.
Chicago Manual of Style (Note):
Don Johnson, "Karhunen-Loeve Expansion," Connexions, August 8, 2003, http://cnx.org/content/m11259/1.3/.
Chicago Manual of Style (Reference, in Author-Date style):
Johnson, D. 2003. Karhunen-Loeve Expansion. Connexions, August 8, 2003. http://cnx.org/content/m11259/1.3/.
Modern Languages Association (MLA) Style Manual:
Johnson, Don. Karhunen-Loeve Expansion. Connexions. 8 Aug. 2003 <http://cnx.org/content/m11259/1.3/>.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:31:54.000Z
|
w6bmldm766ysnepsfldcoakiaxqiaij6
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28348",
"uncompressed_offset": 62321588,
"url": "demonssouls.wikidot.com/forum/t-251227/crystal-lizards",
"warc_date": "2013-11-22T14:53:38.000Z",
"warc_filename": "<urn:uuid:e0f67319-036e-496b-ae2e-e057cfd2ca93>",
"warc_url": "http://demonssouls.wikidot.com/forum/t-251227/crystal-lizards"
}
|
cccc_CC-MAIN-2013-20
|
Crystal Lizards / Discussion
Forum » General / Per page discussions » Crystal Lizards
Started by: Wikidot
Date: 02 Jul 2010 16:35
Number of posts: 8
RSS: New posts
This is the discussion related to the wiki page Crystal Lizards.
New Post
Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:10:02.000Z
|
vn5lc2hmgsxd7pk573mjzfmpafnk47uk
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28351",
"uncompressed_offset": 76023372,
"url": "dungeons.wikia.com/wiki/SRD:Base_Attack/Grapple_%28Creature_Statistic%29?oldid=6055",
"warc_date": "2013-11-22T14:53:38.000Z",
"warc_filename": "<urn:uuid:e0f67319-036e-496b-ae2e-e057cfd2ca93>",
"warc_url": "http://dungeons.wikia.com/wiki/SRD:Base_Attack/Grapple_(Creature_Statistic)?oldid=6055"
}
|
cccc_CC-MAIN-2013-20
|
Wikia
SRD:Base Attack/Grapple (Creature Statistic)
Talk0
9,503pages on
this wiki
Revision as of 06:29, August 11, 2009 by Surgo (Talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
This material is published under the OGL
Base Attack/Grapple
The number before the slash on this line is the creature’s base attack bonus (before any modifiers are applied). This number won’t often be used, but it can be handy sometimes, especially if the creature has the Power Attack or Combat Expertise feats.
The number after the slash is the creature’s grapple bonus, which is used when the creature makes a grapple attack or when someone tries to grapple the creature. The grapple bonus includes all modifiers that apply to the creature’s grapple checks (base attack bonus, Strength modifier, special size modifier, and any other applicable modifier, such as a racial bonus on grapple checks).
Back to Main PageSystem Reference DocumentCreaturesReading Creature Entries
Advertisement | Your ad here
Photos
Add a Photo
1,231photos on this wiki
See all photos >
Recent Wiki Activity
See more >
Around Wikia's network
Random Wiki
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:30:37.000Z
|
7ucnnuti3ucxfvqzpi4znzvcfa6o66e5
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28352",
"uncompressed_offset": 76039399,
"url": "dungeons.wikia.com/wiki/SRD:Spell_Penetration?oldid=15408",
"warc_date": "2013-11-22T14:53:38.000Z",
"warc_filename": "<urn:uuid:e0f67319-036e-496b-ae2e-e057cfd2ca93>",
"warc_url": "http://dungeons.wikia.com/wiki/SRD:Spell_Penetration?oldid=15408"
}
|
cccc_CC-MAIN-2013-20
|
Wikia
SRD:Spell Penetration
Talk0
9,503pages on
this wiki
Revision as of 23:13, August 11, 2009 by Surgo (Talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
This material is published under the OGL
Spell Penetration [General]Edit
BenefitEdit
You get a +2 bonus on caster level checks (1d20 + caster level) made to overcome a creature’s spell resistance.
