text
large_stringlengths
1k
155k
id
large_stringlengths
47
47
dump
large_stringclasses
95 values
url
large_stringlengths
16
401
file_path
large_stringlengths
125
155
language
large_stringclasses
1 value
language_score
float64
0.65
0.99
token_count
int64
500
36.8k
score
float64
2.52
4.72
int_score
int64
3
5
raw_reasoning_score
float64
0.3
3.25
reasoning_level
int64
0
3
interpretation
stringclasses
4 values
topic
stringclasses
23 values
ARTICLE BY ERIN MOSLEY In a not-so-far-away land, vibrant creatures adapt with ease to their rapidly morphing environment. Undiscovered clans with unique customs and cultures communicate in a variety of languages. The clans work together, each respectful of the others despite their differences. This world does not exist in a remote jungle, nor is it the fictional construct of a novelist. It is the collaborative creation of third graders in Tuscaloosa, Ala. Every week, University of Alabama students help children at two schools learn about anthropology – broadly defined as the study of human culture – by creating their own. Kids have fun, unaware their activities are part of an anthropological exercise designed by Dr. Christopher Lynn, associate professor of anthropology at UA, with the aim of fostering a generation of socially conscious and sensitive adults who are understanding and receptive of others. “We are trying to open the world to them,” says Ashley Stewart, an anthropology PhD candidate and instructor of ANT 481 Anthropology is Elemental: Teaching Anthropology in Primary and Secondary Settings. “Just because a culture is different doesn’t make it weird or abnormal.” In Fall 2016 and Spring 2017, University of Alabama students enrolled in ANT 481 Anthropology is Elemental taught weekly anthropology lessons to third graders at Tuscaloosa Magnet School – Elementary and Arcadia Elementary School. More than 200 children have learned about anthropology from approximately 20 UA students through ANT 481, now in its fifth year. In classes with the kids, UA students cover the four sub-disciplines of anthropology – cultural anthropology, biological anthropology, linguistic anthropology and archaeology. Lessons include topics such as food, body modification, ethnography, primates, evolution and race. Lynn, a father of triplets enrolled at the Tuscaloosa Magnet Schools, initially wanted to find a way to introduce his children and their peers to the studies of anthropology and evolution, a topic often met with opposition in the deep South. “I never knew what anthropology was until college, so this was an opportunity that I could not pass up,” Lynn says. According to a 2009 study titled Why Science Standards Are Important to a Strong Science Curriculum and How States Measure Up, the United States as a whole has been falling behind other nations in educational benchmarks, particularly science literacy, since the 1980s. The study repeated a review of state science standards conducted in 2000. Each state was assessed on a letter-grade scale in both 2000 and 2009. Alabama received an F in both years, and researchers noted “only Alabama dropped in the score for biological evolution.” Kelsey Kennedy, a senior from Harvest, Ala., majoring in anthropology, says teaching children about anthropology lifts the veil on a field of study that can seem ambiguous and unclear to those not involved in it. “We can expose the kids to something that is positive,” Kennedy says, “and it doesn’t have to conflict with religion.” Lynn says lessons help children understand all people are connected, despite racial and cultural differences. Recent exploration of the genome has shown all humans share the same set of genes. “Evolution shows us that biologically, we are not racially divided,” Lynn says. Anthropology examines cultural diversity while proving all humans are fundamentally the same, he continues. Through the ANT 481 course, anthropology majors learn to translate basic anthropological concepts to a general audience. Before students begin leading lessons at an elementary school, they spend four weeks in training. Each student must lead a minimum of two lessons in a school and serve as a co-teacher during other lessons. A typical 45-minute session includes a lesson and an activity to solidify it. Kids might spend time developing their own tattoos and tribal markings from body paint during a study on body modification, or they might create their own imaginary species when learning about evolution. UA students enter information about the lessons they create and lead, along with details about their experiences in the elementary classrooms, into a blog: anthropology. ua.edu/blogs/tmseanthro. The blog is public so parents and community partners can see what children are learning. Tammy Barkey, head of the Parent Teacher Association at Tuscaloosa Magnet School – Elementary and a parent of two children who took the anthropology class, says the program is a wonderful way for children to gain exposure to an important field, and it could spark long-term interest. “It’s not uncommon for a child to do more research when the information really clicks,” Barkey says. Because TMSE is a project-based school, teachers encourage research outside the classroom setting. Recently, Lynn received a grant from the Wenner-Gren Foundation for Anthropological Research, a New Yorkbased organization dedicated to advancing anthropology throughout the world. With the aid of this grant, Lynn and his students are further developing Anthropology is Elemental so it can expand across Alabama and into other states. Kennedy uploads teaching materials to the program blog, where all lesson plans are free and accessible to instructors who want to teach similar classes. Hannah Tytus, a senior from Cincinnati majoring in anthropology, manages public relations for the program. Tytus says by the time kids reach the end of the program, there’s a shift in their behavior, particularly in the way they treat each other. By studying other cultures, children learn to be empathetic and tolerant, she says. “They really internalize the message that they are supposed to be kind to one another,” she adds. “They are 8 years old and they’re telling each other to look through the eyes of someone else.” Tytus says she’s learned children can be an agent for positive change in uncertain times. “Adults have a hard time doing that,” she says. “I now see that children are our most important resource.” To learn more about Anthropology is Elemental, see anthropologyiselemental. ua.edu or contact Dr. Christopher Lynn at [email protected] or 205-348-4162 or Ashley Stewart at [email protected].
<urn:uuid:fbe6b325-fb3e-4b97-b71e-da48ab26be8c>
CC-MAIN-2018-39
http://cesr.ua.edu/anthropology-students-teach-elementary-schoolers-to-appreciate-cultural-diversity/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155676.21/warc/CC-MAIN-20180918185612-20180918205612-00163.warc.gz
en
0.947578
1,294
3.234375
3
2.85777
3
Strong reasoning
Education & Jobs
Past planning has had such a considerable impact on our lives that it is interesting to consider how things might have turned out if decisions had gone a different way, or if the public had been more vocal. Take, for example, the failure of the residents of Bilton-with- Harrogate to speak out against the loss of their river Nidd boundary, when the Royal Forest was enclosed in 1778. Had they put up more of a fight during the enquiry stage, when the Duchy surveyors went out of their way to gather public opinion, all the land between High Harrogate and the Nidd would have remained with the bounds of the township. As it happened, the spurious claims of the Knaresborough farmers who cultivated Belmont Fields were the only claims received by the surveyors. Consequently, Starbeck and Belmont were awarded to Knaresborough. Had the boundary between Harrogate and Knaresborough remained the river Nidd, today, people would be discussing the pros and cons of building new houses between Boggs Lane and the Nidd, instead of Killinghall. Similar neglect of their interests meant that the few residents around the decayed but once-celebrated Starbeck Spa failed to bring its significance to the attention of the surveyors. Had they done so, then the Duchy’s policy of incorporating all the then known mineral wells in the Stray would have meant that the Stray slips, instead of ending where, one 150 years later, the general hospital would be built, would have run down into Starbeck and surrounded all the mineral wells. The value of the surrounding land would have increased phenomenally, and would have been retained by the Duchy for the kind of development which in Harrogate occurred round the old sulphur well. Then there was the 1845 plan of the railway company to bring its line into central Harrogate, with the main railway station sited exactly opposite today’s Betty’s. This week’s illustration, which dates from about 1858, shows central Harrogate, with the planned railway line indicated by the dark line from bottom left up to the centre, with the terminus indicated by a green dot. The small rectangle above the dot is Hopewell House, the site of today’s Betty’s. At left may be seen the terrace of buildings next to the Prospect (today Yorkshire) Hotel, and Baker Lane is now Kings Road. Had this line and terminus been built, it would have ruined the 1860 plans of the Victoria Park Company to link the two Harrogates into a single town. It would have meant no James or Cambridge Streets, no Cambridge or Prospect Crescents, no St. Peter’s Church. Fortunately, the plan was abandoned. Yet the eventual introduction of a line from Dragon Junction meant that Joshua Bower’s plan to build expensive villas in what is now Dragon Road, had also to be abandoned. I hope there are none in Harrogate who think that planning is less important today than 200 years ago. Talk about vast housing developments at Killinghall or Beckwith Head Road may suddenly and understandably animate the people who feel affected, and prompt them to rush out and join a pressure group for a while. But planning and its consequences are with us all the time. This is why I believe that every Harrogate resident should join the Harrogate Civic Society, and remain life members. Its committee is elected by the members, who are drawn from across our entire district. Although I am not a member of its committee, I was many years ago, and recall that when the society’s precursor, the Harrogate Society, warned residents of preparations for some great change in their locality, membership soared. But then, after the threat had either been implemented or stopped, the members drifted away. This would be in order if the threats stopped coming, but the nature of things is that they never do. A life-time’s experience has taught me that public opinion often needs to be focussed, if it is to be effective, and that our nation’s civic societies are an essential safeguard against occasionally unreasonable plans from various sources. Which is why readers who are not members of the non-political volunteers that are the Harrogate Civic Society should make a point of joining. Had it been around in 1778, I suggest that the Great Award would have been much better.
<urn:uuid:8e0d7214-f279-45e0-982d-d2d536ae3d15>
CC-MAIN-2017-39
http://www.harrogateadvertiser.co.uk/news/-1-6137258
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686117.24/warc/CC-MAIN-20170920014637-20170920034637-00072.warc.gz
en
0.976658
920
2.90625
3
2.922984
3
Strong reasoning
History
Even rainy weather couldn’t dampen the excitement for the sixth annual Flagstaff Community STEM Celebration at the Northern Arizona University Walkup Skydome Monday night. This year, 110 organizations, clubs and other groups presented on subjects ranging from the Grand Canyon to the human body, encouraging participants to take care of themselves and Flagstaff’s remarkable environment, to dream big and to discover more about the vast world they live in. Albert the Abert’s squirrel, the mascot for the Flagstaff Sustainability Program, even made an appearance. Adults and children alike reveled in the educational festivities as they wandered through colorful displays that freckled the Skydome floor, gathering freebies and tidbits of information about science, technology, engineering and mathematics (STEM). Robotics activities were named the favorite among young learners like Valani Kamrowski, 11, a fifth-grader at Cromer Elementary, and Marceau Dramais, 10, a fifth-grader at Montessori School of Flagstaff. Participants could watch local specialists like the Coconino High School robotics team control the robots, as well as program and drive the robots themselves. Other crowd-pleasers included bottle rockets, thermal infrared cameras, and a space simulation using a large black tarp and weighted objects, where participants were asked to try to get a marble to make a figure eight around a blow-up “Earth” and baseball “moon” to simulate the Apollo 13 mission’s return trajectory. Isabel Zeilman, 10, a fourth-grader at BASIS Flagstaff, said the event is great for science lovers, even if they don’t know which topic they like most. “Find something you like in science and maybe it will be here and you can study it more,” she said. This was true for Mackenzie Spillman, 13, an eighth-grader at Mount Elden Middle School. Though she said social studies is her favorite subject in school, she enjoys visiting STEM night each year. Her favorite activity this year was the balloon-powered cars. Through these activities, local organizations are able to speak directly with such students and encourage them to take an interest in STEM. This mission inspires groups to return year after year. Megan Taylor, a meteorologist with the National Weather Service in Flagstaff, said even though local meteorologists work around the clock, the organization has found a way to host a table at STEM night every year. This year, the meteorologists had soda bottle tornadoes available for students to use. “Science is fun! That’s the whole point of tonight. That’s why people come here and put their booths on. It’s all about the fun for us, too, and being able to make science fun for the kids,” Taylor said. “It’s not only about the kids, but it’s neat to be able to connect with the adults, too, and share what we do in the community.” The Boys & Girls Club of Flagstaff has also been a repeat contributor. Deanna Burrell, teen director and events coordinator, said the goal of the event is to show that STEM is more than beakers and Bunsen burners. This year, the Boys & Girls Club booth demonstrated density with the floating hard-boiled egg test. Adult attendees agreed that this event successfully demonstrates STEM’s diversity and the community these subjects create in northern Arizona. Stephanie Hanson has lived in Flagstaff for 12 years and has two children who attend Sechrist Elementary. She said the kids love seeing their teachers and friends at an event like this, as well as doing hands-on activities they can take home with them. “Just getting excited about science and creativity and fostering that creativity is awesome. I think our community does a great job at that,” Hanson said.
<urn:uuid:ef326d63-8b8e-4a02-b7fc-1f54d5557856>
CC-MAIN-2019-13
https://azdailysun.com/news/local/annual-celebration-shares-stem-with-community/article_2aa7855c-5da3-52e4-a55b-bd23b885918e.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201885.28/warc/CC-MAIN-20190319032352-20190319054352-00554.warc.gz
en
0.951377
818
2.578125
3
2.177896
2
Moderate reasoning
Science & Tech.
Delta Species of Concern The Delta is a lush habitat for plants and animals, many of which are found only in the Delta. Unfortunately, many Delta species have been declared "threatened" or "endangered." Scientists have been working to determine how best to return key Delta species to better health and more abundance. The Deltaís lush, green environment belies the fact that many of its native plants are threatened and endangered species. One of those is the Palmate-Braced Birdís-Beak or Cordylanthus palmates, an annual in the snapdragon family. Its habitat of seasonally-flooded saline-alkali soils in lowland plains and basins is shrinking due to reclamation, leading to the Palmate-Bracted Birdís-Beakís listing as an endangered species. The status of the tiny San Joaquin kit fox that was once a common sight in the semi-arid San Joaquin Valley from north of Modesto to near Bakersfield is precarious. By 1930, the kit fox had been eliminated from the northern portion of its range and was found in declining numbers from Merced south along the Coast Range. Populations survived in Kings, San Luis Obispo and Kern counties, mostly west of Interstate 5. The plight of the tiny Delta smelt, long considered the canary in the mineshaft for the California Delta, has made headlines for years as it appears to be heading for inevitable extinction. Actions on many fronts Ė legal, legislative, political and scientific Ė are at play to try to preserve the Delta smelt. Other fish species that have experienced rebounds from dwindling populations are Chinook salmon and steelhead. The return of a husky-voiced little songbird that was once common in the Central San Joaquin Valley but not heard for more than 60 years is one result of a restoration success of the CALFED Bay-Delta Program. The story of the least Bellís vireo or vireo belie pastilles had a happy ending, but there are still many other birds listed as threatened or endangered who call the Delta home. The giant garter snake or thamnophis gigas, is the victim of decline from a number of factors: habitat loss and fragmentation, flood control activities, changes in agricultural and land management practices, predation from invasive species, parasites, water pollution and continuing threats. It is listed as a threatened species by the U.S. Endangered Species Act in its habitat of the Central and Sacramento valleys.
<urn:uuid:005c35db-178a-4ddf-b6fd-2eb763412e23>
CC-MAIN-2014-42
http://calwater.ca.gov/delta/species/delta_species.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119646554.36/warc/CC-MAIN-20141024030046-00198-ip-10-16-133-185.ec2.internal.warc.gz
en
0.943098
514
4.125
4
2.841371
3
Strong reasoning
Science & Tech.
Report on Popocatepetl (Mexico) — December 2000 Bulletin of the Global Volcanism Network, vol. 25, no. 12 (December 2000) Managing Editor: Richard Wunderman. Popocatepetl (Mexico) December set records in tremor, dome extrusion rates, SO2 flux, and tilt Please cite this report as: Global Volcanism Program, 2000. Report on Popocatepetl (Mexico) (Wunderman, R., ed.). Bulletin of the Global Volcanism Network, 25:12. Smithsonian Institution. https://doi.org/10.5479/si.GVP.BGVN200012-341090 19.023°N, 98.622°W; summit elev. 5393 m All times are local (unless otherwise noted) Around the end of the year 2000 and in January 2001 Popocatépetl extruded dome lavas at record-setting rates and amassed the largest active dome ever recorded on the volcano. The seismic energy released in one 25-hour interval in mid-December was greater than the accumulated energy for any entire year for which measurements are available. The highest plume of the interval rose to ~8 km above the summit crater. During late 2000 into January 2001, but particularly in December, tremor reached the biggest amplitudes yet recorded during this multi-year crisis; it was felt by people 12-14 km distant, and one tremor episode prevailed for ~10 hours. Another episode saturated instruments to the point of damage and drove tiltmeters in dramatic oscillations. Although impressive plumes had been seen before in this crisis, for the first time hot ash and gases began escaping the summit crater regularly, accompanied by pyroclastic flows and mudflows. The longest pyroclastic flow reached a runout distance of ~8 km. Preliminary photo analysis made during episodes of harmonic tremor in mid-December led to lava extrusion-rate estimates that were more than an order of magnitude higher than those typically seen at stratovolcanoes. During mid-December, sulfur dioxide (SO2) fluxes reached ten to twenty times larger than the volcano's typical ~5,000 tons/day. Although later Bulletin reports will provide more details, what follows here are critical highlights for assessing the behavior through 29 January. The report was provided by Servando de la Cruz-Reyna, Carlos Valdés-Gonzalez, Roberto Quaas-Weppen, and affiliated CENAPRED scientists noted below. Relative quiet followed by unrest. The previous episode of dome growth took place in February 2000, resulting in the smallest of all domes grown since 1996 (see BGVN 25:01). After a period of relative quiescence, unrest followed at Popocatépetl in early September 2000 (BGVN 25:10). This marked the beginning of a new episode. September unrest was marked by two seismic observations. First, harmonic tremor appeared in the peak of the exhalation signals. Second, tectono-volcanic earthquakes below the crater were followed by long-duration explosive eruptions that generated higher-altitude plumes. GOES satellite imagery depicted strong thermal anomalies in the crater. Still, only comparatively minor dome growth was detected in mid-September, and this same pattern continued during early November. A variable, somewhat reduced level of activity continued into early December. Escalation in December 2000. As discussed below, RSAM values climbed precipitously during a 7-day interval in mid-December. Prior to that, on 2 December an ash emission of moderate-to-large size lasted about 90 minutes. On 6 December, nine low-magnitude earthquakes (M ~1.7-2.4) occurred followed by a similar swarm on 8-9 December. These earthquakes, in turn, were followed by a period of low-frequency harmonic tremor that lasted about 5 minutes. Although brief, this tremor had the largest amplitude recorded since this eruptive period began in 1994. Particularly during December, tiltmeters, for the first time since their installation, registered all of the large tremor signals (figure 30). Tilt oscillation amplitudes were typically in the range of 100 µrad, reaching peak-to-peak values near 200 µrad. Seismicity during 11-18 December was extremely high (figures 31 and 32). Eruptive activity increased on 12 December 2000 with frequent ash-bearing emissions (up to 200 per day), some of them reaching about 5-6 km above the volcano's summit. During the following night observers saw incandescence and small amounts of hot debris. Similar activity and longer-duration eruptions during 13-15 December produced light ashfalls on towns around the volcano. Early on 15 December more episodes of high-amplitude, low-frequency harmonic tremor were detected, lasting a few minutes. At 1404, the low-frequency harmonic tremor grew to a continuous signal, with amplitudes peaking on all the monitoring stations, including the most distant one. These signals were strong enough to be felt by residents 12-14 km away, and to be detected at stations of the Mexican Seismological Network as far as 150 km from the volcano. This tremor episode remained at constant intensity for about 10 hours, and may have stemmed from very high rates of lava extrusion. Starting early on 16 December activity underwent a dramatic drop that was reversed 16 hours later by a return of low-frequency harmonic tremor of increasing amplitude. This tremor again saturated all monitoring stations; it lasted about 9.5 hours. The amplitudes of the signals were so high that pen drivers and several styli of the paper-drum recorders were damaged. A still-larger tremor episode took place on 18-19 December. Figures 31 and 32 illustrate the seismic traces and cumulative RSAM data. RSAM peaked during an interval of slightly over 7 days in mid-December, when low-frequency tremor prevailed for ~25 hours and the seismic energy released exceeded that of the rest of the year 2000. Actually, the peak surpassed that accumulated during any previous entire year for which records exist (including 1997, see figure 32). The episodes of quiescence and high-amplitude, low-frequency harmonic tremors occurred in such a pattern that they could be described as a load-and-discharge model, as suggested by the time-predictable model of Shimazaki and Nagata (1980). Using this paradigm, workers forecast the onset of the 18 December eruption and tremor episode. Aerial photos taken on 16 December showed significant dome growth inside the crater (figure 33) and allowed correlation of the episodes of high amplitude, low-frequency harmonic tremor with periods of lava extrusion at very high rates. Analysis of the photos indicated that the dome grew at an average rate of ~180-200 m3/s during the episodes of intense harmonic tremor. This rate, which was not sustained, was about two orders of magnitude higher than any other previously observed. |Figure 33. A photograph taken looking into the crater at Popocatépetl, as viewed from the N on 16 December 2000. The substantial glacier on the N side lies covered by ash. Courtesy of CENAPRED.| At Popocatépetl, correlation spectrometer (COSPEC) measurements of SO2 flux have had yearly averages on the order of 5,000 metric tons/day (t/d). In contrast, during 13-19 December the estimates were in excess of 50,000 t/d. On 19 December the reported value was near 100,000 t/d. Civil authorities were made aware of the high magnitude of the monitoring signals, the very high rate of lava production, and the growth of the largest dome yet observed. This motivated them to constitute, on 15-16 December, an emergency board. They declared a further increase in the alert level and defined a security radius of 13 km. This radius was suggested to include at least some of the most vulnerable towns, like Santiago Xalitzintla (centered ~15 km NE of the crater) and San Pedro Benito Juarez (with a few residences 10 km SE of the crater, but the main town at 12 km from it). Santiago Xalitzintla sits downstream of the E side of the largest glacier along one of the main N-flank drainages. San Pedro Benito Juarez lies on a fracture zone on the SE flank, an area where many of the largest tectono-volcanic earthquakes were located. Additionally, increased deformation was also detected using the geodetic network located on that fault. San Pedro Benito Juarez is an isolated town closest to a notch in the SE crater rim. This notch is believed to have formed by collapse on 24 February 1664 during an eruption similar to the current one. Preventive evacuation of Santiago Xalitzintla, San Pedro Benito Juarez, and other towns began on late 15 December and early 16 December. The decisions regarding which other towns should be evacuated were made by authorities at the state and municipal level. This caused some towns, well outside the security radius of 13 km, to also be evacuated by decision of their mayors. About 41,000 people left the area. Around half left the region by their own will and means. The other half used resources provided by local civil protection authorities. Of these, ~14,000 accepted transportation to shelters where they remained for about 10 days. Others moved to stay with relatives or friends. The total volume of fresh lava accumulated within the crater of Popocatépetl was estimated to be between 15 and 19 million cubic meters on 18 December, exceeding the combined volume of all the previous domes (figures 33 and 35). The estimated vertical growth rate of the dome was such that another 20 or 30 hours of tremor associated with the above-mentioned lava production rate could potentially have enabled the dome to begin escaping the confines of the crater. The rate slowed, however, and the dome's upper surface remained well within the crater (figures 33 and 35). As anticipated by the applying the above-mentioned model, after a three-day period of relative quiescence, on the afternoon of 18 December, a new eruption began. The relatively low-explosivity, yet long-lasting eruption of 18-19 December (figure 34) ejected large amounts of hot debris on the flanks of the volcano in three episodes of incandescent fountaining. Ejected hot debris is believed to have ultimately flowed a maximum distance of 5-6 km from the crater. Some images of these eruptions were distributed by some news media, which had installed cameras around the volcano and broadcast images in real time. After 19 December activity decreased noticeably. The next expected period of unrest, suggested by the time-predictable model to ensue near 23 December (figure 35), did not occur, likely indicating that the rate of magma supply had changed. What was believed to be the first dome-destruction explosion of this episode occurred on 24 December, ejecting incandescent debris to a distance of 3.5 km from the volcano, and producing an ash plume estimated to reach 5 km above the crater. When the nature and size of this event was understood, authorities reduced the security radius to 12 km. No towns lie within that radius, and accordingly many people returned to their homes. |Figure 35. Aerial photograph taken looking into the crater at Popocatépetl, as seen from the NE on 23 December. Courtesy of CENAPRED.| Later explosive events failed to excavate substantial portions of the new dome. The current estimate as of 16 January 2001 was that ~10-20% of the new dome volume has been blown out by explosions recorded after 18 December 2000. In many of the previous dome growth-and-destruction episodes since 1996, most of the dome mass has been removed by small to moderate (VEI <= 2) explosions; a similar scenario may play out in the near future. After several weeks of relative calm, significant activity resumed at Popocatépetl on 22 January. At 1458 a M 2.8 volcano-tectonic earthquake occurred on the E flank. This event was possibly a precursor to a large ash emission that started at 1615, and initially produced an ash plume several kilometers in height. Eight minutes later observers saw a more explosive phase throwing incandescent fragments around the crater. After several more minutes, pyroclastic flows were generated and moved 4-6 km down several ravines on the N flank. Ash emission from the crater was continuous and punctuated by intermittent explosions. By 1640, the ash plume towered more than 8 km above the summit crater. At 1800 fluctuating harmonic tremor, similar to that of December, was registered. At times the signals again reached saturation amplitudes; the tremor could have been associated with magma intrusion into the base of the crater, an idea also suggested to explain previous tremor events. Harmonic tremor lasted for ~30 minutes. Ashfall was documented in Santiago Xalitzintla, Atlixico, and parts of Puebla and Tetela del Volcán. At 2200 it was possible to see ejected incandescent fragments that fell up to 1 km from the crater. On 29 January (figure 36), pyroclastic flows caused some glacial melting. The pyroclastic flows initially reached up to 8 km from their source, halting in the drainage upstream of Santiago Xalitzintla. They triggered some glacial melting and in early February their deposits were remobilized and came to rest about 15 km from the crater, about 2 km upstream of Santiago Xalitzintla. As of 29 January Popocatépetl remained at a Stage 3 Yellow alert. |Figure 36. Popocatépetl on 29 January photographed looking S. The image captured the forceful ejection of an ash-laden cloud. Courtesy of CENAPRED.| Reference. Shimazaki and Nagata,1980, Time-predictable recurrence model for large earthquakes: Geophys Res. Lett. 7, p. 279-282. Geological Summary. Volcán Popocatépetl, whose name is the Aztec word for smoking mountain, rises 70 km SE of Mexico City to form North America's 2nd-highest volcano. The glacier-clad stratovolcano contains a steep-walled, 400 x 600 m wide crater. The generally symmetrical volcano is modified by the sharp-peaked Ventorrillo on the NW, a remnant of an earlier volcano. At least three previous major cones were destroyed by gravitational failure during the Pleistocene, producing massive debris-avalanche deposits covering broad areas to the south. The modern volcano was constructed south of the late-Pleistocene to Holocene El Fraile cone. Three major Plinian eruptions, the most recent of which took place about 800 CE, have occurred since the mid-Holocene, accompanied by pyroclastic flows and voluminous lahars that swept basins below the volcano. Frequent historical eruptions, first recorded in Aztec codices, have occurred since Pre-Columbian time. Information Contacts: Carlos Valdés-Gonzalez, Roberto Quaas-Weppen, E. Guevara, A. Martinez, G. Castelán, S. Alcocer, C. Gutiérrez, G. Espitia, F. Galicia, M. Galicia, A. Gomez, G. Jiménez, C. Morquecho, J. Ortiz, E. Ramos, H. Romero, Centro Nacional de Prevencion de Desastres (CENAPRED), Delfin Madrigal 665, Col. Pedregal de Santo Domingo, Coyoacán, 04360, México D.F. (URL: https://www.gob.mx/cenapred/); Servando de la Cruz-Reyna, Instituto de Geofisica, UNAM, Coyoacán 04510, México D.F., México.