Back to Main PageSystem Reference DocumentFeats
Advertisement | Your ad here
Photos
Add a Photo
1,231photos on this wiki
See all photos >
Recent Wiki Activity
See more >
Around Wikia's network
Random Wiki
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:45:22.000Z
|
2rbkdv2jbouylqvlqb2ibc24zf4m72iz
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28355",
"uncompressed_offset": 79552115,
"url": "elinux.org/index.php?oldid=103358&title=ECE497_Project%3A_Twitter_Java_Application",
"warc_date": "2013-11-22T14:53:38.000Z",
"warc_filename": "<urn:uuid:e0f67319-036e-496b-ae2e-e057cfd2ca93>",
"warc_url": "http://elinux.org/index.php?title=ECE497_Project:_Twitter_Java_Application&oldid=103358"
}
|
cccc_CC-MAIN-2013-20
|
ECE497 Project: Twitter Java Application
From eLinux.org
Revision as of 20:22, 24 February 2012 by Yoder (Talk | contribs)
Jump to: navigation, search
Team members: David Zitnik
Contents
Grade
Have your Executive Summary only report the current state of the project. See Project Template for what to include.
Executive Summary
For my final project I would like to develop and compile Java code on the BeagleBoard to create an application for Twitter that allows a user to sign in from the Beagle and post tweets using the Java Twitter API called Twitter4J.
Currently I have a graphical interface built using the Java Swing library. The user can log in to his or her twitter account using twitters external authentication and then will be able to see their profile picture, screen name, and current status. This status can be updated as well as users can be searched for to have their profile pictures and status displayed below.
Installation Instructions
Install the Java Development Kit on the beagle
beagle$ opkg install openjdk-6-jdk
Download the Twitter4j Library from:
beagle$ http://twitter4j.org/en/index.html
Extract the zip file into a directory of your choice
Git Location:
https://github.com/Zitnikdj/BeagleTweet
User Instructions
I compile and run my code on the beagle using the Open JDK6 and using the commands assuming the file Main.java has my main method in it and .java files are using the Twitter4j library:
Compiling .java files in directory
beagle$ javac -cp <directory where you saved the twitter4j library>/twitter4j-2.2.5/lib/twitter4j-core-2.2.5.jar <filename>.java
Or compiling all .java files at once
beagle$ javac -cp <directory where you saved the twitter4j library>/twitter4j-2.2.5/lib/twitter4j-core-2.2.5.jar *.java
Running the application
beagle$ java -cp <directory where you saved the twitter4j library>/twitter4j-2.2.5/lib/twitter4j-core-2.2.5.jar:. Main
Highlights
Theory of Operation
The application is built using a basic Java Swing interface for the GUI but behind it is a server communication with the twitter authentication servers to log in a user using their OAuthentication keys. The application then uses server requests to pull down information and pictures to display them in the GUI from the Twitter4j library.
Work Breakdown
Developed Graphical Interface using Java Swing library
Learned how to compile Java code on the command line on the BeagleBoard
Learned how to do basic interfacing with the Twitter Java API (Twitter4j)
Conclusions
The project was more of a learning experience then originally thought of by learning a new API for Java. If given more time I would have liked to get more features and to somehow bypass the external authentication through twitters website.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:05:25.000Z
|
s5gsousgcb5sa2mxao4ca75lziwvrugf
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28356",
"uncompressed_offset": 79560649,
"url": "elinux.org/index.php?diff=prev&oldid=192080&title=ECE497_Project_Rover",
"warc_date": "2013-11-22T14:53:38.000Z",
"warc_filename": "<urn:uuid:e0f67319-036e-496b-ae2e-e057cfd2ca93>",
"warc_url": "http://elinux.org/index.php?title=ECE497_Project_Rover&diff=prev&oldid=192080"
}
|
cccc_CC-MAIN-2013-20
|
Difference between revisions of "ECE497 Project Rover"
From eLinux.org
Jump to: navigation, search
(user interactiobn)
(Highlights)
Line 96: Line 96:
== Highlights ==
== Highlights ==
Here is a youtube.com [http://www.youtube.com/watch?v=g_-srPShIiU video] of the rover. Ross is recording the video while Jesse is controlling the rover. In the video we spend about a minute talking about how to set up the wireless network and server. Then they show the computer receiving gps and compass data. Then they turn the rover and move to a new location, receive gps and compass data. As expected the data changed and is correct according to Google maps.