<urn:uuid:0a9293f0-528f-44c0-afdd-c2ef7e04028e>
CC-MAIN-2021-39
https://volcano.si.edu/showreport.cfm?doi=10.5479/si.GVP.BGVN200012-341090
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057589.14/warc/CC-MAIN-20210925021713-20210925051713-00718.warc.gz
en
0.953966
3,383
2.78125
3
3.010717
3
Strong reasoning
Science & Tech.
For some of your students, self-confidence in the classroom comes naturally. They tackle new materials with ease and know how to get their points across. For your less-confident students, the day-to-day requirements of school can cause anxiety and frustration. They may question their abilities and struggle with the stress of balancing it all. As a teacher, you have the opportunity to positively influence your students and encourage them to feel proud of their abilities and accomplishments. Here are five strategies to help boost your students’ self-esteem and confidence in the classroom: 1. Praise and acknowledge accomplishments Students who don’t have a lot of confidence tend to focus on only the negative aspects of what they are doing. Make it a point to praise and acknowledge students when they do something correctly, both in private and in front of their peers. Specific praise helps students know that you’re paying attention and helps them acknowledge their own small wins. Giving short feedback on a paper praising their word choice or having the class give a round of applause for fellow students can make a significant difference. 2. Set realistic expectations Be realistic about what your students can accomplish. While it would be nice to see every student make achievements high above the norm, it isn’t attainable for some. Ask students to create their own set of goals and things they would like to accomplish during the school year, and then review their lists with them. Setting goals that are manageable and reasonable for your students can help them see how much they’ve grown and developed. Try to differentiate your teaching and create goals that represent every student in your classroom. 3. Embrace a growth mindset We are only human, so mistakes are inevitable. Those with low confidence may focus on their failures and not see the progress that they’ve made. Use mistakes or failures as teaching moments for students. Remind them that they are not defined by their shortcomings, and reassure them to keep moving forward in their studies. You may hear this practice described as adopting a growth mindset, where students move away from saying things like “not” and “can’t” to saying something more positive like “not yet.” 4. Encourage a sense of ownership Urge your students to take ownership of their learning by providing them with opportunities for decision-making when it comes to assignments or classroom rules. While it can be tempting to just guide students through an assignment and show them how it’s done, prompt them to reach the final answer in their own way. One way to do this is to create a list of “must do” and “may do” assignments for students to complete. Sometimes, you’ll need all students to complete a certain assignment to assess their understanding, which would make it a “must do.” Then, students can look to the “may do” list to have a choice in what they want to work on next. Students will have a greater sense of pride in their learning when they feel a sense of control. Incorporating inquiry-based teaching strategies into your classroom can help you achieve this goal. 5. Acknowledge that every student is different Your students have their own sets of unique strengths, talents, and needs. Accept that some students will have strengths where others don’t, and don’t treat them as a homogenous group. Differentiated learning can help students identify how they learn best. When students feel like their needs aren’t being met in the classroom, they may feel like they’re not welcome. Take notice of the different strengths and learning styles your students have, and create a classroom environment that fosters the unique abilities of individual students. When students are clear with what works best in helping them learn, they may begin to empathize with each other and have open dialogue around successful strategies.
<urn:uuid:1b3d70d1-2853-4c96-8f5b-f2148acdffb8>
CC-MAIN-2023-40
https://www.edmentuminternational.com/blog/5-strategies-to-help-boost-your-students-self-esteem-and-confidence/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510214.81/warc/CC-MAIN-20230926143354-20230926173354-00662.warc.gz
en
0.967038
801
3.5625
4
2.410606
2
Moderate reasoning
Education & Jobs
Answer: Praise be to Allaah. Moderation in religion means that one does not exaggerate and go beyond the limit set by Allaah, and that one does not neglect it and fall short of the limit set by Allaah. Moderation in religion means following the example of the Prophet (صلى الله علیه وسلم). Exaggeration means trying to do more than he did, and negligence means not reaching that level. For example, a man says, “I want to spend all night in prayer (qiyaam al-layl), and never sleep all my life, because prayer is one of the best acts of worship, so I want to spend the entire night in prayer.” We say, this is going to extremes in the religion of Allaah, and this is not right. Something like this happened at the time of the Prophet (صلى الله علیه وسلم), when a group of men got together and one of them said, “I will pray at night and never sleep.” Another said, “I will fast and never break my fast.” The third one said, “I will never marry women.” News of that reached the Prophet (صلى الله علیه وسلم) and he said, “What is wrong with people who say such and such? I fast and I break my fast. I sleep, and I marry women. Whoever overlooks my Sunnah does not belong to me.” These people had gone to extremes in religion, and so the Messenger (صلى الله علیه وسلم) disowned them, because they overlooked his Sunnah which includes fasting and not fasting, praying at night and sleeping, and marrying women. The one who is falling short is one who says, “I do not need to do voluntary (naafil) actions, so I will not do them. I will only do the fard actions.” He may even be falling short in the fard actions, so this person is lacking. The moderate person is one who follows the path of the Messenger (صلى الله علیه وسلم) and his rightly-guided successors (al-Khulafaa’ al-Raashidoon). Another example: three men are faced with an immoral man. One of them says, “I will not greet this immoral man and I will boycott him, keep away from him and not speak to him.” The second one says, “I will go with this immoral man, greet him and smile at him. I will invite him to my place and accept his invitation. He is just like any righteous man to me.” The third one says, “I hate this immoral man for his immoral actions, but I love him for his faith. I will not boycott him unless doing so is in his best interests. If there is nothing to be gained by boycotting him, and if that will only increase him in his immorality, then I will not boycott him.” We say that the first man is going to extremes, the second is negligent and the third is moderate. The same applies to all other acts of worship and dealings with others. People vary between extremism, negligence and moderation. A third example: A man is a prisoner of his wife, who directs him as she wishes and he does not stop her from committing sin, or urge her to do good. She has taken over his reason and has become the one who is in charge of him. Another man treats his wife in a harsh, arrogant and high-handed manner. He does not care about her and regards her as less than a servant. A third man is moderate in his dealings with his wife, as Allaah and His Messenger commanded. “And they (women) have rights (over their husbands as regards living expenses) similar (to those of their husbands) over them (as regards obedience and respect) to what is reasonable.” [al-Baqarah 2:228] The Prophet (صلى الله علیه وسلم) said: “Let no believing man hate a believing woman. If he dislikes one of her characteristics he will be pleased with another.” This last man is the one who is moderate. The second one is extreme in his dealings with his wife, and the first is falling short. The same applies to all other deeds and acts of worship.
<urn:uuid:e4437b5e-77f5-4a04-a43b-594329b696f4>
CC-MAIN-2022-49
https://theclearpath.com/viewtopic.php?f=15&t=128&sid=4cf6617b7d0c272f04ad3e5ff4f76cbb
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710924.83/warc/CC-MAIN-20221203043643-20221203073643-00000.warc.gz
en
0.97963
988
2.59375
3
2.884538
3
Strong reasoning
Religion
At St Mary’s we aim to instil an appreciation and enjoyment of the visual arts. Art and design stimulates imagination and creativity; involving children in a range of visual, tactile and sensory experiences, which enable them to communicate what they see, think and feel through the use of the elements of colour, texture, form and pattern. Art and design promotes careful observation and an appreciation of the world around us. Children explore ideas and meanings through studying the work of artists and designers. Through learning about the roles and functions of art, they can explore the impact it has had on contemporary life and on different periods and cultures. The aims of teaching art and design in our school are: - To engage, inspire and challenge pupils, equipping them with the knowledge and skills to experiment, invent and create their own works of art, craft and design. - As pupils progress through school, they should begin to think critically and develop a deeper understanding of art and design. They should also know how art and design both reflect and shape our history, and contribute to the culture, creativity and wealth of our nation. - To produce creative work, exploring their ideas and recording their experiences. - To become proficient in drawing, painting, sculpture and other art, craft and design techniques - To evaluate and analyse creative works using the language of art, craft and design. - To know about great artists, craft makers and designers, and understand the historical and cultural development of their art forms. The art and design curriculum at St Mary’s RC Primary School is based upon the 2014 Primary National Curriculum in England, which provides a broad framework and outlines the knowledge and skills and taught in each Key Stage. Early Years (Nursery & Reception): In the Early Years, children are given opportunities to be imaginative, explore different materials and develop their ideas. This is an important part of the Early Years Foundation Stage, mainly within the ‘expressive art and design’ area of learning. Children are encouraged to practise their handling, moving and control skills. Materials such as dough, paint, collage are provided for children to develop and explore their ideas and to be imaginative. Key Stage 1 (Years 1 & 2): In Key Stage 1 the children given opportunities to use a range of materials creatively to design and make products through drawing, painting and sculpture. They explore different techniques in using colour, pattern, texture, line, shape, form and space. The children have their own sketch books to record their learning and experiment with different techniques. Another important aspect of the art and design curriculum is learning about the work of a range of artists, craft makers and designers, describing the differences and similarities between different practices and disciplines, and making links to their own work. In Year 2 children take part in an art visit. Key Stage 2 (Years 3, 4, 5 & 6): The content of the art and design curriculum in Key Stage 2 builds on what children have learned in Key Stage 1. Children develop and improve their skills in drawing, painting and sculpture using a range of different materials. They continue to user and develop their sketch books and to use them to review and revisit ideas. They continue to learn about great artists, architects and designers in history. Children in Year 4 have an art based trip. We are fortunate to have Battersea Park and the Tate Britain close by, we take regular trips there across the year groups using them to look at sculpture, and real art. Where we can, we make links to other areas of the curriculum too. All children, regardless of their abilities or needs, will have access to the Art & Design Curriculum with supporting resources. We focus on progression of knowledge and skills. We measure the impact of our curriculum through the following methods: - Images and videos of the children’s practical learning. - Interviewing the pupils about their learning. - Art lead looking at lessons and in sketch books.
<urn:uuid:66c521ef-a12d-470f-9d47-51a62fffe3eb>
CC-MAIN-2021-39
https://www.stmarysschoolbattersea.co.uk/art-and-design/
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780055632.65/warc/CC-MAIN-20210917090202-20210917120202-00635.warc.gz
en
0.952891
812
3.75
4
2.665232
3
Strong reasoning
Education & Jobs
Large tracts of national forest and animals are frequently sighted, at times crossing the Blue Ridge Parkway. That can be one of your best opportunities to see wildlife. Here are some iconic sights you'll see on a visit to the Boone Area's nature preserves. Parkway area summits are the highest in the East. Two scenic species of evergreens symbolize the cool northern climate of the Southern Appalachians. Red Spruce grows widely and ranges all the way to New England. Fraser Fir is native only to high summits in western North Carolina, eastern Tennessee, and southwestern Virginia. The nation's favorite species of Christmas tree grows in neat plantations along the Boone area part of the Parkway. Acid rain and ozone challenge both trees, and the tiny Balsam woolly adelgid is attacking Fraser Fir. In places you'll notice dead, skeletal stands of these evergreens-and places where the cool verdure of the forest is inspiring. Add sugar maples, yellow birches, and paper birches and you'll see why the Parkway's highest forests inspire comparisons with New England. The tree-covered Southern Appalachians offer inspiring vistas from breezy mountaintop meadows called "balds." Despite being located at high elevations, these natural-appearing meadows are not true alpine areas like those that lie above timberline in New England and the West. Parkway peaks would need to reach 8,000 feet for a severe high elevation climate to create treeless summits. Some think the unexplained meadows resulted from fires set by Native Americans to encourage game. The balds are one of the best places to enjoy the rhododendron bloom (link to the article "The King of Appalachian Spring" below). The meadows can easily be seen on the Boone area part of the Parkway at Craggy Gardens (and near the Parkway at Roan Mountain (link to hiking article). The lacey boughs of Carolina Hemlock lend a northern feel to the Parkway's deciduous forests of oak, maple, and tulip poplar. These evergreens love water, so they grow to impressive height and girth in stream drainages and near lakes (such as Trout Lake in Blowing Rock). The bark of the hemlock contains tannin and was used to make a tanning treatment for hides. Sadly, the hemlock woolly adelgid may eradicate the species. A distinctive gargling croak denotes this giant black bird with a bulbous black beak. Often seen high on the Parkway, at Grandfather Mountain and Mount Mitchell, the birds soar along rocky crags and brave even bitter winter winds to frolic in blustery gusts. Quoth the traveler: "The raven never bores" with aerial acrobatics. It's easier than ever to glimpse flocks of wild turkeys along the Parkway-populations of the birds have grown dramatically in North Carolina in recent years. Clusters of gobblers can often be glimpsed at the edges of fields and forests. With the Parkway surrounded by thousands of acres of national forest, you could glimpse the reclusive black bear. The often-sinewy bruins range from 125 to 250 pounds. Parkway campers should use caution not to tempt bears with easily accessible food. Never feed bears or approach too closely, especially a mother with cubs. North Carolina has its own subspecies of northern flying squirrels. It's rare to see these nocturnal gliders, but you will see the red squirrel, another species found far to the north that lives in the cool evergreen forests of Boone area mountains. The highest mountains and streams of the Parkway are home to more species of these slithering amphibians than any other place on the planet. Many Parkway area species are found nowhere else. Most salamanders are "lungless" and breath through their skin, so staying damp is essential. Their preferred habitat of misty forests and streamside sites makes them easy to observe under rocks and logs. You'll often see these furry, puffy-cheeked, roly-poly rodents calmly standing in the grass right beside the Parkway or perched atop stonewalls, munching away on the shoots of a verdant mountain summer. Members of the marmot group are also called woodchucks. They dig impressive burrows and experience a true three or more month hibernation in winter. Groundhogs whistle when alarmed, so mountain residents called them whistlepigs. Zoom in close on the map below (use the plus sign and directional arrows at upper left, or repeatedly double click near, but not on, the map symbols). You can literally see the parking lots for Parkway destinations in this guide. Click any map symbol and information-packed balloons pop up to describe locations all along the route. In the map balloons, click "Directions" to add your address and get step-by-step directions to Parkway locations from wherever you are. Start in the north, follow the road south, for a local's introduction to your own Boone-area Parkway adventure.
<urn:uuid:ce0f2291-6479-4531-b7f0-a6e3f6393a46>
CC-MAIN-2020-34
https://www.exploreboone.com/outdoors/blue-ridge-parkway/nature/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439736902.24/warc/CC-MAIN-20200806091418-20200806121418-00506.warc.gz
en
0.925358
1,047
3.015625
3
1.904014
2
Moderate reasoning
Travel
Configuration And Discovery Configuration and discovery is the process used by commons-logging to determine the correct Log implementation to call. The Current Situation Discover And Configuration Code calls the commons-logging API to request a Log instances. This call is made to a LogFactory class method. This class method attempts to discover which LogFactory instance should be used to service this request. This discovery process involves various classloader gymnastics intended to give correct isolation for applications run in certain container environments. These gymnastics work well in only a limited number of container environments. There is a definite limit to the improvements that can be made to this discovery code whilst it is contained with an API class. The code is also both complex and fragile. There is no compile time dependency from the API classes to the implementation ones. However, it is not practical to distribution the implementation code separately from the API since the API code will fail unless the implementation classes are present. A Road Forward (I'll try to present not the results but the reasoning which lead in this direction. Hopefully, this should make it easier for the community to understand, involve itself and find any better alternative routes that have been missed.) It is generally acknowledge that commons logging needs a small, functional API for components to compile and run against. LogFactory is too complex. It includes complex discovery code which limits the usefulness of subclassing. (For example, for use in a J2ME environment.) It's size limits it's usefulness in applets. A suitable API layer could be created by pushing the discovery code (includig LogFactory) into a separate, subsidary layer. The role of LogFactory in the API would be replaced by a small, simple class called Logger, say. The discovery process has many problems. The current implementation works well in some containers, less well in other containers and not at all in some environments. It has become clear that no one discovery mechanism can work well in the range of environments in which commons-logging may find itself deployed. This points towards a need for the discovery mechanism to be pluggable. The process of discovery should be encapsulated entirely within the discovery layer. Therefore, there seems to be nothing to gain by adding a separate interface for discovery. So, the discovery component should have a facade which extends Logger. The choice of the appropriate discovery implementation should be common throughout a particular environment. For example, though a discovery implementation that knows how to isolate applications is needed for a container environment, there is no need for the discovery process to vary per application. Therefore, the neccessary configuration can be stripped down to the minimal: a system property. This would give the name of the Logger implementation to be loaded and used. Backwards compatibility could be maintained by defaulting to the use of LogFactory when this class is present and no other configuration is. By making Logger a superclass of LogFactory, it should be possible to use the existing system property without breaking existing systems. New discovery mechanisms could override Logger (rather than the bulkier LogFactory). The current API is that it is not useable by itself at run time by itself: it fails when suitable implementations cannot be discovered. This dramatically increases the effective size of a runnable API jar. Since the dominent paradigm involves hold Log references as class variables, this behaviour can be very annoying at times since classes cannot be loaded unless commons logging is correctly configured. So, rather than fail, Logger should provide some sort of very basic Log even when no system property has been set and LogFactory cannot be loaded. This would probably log messages with Error and Fatal serverity to System.err. The Logger API should be minimal and compact. The current LogFactory provides a number of methods which are small variations on each other. These can and should be consolidated. The primary use case for Logger is to provide a log appropriate for a configuration. The use of Class (in addition to String) has proved a useful innovation. I propose that Logger extends this further by allowing any object to be passed in. The discovery layer would have the freedom to process these in whatever fashion they choose. The LogFactory implementation would convert all objects toString other than Class's. We therefore arrive at the following signature for Logger: public static final Log Logger.getLog(Object parameter) throws LogConfigurationException public Log getLog(Object parameter) throws LogConfigurationException Up to Logging
<urn:uuid:2a4d8792-c080-4123-bb17-4a7fdebeaf73>
CC-MAIN-2015-35
http://wiki.apache.org/commons/Logging/ConfigurationAndDiscovery
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645353863.81/warc/CC-MAIN-20150827031553-00064-ip-10-171-96-226.ec2.internal.warc.gz
en
0.913559
914
2.671875
3
2.980201
3
Strong reasoning
Software Dev.