+
Here is a youtube.com [http://www.youtube.com/watch?v=g_-srPShIiU video demonstration] of the rover. Ross is recording the video while Jesse is controlling the rover. In the video we demonstrate how to set up the wireless server/client communication and the functionality present over the network interface, including sensor queries and movement commands. Although these movements are accomplished over Wi-Fi, they can also be programmed for stand-alone operation.
== Theory of Operation ==
== Theory of Operation ==
Revision as of 22:23, 12 November 2012
Embedded Linux Class by Mark A. Yoder
Team members: Ross Hansen, Jesse Brannon, Michael Junge
Contents
Grading Template
I'm using the following template to grade. Each slot is 10 points. 0 = Missing, 5=OK, 10=Wow!
05 Executive Summary
05 Installation Instructions (waiting details)
00 User Instructions
00 Highlights
00 Theory of Operation (Looking forward to more details)
00 Work Breakdown
00 Future Work
00 Conclusions
00 Demo
00 Late
Comments: I'm looking forward to seeing this.
Score: 10/100
Executive Summary
This project is a BeagleBone implementation of a ground-based rover platform. Through a BeagleBone mounted on an RC car, the user will be able to control the car over WiFi - the user can give commands to drive forward, drive backward, turn left, and turn right. The BeagleBone will also send back helpful information to the user over Wifi, such as GPS location and compass heading. Development time permitting, the user will also be able to guide the rover along a path by defining waypoints for movement.
Currently, the project is well underway. The RC car has been acquired and reverse-engineered to gain access to the motor electronics, and the BeagleBone GPIO outputs have been interfaced to allow motor control. A WiFi module has been selected and a procedure has been developed to get it working on the BeagleBone (harder than it seems!). Libraries for the GPS sensor and compass have been written and tested. Code for the network communication to control the BeagleBone over WiFi has been written, and the protocol and libraries currently allow us to type line by line directions to move the rover.
Time permitting and by the end ECE497, the rover may not move autonomously. We are currently working on setting GPS waypoints for the rover to move autonomously so all we have to do is run the program and it will update real-time GPS as it is moving.
When completed, the project will serve as a neat demonstration of the capabilities of the BeagleBone as a robotics platform. The GPIO output, I2C and serial interfaces, WiFi dongle compatibility, and embedded Linux OS of the BeagleBone provide an excellent platform for mobile robotics development.
Installation Instructions
We bought an RC car from Toys 'R Us and modified it to become an intelligent platform by utilizing a BeagleBone. There are two types of communications with the RC car, commands and queries. An command tells the BeagleBone to move to a different location based on the user input. A query asks the BeagleBone to send data to the user. The data could be either a GPS location or compass heading, depending on what the user asked for. To successfully recreate our work, certain skills will be helpful: dremel-based hardware modification, soldering, experience with Beagle Bone or an equivalent embedded processor bases system, familiarity with the Python and C programming languages, and basic circuit knowledge such as power regulation from batteries.
Modifying RC Truck/Car
Figure 1 - Electronics housing
Figure 2 - Motor control PCB
Figure 3 - Motor control pins
As shown in Figure 1, we removed the aesthetic cover form the truck. We also cut out most of the plastic with a Dremel tool. We did this to expose the circuity below. Cutting out most of the plastic is necessary unless you are skilled enough to drill only a small hole to feed the wires through and can replace the circuit board back into place without viewing it. Figure 1 also shows, four screw slots. In order to obtain access to the circuity, you must remove the screws from their sockets. Now turn the truck so that it's undercarriage is facing up, remove the housing unit of the battery. The battery unit should be loose and thus be removed since you already removed the four place holder screws. Be careful though to not pullout or detach any wires from the their respected places as you are pulling out the circuit board. Figure 2 shows the circuit board removed from it's housing with the wires exposed. The red and black wires you see are respectively power and ground, the same for all electrical work.
Figure 3 is focused on the specific connections that we soldered to the board. We choose the top left corner (where three of the connections are) because when we reverse engineered the board, this area is where the wireless signals are received and sent to the motor controllers. The fourth wire was supposed to be the pin on the right but as you can see by the picture, the circuit pad is burned off. We just followed the hard trace and soldered at the next available node. After testing, this improvised step seemed suitable for our needs. The same four pins are labeled on the circuit board as F,W,L,R. Originally, we thought these meant forward, backward, left and right. However the RC Truck is designed with tank steering so in order to go forward it theoretically should require two separate signals. We tested this theory and found out that it did in fact require two signals, thus the F,W,L,R labels are incorrect. The pins attach to relays on each motor, and correspond to "right forward", "right backward", "left forward", and "left backward", and are digital control signals. Therefore, in order to turn left you would drive the "right backward" and "left forward" pins high. Fortunately, motor conflicts are not destructive and exact pin mappings can be determined by experimentation - if you mistakenly drive the "right forward" and "right backward" pins high, for instance, the relay will click and the motors will not move, without any damage to the motors or electronics.
If you want to reverse engineer this circuit board for yourself instead of just following this guide, you will need a separate 5V dc power supply as well as the 9V battery that was included, a 5V wall adapter with stripped wires will be suffient for the extra power supply. Then you should look for the wireless adapter board. Most RC electronics will have a separate wireless circuit board. Ours happened to be already physically attached to the motor controllers. Find the output signals from the wireless adapter and test which signals control which motors and direction of motors. To test this just attach the 5V to the pin on the circuit board while the truck battery is installed and switched on. Also you will need to find a ground wire to attach for common ground. We just soldered directly to the terminal on the installed battery for our ground.
BeagleBone
Figure 4 - Power Circuit
Figure 5 - Regulator Circuit
After several problems with the WiFi on the BeagleBone not working as expected, we decided to overwrite our Angstrom Beagle Image with Ubuntu. We followed the BeagleBoardUbuntu on elinux.org. Since WiFi is critical to this project, it seemed a better alternative to spending hours working on Angstrom and not really getting anywhere.
However, if you are a true Beagle user and want to pursue the Angstrom route then I would suggest reading Dr. Yoder's Out of The Box, Bone. Note: If you want WiFi to work properly, install the A5 image not the A6 image.
Whether you use the Angstrom image or Ubuntu is up to you. However, you will still need to wire the BeagleBone up so that it runs off of battery power. We bought a 7.4 Vdc 10400 mAh battery. Since the BeagleBone runs off of 5V with a possible peak current of 1.5 amps we needed a 5V 3 amp voltage regulator. To be safe and avoid short-circuiting the BeagleBone, we decided to buy a barrel connector This barrel connector replaces the need to solder wires to the hardware of the BeagleBone, thus allowing for us to safely supply power the way the BeagleBone was designed. As seen in Figure 4, the barrel connector, battery and voltage regulator with heat sink can be seen. Figure 5 is our Regulator circuit. It shows how to connect the regulator to the rest of the BeagleBone hardware.
Note: We specifically used a BeagleBone for it's smaller size and less cost due to less capabilities. However, you could use any board that has an Omap processor, such as the Beagle XM Board.