History of golf |This article needs additional citations for verification. (December 2011)| The origins of golf are unclear and much debated. However, it is generally accepted that modern golf developed in Scotland during the Middle Ages. The game did not find international popularity until the late 19th century, when it spread into the rest of the United Kingdom and then to the British Empire and the United States. - 1 Origins - 2 The spread of golf - 3 Golf course evolution - 4 Equipment development - 5 Etymology - 6 Museums - 7 References - 8 See also A golf-like game is, apocryphally, recorded as taking place on 26 February 1297, in Loenen aan de Vecht, where the Dutch played a game with a stick and leather ball. The winner was whoever hit the ball with the least number of strokes into a target several hundred yards away. Some scholars argue that this game of putting a small ball in a hole in the ground using golf clubs was also played in 17th-century Netherlands and that this predates the game in Scotland. There are also other reports of earlier accounts of a golf-like game from continental Europe. In the 1261 Middle-Dutch manuscript of the Flemish poet Jacob van Maerlant's Boeck Merlijn mention is made of a ball game "mit ener coluen" (with a colf/kolf [club]). This is the earliest known mention in the Dutch language of the game of colf/kolf as played in the Low Countries. In 1360, the council of Brussels banned the game of colf: “... wie met colven tsolt es om twintich scell’ oft op hare overste cleet ...” (he who plays at colf pays a fine of 20 shillings or his overcoat will be confiscated). In 1387, the regent of the county of Holland, Zeeland and Hainaut, Albrecht of Bavaria, sealed a charter for the city of Brielle, in which it was forbidden to play any game for money. One of the exceptions to this ordinance was “den bal mitter colven te slaen buten der veste” (to play the ball with a club outside the town walls). Two years later, in 1389, the regent Albrecht offered the citizens of Haarlem a field called ‘De Baen’ (the course) to be used exclusively for playing games – especially colf – because these were too dangerous within the city walls. - Den 3. April wast moy claer weder met een n.o. wint ende stil, doen maeckten wy een colf toe om daer mede te colven, om also onse leden wat radder te maecken, daer wy allerley middelen toe zochten. - (The 3rd of April the weather was nice and clear with a north-easterly wind and quiet, then we made a colf [club] to play colf with, and thus make our limbs more loose, for which we sought every means) Early golf in Scotland The modern game of golf is generally considered to be a Scottish invention. A spokesman for the Royal and Ancient Golf Club of St. Andrews, one of the oldest Scottish golf organisations, said "Stick and ball games have been around for many centuries, but golf as we know it today, played over 18 holes, clearly originated in Scotland." The word golf, or in Scots gowf [gʌuf], is usually thought to be a Scots alteration of Dutch "colf" or "colve" meaning "stick, "club", "bat", itself related to the Proto-Germanic language *kulth- as found in Old Norse kolfr meaning "bell clapper", and the German Kolben meaning "mace or club". The Dutch term Kolven refers to a related sport. The first documented mention of golf in Scotland appears in a 1457 Act of the Scottish Parliament, an edict issued by King James II of Scotland prohibiting the playing of the games of gowf and football as these were a distraction from archery practice for military purposes. Bans were again imposed in Acts of 1471 and 1491, with golf being described as "an unprofitable sport". Mary, Queen of Scots was accused by her political enemies of playing golf after her second husband, Henry Stuart, Lord Darnley, was murdered in 1567. George Buchanan subsequently wrote that she had been playing "sports that were clearly unsuitable to women". Golf was banned again by parliament under King James IV of Scotland, but golf clubs and balls were bought for him in 1502 when he was visiting Perth, and on subsequent occasions when he was in St Andrews and Edinburgh. The account book of lawyer Sir John Foulis of Ravelston records that he played golf at Musselburgh Links on 2 March 1672, and this has been accepted as proving that The Old Links, Musselburgh, is the oldest playing golf course in the world. There is also a story that Mary, Queen of Scots, played there in 1567. Instructions, golf club rules and competitions The earliest known instructions for playing golf have been found in the diary of Thomas Kincaid, a medical student who played on the course at Bruntsfield Links, near Edinburgh University, and at Leith Links. His notes include his views on an early handicap system. In his entry for 20 January 1687 he noted how "After dinner I went out to the Golve", and described his Golf stroke: I found that the only way of playing at the Golve is to stand as you do at fenceing with the small sword bending your legs a little and holding the muscles of your legs and back and armes exceeding bent or fixt or stiffe and not at all slackning them in the time you are bringing down the stroak (which you readily doe) .... The oldest surviving rules of golf were written in 1744 for the Company of Gentlemen Golfers, later renamed The Honourable Company of Edinburgh Golfers, which played at Leith Links. Their "Articles and Laws in Playing at Golf, now preserved in the National Library of Scotland, became known as the Leith Rules and the document supports the club's claim to be the oldest golf club, though an almanac published about a century later is the first record of a rival claim that The Royal Burgess Golfing Society had been set up in 1735. The instructions in the Leith Rules formed the basis for all subsequent codes, for example requiring that "Your Tee must be upon the ground" and "You are not to change the Ball which you strike off the Tee". The 1744 competition for the Gentlemen Golfers’ Competition for the Silver Club, a trophy in the form of a silver golf club provided as sponsorship by Edinburgh Town Council, was won by surgeon John Rattray, who was required to attach to the trophy a silver ball engraved with his name, beginning a long tradition. Rattray joined the Jacobite Rising of 1745 and as a result was imprisoned in Inverness, but was saved from being hanged by the pleading of his fellow golfer Duncan Forbes of Culloden, Lord President of the Court of Session. Rattray was released in 1747, and won the Silver Club three times in total. The spread of golf In 1603 James VI of Scotland succeeded to the throne of England. His son Henry Frederick, Prince of Wales and his courtiers played golf at Blackheath, London, from which the Royal Blackheath Golf Club traces its origins. There is evidence that Scottish soldiers, expatriates and immigrants took the game to British colonies and elsewhere during the 18th and early 19th centuries. The Royal Calcutta Golf Club (1829) and the club at Pau (1856) in south western France are notable reminders of these excursions and are the oldest golf clubs outside of the British Isles and the oldest in continental Europe respectively. However, it was not until the late 19th century that Golf became more widely popular outside of its Scottish home. The late 19th-century boom In the 1850s Queen Victoria and Prince Albert built Balmoral Castle in the Scottish Highlands. The railways came to St Andrews in 1852. By the 1860s there were fast and regular services from London to Edinburgh. The royal enthusiasm for Scotland, the much improved transport links and the writings of Sir Walter Scott caused a boom for tourism in Scotland and a wider interest in Scottish history and culture outside of the country. This period also coincided with the development of the Gutty; a golf ball made of Gutta Percha which was cheaper to mass-produce, more durable and more consistent in quality and performance than the feather-filled leather balls used previously. Golf began to spread across the rest of the British Isles. In 1864 the golf course at the resort of Westward Ho! became the first new club in England since Blackheath, and the following year London Scottish Golf Club was founded on Wimbledon Common. In 1880 England had 12 courses, rising to 50 in 1887 and over 1000 by 1914. The game in England had progressed sufficiently by 1890 to produce its first Open Champion, John Ball. The game also spread further across the empire. By the 1880s golf clubs had been established in Ireland, Australia, New Zealand, Canada and South Africa. Singapore followed in 1891. Courses were also established in several continental European resorts for the benefit of British visitors. United States of America Evidence of early golf in what is now the United States includes a 1739 record for a shipment of golf equipment to a William Wallace in Charleston, South Carolina, an advertisement published in the Royal Gazette of New York City in 1779 for golf clubs and balls, and the establishment of the South Carolina Golf Club in 1787 in Charleston. However, as in England, it was not until the late 19th century that golf started to become firmly established. Several clubs established in the 1880s can make claim to be the oldest extant in the country, but what is not disputed is that as a result of two competing "National Amateur Championships" being played in 1894, delegates from the Newport Country Club, Saint Andrew's Golf Club, Yonkers, New York, The Country Club, Chicago Golf Club, and Shinnecock Hills Golf Club met in New York City to form what was to become the United States Golf Association (USGA). By 1910 there were 267 clubs. During the Roaring Twenties the game expanded greatly in popularity and by 1932 there were over 1,100 golf clubs affiliated to the USGA. In 1922 Walter Hagen became the first native born American to win the British Open Championship, signaling the USA's dominance of the game that has yet to be seriously challenged. The expansion of the game was halted by the Great Depression and World War II, but continued in the post war years. By 1980 there were over 5,908 USGA affiliated clubs. That figure grew to over 10,600 by 2013. After the Meiji restoration of 1868 Japan made a concerted effort to modernise its economy and industry on western lines. Japanese came to Europe and America to establish trade links and study and acquire the latest developments in business, science and technology, and westerners came to Japan to help establish schools, factories, shipyards and banks. In 1903 a group of British expatriates established the first golf club in Japan, at Kobe. In 1913 the Tokyo Golf club at Komazawa was established for and by native Japanese who had encountered golf in the United States. In 1924 The Japan Golf Association was established by the seven clubs then in existence. During the 1920s and early 30's several new courses were built, however the great depression and increasing anti-Western sentiment limited the growth of the game. By the time of the Japanese attacks against the USA and British Empire in 1941 there were 23 courses. During the subsequent war most of the courses were requisitioned for military use or returned to agricultural production. In the postwar period, Japan's golf courses came under the control of the occupying forces. It was not until 1952 that courses started to be returned to Japanese control. By 1956 there were 72 courses and in 1957 Torakichi Nakamura and Koichi Ono won the Canada Cup (now World Cup) in Japan, an event that is often cited as igniting the post-war golf boom. Between 1960 and 1964 the number of golf courses in Japan increased from 195 to 424. By the early 1970s there were over 1,000 courses. The 1987 Resort Law that reduced protection on agricultural land and forest preserves created a further boom in course construction and by 2009 there were over 2,400 courses. The popularity of golf in Japan also caused many golf resorts to be created across the Pacific Rim. The environmental effect of these recent golf booms is seen as a cause for concern by many. Golf course evolution |This section does not cite any references or sources. (December 2011)| Golf courses have not always had eighteen holes. The St Andrews Links occupy a narrow strip of land along the sea. As early as the 15th century, golfers at St Andrews established a trench through the undulating terrain, playing to holes whose locations were dictated by topography. The course that emerged featured eleven holes, laid out end to end from the clubhouse to the far end of the property. One played the holes out, turned around, and played the holes in, for a total of 22 holes. In 1764, several of the holes were deemed too short, and were therefore combined. The number was thereby reduced from 11 to nine, so that a complete round of the links comprised 18 holes. Due to the status of St Andrews as the golfing capital, all other courses followed suit and the 18 hole course remains the standard to the present day. The evolution of golf can be explained by the development of the equipment used to play the game. Some of the most notable advancements in the game of golf have come from the development of the golf ball. The golf ball took on many different forms before the 1930s when the United States Golf Association (USGA) set standards for weight and size. These standards were later followed by a USGA regulation stating that the initial velocity of any golf ball cannot exceed 250 feet per second. Since this time, the golf ball has continued to develop and impact the way the game is played. Another notable factor in the evolution of golf has been the development of golf clubs. The earliest golf clubs were made of wood that was readily available in the area. Over the years, Hickory developed into the standard wood used for shafts and American Persimmon became the choice of wood for the club head due to its hardness and strength. As the golf ball developed and became more durable with the introduction of the “gutty” around 1850, the club head was also allowed to develop, and a variety of iron headed clubs entered the game. The introduction of steel shafts began in the late 1890s, but their adoption by the governing bodies of golf was slow. In the early 1970s, shaft technology shifted again with the use of graphite for its lightweight and strength characteristics. The first metal “wood” was developed in the early 1980s, and metal eventually completely replaced wood due to its strength and versatility. The latest golf club technology employs the use of graphite shafts and lightweight titanium heads, which allows the club head to be made much larger than previously possible. The strength of these modern materials also allows the face of the club to be much thinner, which increases the spring-like effect of the club face on the ball, theoretically increasing the distance the ball travels. The USGA has recently limited the spring-like effect, also known as the Coefficient of Restitution (COR) to .83 and the maximum club head size to 460cc in an attempt to maintain the challenge of the game. The word golf was first mentioned in writing in 1457 on a Scottish statute on forbidden games as gouf, possibly derived from the Scots word goulf (variously spelled) meaning "to strike or cuff". This word may, in turn, be derived from the Dutch word kolf, meaning "bat," or "club," and the Dutch sport of the same name. But there is an even earlier reference to the game of golf, and it is believed to have happened in 1452 when King James II banned the game because it kept his subjects from their archery practice. There is a persistent urban legend claiming that the term derives from an acronym "Gentlemen Only, Ladies Forbidden". This is a false etymology, as acronyms being used as words is a fairly modern phenomenon, making the expression a backronym. J. R. R. Tolkien, a professional philologist, nodded to the derivation from the Dutch word for club in his 1937 fantasy novel The Hobbit. There he mentions (tongue-in-cheek) that the game of golf was invented when a club-wielding hobbit knocked the head off a goblin named Golfimbul, and the head sailed through the air and landed in a hole. The history of golf is preserved and represented at several golf museums around the world, notably the British Golf Museum in the town of St Andrews in Fife, Scotland, which is the home of the Royal and Ancient Golf Club of St Andrews, the United States Golf Association Museum and Arnold Mongool Center for Golf History, located alongside the United States Golf Association headquarters in Far Hills, New Jersey. The World Golf Hall of Fame in St. Augustine, Florida also presents a history of the sport, as does the Canadian Golf Hall of Fame in Oakville, Ontario, and the American Golf Hall of Fame in Foxburg, Pennsylvania at the Foxburg Country Club. - Oorsprong van de verwarring, KNKB Webmuseum - Geert & Sara Nijs, 1297, Loenen aan de Vecht: Facts or fairy tale?, 2009 September Golfika no. 4 (Magazine of the European Association of Golf Historians and Collectors) - golf :: Scots as inventors: a popular fallacy - Britannica Online Encyclopedia - Jacob van Maerlant, Boeck Merlijn, 1261 - Geert & Sara Nijs, 750 Years 'Mit ener coluen', 2011 April Golfika no. 7 (Magazine of the European Association of Golf Historians and Collectors) - Jacques Temmerman, Golf & Kolf, zeven eeuwen geschiedenis, 1993 ISBN 978-90-5349-082-2 - Steven J. van Hengel, Early Golf, 1982 ISBN 978-90-6010-725-6 - Robin Bargmann, Serendipity of Early Golf, 2010 ISBN 978-90-816364-1-4 - Gerrit de Veer, Waerachtighe beschryvinghe van drie seylagien, ter werelt noyt soo vreemt ghehoort, (ed. Vibeke Roeper en Diederick Wildeman). Van Wijnen, Franeker 1997 - "Sports Beat". Seattle Post-Intelligencer. 11 January 2006. - Harrell, Eben (11 January 2006). "Chinese chip in with claim to golf". The Scotsman (Edinburgh). - Online Etymology Dictionary - Golf in Scotland 1457-1744- National Library of Scotland - M Wood (ed.), Extracts From The Records Of The Burgh Of Edinburgh, Oliver And Boyd 1927, p.63 - "It's official:Musselburgh golf course is world's oldest". East Lothian News. 20 March 2009. Retrieved 10 July 2009. - "Recognition for the world's oldest links, at last". PGA Tour. 24 March 2009. Retrieved 29 July 2009. - Our History, Royal Blackheath Golf Club - History of the Royal Calcutta Golf Club Royal Calcutta Golf Club website - History of the club Pau Golf Club website - The History of Balmoral, Balmoral Castle official website - St Andrews Railway, Railbrit.co.uk - 1865 - Queen Victoria and the Highlands, National Library of Scotland website - Queen Victoria takes to the throne, Scotland's History, BBC - The year of Sir Walter Scott, The Herald Newspaper online - The Gutty, GolfBallMuseum.com - The Oldest Course in England, Royal North Devon Golf Club Website - Scottish Croquet: The English Golf Boom, 1880-1914 John Lowerson, History Today, May 1983 - Tommy Braswell (1 Dec 2014). "Rewriting history: Golf arrived in America even earlier than thought at Charleston". Charleston Post and Courier. Retrieved 14 Feb 2015. - The Glorious World of Golf, Peter Dobriner, 1973 ,ISBN 0-448-14376-3 - Gene Sapakoff (5 Aug 2012). "American golf started in Charleston, 226 years before the PGA Championship at the Ocean Course". Charleston Post and Courier. Retrieved 14 Feb 2015. - Neil Laird (editor) (31 Jan 2014). "New World: Oldest Golf Clubs and Courses". scottishgolfhistory.org. Retrieved 14 Feb 2015. - Neil Laird (editor) (1 Jan 2015). "Oldest Golf Clubs and Courses in America Part II". scottishgolfhistory.org. Retrieved 14 Feb 2015. - "USGA HISTORY: 1894 - 1910". United States Golf Association. Retrieved 14 Feb 2015. - "Club membership history". United States Golf Association. - Gliding past Fuji - C.H. Alison in Japan Thomas MacWood, GolfClubAtlas.com - About (the) JGA Japanese Golf Association Website - Japan Golfcourses and Deforestation, Trade Environment Database, American University, Washington DC, 1997 - Torakichi Nakamura Obituary, New York Times, 2008 - Environmental and Economic Scenario Analysis of the Redundant Golf Courses in Japan Osamu Saito, World Academy of Science, Engineering and Technology 58 2009 - Japan Golf Trade Environment Database, American University, Washington DC, 1997 - Global Anti Golf Movement Manifesto - "Biography of Hugh Richardson (1905-2000)". Pitt River Museum. Retrieved 2013-10-29. - USGA History: 1931 - 1950 - Golf Club History - Golf Club Revue - Guide to the Rules on Clubs and Balls - USGA - "At the fut bal ande the golf be vtterly criyt done and nocht vsyt", Dictionary of the Scots Language, accessed 25 April 2007 - see article at About. - See article at Snopes. - Timeline of golf history (1353-1850) - Timeline of golf history (1851-1945) - Timeline of golf history (1945-1999) - Timeline of golf (2000-present) - British Golf Museum
<urn:uuid:ea348089-1d1f-4063-964e-621b05fd7a30>
CC-MAIN-2015-11
http://en.wikipedia.org/wiki/History_of_golf
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461494.41/warc/CC-MAIN-20150226074101-00112-ip-10-28-5-156.ec2.internal.warc.gz
en
0.949948
4,819
3.1875
3
2.751649
3
Strong reasoning
Sports & Fitness
Swimming fish do not appear to use their collision warning system in the same way as flying insects, according to new research from Lund University in Sweden that has compared how zebra fish and bumblebees avoid collisions. The fish surprised the researchers. All animals need some form of warning system that prevents them colliding with objects in their surroundings. The warning system helps them to continually regulate their speed and judge their distance from objects. For flying and swimming creatures this is an extra challenge because they also have to deal with winds and currents that affect their speed and direction. "Bumblebees use what is known as an optic flow to help them avoid crashing into surrounding objects," said Christine Scholtyssek, Postdoc at the Department of Biology at Lund University. The optic flow can be described as the sensation that surrounding objects move as the bumblebee flies past. To the bumblebee, reality is reversed -- it is as though the bee remains still while the objects speed past. Humans can have a similar experience when travelling by train, for example, when the surroundings race past the window. The closer the bee comes to an object, the faster the object appears to move, i.e. the optic flow in the bee's field of vision grows stronger. If the optic flow suddenly becomes stronger in the right eye than the left, the bumblebee will turn left to reduce the risk of a collision. "The bumblebee has to constantly balance the optic flow between its two eyes," said Christine Scholtyssek. The researchers at Lund University used specially constructed tunnels containing water and air to compare the optic flow of swimming and flying creatures respectively. The new study is the first to investigate the optic flow of swimming species. The results showed that zebra fish also use optic flow. However, the zebra fish did not react in the way the researchers had expected. "Surprisingly, the fish steered towards a stronger optic flow rather than away from it like the bees," said Christine Scholtyssek. In other words, the fish chose to approach objects rather than steering away from them. The researchers believe the reason for this could be that zebra fish live in a more turbid underwater environment where visibility is only around 30 centimetres. This means that the zebra fish are reluctant to swim away from objects because they risk finding themselves in a situation where they have no points of reference in their surroundings. This in turn makes it more difficult to use their in-built warning system to control speed and direction. The research on animals' collision warning systems is not only of interest to gain fundamental knowledge about animals, but also in areas such as the engineering of machines with automatic steering. - C. Scholtyssek, M. Dacke, R. Kroger, E. Baird. Control of self-motion in dynamic fluids: fish do it differently from bees. Biology Letters, 2014; 10 (5): 20140279 DOI: 10.1098/rsbl.2014.0279 Cite This Page:
<urn:uuid:21a4134a-34eb-4f37-b3e7-c74dbd8e022f>
CC-MAIN-2014-52
http://www.sciencedaily.com/releases/2014/05/140528103316.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802769419.87/warc/CC-MAIN-20141217075249-00101-ip-10-231-17-201.ec2.internal.warc.gz
en
0.958388
627
3.609375
4
2.973567
3
Strong reasoning
Science & Tech.