WiFi Network
Connecting to WiFi is an important part of our project. We intended this project to receive data from a user on a mobile laptop. We decided to use WiFi to avoid following the RC truck around a field with the laptop in our hands. WiFi helps the user stay in the same place while the RC truck moves around the field. We ordered an Adafruit WiFi adapter that Adafruit specifically sponsors for the BeagleBone. They also have an install tutorial. After several days of researching WiFi capabilities for the BeagleBone, we continually ran into many difficulties. One of the many difficulties is with 'opkg upgrade' that Adafruit says to run. Do not run this, I repeat DO NOT RUN 'opkg upgrade'. Depending on what software image you are running, you will receive an error that for some reason cannot be resolved. There are many reported cases on Adafruit's help forums. There are also several more reported cases for the BeagleBone group on google groups. After researching and WiFi experimentation I discovered that the Adafruit WiFi adapter works well on the A6 version of the BeagleBone hardware while running A5 version of Angstrom. This is the only valid combination I could find. The A5 hardware shows and detects the adapter, but for some reason the adapter does not connect to a wireless router. When the same SD card is plugged into an A6 hardware, it connects fine without issue to a router. I also noticed that the A6 software image does not even recognize the BeagleBone following the same procedure as for the A5 software.
Because of the difficulties, we decided to not use the Angstrom images supported by Beagle. We instead installed Ubuntu Operating system on our A6 hardware. With Ubuntu installed it was as easy as plug and play. All we did after installing Ubuntu was to physically plug in the adapter and it was recognized immediately. However, if you are a true Beagle user and want to stay with Angstrom I would suggest following the directions in ECE497 Beagle Bone WiFi.
Software
The code for the platform can be found on the Github Page and BeagleRover Github Repository.
A Makefile is provided, and the code can be compiled with the command "make" in the root directory of the project; this will build a main binary movement and shared libraries for movement control over WiFi.
See the README for detailed instructions on installation and documentation of the code structure.
User Instructions
The rover is designed for two different operating modes.
1. Stand-alone control and navigation
2. Remote operation over Wi-Fi via Python
The README file on the software Github Page includes details about running the software for each of these modes. For stand-alone operation, the compiled binary movement can be executed to run commands such as moving forward or turning to a specific heading. For remote operation, Python scripts are provided to setup a server/client interface to communicate with the BeagleBone. When communicating with the Bone over Wi-Fi, the Python script presents the user with options of what to send to the BeagleBone.
Selection:
1: FWD
2: BCK
3: TURN
4: COMPASS QUERY
5: GPS QUERY
9: EXIT
The user then inputs the selection number, and an option if necessary. For instance, the option for sending a "FWD" command is the duration in microseconds, while the option for a "TURN" command is the heading relative to magnetic north. FWD, TURN, COMPASS QUERY, and GPS QUERY are all implemented and functional, but BCK is currently unimplmented; the code is simple and implementation would be trivial, but for the end application of this software (emulating UAV movements) it was unnecessary.
Upon sending the command, the BeagleBone will return feedback to the user over Wi-Fi. In the case of a movement command it will return that the command was executed successfully, and if a sensor was queried it will return the result. The Python script will then prompt the user for another command to send.
Highlights
Here is a youtube.com video demonstration of the rover. Ross is recording the video while Jesse is controlling the rover. In the video we demonstrate how to set up the wireless server/client communication and the functionality present over the network interface, including sensor queries and movement commands. Although these movements are accomplished over Wi-Fi, they can also be programmed for stand-alone operation.
Theory of Operation
Hardware Interfaces
Figure 6 - P9 Header Layout
Figure 7 - GPIO Pin Connections
Figure 8 - Compass and GPS Pin layout
Figure 9 - Compass, GPS, and WiFi mount
The BeagleBone is connected to the RC truck via 4 GPIO pins and a ground wire. The four GPIO pins control left forward, left reverse, right forward, and right reverse on the tank-style drive base. Tank-style means that each side is controlled independently, as opposed to a standard steering where the user controls whether the car as a whole is moving forward or reverse and turns are accomplished by rotating the front axle. (See Figure 4, in connecting the wires to the PCB) Figure 6 is the BeagleBone P9 Header layout and provides a good reference in knowing which pins in the header connect to pins on the BeagleBone. Figure 7 shows how the GPIO pins on BeagleBone are connected to the motor control PCB. As seen in Figure 4 the motor control wires are white. The GPIO pins are the two orange and two yellow wires labeled in the figure. Figure 8 shows how the pins for the gps and compass are connected to the P9 header. Figure 9 shows where the Compass, GPS and WiFi module are mounted. We had to mount them outside of the box because placing them inside of the box caused interference among the signals and created extreme levels of noise.