There are many different card making techniques and they all play an essential role in creating the beautiful cards you desire. Taking the time to learn and apply them to your card making will only help to improve your cards. Mastering them all though is no easy task. You shouldn’t feel pressured to be in expert all of them instantly. Below we will list some of the most common and we would recommend looking at the guides we’ve produced for each to get a better idea of them. Then you can choose which you’re keen to learn and focus on them one at a time. Just by trying them out in your card making will help to advance your abilities. Don’t feel frightened or daunted by them – get stuck in and give them a go! Card Making Techniques Embossing is a technique that creates raised areas and patterns on different materials. In card making that would usually be on paper or card. There are lots of types of embossing, the most common in crafting being wet or dry embossing. Wet embossing uses embossing ink and powder that is heated until it gives the effect you are looking for. See our Embossing Guide A somewhat misleading name as no glass is actually involved. Instead you use acetate and create designs on it with special pens that can then be mounted or framed on your cards. For more see our Glass Painting Guide Decoupage is one of our favourite techniques. It’s similar to layering (see below) in that you take cut out paper, card or images and layer them to create a 3D-like raised effect. Much easier to do than you might think too. See our Decoupage Guide Stamping is one of the most well.used techniques in creating cards. It’s exceptionally easy and just involves taking your chosen stamp, inking it up and pressing it to into your card or paper. There are so many types of stamps and inks available you may want to see our stamping guide for a better explanation of them all. See our Stamping Guide A simple technique that entails building an image by placing layer upon layer of pieces of card or paper on top of one another. You begin with a large piece and they get smaller and the layers increase until you have a 3 dimensional, raised image. See our Layering Guide Making an Envelope An obvious technique – the ability to be able to make your own envelope instead of having to buy one. You can use your choice of paper so it matches your card. See our Envelope Making Guide Paper tearing is a surprisingly effective way of creating different looks. It’s perfect for decorative edging to projects. It’s also very easy to do, which is always good! All you have to do is fold along the area you want to test, hold a ruler against its and rip. This will give you a clean edged year. However if you want to create a rougher look then just tear without the ruler. You may want to wet the paper beforehand to aid in the testing process. The best way to do this is after folding the paper use a small, fine brush to lightly paint water along that folded line. Leave it to dry and then tear. Cutting and Scoring A basic but important technique. It will give your cards and more professional look. Usually best to do with a metal ruler, craft knife and cutting board. Find the central fold line using your ruler and set square and mark it with a pencil gently. Then draw the craft knife very gently along the marked line on the outside if the card. Finally fold the card inwards pressing firmly on the fold. A very easy technique that involves using different sizes and types of sponges to dab or paint your cards to create interesting textures and shades. Masking uses stamped images and paper cut outs to build layers. Your stamped images are built on top of each other without overlapping and then you cover any part you want to leave as it is with the cut outs. Paper piecing is when you cut an already made design into smaller pieces and sections before layering those pieces on your card to give a different style or look. There are even more techniques than the ones featured here but this should give you an idea of the basics and whee you might want to start with card making techniques.
<urn:uuid:e35161b7-c4bd-4e23-bb55-c7b98c2a780a>
CC-MAIN-2018-43
http://www.card-making-world.com/card-making-techniques/
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583510893.26/warc/CC-MAIN-20181016221847-20181017003347-00096.warc.gz
en
0.956156
902
2.703125
3
1.272994
1
Basic reasoning
Art & Design
Page 1 | 2 Begun as trading and commercial hubs, Alberta’s first European-initiated communities were within fur trading forts and posts. For example in 1795, Fort Edmonton was originally built near the current location of Fort Saskatchewan, was relocated in 1802 to what is now downtown Edmonton, relocated between 1810 and 1813 to what is now the Rossdale Power Plant location, and then settled in 1830 on a site that is now part of Alberta’s Legislature grounds. Large forts had a small school room, missionaries who gave services, sleeping quarters for company men and their families, houses for factors, ice rooms, and garden plots. As time progressed, established fort locations spread outward and evolved into hamlets. Establishing Alberta’s earliest agricultural and faith communities outside fort or post locations came about largely through the efforts of missionaries who were intent on showing Native and Métis people that farming was in their best long- term interests — especially since the fur trade and ravaged buffalo herds could no longer provide Missions were built and crops were planted. For example in 1844, Father Thibault and Father Bourassa started a mission and planted crops in the Lac St. Anne area. Naturally, missions, grist mills, saw mills, obtaining livestock and planting crops could not be established without the volunteer work of the missionaries or the volunteer work of Native and Métis people. Father Lacombe arrived on the scene in 1852 and actively began promoting permanent farming areas for Métis people. In 1861, he built St. Albert mission by Sturgeon River. A Métis farming community grew around this log church. In 1872, the Dominion of Canada passed the Dominion Lands Act which gave settlers free land for homesteading. Farming, with a huge emphasis on a wheat crop economy was promoted. Under this Act, individuals could apply for parcels of Crown land in Western Canada. The size of most homesteads was one quarter section or 160 acres. Homesteaders were required to clear at least 10 acres of land, start some cultivation, build a habitable dwelling and some farm buildings, and live on the land for six months out of the year for three years. Once these various requirements were met, individual homesteaders could submit an application for title to the land. Aware of the beef bonanza that was occurring in the western United States, in 1879 the British government imposed an embargo on live cattle imported from the United States. Britain wanted to give Canadian cattlemen an advantage in the British market. The arrival of the railway in 1883 to Calgary and a focused shift from a wheat crop economy to ranching economy combined to change settlement patterns in Alberta. It was widely thought that southwestern Alberta was too dry for farming but possessed ideal conditions for large scale In 1881, the federal government amended the Dominion Lands Act that granted leases to British subjects. Only lessees could homestead. Huge incentives included up a hundred thousand acres (forty thousand hectares) for 21 years at a rate of $10 per thousand acres (four hundreds hectares) which is translated into one cent per acre per By 1881 nearly a thousand adventurous white men had lifted a corner of the curtain of Alberta’s stage and peered in expectantly. What they saw, whether along the Saskatchewan River or in the chinook belt was vastly encouraging. North of the coal along the Saskatchewan River lay unlimited forest; south of it, rich parklands. In the chinook belt, coal timber and rippling grasslands extended all along the foothills, while farther east, grazed only by deer antelope and gophers, stretched endless flower strewn, rolling pastures scented by wolf willow or sage. In short, they had peered into a land ready to flow with milk and By 1884 over two thousand pioneers reached Alberta and, now that the Canadian Pacific Railway had crossed the prairies and provided a means of getting their stock to market, most of them had come to try their hand at ranching.
<urn:uuid:35909057-f652-42b5-aa08-c7222afe440c>
CC-MAIN-2022-33
http://wayback.archive-it.org/2217/20101208162220/http://www.abheritage.ca/volunteer/history/1905_settlement.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00371.warc.gz
en
0.951968
944
3.671875
4
2.650907
3
Strong reasoning
History
If you are planning your trip to souther Italy and jotting down notes about hidden gems, get ready to add this one to the must-see in Sicily column. be ready to add this one to the list of must-visit in Sicily?There’s a river in Sicily whose source is located on the south side of the Monti Nebrodi and its mouth in the Ionian Sea, at Giardini-Naxos: it is the Alcantara river. It flows into gorges caused by very old volcanic eruptions that made deep incisions in the rocks and cliffs to create a natural canyon 164 ft deep. Going through the gorges, visitors can admire rock pools and falls of crystal clear, really cold water; in fact, tourists can rent overalls, boots and wet suits to enter the icy water. The river’s name ‘Alcantara’ has Arabic origins and refers to a bridge built by the Arabs during ancient Roman times. Many artists throughout history have tried to describe the beauty of this place, unknown to most. In 2010, it was awarded the important EDEN prize as a ‘European Destination of Excellence.’ Alcantara Gorges: The Legend In the past, volcanic eruptions were often interpreted to result from the gods’ anger; this is how a Sicilian legend explains the origins of the Alcantara Gorges. The legend recounts that the whole Alcantara river valley was dug out when the gods caused a volcanic eruption due to their anger at a farmer’s dishonesty. This legend is actually fairly close to reality since a volcano that once stood between Mount Etna and the Peloritan Mountains, the cone-shaped valley of Moio Mountain, was the real origin of the eruption. An earthquake occurred during the eruption and gave the incandescent lava the unique shape it has today, producing deep cracks in which the river’s water started to flow, creating the canyon known as the Alcantara Gorges. How to Get There Just 25 minutes from beautiful Taormina and 15 minutes from the seaside resort of Giardini-Naxos, the Alcantara Gorges are easily reached by car driving along SS 185 (a toll free state road) towards the interior, following indications for ‘Francavilla di Sicilia.’ Visitors can walk down a path, or descend using an elevator. Between the months of May and September, when the water level is lower than it is in wintertime, a big stretch of the canyon can be explored. Throughout the centuries, the canyon has been polished and shaped by the rushing water, creating fantastic rock formations that are a marvel to behold. Would you like to plan a trip to eastern Sicily to see this magical place? Let us know!
<urn:uuid:6ffb0fff-d25c-4b17-b65d-543c717a1219>
CC-MAIN-2020-50
https://selectitaly.com/blog/hidden-gems/must-see-in-sicily-alcantara/
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141171126.6/warc/CC-MAIN-20201124053841-20201124083841-00280.warc.gz
en
0.953696
585
2.78125
3
2.140151
2
Moderate reasoning
Travel
run; away; run away; teenager; fighting; arguments; disagreements; parents. ; Most young people who run away and are reported to the police are found within 48 hours. Whilst runaways usually return home within this time, it can be very scary for parents and family. Children and young people from families in all walks of life run away from home for all kinds of reasons. It can happen because they are reacting to something emotionally in the heat of the moment, or when they are testing the limits. Adolescence is a time for testing values and boundaries and trying out new things. During this period of development, the influence of friends can be very strong as young people start to form their own ideas and values. As part of testing new things out, young people can often believe that 'nothing will happen to me' and take risks that other people wouldn't take. They are often torn between wanting complete freedom very quickly, and wanting to be cared for as they have been in childhood. As a parent you are torn between trying to make sure they are safe as well as supporting them to gradually become more independent. For all these reasons there can be arguments and disagreements between parents and young people and some of these may lead to running away. Why children and young people run away Some run away because: - There is a disagreement on something they feel strongly about. Running away can often be a 'spur of the moment' act following an argument. They may have very intense feelings about something, and like all people experiencing strong emotion, may have trouble communicating or negotiating what they want. - They might believe that running away will make parents realise they've made a mistake. - They are afraid they're about to get into trouble. - They think their home has too many rules and limits - they seek the freedom to live their own lives. - There are too many restrictions at home and their parents don't know how to support their emerging independence. - Home isn't safe or there is something serious going wrong in their lives. This can include having parents who are continually arguing, where there is domestic violence, or where they are being physically or sexually abused or neglected. - Some young people genuinely feel unwanted and unloved at home. - They don't like the situation at home with a parent's new partner, stepparent, defacto or stepbrothers and sisters. - They are trying to get away from a difficult situation (eg bullying at school). - They are responding to pressure from peers. - They are depressed, have a drug or mental health problem and need help. What parents can do Parents can feel they've lost their influence and control and can feel helpless when their child or young person runs away. Whatever they say in the heat of an argument, you are still very important to them and you do still have influence in many ways. It's very scary for them if they feel you've given up on them. - If things are starting to go wrong between you and your young person, try to rebuild the relationship before there is a crisis. Through all the 'ups and downs' make sure she knows you love her. Try to listen to her point of view before giving yours. Talk with her about things other than focusing on problems. - Try to find some middle ground where you can each 'win' something. Leaving someone feeling totally powerless often leads to a strong reaction. - If your child threatens to run away, take it seriously. It does not help to dare them to run, eg 'Alright, go then, you'll be back soon enough' or to forbid it, eg 'No! You're not going'. Listen to how she is feeling, what her problems are and what things could change. - You may need some time apart for a while to let things settle down. Arrange for her to stay with a close relative or friend whom you both trust. This will give you both a chance to rethink what is happening and try to do some things differently. - Try to look at the situation differently, eg 'What can we do to make everyone in the family feel better?' rather than 'Why is she always making trouble?' - Know your child's friends, who she mostly talks to and where she gets support. When young people run away, friends will often know where they are likely to go. If your child or young person runs away - Try to stay calm. Remember most runaways return by themselves. - Find out about the way he left home and where he is likely to have gone. Was it planned or impulsive? Did he go off with friends? Did he take money, clothes or other possessions? Did he leave a note or say anything to anyone? Is he 'running away' from something or 'running towards' something? - Work out whether he is likely to be safe. - Contact parents of their friends to find out what they know. Don't feel worried about doing this as most people know from their own experience that all families have ups and downs. - Contact the school to see if there have been problems. - If you find out your child is with friends, let him know that you are worried and that you want to talk about what is upsetting him. Don't leave messages that are threats. - The fact that you are looking for him will help him to know you care, provided you are not angry and critical. This may be hard to show. - You may need a third person to help you both talk things through in the beginning. Be prepared to make some changes. If things are not sorted out he will be likely to run away again. - In early discussions, it doesn't mean that you have to give in on everything but it is important to discuss ways to make things better for you all. - Have an open door attitude to his return. - If you can't find him, can't work out why he has gone and don't know if he is safe, don't waste time, phone the Police to report him as missing. When they return - Don't launch into major discussions or lecture her as soon as she walks in the door. Give her time to settle in first and to know that you care. Let her know you have been worried and you need to talk about what has been happening. - Allow her to 'save face'. Don't say things like 'I knew you'd have to come crawling back!' - Try to see the problem from their point of view. Make sure she knows you understand her point of view even if it's tempting to convince her of yours. - Try to work together on ways to make things different. Use her ideas if possible as well as your own. Ask her what rules she thinks she could live with. - Fight fair. Talk about the problem, not the person. For example you could say 'Wagging school is not going to help you get the things you want' rather than 'You're hopeless and irresponsible'. - If your young person won't talk to you, or you can't seem to get anywhere, get someone else to help you sort it out. - When a child or young person runs away it is often a serious cry for help. Parents need to take this seriously. - Keep building a positive relationship. - Try to work out rules together so he feels he has some choices. - Respect your young person's personal privacy, but remember you are responsible for his safety. - Find out if they are 'running away from' something or 'running to' something. - Running away can be a sign that something serious is going wrong and you may need to get professional help. - Hang in there. Children and young people need to know you are there for them and won't give up on them. - Crisis Care 13 16 11 - Kids Helpline 1800 55 1800 - Police 131 444 or Emergency 000 - Youth Healthline 1300 131 719 - Parent Helpline 1300 364 100 24 hours a day, 7 days a week for advice on child health and parenting Related Parent Easy Guide - Running away The information on this site should not be used as an alternative to professional care. If you have a particular problem, see a doctor, or ring the Parent Helpline on 1300 364 100 (local call cost from anywhere in South Australia). This topic may use 'he' and 'she' in turn - please change to suit your child's sex.
<urn:uuid:ae41d22d-0596-4773-a348-8f3cb0b8e6e8>
CC-MAIN-2015-27
http://www.cyh.sa.gov.au/HealthTopics/HealthTopicDetails.aspx?p=114&np=141&id=1835
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375099036.81/warc/CC-MAIN-20150627031819-00065-ip-10-179-60-89.ec2.internal.warc.gz
en
0.974683
1,753
3.1875
3
2.694705
3
Strong reasoning
Social Life
Queen of Sheba, Arabic Bilqīs, Ethiopian Makeda, (flourished 10th century bce), according to Jewish and Islamic traditions, ruler of the kingdom of Sabaʾ (or Sheba) in southwestern Arabia. In the biblical account of the reign of King Solomon, she visited his court at the head of a camel caravan bearing gold, jewels, and spices. The story provides evidence for the existence of important commercial relations between ancient Israel and Arabia. According to the Bible, the purpose of her visit was to test Solomon’s wisdom by asking him to solve a number of riddles. The story of Bilqīs, as the Queen of Sheba is known in Islamic tradition, appears in the Qurʾān, though she is not mentioned by name, and her story has been embellished by Muslim commentators. The Arabs have also given Bilqīs a southern Arabian genealogy, and she is the subject of a widespread cycle of legends. According to one account, Solomon, having heard from a hoopoe, one of his birds, that Bilqīs and her kingdom worshipped the Sun, sent a letter asking her to worship God. She replied by sending gifts, but, when Solomon proved unreceptive to them, she came to his court herself. The king’s jinn, meanwhile, fearing that the king might be tempted into marrying Bilqīs, whispered to him that she had hairy legs and the hooves of an ass. Solomon, being curious about such a peculiar phenomenon, had a glass floor built before his throne so that Bilqīs, tricked into thinking it was water, raised her skirts to cross it and revealed that her legs were truly hairy. Solomon then ordered the jinn to create a depilatory for the queen. Tradition does not agree as to whether Solomon himself married Bilqīs or gave her in marriage to a Hamdānī tribesman. She did, however, become a believer. The Queen of Sheba appears as a prominent figure in the Kebra Nagast (“Glory of King”), the Ethiopian national epic and foundation story. According to this tradition, the Queen of Sheba (called Makeda) visited Solomon’s court after hearing about his wisdom. She stayed and learned from him for six months. On the last night of her visit, he tricked her into his bed, and she became pregnant. She returned to her kingdom, where she bore Solomon a son, Menilek. Menilek I was made king by his father, thus founding the royal Solomonic dynasty of Ethiopia, which ruled until the deposition of Haile Selassie I in 1974. The story of the Queen of Sheba also appears among the Persians (probably derived from Jewish tradition), where she is considered the daughter of a Chinese king and a peri.
<urn:uuid:a7eee2e8-81b2-4c38-bde4-c055bd85979f>
CC-MAIN-2019-39
https://www.britannica.com/print/article/539342
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572289.5/warc/CC-MAIN-20190915195146-20190915221146-00325.warc.gz
en
0.985818
591
3.421875
3
3.013952
3
Strong reasoning
History
Genomic research will transform medicine but progress has been slower than expected, leading critics to charge that the promise of genomics was hyperbole to get funding mandates and that while research should continue, the bulk of the money earmarked because of its applied science potential might instead be better spent elsewhere. Proponents argue that the slowness shows the complexity of the relationship between medicine and disease and argue for more funding. Both sides are arguing with anecdote so Ramy Arnaout, MD, DPhil, a founding member of the Genomic Medicine Initiative at Beth Israel Deaconess Medical Center (BIDMC), has tried to show benefits versus cost using quantitative modeling, the numerical forecasting approach used to try and predict everything from weather events to the outcomes of political elections. Drug-related adverse outcomes cost the health-care system upwards of $80 billion a year and they contend that many such cases should be avoidable by choosing and dosing drug prescriptions according to a person's genome, so they developed a quantitative model to estimate how much time and money would be required to use genomics, specifically pharmacogenomics, to cut these adverse outcomes in half. They believe their findings offer a template for the use of quantitative modeling in this field. How do the numbers in their estimates shake out? Using their parameters, the research team found that the cost could be less than $10 billion spread out over approximately 20 years. "If you look across medicine, you can see specific places here and there where genomics is really starting to change things, but it's been hard to know how it all adds up in the big picture," Arnaout, also an Assistant Professor of Pathology at Harvard Medical School. "Quantitative modeling is a standard approach for forecasting and setting expectations in many fields as we all remember from the recent presidential election and from the hurricane season. Genomics is so important and is so often on the minds of our patients, students and staff, that it seemed like a good idea to use modeling to get some hard numbers on where we're headed." The authors created the model to answer the question many people ask about biology that got a lot of attention last decade, like human embryonic stem cell research and genomics; when will it help people? They decided to try and answer this question by applying forecasting methods to a big clinical problem – drug-related adverse outcomes that are not preventable, like patients who take it wrongly or medical error. "We know that preventable causes of these adverse outcomes -- patients' non-adherence, interactions between multiple drugs, and medical error, for example -- account for only a fraction of the millions of adverse outcomes that patients experience each year," explains Arnaout. "This leaves a significant number that are currently considered non-preventable and are thought to be caused by genomic variation." Arnaout says 30 million Americans currently use the blood-thinning drug warfarin but in some cases, patients' genomes contain variants that make the standard dose of warfarin too high for them and those individuals are likely to experience bleeding, an extremely dangerous side effect. He says three-quarters of the variability in warfarin dosing requirement is due to genomic variants, and that scientists have already identified a set of variants in six specific genes that explain two-thirds of the variability. "This kind of progress suggested an interesting thought experiment," says Arnaout. "What if we took existing examples in which there appears to be a carefully vetted, clinically useful connection between a specific adverse outcome and a specific genetic variant, found out how much it cost and how long it took to discover, and applied that model to all drugs? How much would it cost and how long would it take to cut adverse outcomes by 25 percent? How about by half?" As data for the model, the authors selected eight associations involving six prescription drugs (clopidogrel, warfarin, escitalopram, carbamazepine, the nicotine-replacement patch and abacavir) and one drug class, the statin class of anticholesterol drugs. Using Monte Carlo modeling, an assumption- and parameter-based modeling method, the team ran simulations to forecast the research investment required to learn how to cut adverse outcomes by meaningful amounts, and how long that research work would be expected to take. To increase their statistical confidence, they ran the simulations thousands of times and explored a wide range of assumptions. "The results were surprising," says Arnaout. "Before we did this work, I couldn't have told you whether it would take a million dollars or a trillion dollars or whether it would take five years or a hundred years. But now, we've got a basis for thinking that we're looking at single-digit billions of dollars and a couple of decades. That may sound like a lot or a little, depending on your point of view. But with these numbers, we can now have a more informed conversation about planning for the future of genomic medicine." The most important determinant of the numbers is the extent to which the examples used in the model will turn out to be representative of drugs as a whole. "It's a broad set of drugs that were used, but we know how the genome can surprise us," says senior author Dr. Vikas P. Sukhatme. "For example, you won't be able to use genomics to cut adverse outcomes in half if genomics turns out to explain less than half of the adverse outcomes. But even in that case, we found that pharmacogenomics will be able to make a significant dent in adverse outcomes – cutting them by a quarter – for multi-billion-dollar investments." Also surprising, say the authors, was the timing. "As a rule, the fruits of research come only after research dollars have already been spent," points out Arnaout. This means that, in this case, hundreds of millions of dollars will be spent for "pump-priming" long before the public can expect to see any meaningful clinical impact. "It's one thing to say, 'Be patient,' based on just faith," he adds. "It's another to be able to say so based on data and a model. We now have that. This enables the conversation to shift to which indicators of progress to look for, over the five or so years of pump-priming, to make sure we're on track." Can results be sped up? Researchers always argue more money now will speed things up but it may be achievable here. "If we could enroll an ethnically diverse set of patients who are taking each of the 40 or 50 most commonly prescribed drugs, get their blood samples, and keep track of the adverse outcomes that some of them are bound to experience, we should be able to move faster, for less money," adds Arnaout, who describes this idea as a "50,000 Pharmacogenomes Project," a pursuit along the lines of the 1,000 Genomes Project, the UK10K or the Veteran's Association Million Veteran Program. Published in Clinical Chemistry.
<urn:uuid:293621fc-b214-4865-9dd8-9851eb58ceac>
CC-MAIN-2016-44
http://www.science20.com/news_articles/will_pharmacology_be_where_genomic_research_translates_clinical_care-100214
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988722653.96/warc/CC-MAIN-20161020183842-00394-ip-10-171-6-4.ec2.internal.warc.gz
en
0.959276
1,443
2.75
3
2.984994
3
Strong reasoning
Health
Posted on Monday 26 June 2017 by Cruickshank Intellectual Property On Monday the 19th June, the Supreme Court in the United States ruled that the laws surrounding the prevention of registering a Trademark due to ‘disparaging’ terms are in fact a direct violation of the free speech clause laid out in the First Amendment. The case in question involved the trademark of the name ‘The Slants’ an Oregon based Asian- American dance-rock band. Formed in 2006, the band have been known for their involvement with the Asian – American community and their fight against racist stero-typing. Choosing the name The Slants was their way of communicating their ‘own slant on life’ based on personal experiences. Lead singer Simon Tam in an interview with Fox news in 2015 said: “I named the band The Slants because it represented our perspective – our slant – on life as people of colour. It was a deliberate act of claiming an identity as well as a nod to Asian-American activists who had been using the term for decades. It was a way to address a false stereotype and to destigmatize a slur.” Yet in 2011 the United States Patent and Trademark Office (USPTO) rejected the trademark in accordance with Section 2 of the US Trademark Act, on the basis their name was inappropriate and disparaging to people of Asian descent. However, the band decided to legally challenge this rejection deeming it a violation of free speech, a case which was voted 8 -0 in their favour last week Following the judgement, the Supreme Court stated - ‘Speech may not be banned on the ground that it expresses ideas that offend.’ This court victory may now mean that the USTPO can no longer reject a trademark application based on their own opinions and assumptions of phrases, words or symbols as it directly prohibits the use of free speech. What is significant about the Supreme Court’s decision is the direct affect it will have on another Trademark dispute. NFL team the Washington Redskins have been involved in a Trademark battle for the last number of years and one which saw their name and other registered trademarks cancelled on the grounds of being disparaging towards Native Americans. Following this the Washington Redskins challenged the decision, raising the issue of the First Amendment. While no decision has been made as of yet it is thought that the recent decision for The Slant’s will only accentuate the Redskins position in this legal matter. While the USPTO are governed by their own set of rules, The European Union Intellectual Property Office (EUIPO) states in Article 7 that trademarks will be refused if they are found to be contrary to public policy or to accepted principles of morality. This is also part of Article 6 of the Paris Convention of which Ireland is a signatory. This basis of public policy and morality are also set out in Section 8 of the Irish Trademarks Act 1996. While trademarks can be cancelled or rejected by any of the trademark governing bodies it does not mean that you cannot still use your mark or name. As is the case with the Washington Redskins, their logo and branding may not be trademarked however it does not mean they need to cease business under that name, nor have to change it. What is important to note is that trademarks function as a tool of protection, prevent infringement by other businesses and distinguish your brand. Essentially they protect your most valuable asset – your intellectual property. Following loss of a registration you ultimately have no trademark protection which leads you to a vulnerable position, allowing the threat of counterfeit imposters. Customs and Border Control is one such area where you are no longer guaranteed protection. Once a trademark registration is noted, customs have the ability to impound and destroy counterfeit goods as and when they enter a country, once a trademark registration is cancelled customs involvement effectively ceases, and they will no longer seize items they believe to be counterfeit and in turn will not inform the registrant of said trademark. While counterfeit products are seen as an IP problem, they also do not comply with standard health and safety regulations posing serious hazardous consequences to the consumer. Take for instance, counterfeit clothes containing illegal dyes or unknown chemicals which affect a consumer with allergies, worse yet clothes with these chemicals could prove to be highly flammable, or drugs on the market containing substances still not approved or regulated. With The Slants case seen as a victory, it will no doubt raise the question of what exactly constitutes as free speech or freedom of expression and in turn what is perceived as acceptable or deemed as offensive. No doubt in the coming months we will begin to see a rise of questionable trademark applications, whether they are accepted or not we will just have to wait and see. If you have an idea that requires protecting or simply need an expert in European IP Law, then please get in touch with us today. The world is constantly changing, to provide the best possible advice we need to keep our fingers on the pulse of European law. If you would like to know the latest news or download helpful publications and guidance, go here
<urn:uuid:ae3b8153-feff-4cd1-b0c6-f15d6e7528b1>
CC-MAIN-2019-30
https://cruickshank.ie/news-blog/2017/06/26/whats-in-a-name
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195527048.80/warc/CC-MAIN-20190721144008-20190721170008-00282.warc.gz
en
0.961809
1,041
2.515625
3
3.048943
3
Strong reasoning
Crime & Law
Definition - What does Carbonation mean? Carbonation is the chemical reaction between carbon dioxide present in the air, and the hydration compounds of the cement in concrete structures. The rate of carbonation depends on the physical characteristics such as the design, on-site preparation, production and protection, as well as external factors, such as the location and degree of exposure to contaminants and other environmental factors. Carbonation may lead to the corrosion of the reinforcement steel and deterioration of concrete structures. Corrosionpedia explains Carbonation The carbonation process starts immediately when concrete is exposed to air. Carbon dioxide (CO2) penetrates the concrete through the pores where it reacts with the calcium hydroxide and the moisture in the pores to form calcium carbonate. The carbon dioxide combines with the pore water to form a dilute carbolic acid which acts to reduce the concrete’s alkalinity. Carbonation reduces the concrete’s natural alkalinity from pH13 to about pH8. Whereas a high pH provides a passivation layer around the steel, at pH below 9.5, the passivation layer breaks down and exposes the reinforcement steel to the corrosive effects of water and air. When steel rusts, it expands in volume and exerts force on the surrounding concrete, causing the concrete to crack and spall at a rate that increases exponentially if the corrosion is not prevented. Factors affecting concrete carbonation include: - Concentration of CO2 gas — Usually high in cities due to pollution - Humidity — Ideally 50%-70%, when lower, there is less water and when higher, water inhibits carbon dioxide diffusion - Temperature — higher carbonation in hot environments - Pore system of the concrete — Determined by water-to-cement ratio, degree of hydration and type of binder - Porosity and permeability Consequences of carbonation include: - Deterioration of concrete structures through corrosion of the reinforcement steel - Increased compressive strength of carbonated concrete - Slight increase in the splitting strength of the concrete - Increased electrical resistivity - Reduced permeability and porosity Carbonation is recognized by the presence of discolored areas on the surface of the concrete. If invisible, it can be visualized by using phenolphthalein, an indicator solution that is pink in unaffected concrete and clear in carbonated areas. Carbonation can be prevented by: - Following good building practices - Understanding the environment - Using low water-cement ratio - Barrier coatings - Mineral paints Protection should be implemented in situations where carbonation penetration is deeper and nearly reaching the steel reinforcement. Once carbonation reaches the reinforcement, it cannot be prevented. However, it is still possible to protect steel from corrosion by waterproofing to prevent the ingress of water.
<urn:uuid:cf8cbf70-c7c5-4114-832f-5b7d161d8d06>
CC-MAIN-2017-47
https://www.corrosionpedia.com/definition/1729/carbonation
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806225.78/warc/CC-MAIN-20171120203833-20171120223833-00188.warc.gz
en
0.891862
589
3.609375
4
2.421983
2
Moderate reasoning
Industrial
Back before computers were ubiquitous, salespeople had a hard time showing their customers what stuff looked like, especially big stuff. Sure, there were photographs and drawings, but for a full three-dimensional effect, you needed a physical model. That’s where Topping, Inc. came in. When you play a game of billiards, you’re usually hoping to hear the satisfying clack of the balls. You’re probably not hoping to hear a sound like gunfire as your cue ball connects with the eight ball. But if you got your hands on some of the earliest plastic billiard balls, that was a chance you took. We might all need to buy new baby bottles. A new study by researchers at the University of Calgary has show for the first time that a widely used BPA substitute called BPS could have the same harmful health effects as the chemical we ditched. BPA-free might not mean squat. Plastic has become a ubiquitous part of life, though we rarely think about its impact on the environment and our health. This beautifully crafted four-minute film shows the various problems associated with plastic, along with possible solutions. Strong, durable materials are hard to recycle—they're designed to stand up to abuse. But research chemists at an IBM laboratory just published their discovery of a never-before-seen family of polymers that's super strong, self-healing, lightweight, and easy to recycle. And it was discovered completely by accident. As a nation, the United States consumes a whopping 8 billion chickens every year, and this results in a few mountains' worth of chicken feathers in pure waste. But no more, some entrepreneurs say: chicken feathers could be the future of plastic. By George Dvorsky and Joseph Bennington-Castro. The chemicals contained in plastics can be quite harmful. But given that "plastic" can mean a wide variety of substances, it's difficult to know which ones are bad for us. Here’s everything you need to know about plastic and an its impact on your health. Ever heard of phthalates? They're a class of chemicals used to soften plastics found in everything from household containers to medical supplies, and to stabilize colors and fragrances in cosmetics like lipstick and perfume. Earlier this week, scientists announced the development of an entirely new genre of plastic that heals itself when it's scratched or cut, and bleeds like human skin — but researchers say you're more likely to find these next-gen materials wrapped around a car bumper than you are a freshly minted 800 Series. Canadian company JBI is setting the recycling industry on fire with its new Plastic2Oil plants that promise to convert non-recyclable plastics into fuel. Soda's bad for you, but plastics—especially the petroleum-based PET plastics used widely for bottles—are bad for everyone. Thankfully, after millions of dollars and years of research, Pepsi thinks it's cracked the code on a 100% plant-based PET bottle. I throw out more expired food than I like to admit, but half the time, it's because I can't remember when I bought it, and can't tell if it's spoiled or not. This new, "intelligent" plastic could fix that. Bisphenol A, or BPA, as its close friends call it, is a chemical used to create plastics. It's included in a ton of great stuff—water bottles, tooth fillings, sports equipment—because it's cheap and shatterproof. It also kills sperm. Four months after boasting of vacuums made from recycled sea junk, Electrolux now has five colorful cleaners to show off. They're made from 70 per cent recycled plastics, with each cleaner's design representing the ocean the rubbish came from. There’s one kinda big problem with SunChips’ new 100% compostable bag: It’s noisy as Hell. An Air Force pilot says it’s louder than the cockpit of his jet, and this video test pegs it at a potentially damaging 95 decibels. Earlier this week, IBM researchers announced a discovery that could lead to plastics made from plants instead of petroleum. The new plastics will be more energy efficient, more versatile, and infinitely recyclable (until we move to our space colony). This nature photography by Chris Jordan isn't for the faint of heart. The series of decomposing bird carcasses faithfully documents the impact of the Great Pacific Garbage Patch on albatross chicks in the Midway Atoll. Imagine concrete that's two-thirds granulated plastic, but is as strong as the stuff currently in use. Architect/engineer Henry Miller figured out how to make it, not just on paper, but in a couple of real-life structures. Curious as to how all those plastic cups, trash cans and containers you get at Ikea are made? Random Good Stuff takes a tour of the Koziol plastics factory in Germany, where many of those household items are designed. It may look all innocent, but this little logic circuit is made from organic molecules that lined themselves up to form 300 transistors, without the need for machine production. This kind of chip-in-a-test-tube approach to creating semiconductors, demonstrated as effective for the first time by Philips Research, could…
<urn:uuid:b16c2a3d-bc37-4e0d-98fd-7fa8db2d66a5>
CC-MAIN-2016-36
http://gizmodo.com/tag/plastics
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982292493.37/warc/CC-MAIN-20160823195812-00216-ip-10-153-172-175.ec2.internal.warc.gz
en
0.961317
1,101
2.515625
3
2.800783
3
Strong reasoning
Science & Tech.
Names Indicate French and Spanish Influence October 5, 1939 The State of Louisiana is peculiar in that it is the only one of the United States whose political subdivisions know as counties in the other 47 states are called “parishes”. Louisiana at present has 64 parishes. The name Louisiana’s parishes, especially in the case of the older ones, indicate French and Spanish influence. As early as the time of the French ownership of the Louisiana Territory is the distinction of “parishes” known. In the year 1723 the Territory of Louisiana was divided into nine parts or parishes, each one governed by a commandane, assisted by a judge. There were five parishes during the Spanish domain, and each parish in the days of either of these periods was a vast territory, for Louisiana was all the known and unknown land lying west of the Mississippi River. Goes Back to 1803 The origin of the name “parishes” in Louisiana as applied to present-day subdivisions dates back to December 20, 1803, at the time of the transfer of the Province of Louisiana from France to the United States. The scene of the transfer was the Cabildo in New Orleans facing Jackson Square, now one of the most historical buildings in the Nation, and the representative of the United States was Governor W. C. C. Claiborne of the Mississippi Territory who had been sent to New Orleans by President Thomas Jefferson. After details of the transfer had been settled, Governor Claiborne issued a statement exercising the powers of “the Governor General and Intendant of the Province of Louisiana” and bequeathed upon the French and Spanish population of the province the “enjoyments of all rights, advantages and immunities of citizens of the United States,” thus making our French and Spanish forebears Americans. Claiborne Divides Territory In order to form a substantial set-up under which the people of Louisiana might govern themselves, the United States congress called upon Governor Claiborne to divide the Territory of Louisiana into election districts. A General Assembly was established and provided for the calling of an election to name the 25 members who were to compose the General Assembly. On December 3, 1804, this legislative council divided the territory into 12 counties called Orleans, German Coast, Acadia, Lafourche, Iberville, Pointe Coupee, Attakapas, Opelousas, Natchitoches, Rapides, Ouachita and Concordia. The boundaries of these 12 counties were vaguely drawn … the Orleans territory was not surveyed or chartered … and with the exception of Rapides and Ouachita, the locations and approximate limits of the other counties were fixed by describing them as being composed of a given parish or parishes. Were Ecclesiastical Divisions These “parishes”, of course, were ecclesiastical subdivisions, territory served by a particular church in a particular sector. Under French and Spanish colonization the little parish church became the community center, its sphere of influence extending to outlying territory in fairly well known and recognized limits. On March 31, 1807, the first act of the second session of the legislature provided for the division of the Orleans Territory into 19 parishes, and the division of the territory into counties was abolished, except for the purpose of representation. Thus, a sort of dual system of county and parish government was set up, the county still retaining a portion of autonomy. These 19 parishes were: New Orleans, St. Bernard, Plaquemines, St. Charles, St. John the Baptist, St. James, Ascension, Assumption, Lafourche, Iberville, Baton Rouge, Pointe Coupee, Concordia, Ouachita, Rapides, Avoyelles, Natchitoches, St. Landry, and St. Martin (Attakapas). Claiborne Establishes Boundaries Governor Claiborne was given authority to declare and establish the boundaries of the parishes in any cases were difficulty or doubt was concerned. The officers of the county judges, clerks, sheriffs, coroners and treasurers were abolished, and the offices of parish judges, et al, were set up in their places. Section 32 of the Act says “that the division of the territory into counties shall subsist for the purpose of making the election of the representatives of the territory, and levying the territory, and levying the territorial taxes”. On this score, Mr. Robert Calhoun of Vidalia, Louisiana, “an artist working in history,” observes: “It will thus be seen that the fight which the Creole population had waged for a territorial subdivision into autonomous civil parishes had at least borne fruit and with a retention of their old ecclesiastical names.” On February 16, 1811, President Monroe approved the act of congress entitled “An Act to enable the people of the Territory of Orleans to form a constitution and state government and for the admission of such state into Union, on an equal footing with the original states and for other purposes. The people of the Territory were authorized to form a constitution and state government, to call a constitutional convention for this purpose. Congress prescribed that the convention representatives should be apportioned among the several counties, districts and parishes of the Territory of New Orleans, and of a number not to exceed 60. The legislature of the Orleans Territory was empowered by Congress to prepare for the convention and specify the number of representatives to the constitutional convention. The legislature declared there should be 45 representatives, apportioning them from the original 12 counties and not from the 19 parishes. On January 22, 1812, the Constitution of the State of Louisiana was finally drafted, adopted and signed. Each delegate signed from the county from which he was elected. This constitution, drawn on broad lines, with the details of governmental set-up left to the legislature, appeared to contemplate a county rather than a parish system of local government. But the constitution did not specify either county or parish government; it did not subdivide the state into counties or parishes. Seven Judicial Districts At the second session of the first legislature of the new State of Louisiana, the state was divided into seven judicial districts by parishes. From about this time on the word parish supplanted county and it began to be generally adopted by everybody legislators and laymen alike. In 1816 William Darby publishes his parish map of Louisiana; he did not delineate the counties because “so much confusion would have been superinduced by so many conflicting subdivisions.” By that time Louisiana had 25 parishes. The Act of December 16, 1824, provides “the sheriff of the parish of St. John the Baptist shall be ex-officio sheriff of the County of German Coast, and that in the future only one sheriff shall be appointed for said county.” 4 Congressional Districts And that old sore-thumb, the county of German Coast, still stuck out as late as 1842. It is mentioned in the act of March 27, 1843, when the state treasurer was authorized to receive a sum of money from the sheriff of that county. The act of April 6, 1843, divided the state into four congressional districts by parishes; the act of February 29, 1844, separated the state into six electoral districts for presidential electors, but separated them by counties. The Constitution of 1845, superseding the Constitution of 1812, laid the ghost of the county system in Louisiana. The word county does not appear a single time in the new constitution, the whole theory of the instrument is parish autonomy. So today the 64 political subdivisions of the State of Louisiana are called parishes, this state being the only one in the nation having such title for the divisions. From time to time, after the state was admitted to the Union in 1812, various parishes of Louisiana were divided into smaller subdivisions, and today the 64 are just about the same area in size. Each of Louisiana’a parishes is entitled to at least one member in the State legislature, although the larger parishes are entitled to more than one, the appointment being based on population. Orleans parish in which the City of New Orleans is situated, has 20 representatives, the 17 wards of the parish. One parish, Caddo, has four representatives, two have three members in the state legislature, and 10 have two representatives. The remaining parishes each have one representative. There is a total of 100 members of the house of representatives of the state legislature. 33 Senatorial Districts The parishes are grouped or divided into 33 senatorial districts from which are elected the 39 senators who serve in the upper house of the legislature. Orleans parish is divided into eight districts, and the remaining 31 comprise the other 63 parishes that have been politically grouped to form districts. The sheriff of each parish is the chief law-enforcement officer and also ex-officio tax collector. The clerk of court in each parish is also the recorder and the tax assessor fixes valuation of property. The police jury, which corresponds to the quorum court, county court or board of supervisors of some states, is the parish lawmaking body. It has great legislative and administrative powers and representatives are elected from the police jury wars tot his body which often contains as many as 12 or 16 members. The parish school board has the same number of members elected in the same way, but is in no way connected with the other functions of the parish government. School board members are elected for periods of six years, and parish officers, including police jurors, are elected for four years. Judges and district attorneys in Louisiana are elected by districts, and are elected for six year terms. In the larger districts of the state, there is an assistant district attorney for each parish. Louisiana has a population of more than 2,120,000 and the area of the Pelican State is 45,966 square miles. Baton Rouge is the capital. The land of the state is thus distributed: alluvial lands, 13,225 square miles; bluff prairies, 5,739 square miles; oak uplands, 8,103 square miles; pine hills, 7,582 square miles; pine flats, 2,256 square miles; central prairies, 785 square miles; and coastal marshes, 7,420 square miles. Of the 28,000,000 acres of land in Louisiana, between five and six million are now under cultivation. The Louisiana Territory, after being under Spanish and French rule through settlement and conquest for over 250 years, was ceded by France to the United States on the 30th of April, 1803, for $15,000,000. Louisiana was admitted to the Union as a state in 1812.