The Motor Control pin layout is listed below. These are defined in movement.c, and can be redefined easily to match a different pin configuration.
Motor Control BeagleBone
Right Forward 40 - P8 header (software sysfs GPIO 77)
Right Reverse 44 - P8 header (software sysfs GPIO 73)
Left Forward 42 - P8 header (software sysfs GPIO 75)
Left Reverse 46 - P8 header (software sysfs GPIO 71)
WiFi is achieved with Adafruit's USB WiFi Module. The USB WiFi Module is obviously connected to the only usb port on the BeagleBone.
The GPS is connected to the BeagleBone over UART serial. The GPS pin layout is as follows:
GPS BeagleBone
1 - tx 24 - P9 header
2 - rx 26 - P9 header
3 - gnd 1 or 2 - P9 header
4 - 3.3v 3 or 4 - P9 header
5 - nc
6 - nc
The compass is connected to the BeagleBone via I2C. The Compass pin layout is as follows:
Compass BeagleBone
1 - P9 header
2 - P9 header
3 - P9 header
4 - P9 header
Software
The motors are interfaced with GPIO controls in a C library. Movement, waypoint management, and sensor code are all also implemented as C libraries. Data is sent over WiFi to and from the Bone using TCP sockets in Python; the C libraries are accessed by the Bone in Python using the ctypes Python standard module. Browser controls are based on node.js and Google Maps API.
More detail regarding the interaction of different parts of the code and important interfaces will be provided as they are finalized.
Work Breakdown
A summary of the major development areas and the primary contributor(s) to each subsystem:
• RC car hardware interfacing and mounting: Michael Junge
• Power subsystem development: Michael Junge
• Wireless communication hardware: Michael Junge, Jesse Brannon
• GPS and Compass sensor interfacing: Jesse Brannon
• Movement and navigation software development: Jesse Brannon, Ross Hansen
• Network communication software development: Ross Hansen
Tasks completed and in development by each team member:
Michael Junge
• Constructed hardware interfaces to compass sensor and drive base electronics
• Investigated WiFi issues on Angstrom - determined that the Angstrom A5 image on BeagleBone A6 hardware is a known working configuration **still under invesgitation, won't be fully completed due to hardware/software issues between Angstrom and Beagle
• Soldered and interfaced battery subsystem to power BeagleBone
Jesse Brannon
• Decided and installed an Ubuntu image instead of Anstrom specifically for the WiFi functionally
• Researched and purchased compass and GPS sensors
• Wrote libraries to interface to compass and GPS sensor
• Currently co-developing movement and navigation software **to be completed 11/7; code to add waypoints complete as of 10/31
Ross Hansen
• Currently co-developing movement and navigation software **to be completed 11/7; code for basic movement complete as of 10/24
• Developed prototype software for network communication, currently developing more robust network protocol implementation **to be completed 11/3; basic prototype code completed 10/31
Tasks Remaining
1) Solidify the interface from the networking code to the motor control
2) Code to manage waypoints and drive the motors based off of waypoint inputs
3) Improve GPS library to allow for update rate configuration
Task 1 is absolutely necessary to fulfilling the goals of the project, while tasks 2 and 3 are good features, but not core requirements.
Future Work
This project has the possibility to branch into several interesting areas.
• The BeagleBone platform has the processing power for various interesting sensory systems, such as computer vision. The RC car interface and networking platform allows for a variety of interesting applications of sensor systems, where driving decisions are made based off of sensor inputs or sensor data is relayed remotely back to a powerful processing node.
• A GUI is being developed that could be used to send commands to control the rover. Work on it can be seen here: ECE497_Project_RoverGUI
Conclusions
TBD....
Embedded Linux Class by Mark A. Yoder
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:55:11.000Z
|
nf5l2qho66z3o7454yippavlfcrdcg66
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28365",
"uncompressed_offset": 88886258,
"url": "familysearch.org/learn/wiki/en/index.php?diff=400150&oldid=400141&title=Great_Valley_Road",
"warc_date": "2013-11-22T14:53:38.000Z",
"warc_filename": "<urn:uuid:e0f67319-036e-496b-ae2e-e057cfd2ca93>",
"warc_url": "http://familysearch.org/learn/wiki/en/index.php?title=Great_Valley_Road&diff=400150&oldid=400141"
}
|
cccc_CC-MAIN-2013-20
|
Great Valley Road
From FamilySearch Wiki
(Difference between revisions)
(Avery's and Georgia Road)
(to)
Line 18: Line 18:
*Hagerstown, Washington, Maryland (crosses [[Cumberland Road|Cumberland Road]])
*Hagerstown, Washington, Maryland (crosses [[Cumberland Road|Cumberland Road]])
*Winchester, Frederick, Virginia ([[Pioneer Road|Pioneer Road from]] Alexandria joins here)
*Winchester, Frederick, Virginia ([[Pioneer Road|Pioneer Road from]] Alexandria joins here)
*Staunton, Augusta, Virginia (start of [[Kanawah Trail|Kanawah Trail to]] West Virginia)
+
*Staunton, Augusta, Virginia (start of [[Kanawah Trail|Kanawah Trail]] to West Virginia)
*Roanoke, Roanoke, Virginia (trail forks toward Knoxville and Augusta)
*Roanoke, Roanoke, Virginia (trail forks toward Knoxville and Augusta)
*Bristol, Washinton, Virginia (start of [[Wilderness Road|Wilderness Road]] to Boonesborough
*Bristol, Washinton, Virginia (start of [[Wilderness Road|Wilderness Road]] to Boonesborough
Revision as of 23:41, 31 July 2010
United States Migration Trails and Roads Great Valley Road
The Great Valley Road went from Philadelphia, Pennsylvania to Roanoke, Virginia. There it split with one fork going to Knoxville, Tennessee, and the other to Augusta, Georgia.
The Great Valley Road, also called in various parts the "Great Wagon Road," "Great Warriors' Trail," "Valley Pike," "Carolina Road," or "Trading Path," was the most important Colonial American route for settlers of the mountainous backcountry of the southern British colonies. It went from Philadelphia, Pennsylvania over to the Shenandoah Valley of Virginia forking into the Tennessee Valley and Knoxville. The other fork went more south into the Piedmont Region of North Carolina, and then to its terminus on the Savannah River at Augusta, Georgia. Several other important early pathways merged with, or split off from the Great Valley Road.
Contents
Historical Background
The Great Valley Road was most heavily used by Ulster-Irish immigrants called Scots-Irish in America to spread through most of Appalachia bringing their Presbyterian religion.
The Wilderness Road into Kentucky branched off the Great Valley Road in southwest Virginia.
Route
(Northeast to Southwest)
• Philadelphia, Philadelphia, Pennsylvania
• Lancaster, Lancaster, Pennsylvania
• Gettysburg, Adams, Pennsylvania
• Hagerstown, Washington, Maryland (crosses Cumberland Road)
• Winchester, Frederick, Virginia (Pioneer Road from Alexandria joins here)
• Staunton, Augusta, Virginia (start of Kanawah Trail to West Virginia)
• Roanoke, Roanoke, Virginia (trail forks toward Knoxville and Augusta)
• Bristol, Washinton, Virginia (start of Wilderness Road to Boonesborough
• Jonesboro, Washington, Tennessee
• Knoxville, Knox, Tennessee (connects with Avery's Trace to Nashville, and Georgia Road to Athens)
• Martinsville, Henry, Virginia (on south fork of the Great Valley Road)
• Salem, Forsyth, North Carolina
• Salisbury, Rowan, North Carolina
• Charlotte, Mecklenburg, North Carolina
• Camden, Kershaw, South Carolina
• Augusta, Richmond, Georgia
Settlers and Records
For partial list of settlers who used the Great Valley Road to settle in ??? , see .