<urn:uuid:62cc6ded-d20a-4e66-9518-fa654f9f2003>
CC-MAIN-2021-17
https://shilohtocanaan.com/2018/12/19/how-louisiana-got-the-name-parishes/
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039626288.96/warc/CC-MAIN-20210423011010-20210423041010-00035.warc.gz
en
0.969786
2,239
3.421875
3
2.644076
3
Strong reasoning
History
Room-Temp Breakthrough Heats Up World of Masers Masers, or Microwave Amplification by Stimulated Emission of Radiation, typically require either extreme low pressure or extreme low temperature environments in order to work properly. That means so far, their use has been limited. Researchers, however, have devised a way to make the technology work at room temperature. Aug 17, 2012 5:00 AM PT Research scientists in the UK have demonstrated for the first time a solid-state maser that can work at room temperature. Maser is an acronym for Microwave Amplification by Stimulated Emission of Radiation. If that sounds, and reads, suspiciously like the word "laser" that's because masers were developed before lasers, and the two amplify different parts of the electro-magnetic spectrum. The difference is that masers deliver a beam of concentrated microwaves and lasers a beam of concentrated light. However, masers ended up being used in niche areas only, such as in atomic clocks and as electronic amplifiers in radio telescopes, because they have always required extreme conditions in order to work. These could be extremely low pressures or intense cold. The United States Naval Observatory, which keeps standard time for the U.S., employs hydrogen masers as part of its master clock. "At the moment, [the maser} is the size of a coffee can," research team member Mark Oxborrow of the NPL told TechNewsWorld. "But it could be shrunk to the size of a sugar cube or even smaller by using different designs of known resonators." More on Masers Masers work by essentially amplifying microwaves in a process known as "masing." There are atomic beam masers, gas masers and solid-state masers. The maser developed by the British researchers is a solid state maser, being "made of solid materials with ambient air in the gaps between the solid components," the NPL's Oxborrow said. In addition to requiring special vacuum chambers and pumps to create very low pressures, traditional masers need large cooling systems as they function in temperature close to absolute zero degrees Celsius. They may also need very strong magnets to create a population inversion of the atoms in order to get them into an excited enough state to emit microwave radiation as they decay. By getting rid of these special requirements, the British researchers have opened the door for more extensive use of masers. Masing in a Coffee Can The new maser demonstrated by the British researchers uses p-terphenyl, an aromatic hydrocarbon that's used as a laser dye and an ingredient in sunscreen. "The pentacene molecules are dissolved into molten p-terphenyl which then solidifies upon cooling to form a solid pink crystal," the NPL's Oxborrow said. This crystal is placed inside a microwave cavity and then exposed to a pulse of yellow light from a dye laser. The pentacene molecules absorb the light from the laser and go into a special excited state, Oxborrow continued. They are then stimulated into emitting microwave energy, thus strengthening the amplitude of the oscillating magnetic field. This stimulates the emission of even more pentacene molecules. "This process runs away with itself, resulting in a high amplitude oscillation," Oxborrow remarked. "The choice of pentacene made it possible to operate at room temperature, because at low temperatures, the timescales would not have favored masing," Neil Alford, head of the department of materials, Imperial College, London, told TechNewsWorld. Masing for the Masses Maser can be used for things like radio telescopes, military applications, and medical technologies like body scanners. The new maser currently works only in pulses, and "we first need to get the device working continuously" before developing a prototype for eventual production, Oxborrow said. "We have submitted proposals to [develop a prototype] ... but don't forget that from discovery to production can take quite a long time," Alford stated.
<urn:uuid:402f3456-6f5b-4c76-b139-304c3ec22d12>
CC-MAIN-2015-35
http://www.technewsworld.com/story/science/75925.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645330174.85/warc/CC-MAIN-20150827031530-00202-ip-10-171-96-226.ec2.internal.warc.gz
en
0.943023
838
3.265625
3
2.812397
3
Strong reasoning
Science & Tech.
For better or worse, the United States of America that we know and love today was founded, changed, built and fought for with blood and conquest. It’s a history that we often forget. The U.S. borders have warped and moved countless times. In it’s earliest years, much of the land was owned and ruled over by different countries. Today, we are here at Palo Alto National Battlefield to learn about the history of this very small corner of Texas and the U.S. Mexican War. The Palo Alto National Historic Park is the only National Park Unit to interpret this war. The park introduction reads as follows: “On May 8th, 1846, United States and Mexican troops clashed on the prairie of Palo Alto. The battle was the first in a two-year long war that changed the map of North America”. I need to stop here for a moment and make a confession. I’ve never heard of this battle. If I was taught about it in school it’s long since been buried, covered over by the words of every commercial jingle I’ve ever heard and the moves for how to dance the Macarena. I’ll bet you can relate. We forget. Time erases the past and makes way for the future, but the saying goes, “Those who forget the past are doomed to repeat it.” These places are important, these memories are important. On the day we visited, the park was empty but for a historian/bicyclist who told us that the park ranger was a fount of knowledge and we should appreciate him. We asked the ranger to tell us all he knew and he was indeed a fount of knowledge! The main picture at the beginning of this post is of an interactive map which shows how the boundaries changed. The U.S. Mexican War transformed North America and by pushing a button on the map the boundary changes light up. The boundaries between the U.S. and Mexico had been disputed for some time. President James K. Polk was determined to expand his country and disputed Mexico’s ownership claims of Texas. He also insisted that Texas stretched all the way to the Rio Grande. I was particularly intrigued by the book below this display. Turning the pages showed the U.S. boundaries throughout history and the countries who laid claims to the land. I had forgotten how much effort, war and negotiation it took to create the country we enjoy today. Displays show the aspects of the war from two different perspectives. The U.S. had huge cannons and both heavy and light artillery, while the Mexican soldiers made do with ancient relics left over from Mexico’s Independence Wars. These are some archaeological finds from the battlefield. I was even more ashamed to admit that my knowledge of the Mexican-American War was lacking, when I was reminded, by a display, that Commander Winfield Scott played a huge part in the winning of the war. During my childhood, my father spoke of Winfield Scott frequently and referred to him by his nickname “Old Fuss and Feathers”. Apparently General Scott is a family relation and/or played an important part in my family history, on my father’s side. I’m going to have to look into our genealogical records again! There are two ways to explore the battlefield. The first is by walking a paved trail from the visitor center to the separate battle line, trails on the field itself. The second option is to drive to the battlefield and walk from there. We went for option two and drove to the parking area. From there it’s possible to look out onto the entire battlefield. The site itself is so large that while there are flags marking the opposing sides, they’re difficult to see in the distance. The cannon picture above the page heading shows the view from this spot and the Mexican side of the conflict. There are two trail options to hike, along the Mexican front lines or along the American front lines. Jeff and I are still a little sick so we choose to walk just the American side. This picture shows the trailhead at the parking lot and a closer look at the Mexican flags which mark the battle lines and cannons in the distance Turning to the right leads to the Mexican side of the trail. Turning to the left leads to the U.S. side. When walking through a quiet field of grass and cactus it’s next to impossible to appreciate the noise and chaos of a cannon battle. The lilting voices of songbirds fill the air, the riotous color of blossoms dot the landscape as far as the eye can see, squirrels scamper through the brush…no smoke, no fire, no explosions. How is it possible to understand the events that went on here? The park service has done a tremendous job of bringing history to life through the interpretive signs along the trail, by including testimonies of the conditions of war in the soldiers own words. It’s impossible to read them and not be moved. This is the U.S. line and flags in the distance. The huge U.S. siege cannon sits silent. The siege cannon weighed so much that it could not be taken off the road and into the prairie. It fired 18 pound balls and according to one soldier “They made the earth tremble and cut the Mexicans down in heaps”. Can you imagine standing here behind one of these monstrous guns? Or what it would be like to dodge cannonballs? What about staring at a line of guns pointing at you from across the field? One of the things I personally never stopped to think about was what it took to keep that many men fed and supplied so far from home. What was it like to be a cook or a blacksmith behind the lines, doing their job while the cannons boomed? Were there this many cactus plants covering the field back then? Where did they put 300 wagons amongst all of them and how much of a factor were the spines while trying to dodge cannonballs? Things I never considered. Sleeping, was it even possible? What an awful sight to wake up to! Walking back to the car, over a boardwalk, we were reminded that a good portion of the land was marsh in the rainy season which added another level of difficulty and discomfort. Visiting Palo Alto Battlefield gave me a new respect for the men and women who fought for our freedom and those who continue to do so every day. Since the day is still early and we have no other plans, we decide to drive down the opposite side of the Port of Brownsville to Boca Chica State Park. I have to admit, I was hoping to see a little of the port industry and what we missed by not being able to have a boat tour, though I don’t hold out much hope. The entrance gate is as close as we’ve been so far. That’s it for our industry tour. Boca Chica State Park is the southern end of the barrier island that we visited yesterday at South Padre. You can drive on the beach here for free. A right turn leads to the opening where the Rio Grande River meets the sea. That is our first destination. It’s quickly apparent that the oil is worse here. While the ocean is beautiful, this side of the channel has a lot more trash in the dunes above and the oil is very bad in spots. But it’s a short drive to reach the mouth of the Rio Grande. There it is, Mexico on the opposite bank. Once long ago, we took a trip, when our kids were very young. We were somewhere in Colorado and as usual driving the scenic route. We came around a corner, out of the mountains and there before us was the most beautiful river plateau we had ever seen. We pulled over to take pictures and saw a sign that identified it as the headwaters of the Rio Grande River. Something about that sight stayed with us. For years and years that picture was Jeff’s favorite computer background. To this day we still describe it as one of our top ten. It’s only fitting that we’ve come here now to admire the other end. It’s a popular place, full of birds. Some who don’t mind a little human trash. I could watch these little birds for hours. I believe these are Arctic Terns. They fly over the ocean until they spot a fish, then they tip their beak straight down as if pointing. They dive down fast! Straight as an arrow. Into the water and back up with the prize! There’s usually some disagreement as to who it belongs to. Up the river, the trash and oil are much worse here. The sludge on the bank is oil residue and trash litters the dunes on the land side. I wonder, if the fact that the beach is free and not monitored the way the South Padre beach was makes much of a difference in cleanliness? Regardless, it is a beautiful place popular with fisherman. The two gentlemen in the background of this picture started fishing from the Mexican side but kept drifting further and further toward the American side as they fished. Once again, what borders? Everyone was out having a good time. Human and bird alike. Lets explore the other end of the island! We startled a very large something which flew up in front of us. I have to say that a Turkey Vulture is not a bird I would expect to see on the beach. The wingspan is huge! Shells litter the beach. Though they are often marred by oil. We found some unidentified objects which are probably conglomerations of solidified oil. Kind of ironic that one looks like a fish and the other like a seahorse. Birds of a different color. Blue Herons congregate by fisherman. The beach is narrow in places and sometimes littered with tires. When we reach the jetty, South Padre Island’s hotels are visible in the distance. The bridge rises through the haze. On this side, it’s possible to walk along the jetty and watch the boats zipping up and down the channel. The Royal Terns use this spot for resting. They squawk and carry on at each other. It’s also a popular spot for bathing while a friend keeps watch for you. The “road” continues a little further around the point. The road ended at a beach where a lot of construction was going on. A barge was unloading an excavator. Pretty interesting to see how they used the bucket to help “walk” the excavator off the barge. It startled a crane. Old beach houses stood like sentinels. Ravaged by weather, they appear to have been vacant for a long time. Nothing more to see here, it’s time to head back to the road. When I plan these “explorations” I often use Google Maps, and zoom in to see what might look interesting. While looking at the entrance to the Boca Chica Beach, the words “Space X Space Launch Facility” appeared over the top of a square of dirt on the digital map. Determined to figure out what it was while we were here, we slowed down to look. It’s a square mound of dirt surrounded by a chain link fence with a Space X sign on the front. We still have no idea whether it really is a launch site but there’s no infrastructure that we can see and it isn’t very big. It’s a mystery! We also noticed another marker on the opposite side of the road. These pillars are remains of a railroad which transported military supplies. At this point I need to share with you an interesting/annoying habit that Jeff has. We can be driving along, on the way home after a fun day or on the way to have a fun day or really anytime at all, when suddenly he “sees” something that he thinks looks interesting. The next thing you know, he’s turned down some little “road” looking for who knows what. Today, on the way home, he made a quick left turn onto a side road which led toward some ranch homes. I don’t know why. We followed the road to the end and turned around. Nothing to see here folks! We were almost back to the main road when we noticed a little marker. “The last battle of the Civil War”. Apparently, the last battle of the Civil War was fought in a nondescript field, in the “middle of nowhere” Texas and we happened to stumble upon it! The battle of Palmito Ranch. Once again, the silence is profound and there is nothing much to see. You must use your imagination. But life goes on, even after a war. Little bugs stay busy on a blossom… A strange caterpillar is on a mission… Plants and flowers are doing what plants and flowers do. I like to take time to appreciate the details. For those of you who would like to visit this small Civil War Battlefield, we discovered that there IS a marker on Boca Chica Blvd. The sign and marker do not give very clear information on where the battlefield actually is though. The battlefield is located on a nearby, nondescript side road named Palmita Hill.
<urn:uuid:cec765a8-df17-4aec-ab90-435cb966c0ee>
CC-MAIN-2021-49
https://nostoneunturnedadventures.com/2018/05/15/palo-alto-national-battlefield-and-beyond/
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363149.85/warc/CC-MAIN-20211205065810-20211205095810-00141.warc.gz
en
0.965231
2,896
3.421875
3
2.660759
3
Strong reasoning
History
Teachers who Influenced Karen Ellis When Philadelphia resident Karen Ellis recalls the memorable teachers in her life, she likes to talk about how they gave her the "building blocks of how the world works." These teachers "gave me the skills to negotiate for the rest of my life." Her first guitar teacher from Jenkintown Music School philly.com obit Folksinger legacy of important work George S. Britton who helped found the Philadelphia Folksong Society in 1957 and recorded Pennsylvania Dutch Folk Songs now found in the Smithsonian followed by two more teachers who were of great influence Armand Mednick an artist, potter, painter who had fought with the French Resistance and taught a 10-year-old girl about the Nazi persecution of Jews in World War II Europe, and then another great musician Mrs. Fanabell Kremens who taught her Orff Schulwerk during 1965 and 1966 at Oaklane Day School when she was 9 and 10 years old. Interestingly enough Karen Ellis may well have been the first person to have graduated with Orff Certification in 1975 in the US., who had also happened to have received Orff training as a child in the US. SEE OTHER TEACHERS: Fannabell Kremins, George Brittan, Armand & Anita Mednic and Tossi Aaron. In High School another teacher taught a 17-year-old young woman in a "media literacy" class how to evaluate critically all the news media and government reports about the Vietnam War. Ellis, remembers well these lessons and other lessons from the 1950s and 60s: "Being a part of a culture that saw integration happen -- and the danger, pain, and humiliation of segregation -- left a powerful collective memory of what intolerance feels like." Ellis has been working for the past few years to use all of these lessons to help educators, parents and students to make use of online resources -- to help give today's students building blocks of how the world works. Her efforts, so far, have led to the creation of Community Area of electronic mailing lists that appeals to a broad range of interests and encourages innovation and interaction across many disciplines; and to an Internet portal, the Educational CyberPlayGround, that not only is interdisciplinary and collaborative but also is trying to cut across social and cultural barriers and to encourage broad use of Internet resources. Educators, parents and librarians, for example, will find the online curriculum resources for Black History Month and for other minorities on the Educational CyberPlayGround a safe place for children to be online, Ellis said. "We know that the Internet sometimes can be overwhelming, and we want to help those with limited Web experience, particularly those involved with education, to master Web tools and skills. The focus is on integrating what has become a fragmented community of educators and regular folks." Ellis directs this focus as webmistress and coordinator of all the mailing lists located in the Community area of the Educational CyberPlayGround, where there are more than 11,000 subscribers. She is the organizer, coordinator, director and guiding spirit of the Educational CyberPlayGround. Ellis said the Educational CyberPlayGround is trying not only to provide online learning resources for different cultural and ethnic groups but also for those with different learning styles and who may use interdisciplinary approaches to learning. The portal provides K-12 interdisciplinary, collaborative, thematic modules that use multiple- intelligence approaches for schools, home schooled and learning centers. "We are sensitive to different learning styles -- not just logical learners but visual and intuitive ones as well. This will let students use the pathways that work best for them." Ellis, whose background includes a bachelor's degree in elementary education, a certificate in the Orff Schulwerk approach to music education and experience as a teacher and music therapist, has throughout her career attempted to integrate her interests. Her three years as a teacher in St. Croix, U.S. Virgin Islands, for example, resulted in her book, "Domino," a collection of 60 authentic Caribbean play songs that included maps, proverbs, history and cultural information. An accompanying cassette features children performing the play songs and is the only live-sound field recording from that area of the world in the Folklore Archive in the Library of Congress. The Midwest Book Review in 1990 noted that "Domino" is "a unique opportunity to absorb the culture and sounds of an area which has received relatively little attention," providing a political and cultural review of the Virgin Islands. Her work in St. Croix also resulted in the development of an extremely successful thematic reading curriculum that makes use of children's indigenous songs and games to help them learn Standard English and that dramatically raised their reading scores, Ellis said. Ellis is bringing this same integrative approach to the Educational CyberPlayGround. Available on the portal are a Web tutorial for "newbies," guidance of " Ring Leaders," experts in their fields, to provide assistance to new and experienced Web users; research, editing and Web-site development services; an educational vendor directory to aid users in locating goods and the online curriculum resources in the Cul De Sac area. Ellis said the varied "Black History Month All Year Long" online curriculum includes materials about the Underground Railroad, Martin Luther King Jr., slavery, pioneers, original Anansi folk tales in e-book form, Amistad and African-American contributions to science, literature, music, art and film. "Teachers should find enough materials to allow them to include 'Black History Month All Year Long' as part of their classes all year," she said. A preview of the curricula is available at: Also available on the portal, is access to "Standing in the Shadows of Motown WebQuest," a collaborative education project that integrates technology, literacy, film, history, art, and music into the classroom. Under development is the American Virgin Islands Online Curriculum, which Ellis said will provide a "missing part" of U.S. history, particularly in regard to the slave trade. There is also The National Children's Folksong Repository where you can integrate literacy, music, and technology into the classroom. U.S. history and social studies textbooks of past decades have ignored the American Virgin Islands, she said. "Such multicultural, diverse content now is possible with online resources. We produce and publish unique, fresh and accurate interdisciplinary K-12 online curricula for a diverse multicultural population that print publishers have never included in the traditional school textbooks." Such efforts to increase Internet resources for educators and to provide interactive, interdisciplinary studies have brought the Educational CyberPlayGround attention from national news and trade publications. MacWorld Magazine has chosen the Educational CyberPlayGround one of the 50 best sites for "high-quality education on the Web." Earthlink.net featured the portal in its bLink Magazine in August 2000. The bLink profile described Ellis as using "her experiences teaching movement, dance, and elementary education to young people in the U.S. Virgin Islands" to create the Educational CyberPlayGround as "a learning site that celebrates diversity in students' background while highlighting the variety in students' preferred approaches to learning." USA Today in January 2000 selected Educational CyberPlayGround as one of its "Best Bets for Educators." The Educational CyberPlayGround also has been a USA Today "Hot Site," in both its online and print editions; and a "Web Pick" of MSNBC News online, and the New York Times featured the portal in the New York Times on the Web Learning Network. " The Educational CyberPlayGround provides teachers, parents, librarians, home-schoolers and regular folks to a 'webliography" of links to educational resources," USA Today wrote. The Times noted that the site provides opportunities for parents, teachers and librarians, even with limited online experience, to learn how to use the World Wide Web to provide more effective teaching. "The site offers well organized links in the areas of curriculum, arts, the Internet, linguistics, music, teachers, literacy and technology," the Times stated. The Internet provides several advantages in regard to providing such curricula, Ellis said. The space available on the Web, for example, allows the opportunity to target information to numerous ethnic and cultural groups. Future plans for the Educational CyberPlayGround include providing increased resources for dialect speakers. "A dialect is simply a language without an army or a navy," Ellis said. "It's a legitimate language with rules just like every other standard language has." Creole speakers will eventually be able to read the resources of the Educational CyberPlayGround in their own dialect. Ellis said the Internet also provides the opportunity for frequent updates and rapid, if not immediate, corrections of course materials. "Course materials should be fresh and accurate, and we have zero tolerance for false and misleading information or any kind." Another advantage, she said, is that students can become active, or perhaps interactive, participants in their own education:"Online learners have a multisensory experience, when combining audio, video, text and graphics. They can control the information they want and also get it when they want it on a need-to-know basis. It's called just-in-time learning. When motivated -- you can learn anything and that is simply the key to all success. Ellis said that the current computer environment provides today's students with a different way of interacting with information compared with their parents and grandparents. " These folks are used to television, movies, radio, newspapers, magazines and books which presents information in what called a 'linear learning style.' They never had control over how they were given the information. The flow of information was predetermined by the providers of the information. Those days are gone." Ellis said the industrial revolution and the "factory model" of education are over. "Children learn very differently now; we all do. Technology allows the learner to be interactive and control how they take in the information. Learners can direct the flow, modify speed, complexity and manner of presentation, allowing for collaborative learning -- collaborative teamwork is what is used as the business model today." "Online curricula gets children prepared for the future and everyone off on the right foot," said Ellis, trying, as her favorite teachers, to provide good building blocks for today's students.