Wikipedia has more about this subject: Great Wagon Road
Internet Sites
Sources
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:51:10.000Z
|
bamcw2qsj76xltl6aaibweg2tef2trk5
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28366",
"uncompressed_offset": 88903659,
"url": "familysearch.org/learn/wiki/en/index.php?oldid=419013&title=Midland%2C_Maryland",
"warc_date": "2013-11-22T14:53:38.000Z",
"warc_filename": "<urn:uuid:e0f67319-036e-496b-ae2e-e057cfd2ca93>",
"warc_url": "http://familysearch.org/learn/wiki/en/index.php?title=Midland,_Maryland&oldid=419013"
}
|
cccc_CC-MAIN-2013-20
|
Midland, MarylandEdit This Page
From FamilySearch Wiki
Revision as of 06:13, 27 August 2010 by Janedwards (Talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
United States > Maryland > Allegany County > Midland
Contents
Town Hall
Quick History
Wikipedia
Geographic location: Google
Resources
Cemeteries
Church History and Records
Directories
Need additional research help? Contact our research help specialists.
Need wiki, indexing, or website help? Contact our product teams.
Did you find this article helpful?
You're invited to explain your rating on the discussion page (you must be signed in).
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:09:16.000Z
|
nmcvqgzdvf5a5kt2f4oddrh45poh26du
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:28367",
"uncompressed_offset": 88915423,
"url": "familysearch.org/learn/wiki/en/index.php?oldid=912129&title=Preston_County%2C_West_Virginia",
"warc_date": "2013-11-22T14:53:38.000Z",
"warc_filename": "<urn:uuid:e0f67319-036e-496b-ae2e-e057cfd2ca93>",
"warc_url": "http://familysearch.org/learn/wiki/en/index.php?title=Preston_County,_West_Virginia&oldid=912129"
}
|
cccc_CC-MAIN-2013-20
|
Preston County, West VirginiaEdit This Page
From FamilySearch Wiki
Revision as of 16:59, 24 February 2012 by Fauquier (Talk | contribs)
United States > West Virginia > Preston County
Contents
County Courthouse
• Preston County
101 West Main Street #101
Kingwood, WV 26537
304-329-0070
• County Clerk had birth, marriage, dead
• Probate and land records from 1869
• Clerk Circuit Court has divorce & court records
History
Parent County
1818--Preston County was created 19 January 1818 from Monongalia County. County seat: Kingwood [1]
Boundary Changes
See an interactive map of Preston County boundary changes.
Record Loss
1869--The courthouse burned.
Places / Localities
Populated Places
Neighboring Counties
Family Histories
General
• Genealogy of Some Early Families in Grant and Pleasants Districts, Preston County, West Virginia. Baltimore, Md., 1977.
Bibliography
Land
Local Histories
Maps
Map of 1850 Virginia and West Virginia
Military
Revolutionary War
• A Census of Pensioners for Revolutionary or Military Services: With their Names, Ages, and Places of Residence, as Returned by the Marshalls of the Several Judicial Districts, Under the Act for Taking the Sixth Census]. 1841. Digital versions at U.S. Census Bureau and Google Books et. al. 1967 reprint: FHL Collection 973 X2pc 1840. [See Virginia, Western District, Preston County on page 136.]
• Rejected or Suspended Applications for Revolutionary War Pensions. Washington, D.C., 1852. Reprinted by Genealogical Publishing Co., Inc., 1969, and 1991. Reprints include "an Added Index to States." FHL Collection 973 M24ur; digital version at Ancestry ($). [Includes veterans from this county; Virginia section begins on page 238.]
West Virginia, Civil War Service Records of Union Soldiers, 1861-1865
Newspapers
Probate
Taxation
Vital Records
West Virginia Vital Records - Birth - Death - Marriages
Societies and Libraries
Family History Centers
Web Sites
References
1. The Handybook for Genealogists: United States of America,10th ed. (Draper, UT:Everton Publishers, 2002).
Need additional research help? Contact our research help specialists.
Need wiki, indexing, or website help? Contact our product teams.
Did you find this article helpful?
You're invited to explain your rating on the discussion page (you must be signed in).
|
v0
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.