<urn:uuid:5f5737af-0660-4936-8510-f59ee0654eff>
CC-MAIN-2017-34
http://www.edu-cyberpg.com/AboutUs/oaklane.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102393.60/warc/CC-MAIN-20170816191044-20170816211044-00627.warc.gz
en
0.95018
2,131
2.796875
3
2.97613
3
Strong reasoning
Education & Jobs
Culture radicalism and technological experimentation inspires art, the meaning of which is the subject of heated debate between artists of the old school and ones exploring new aesthetics. Anti-establishment underground art emerges as a counterreaction to established avant-garde art. A young generation of artists begins to make electronic music and computer art, and in the early 1960s, Yleisradio adopts video technology for TV use. Experimental expression expands multidimensionally in the fields of film, radio art, sculpture, dance, theatre, happening and poetry. The potential of electronics and electronic sound is explored with transistor technology and early digital device innovations. - Bengt Johansson realises Finland’s first electronic tape music work Kolme elektronista harjoitelmaa (translates as Three Electronic Studies) for YLE. The synthetic sound material is generated with oscillators. The work is presented at the Nordic Music Days in Stockholm. - YLE organized Finland’s first four-channel electronic music concert at the University of Helsinki. - In the Summer, two Ampex VR-1000 video recorders arrive at YLE’s television studio and television switches to using recoding video technology. During the first months, art and music performances are recorded on video tape for use in later transmissions. - The first portrait produced on a computer in the style of ASCII art is printed on an IBM-machine in the Amerikka tänään (translates as America today) exhibition. The subject of the picture is president Kekkonen. - Seppo Mustonen creates a computer program in the electronics department of the Finnish Cable Factory. The program creates and plays real-time generative computer music. - Wayne Wiitanen, of Finnish origin, conceives the Spacewar! game at MIT, one of the most significant early interactive video games developed for the digital computer. - Riitta Vainio performs the dance piece Kotka (translates as Eagle) live on Yleisradio’s television show Studio 1. This is the first performance of modern dance on Finnish television. Later, Eino Ruutsalo realises background projections for Vainio’s performances and produces the short film Kotka. Vainio continues interdisciplinary collaboration with visual artists and musician throughout the 1960s. - Eino Ruutsalo’s short film Kaksi kanaa (translates as Two Chickens) with music by Otto Donner. - Erkki Samenhaara’s sound piece and sculpture Sävellys ferrofonille (translates as Composition for Ferrophone) is based on a large metal plate that is played. - Erkki Kurenniemi draws computer graphics for a cathode ray tube on the University of Helsinki’s Nuclear Physics department’s EAI Pace TR-48 analog machine and publishes the article Kokeita analogialaskijalla (translates as Experiments on an Analogue Calculator). - The Electronic Music Studio of the University of Helsinki is started by musicology professor Erik Tawaststjerna’s decision. Volunteer assistant Erkki Kurenniemi is responsible for the operation. - Kurenniemi presents the University of Helsinki’s studio at Stockholm’s Elektroniska Festspel and Iannis Xenakis tells about the potential of computers in music. - Ken Dewey directs happenings in Helsinki, in which among others Terry Riley, Jan Bark and Finnish artists take part. YLE TV1 broadcasts The Pasila Piece, a TV happening filmed in the studio. - Liisa Tenkku teaches sound based music education at the Finnish co-educational school. Pupils make audio works from the sounds they record with a reel-to-reel tape recorder. In the 1970s, Tenkku and Ellen Urho develop a method for teaching sound and publish instructions for producing sound works in their textbooks. - Ensio Suominen and Olli Hämäläinen implement the first visualization of electronic music. 3.5.1964 TV2 screens a programme based on Reijo Jyrkiäinen’s electronic works on the Musiikin maailmasta (translates as From the World of Music) show. - Merce Cunningham’s Dance Company performs in Helsinki and Turku. A film recording of the Helsinki performance is published. The company’s composer-musicians John Cage and David Tudor record Cage’s Atlas Eclipticalis at YLE’s studio on Kasarmikatu. The finishing touches are left to sound engineer Reijo Jyrkiäinen, who mixes the multitrack recordings together. - Kurenniemi experiments with digital circuits and makes recordings on a self-built integrated synthesizer that combines digital and analogue technology. - Henrik Otto Donner and Ismo Kajander produce the melodic installation Musiikkikone (translates as Music Machine). - Eino Ruutsalo’s short film Hyppy (translates as “The Jump”) with music by Erkki Kurenniemi and Otto Donner. - A seminar of Algorythmic music is organized during the Jyväskylän Kesä event, where Erkki Kurenniemi presents an integrates synthesizer. - The performers of Katri Nironen’s experimental speech choral work Agadir explore the boundaries of the human voice using performing arts, physical movement and electronic amplification. - Väinö Kirstinä’s poem Luonnollinen tanssi (translates as Natural dance) is aired on the Runostudio radio programme. Tytti Paavolainen’s recitals are augmented by electronic sounds and voice that is manipulated in the studio. - At Turku students’ art event, sound art gets its own place in the programme. The event also presents two computer compositions and computer graphics by Ulla Huttunen (Pursiheimo) - Antero Takala’s video work Juopunut pursi (translates as The Drunken Yacht) is based on Erkki Salmenhaara’s music and Arthur Rimbaud’s poem. Its experimental visuals, filmed on video tape at the YLE studios, use multi-camera technique. The work uses image manipulation, special effects, smoke and unfocused image and marks the beginning of Finnish video art. - Jan Barkin’s (SE) and Erkki Kurenniemi’s Spindrift is the first experimental computer animation in the Nordic countries. The piece is shown in Dipoli’s computer music seminar in 1967 and on Swedish television SVT in 1968. - Helsinki City Theatre starts using compute-based stage lighting. - Katri Niironen founds Collegium Artium. The group combines physical movement, sound, electronic music and projection and gains recognition in Europe. At the Venice Biennale in 1970., an international jury selects the performance Strontium as one of the three best performances. - Erkki Salmenhaara’s Information Explosion is the first tape music recording release in Finland. - Literary magazine Parnasso starts publishing film and television critiques and Finnish translations of texts by Hans Magnus Enzenberger and Marshall McLuhan as well as Keith Allsop’s essay Muzak. - Eino Ruutsalo builds the Valo ja liike (translates as Light and Movement) exhibition. The exhibition space of the Amos Anderson museum transforms into a kinetic light and sound experience that includes experimental films. - Osmo Valtonen realizes his first kinetic works, which are presented in a solo exhibition at gallery Pinx. - J. O. Mallander publishes the audio disk Extended play with only one word, “Kekkonen”, constantly repeated. - At the Sähköshokki (translates as Electrical Shock) evening at the Old Student House, Erkki Kurenniemi modulates Claes Andersson’s and Kalevi Seilonen’s poetry recitals with the synthesizer he built. - Peter Widén’s film Taiteen kuolema (translates as The Death of Art) is screened at Sperm’s concerts. The explicit sex depiction in the film leads to Widén prison sentence, and the authorities destroy the film reel. - At the Students’ Art Event in Dipoli, the relationship between art and technology is discussed. The event, which introduces artwork, performance art and experimental film is a roaring success. At the seminar, Erkki Kurenniemi presents a music terminal for networked computers and M. A. Numminen the Melody Machine of the Sähkökvartetti (translates as Electronic Quartet). Markku Nurminen introduces computer tango, Jaakko Malmivuo’s electronic rhythm machine accompanies the band Surprise, and Otto Donner loops recordings of his band’s live performance in concert. Timo Aarniala realizes a psychedelic light show for the event with prepared slide projector, oil and dyes. - In Dipoli, President Kekkonen switches on the largest acoustic-kinetic sculpture in Finland. The seven meter high sculpture Käpy (translates as Pine Cone) by Reijo Perkko, Heikki Koivikko and Philip Donner opens and closes and produces a sound event designed by Donner. - In a radio show broadcast by YLE, a team of experts compete against the computer of the University of Tampere in trying to guess the author of a text by hearing an excerpt. - Photokinetic works by Veikko Eskolin, Esa Lauremaa, Aimo Taleva and the Aloha group in the Exhibition of Young Artists. - The laboratory of Strömberg Oy begins to manufacture keyboard-controlled colour-music apparatus, i.e. light organs. - Osmo Lindeman establishes a home studio for electronic music and orders the sequencer-oscillator Dico from Erkki Kurenniemi.
<urn:uuid:d0597692-9060-4c9d-9ead-5d9652d2848d>
CC-MAIN-2023-50
https://media-art-finland.fi/en/media-art-history-in-finland/timeline-of-finnish-media-art/the-1960s/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100555.27/warc/CC-MAIN-20231205172745-20231205202745-00375.warc.gz
en
0.855953
2,173
2.8125
3
2.750045
3
Strong reasoning
Art & Design
Editor’s Note: Nelson Tull is a graduate student in the Department of Civil, Construction, and Environmental Engineering at North Carolina State University. With adviser Casey Dietrich, he is conducting research to improve hurricane and storm surge guidance to emergency managers of the coastal counties in the state. They are collaborating with Rick Luettich at the University of North Carolina at Chapel Hill Institute of Marine Sciences, Brian Blanton at the Renaissance Computing Institute (known as RENCI), and Jason Fleming with Seahorse Coastal Consulting. This research is funded by the National Consortium for Data Science, based on a previous project supported by North Carolina Sea Grant. Storm surge model forecasts are a critical tool coastal emergency managers use to plan and make decisions. These models must be both accurate and fast, to give reliable information in a timely manner as a storm moves toward the coast. Then the forecast guidance must be visualized in a way that is meaningful to end users. We use ADCIRC, a powerful computer model that can predict coastal flooding due to storm surge on regional and even continental scales. During a tropical cyclone event, ADCIRC is run every six hours when the National Hurricane Center issues a storm advisory. The image shows the model-predicted storm surge in coastal North Carolina for Hurricane Matthew Advisory 27, which was issued on Oct. 4, 2016, four days before the center of the storm moved past Wilmington, NC. This advisory called for a stronger storm and thus greater surge than actually occurred. Model forecasts are currently visualized using Kalpana, a computer program developed with support from North Carolina Sea Grant that converts the model results into visual formats that are easily understood and useable by local stakeholders. The image below is an example of one such format (ArcGIS). North Carolina Emergency Management (NCEM) needs forecasts of the maximum flooding that is expected to occur along the coast during a storm event to make evacuation decisions and develop damage estimates. Although our model provides water level predictions from the deep ocean all the way to the coastal floodplains, the extent of the predicted overland flooding may be limited by the model resolution. The model may not include topographic features, such as roadways or narrow stream channels, at scales smaller than about 200 to 500 feet due to concern over computational time. As a result, there may be locations where the model flooding extent is an underprediction. The elevation dataset used by the NCEM has higher resolution and is well-suited for the task of determining the true flooding boundary. Continuing from a North Carolina Sea Grant project and with new support from the National Consortium of Data Science, we are developing a method to improve prediction of the true flooding extent by combining the results of the model with the more accurate elevation datasets. To perform this prediction of the flooding extent, the new project uses a Geographic Information System (GIS) called GRASS GIS that specializes in processing very large amounts of data. Because the goal of the project was to improve the flooding extents across the entire coast of North Carolina, the elevation dataset was very large, and therefore GRASS GIS was the ideal tool to use. The project has two major objectives. The first was processing the modeled water levels and the elevation dataset together, producing a map showing the extent of predicted flooding. When the modeled water levels are greater than the elevation of the land, these water levels at the boundary of the flooded region in the model are extended outward into neighboring, unflooded areas in the dataset. This results in more accurate surge forecasts through the enhanced resolution of overland flooding. By enhanced, we mean that the model results have been mapped to the higher-resolution datasets and extended further into the estuaries and floodplains. The result is illustrated in the image below. The second major objective was speed. Because the model is used for real-time forecasting during storm events, it is critical for the process to be fast. From a practical standpoint, NCEM needs to know how high the water will be and where flooding will occur, and they need to know this information as fast as possible. Therefore, for the process to be fast, the enhanced-resolution program has to use methods that can work efficiently with large amounts of data. After exploring several methods and trying different ways of structuring the program, we developed a process that requires 15 to 20 minutes to run, depending on the complexity of the storm. This new technology is slower than the existing visualization methods, because the lower resolution means they can be run quickly (e.g., dark blue region in Figure 2). But the new visualizations are more accurate (e.g., light blue regions in Figure 2) than what is currently available, and they can still be provided to NCEM in a timely manner to help them make better decisions. This process will become part of the current workflow at Seahorse Coastal Consulting and RENCI that includes running the ADCIRC storm surge model for every forecast advisory during an approaching storm. Our goal is to turn around the model forecast in 60 to 90 minutes, immediately followed by the 15- to 20-minute, enhanced-resolution program. This new and improved guidance is being shared with NCEM during the 2017 hurricane season. While this project has given state emergency managers in North Carolina new capabilities, we would need additional work to apply this method to different coastal regions, such as Louisiana or Texas. In addition, we continue working to improve the speed of the program, because for those who live on the coast and those in charge of protecting them, every minute of preparation counts when a storm is approaching.
<urn:uuid:2425bbc5-18eb-4cb8-b464-0b638e8a8f28>
CC-MAIN-2021-04
https://ncseagrant.ncsu.edu/currents/2017/08/fast-accurate-forecasts-of-coastal-flooding/
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703520883.15/warc/CC-MAIN-20210120120242-20210120150242-00387.warc.gz
en
0.948645
1,135
2.546875
3
2.976313
3
Strong reasoning
Science & Tech.
Philadelphia, Pa. — Fetal echocardiography is increasingly used to detect congenital heart defects before birth, although whether prenatal diagnosis benefits children with heart disease has been questioned. A new study by The Children’s Hospital of Philadelphia suggests that newborns with a severe, life-threatening defect called hypoplastic left heart syndrome (HLHS) are less likely to have early neurologic problems, such as seizures or comas, if HLHS is diagnosed before birth. The researchers found that prenatal detection of the heart defect allowed better treatment, such as delivering the baby in an advanced, high-risk nursery, and promptly providing the drug prostaglandin to maintain blood flow until the first stage of reconstructive surgery can be performed. Compared to newborns with HLHS diagnosed after birth, infants diagnosed prenatally were half as likely to experience seizure or coma prior to or within 6 weeks of their surgery. The research was reported in the June 2001 issue of the journal Pediatrics. Children with HLHS are born with a severely underdeveloped left ventricle, but may appear healthy at birth. When a blood vessel in a newborn’s heart called the ductus arteriosus closes within a few days of birth – a normal event – a baby with HLHS has severe circulation problems because of the heart defect. "If diagnosis of HLHS is delayed, severe organ damage may occur, especially to the brain," says William T. Mahle, M.D., an attending cardiologist at The Children’s Hospital of Philadelphia, and lead author of the current study. "Our study was the first to examine an association between prenatal diagnosis and early neurological events. We will continue to follow these children to see if there is any effect on their cognitive function as they develop." The researchers studied 216 newborns with HLHS referred to Children’s Hospital for heart surgery between 1992 and 1997, 79 of whom were diagnosed prenatally. The study was part of a larger project studying the neurological benefits of a drug used in infants with heart disease. The researchers found survival rates after the first stage of surgery to be the same, 74 percent, regardless of whether HLHS was diagnosed before or after birth, a result consistent with previous studies at other centers. Since the period of that study, added Dr. Mahle, survival rates have continued to improve. At Children’s Hospital, 86 percent of infants with HLHS survived the first stage of surgery from January 1999 to April 2000. Before the advent of this surgery in the early 1980s, HLHS was invariably fatal. Surgery for the condition is now performed in three stages during the first one to two years of life. "As survival rates for HLHS and other congenital heart disease have soared over the past 20 years, physicians have been better able to concentrate on longer-term quality of life for these children," said Dr. Mahle. "Recent data from the Cardiac Center at Children’s Hospital and other pediatric centers suggest that long-term neurological outcomes such as I.Q. may be improving in children who underwent complex heart surgery as infants, including children with HLHS." However, children with HLHS remain at a higher risk of long-term cognitive and neurological problems, compared to children with other heart defects. "Those long-term neurological problems may result both from early complications of the disease, and from the need for circulatory arrest during the surgery," says Dr. Mahle. "We hope to show that prenatal diagnosis, in addition to reducing short-term neurological problems, also improves long-term functioning. We will follow the children in the study as they attain school age to assess how well they’re doing cognitively and neurologically." Co-authors of the study with Dr. Mahle are Robert R. Clancy, M.D., and Susan P. McGaurn, of the Division of Neurology; and Bernard J. Clark, M.D., of the Division of Cardiology, all of Children’s Hospital; and James E. Goin, Ph.D., of the DataMedix Corporation, of Media, Pa. The study was supported in part by the National Institutes of Health. Founded in 1855 as the nation's first pediatric hospital, The Children’s Hospital of Philadelphia is ranked today as the best pediatric hospital in the nation by a comprehensive Child Magazine survey. Its pediatric research program is among the largest in the country, ranking second in National Institutes of Health funding. Materials provided by Childrens Hospital Of Philadelphia. Note: Content may be edited for style and length. Cite This Page:
<urn:uuid:b85ae392-2730-4b25-9f0c-939b5cd1c402>
CC-MAIN-2017-22
https://www.sciencedaily.com/releases/2001/06/010605075215.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607636.66/warc/CC-MAIN-20170523122457-20170523142457-00485.warc.gz
en
0.963937
945
2.90625
3
2.976184
3
Strong reasoning
Health
Child Care Safety, Health, and Security KinderCare cares for your child like you would. Education and development are important, but we know that nothing matters more than the safety, security, and health of your child. That’s why protection and preparedness are critical considerations in everything we do. Setting a new health and safety standardOur teachers and staff undergo extensive training on health and safety practices, including pandemic-response protocols so you can rest assured your child is in good hands. Since the beginning of the pandemic, the transmission rate of COVID-19 in our centers has stayed below the community average, which means our approach has set a new standard within the child care industry. We work closely with expert medical partners including Pediatric Disaster Preparedness Doctors, and we follow CDC guidelines on the ongoing and evolving protocols. Learn more about our enhanced procedures including vaccine updates. Protecting your child's health and safety From first aid training for emergency situations to sanitation and ensuring a clean and healthy environment for children, we have more than 50 years of experience ensuring that every child is happy and healthy. Although scraped knees are a part of growing up, you can have confidence that your child is cared for in a secure, nurturing environment every day. - Our high-quality playground equipment is safe, sturdy and tested monthly by our facilities technicians to ensure it is secure and in good working order. - We have safe fall zones with soft landing areas if your child takes a tumble. - All outside play areas are wrapped in secure fencing. - We assess every child’s health by talking with parents and monitoring for symptoms during the course of each child’s day with us. We increase assessment during flu season. - We notify parents when a child does not feel well to help prevent an illness from spreading. - We clean our centers each day with safe, non-toxic cleaning products. - Cleaning supplies are locked safely out of reach of children. - While other child care providers clean toys each evening, KinderCare sanitizes toys throughout the day to help prevent the spread of germs. - We encourage children to wash their hands throughout the day by singing songs and teaching lessons about health and hygiene. - Diapering is conducted in an area separate from children’s play areas. - We have strict policies for administering medication to your child to ensure they are protected. - Based on new research about healthy practices for infants and toddlers, we require a doctor’s note for any medication, prescription or over the counter, given to a child under 2 years to ensure safety. - Our centers are secured so that only authorized staff and families may enter. - Safe, secure perimeters ensure that children can enjoy outdoor play safely. - We use safety gates, window guards (except fire escapes) and cap electrical outlets. - Our centers include smoke detectors and fire extinguishers. - Radiators and heaters are covered to prevent your child from touching something hot. - We have dedicated, friendly caregivers who are trained in child development, early-childhood education or a related field. - We conduct criminal background checks to ensure trustworthy staff and passionate teachers provide the best care and education for your child. - Our staff and teachers are trained in first aid and CPR. - We are serious about training for earthquakes, fires and lockdown situations. - We have an emergency evacuation plan at each center. - We don’t just have a plan, we regularly test and train so our people are ready. - All perishable food is refrigerated. - Our menu is planned by a registered dietitian so your child eats nutritious foods. - We welcome breastfeeding mothers, and we have careful policies for separating breast milk from formula. - Only pre-approved people with photo identification may pick-up your child.
<urn:uuid:5b4f2a39-656e-47b5-a14e-b52591d547f7>
CC-MAIN-2021-49
https://www.kindercare.com/our-centers/inside-kindercare-centers/child-care-safety
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363791.16/warc/CC-MAIN-20211209091917-20211209121917-00077.warc.gz
en
0.933828
829
2.734375
3
1.95503
2
Moderate reasoning
Health
This section is from the book "Hill's Manual Of Social And Business Forms: A Guide To Correct Writing", by Thos. E. Hill. Also available from Amazon: Hill's Manual Of Social And Business Forms: The How-To-Do-Everything Book Of Victorian America. THE dinner-hour will completely test the refinement, the culture and good breeding which the individual may possess. To appear advantageously at the table, the person must not only understand the laws of etiquette, but he must have had the advantage of polite society. It is the province of this chapter to show what the laws of the table are. It will be the duty of the reader, in the varied relations of life, to make such use of them as circumstances shall permit. Sit upright, neither too close nor too far away from the table. Open and spread upon your lap or breast a napkin, if one is provided - otherwise a handkerchief. Do not be in haste; compose yourself; put your mind into a pleasant condition, and resolve to eat slowly. Possibly grace will be said by some one present, and the most respectful attention and quietude should be observed until the exercise is passed. It is the most appropriate time, while you wait to be served, for you to put into practice your knowledge of small talk and pleasant words with those whom you are sitting near. By interchange of thought, much valuable information may be acquired at the table. Do not be impatient to be served. "With social chitchat and eating, the meal-time should always be prolonged from thirty minutes to an hour. Taking ample time in eating will give you better health, greater wealth, longer life and more happiness. These are what we may obtain by eating slowly in a pleasant frame of mind, thoroughly masticating the food. If soup comes first, and you do not desire it, you will simply say, "No, I thank you," but make no comment; or you may take it and eat as little as you choose. The other course will be along soon. In receiving it you do not break the order of serving; it looks odd to see you waiting while all the rest are partaking of the first course. Eccentricity should be avoided as much as possible at the table. The soup should be eaten with a medium-sized spoon, so slowly and carefully that you will drop none upon your person or the table-cloth. Making an effort to get the last drop, and all unusual noise when eating, should be avoided. Fig. 9 The general arrangement of the table set for a party of twelve persons. The plates are often left off, and furnished by the waiter afterwards. Fig. 10. Relative position of plate, napkin, goblet, salt-cup, knife and fork, when the table is set. If asked at the next course what you desire, you will quietly state, and upon its reception you will, without display, proceed to put your food in order for eating. If furnished with potatoes in small dishes, you will put the skins back into the dish again; and thus where there are side-dishes all refuse should be placed in them - otherwise potato-skins will be placed upon the table-cloth, and bones upon the side of the plate. If possible, avoid putting waste matter upon the cloth. Especial pains should always be taken to keep the table-cover as clean as may be.
<urn:uuid:b91b72ec-ba32-46c1-8e5f-37481f8a75fa>
CC-MAIN-2017-39
http://chestofbooks.com/business/reference/Social-Business-Forms/Etiquette-Of-The-Table-The-Table-How-To-Set-And-Arrange-It.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687582.7/warc/CC-MAIN-20170920232245-20170921012245-00141.warc.gz
en
0.94808
709
2.6875
3
2.189412
2
Moderate reasoning
Food & Dining
(NaturalNews) The Breast Cancer Fund recently tested 12 brand name canned soup and pasta products and found bisphenol A, or BPA, in all of them. BPA is a hormone-mimicking toxin that also has recently been found to impact our DNA and to kill off female ovarian cells in a way that may cause Down Syndrome and fertility problems in future generations. While BPA shouldn't be in any of us, children are thought to be the most susceptible and the soups and pastas tested were marketed toward children. In the testing, 34 to 148 parts per billion of BPA were found in the soups and 10 to 34 ppb in the pastas. A few months ago, the FDA also found BPA in 71 of 78 canned goods they tested. The FDA also tested different types of foods, including canned tuna and vegetables, and in these foods they found much higher levels of BPA - ranging from 300 ppb to more than 700 parts per billion. Some research shows that BPA is eliminated quickly from the body, but the problem with this research is that it looks at it from a one-time dose situation, as opposed to a more true to life repeated exposure situation. And with continual exposure, it tends to accumulate. Canned foods are also not the only foods contaminated with BPA; it's also in plastic wrapped food products. And according to Environmental Working Group research, it's in the blood of 9 out of 10 infants at birth. Cheryl Rosenfeld and her colleagues from the University of Missouri, Columbia looked at BPA exposure from a different angle and tested mice with a more true to life scenario. They fed these mice food laced with a little BPA each day and found that with chronic dietary exposure, the animals exhibited "the potential to bioaccumulate BPA over time." Then Rosenfeld tells us that there's no reason to expect the human body would respond any differently. The researchers also found that BPA absorbs in the body in a greater degree when it is consumed with food, rather than taken as a one-time dose without food. "What we found," Rosenfeld said, "is that when animals are exposed through the diet, they actually show increased absorption of BPA" as opposed to when they get a single larger dose. [Editor`s Note: NaturalNews is strongly against the use of all forms of animal testing. We fully support implementation of humane medical experimentation that promotes the health and wellbeing of all living creatures.] Kim Evans is a natural health writer and author of Cleaning Up! The Ultimate Body Cleanse. Cleaning Up! offers deep cleansing and using methods in this book, people have gotten rid of dozens of different types of health problems, as well as just losing excess weight, thinking more clearly, and feeling better. Kim's next book chronicles events in her life that happen to match patterns in the Bible. She's also found three places in the Bible that tell us its about these patterns and even asking you to match them. Here's a little from the upcoming book... In Isaiah 22:20, it says, "And it must occur in that day that I will call my servant, namely Eliakim." But, because these prophecies are cryptic and they aren't meant to be understood until they are understood, it's only the last three letters. A few lines later, it says, "From the land of Kittim it has been revealed to them." Here, you just take out any three middle letters, and again, it's the name of the person bringing you this message, or the sacred secret of the prophecy. Actually, if you take those two passages, Kim is about the only name you can get from both of them. In Numbers 1:1 – 1:18, it's talking about "the family" and mentions Pagiel. It also twice mentions February 1st, (Kim's birthday) and then says that the youngest is 20 years old. Kim's little sister Paige is currently 20 years old. In Chronicles 1 11:20 it mentions the brother of Joab and then in the same sentence uses the word brandishing. Kim's middle name is Jo and her older sister's name is Brandi. There are other patterns to her sisters too but these sort of mention them by name. Of course, it helps if you know that there is a magical spiritual reality available that comes deep cleansing and often major dietary upgrades. It's also why Jesus was teaching the same thing, if you find his teachings in the Essene Gospel of Peace. In this text, he even says things like, "You'll never see the father unless you clean your colon." But, this is paraphrased... In the Bible Jesus says things more like, happy are those who wash their robes, as they can enter the tree of life. The tree of life is elsewhere explained as God's paradise. He also said, first clean the inside of the cup and then the outside will also be clean. Kim's book Cleaning Up! is here http://www.cleaningupcleanse.com. You can also preorder The Sacred Prophecies Have Been Fulfilled here. It shouldn't be long.
<urn:uuid:ed302498-229d-406e-80ef-eb8441fa89e6>
CC-MAIN-2014-49
http://www.naturalnews.com/033818_canned_foods_BPA.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931004885.2/warc/CC-MAIN-20141125155644-00202-ip-10-235-23-156.ec2.internal.warc.gz
en
0.970024
1,064
3.015625
3
2.846179
3
Strong reasoning
Health
Last year I read a read an online story about some teachers who were flipping their classrooms. I do not recall the school in question, however, a comparable example of a flipped school could be Clintondale High school in Michigan. I found this an interesting perspective, and an unique perspective to the use of technology in the furtherance of student understanding. I tried to flip a unit in my own classroom to see if this was something that would benefit my practice and subsequent student success…it didn’t. There were probably many ,many reasons why I didn’t experience success, not the least of which was only trying it once, however the bigger difference, from my perspective is the difference between flipped learning and a flipped classroom. While my experience was not as successful as I might have liked it to be, It did cause me to think about how technology will ultimately end up, in the foreseeable future anyway, manifesting itself in the classroom. This became the focus in my search for a review piece this week. In the end I settled on a video featuring Monique Markoff speaking at Ithica college on the concept of blended teaching and learning. Blended learning , as the video identifies, is the integration of technology to facilitate learning, not the focus of learning. Markoff suggests in the video that the goal of a blended environment is to use technology as a learning device not a device to be learned. A subtle difference but one that should be considered. How often do we as teachers have students research using, texts books and magazines in order to create a PowerPoint, MovieMaker, or some other platform? Too often the amount of time spent learning the animation and methods to convert backgrounds into eye dissolving combinations of fuchsia and lime green, far exceeds that given to accessing individual methods of source information and medium to use as presentation. Worse still is the possibility that the assessment links more to the tool than to the message. This truly is the medium becoming the message in the truest sense of the word. Identifying that this is not best practice in the implementation of technology Markoff identifies different models of technology integration into the classroom, with the traditional ‘everyone get a computer’ model as only one of the potential methods to allow students the opportunity to interact with technology in a more self determined way. Markoff identifies a number of models (2:49) ranging from the rotational model which allows for multiple orientations from student to peer, to student to teacher, or student to technology. Perhaps most important is the assurance that there is no one way that incorporating blended learning is right or wrong. Rather that true blended learning occurs in a flexible environment that is willing and able to take risks and make changes when things are not working. This to me presents one of the biggest challenges to teachers and the integration of technology. Hesitation for risk taking. There is tremendous pressure on teachers to get results, abandoning a plan midway through its execution would probably throw most teachers into a state of panic. Yet ‘how’ technology, ‘what’ technology and ‘when’ to use technology will not always, if ever, follow the plans that we create, regardless of our greatest intentions. Ultimately it doesn’t matter which app is the newest or greatest, if there is preconceived beliefs about technology on any of the stakeholder parts, there will be hiccups in the process. All members may have to abandon notions of value, or what is, or is not, educational in order to find the best way to integrate technology into the classroom. I have to admit that I struggle with some notions myself. I share Cindy Adams concerns on ‘authentic’student motivation, when choosing a reward as a motivator vs some internal compass then guides us to make decisions around our learning. Or as Barbara DeWitt identified in her blog on the evolution of language…why can’t students just change their ‘txting 2 read RL wrds’? These concerns exist in my concepts of education and technology and are as foreign to students as as theirs may be to me. Letting go of some of these and taking that risk of potential failure is key to finding out how technology will not just be a branch of our instruction. As mentioned in the outset, I tried flipping a class… I failed, but out of that failure my class found aspects of success. There is more to the integration of any technology than simply introducing an app or hyper-linking a website. buzz-words and trends are useless without input and tailoring from educators who are looking to ultimately advance students learning. After all technology, regardless of how flashy it maybe will fail as quickly as traditional chalkboard lessons, if not tailored to the students it is intended to reach.
<urn:uuid:704cac1f-2dad-45dd-bf53-06a2cbd2b3b3>
CC-MAIN-2017-43
https://icogit8.wordpress.com/2015/10/05/blended-learning-environments-the-future-role-of-technology-in-the-classroom/comment-page-1/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823630.63/warc/CC-MAIN-20171020025810-20171020045810-00714.warc.gz
en
0.967141
972
2.984375
3
2.987788
3
Strong reasoning
Education & Jobs
An in-depth report on the causes, diagnosis, and treatment of MS. What Is Multiple Sclerosis? - Multiple sclerosis (MS) is a chronic disease that affects the central nervous system. MS is thought to be an autoimmune disease. In MS, the body's immune system produces an inflammatory response that attacks myelin, a fatty substance that protects nerve fibers. - The cause of MS is not known. It is not an inherited disease, but it appears that genetic factors make some people more susceptible to developing MS. - MS affects significantly more women than men. Most people first notice symptoms between the ages of 20 to 50. - The course of MS varies among people. The disease may be mild, moderate, or severe. Most people have the relapsing-remitting form of MS in which flare-ups (also called relapses or exacerbations) of symptoms are followed by periods of remission. - Symptoms of MS include fatigue; vision problems; difficulty walking; muscle weakness, stiffness, and spasms; and bladder and bowel problems. Not all people have all symptoms. People with MS are treated with medications and rehabilitation. Nine disease-modifying drugs are approved to treat MS. These drugs can help reduce the frequency and severity of relapses, and slow disease progression and disability. Drugs approved by the Food and Drug Administration (FDA) are: - Interferon beta-1b (Betaseron, Extavia) - Interferon beta-1a (Avonex) - Interferon beta-1a (Rebif) - Interferon beta-1a (Plegridy) - Glatiramer acetate (Copaxone) - Natalizumab (Tysabri) - Mitoxantrone (Novantrone) - Fingolimod (Gilenya) - Teriflunomide (Aubagio) - Dimethyl fumarate (Tecfidera) - Daclizumab (Zinbryta) Complementary and Alternative Therapies In 2014, the American Academy of Neurology (AAN) released guidelines for the use of complementary and alternative medicine (CAM) therapies in treating MS symptoms. Among the treatments that may be possibly effective: - Prescription oral synthetic marijuana pills and spray for treating spasticity and pain (the AAN found insufficient evidence to recommend for or against smoked marijuana) - The herb ginkgo biloba for treating fatigue (but not thinking or memory problems) - The acupressure technique reflexology to ease tingling and burning nerve sensations
<urn:uuid:2d83c351-66ca-4960-9c16-aca3a1b4f384>
CC-MAIN-2021-04
https://www.sutterhealth.org/diseases-conditions/neurologic-disorders/spmf-ms
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703519923.26/warc/CC-MAIN-20210120054203-20210120084203-00415.warc.gz
en
0.896286
553
3.53125
4
2.176419
2
Moderate reasoning
Health
In Language Online, David Barton and Carmen Lee investigate the impact of the online world on the study of language. The effects of language use in the digital world can be seen in every aspect of language study, and new ways of researching the field are needed. In this book the authors look at language online from a variety of perspectives, providing a solid theoretical grounding, an outline of key concepts, and practical guidance on doing research. Chapters cover topical issues including the relation between online language and multilingualism, identity, education and multimodality, then conclude by looking at how to carry out research into online language use. Throughout the book many examples are given, from a variety of digital platforms, and a number of different languages, including Chinese and English. Written in a clear and accessible style, this is a vital read for anyone new to studying online language and an essential textbook for undergraduates and postgraduates working in the areas of new media, literacy and multimodality within language and linguistics courses. "Language Online introduces the reader to key concepts and themes in the study of digital language and discourse: multilingualism and linguistic diversity, self-presentation and stance-taking, language ideologies and learning. The authors offer clear definitions, a rich set of examples, valuable suggestions on research methodology and innovative insights into their own interpretations. Language Online achieves a remarkably good balance between cutting-edge research and reader-friendliness." - Jannis Androutsopoulos, University of Hamburg, Germany "Using a methodology grounded in both linguistics and digital literacies, Barton and Lee provide a valuable introduction to studying language online. They also carefully define terms and concepts that are used in both of these fields and are central to the study of language online--text and practices, among others…This volume will interest those who want to understand how language is changing as a result of new technologies and those pursuing their own research into language use online." - A. M Laflen, Marist College, USA in CHOICE 1. Language in the Digital World 2. Ten Reasons Why Studying the Online World is Crucial for Understanding Language 3. Acting in a Textually-Mediated Social World 4. Hello! Bonjour! Ciao! Hola! Guten Tag!: Deploying Linguistic Resources Online 5. Taking up the Affordances of Multiple Languages 6. ‘This is Me’: Writing the Self Online 7. Stance-taking through Language and Image 8. ‘My English is so poor’: Talking about Language Online 9. Everyday Learning Online 10. Language Online as New Vernacular Practices 11. Language Online and Education 12. Researching Language Online 13. Flows of Language Online and Offline. Appendices
<urn:uuid:0ede15e7-79f5-46d6-88b0-fbd7f9e575cb>
CC-MAIN-2018-47
https://www.routledge.com/Language-Online-Investigating-Digital-Texts-and-Practices-1st-Edition/Barton-Lee/p/book/9780415524957
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746061.83/warc/CC-MAIN-20181119171420-20181119193420-00496.warc.gz
en
0.885263
560
2.765625
3
2.956926
3
Strong reasoning
Literature
While helmet laws vary from state to state, it’s generally a good idea to wear a bike helmet no matter where you’re going. Many cities, including Seattle and Spokane, require riders of all ages to wear a helmet. There are no mandatory bicycle helmet laws for adults in Oregon, but the state’s law requires bicycle helmets for riders under a certain age. In addition, some cities have stricter bicycle helmet laws than state laws. For example, although Texas does not have a state-wide bike helmet law, Austin, Dallas, and Fort Worth require riders to wear a helmet. Likewise, Houston has a mandatory bike helmet law for children under 16 years old. While there are no federal laws requiring bicycle helmets, a small number of states have introduced local or state helmet laws. These laws are often focused on youth and hold parents responsible for their children’s safety. While many states do not require cyclists to wear a helmet, New York City is considering a helmet law. Related Questions / Contents What Percent of Bikers Wear a Helmet? A recent study asked bicyclists in nine European capitals whether they wear helmets while riding. The study measured helmet use in locations near city centers on weekdays. It also included a pilot study in Stuttgart, Germany. The results revealed that 18 percent of bicyclists wear helmets all the time. However, many more do not use them. The study showed that helmet users are less likely to suffer head injuries or be hospitalized, even in bicycle-motor vehicle crashes. The most common injury sites included the head and neck, which is why helmets are so important for cyclists. Moreover, those who use a helmet are less likely to sustain traumatic brain injuries, which are the most serious type of injury. According to the National Highway Traffic Safety Administration, 75 percent of cyclist fatalities occur on roads that do not have bike lanes. However, there are some ways to make road rides safer, including joining advocacy groups in your area. Organizing and participating in bike advocacy groups is a great way to influence policy and lobby for better bike networks. Using a helmet does not completely eliminate the need for safer streets, but it can be a great way to increase awareness of the importance of wearing a helmet. When Did Bicycle Helmets Become Law? The question of whether cyclists should wear bicycle helmets is a controversial one. Although the overall cost of cycling is low, there is a clear link between wearing a bicycle helmet and the risk of a head injury. Furthermore, a large body of research shows that cyclists are healthier and live longer than non-cyclists. A number of states and cities have adopted bicycle helmet laws. These laws are meant to reduce the risk of bicycle accidents and injuries. Bicycle-related fatalities account for about two percent of all traffic fatalities, according to the National Highway Traffic Safety Administration. The first state to enact a bicycle helmet law was California, which passed a law in 1986 limiting helmet use to children under five. The law was later expanded to include cyclists of all ages. Although bicycle helmet laws are generally considered effective at reducing injuries, there are some disadvantages. Some people view helmet mandates as a threat to their personal liberties. While the overall reduction of head injuries is substantial, some studies indicate that helmet laws can deter riders from riding bicycles. Do Cyclists Have to Stop For Red Lights? In the city of New York, cyclists are legally required to stop for red traffic lights and yield to cars and other vehicles. Fortunately, they get a head start at 50 intersections, and Mayor Bill de Blasio’s administration is backing a plan to extend this privilege to all other New York City intersections. While the Hunter study shows that cyclists in the city have gotten better at stopping for red lights, a report by the New York Post found that nearly 50 percent of cyclists did not wear helmets and nearly 30% were using electronic devices. Despite the popularity of Idaho Stop laws, there are still a number of cyclists who argue that they should have the same rights as drivers. Some argue that cyclists shouldn’t have to stop for red lights, but they do need to slow down and yield to oncoming traffic. In addition, they shouldn’t race through intersections, as this is extremely unsafe for everyone. Can Cyclists Get Speeding Tickets? The laws regarding speeding differ in different states. In some places, a cyclist can be fined as little as $10 for a minor infraction, while in other places, a speeding ticket can cost as much as $200. In any case, cyclists can get a speeding ticket for exceeding the posted speed limit. Speed limit signs are often posted along the side of the road, and this law applies equally to cyclists and cars. Unfortunately, many cyclists do not know the law and end up getting ticketed. While cyclists are allowed to use a cell phone while cycling, it is illegal to use a headset in one ear. Fortunately, there are few cyclists who attempt to use a cell phone while cycling. Cyclists can have their traffic tickets dismissed if they complete traffic school. California has special traffic school for cyclists, and cyclists may be able to attend for free if they are arrested for a traffic violation. These programs are offered at universities like UC Davis in Davis, California, and Cal Poly in San Luis Obispo, California. How Many Deaths Do Helmets Prevent? A recent study found that bike riders with helmets had fewer fatalities than those without one. However, the study was limited to fatal accidents involving motor vehicles and bicycles. It found that the helmets reduced the risk of head injuries by about two-thirds. According to the Bicycle Helmet Safety Institute, a nonprofit organization in Arlington, Va., a bicycle helmet can prevent two-thirds of all bicycle-related injuries. Helmet use is influenced by factors such as age, marital status, and education. The use of helmets is higher among high-income groups, while lower-income groups are less likely to wear them. A recent study from Utah showed that children aged six to 11 wear helmets about 63% of the time. The study also found that those wearing helmets were less likely to suffer head injuries and to be hospitalized. Injuries from bicycle accidents were also significantly less severe when helmets were worn. The most common injury regions involved the lower and upper extremities, face, and head. Most of these injuries were cuts and bruises. TBI, meanwhile, represented 11% of injuries. These injuries were most frequent among patients aged ten to fourteen years. Do Bike Helmets Really Save Lives? According to the National Highway Traffic Safety Administration (NHTSA), the use of bike helmets greatly reduces the risk of serious head injuries in crashes. According to the organization, wearing a bike helmet is also linked to fewer hospitalizations, especially those involving motor vehicles. In fact, cyclists wearing helmets are three times less likely to suffer traumatic brain injuries than those without helmets. The US Consumer Product Safety Commission (CPSC) has a comprehensive Bicycle Helmets FAQ that contains information on bicycle safety. Cycling UK also publishes an article analyzing the safety of bicycle helmets and pointing out that official UK safety advice is not adequate. It is important to wear a bicycle helmet for your own safety, even if you don’t have a family member who rides a bike. A helmet can protect the brain in a crash because the outer shell spreads the impact over a large area. The soft inner liner also helps absorb energy, minimizing damage to the head. Wearing a helmet can prevent head fractures and even paralysis. This is why the EU requires cyclists to wear bike helmets. How Many Lives Do Bike Helmets Save? A recent study from the IIHS found that bicycle helmet use is not always related to a lower rate of head injury. For example, helmet use among cyclists with serious injuries was only 13% and among those without serious injuries, it was 7%. In fact, helmet use did not even reduce the number of fatal crashes. In 2013, 900 people died from bicycle-related injuries, and nearly 500,000 people visited emergency rooms. However, wearing a bike helmet decreased the likelihood of serious head injury by 44 percent and traumatic brain injury by 52 percent. This is because a helmet is made of hard plastic and foam and dissipates the force of the impact. A helmet will also help prevent severe brain injury in most cases. Bicycle head injuries can be expensive and can impact a child’s life for years to come. For instance, in 1991, bicycle crashes to children aged four to 15 resulted in an estimated $594 million in medical costs over the lifetime. In addition, nearly two thousand children suffered permanent disabilities. It is estimated that if all children aged four to fifteen wore bicycle helmets, between 1,200 and 1700 lives would be saved. Learn More Here:
<urn:uuid:5799f61c-2821-4ae4-9ce1-3ac2035b6ee2>
CC-MAIN-2022-49
https://www.cyclingrevolution.com/are-you-required-to-wear-a-helmet-on-a-bike/
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711077.50/warc/CC-MAIN-20221206092907-20221206122907-00732.warc.gz
en
0.968264
1,804
3.140625
3
2.723025
3
Strong reasoning
Transportation
3 Ways ITN Is Creating A Healthier World Close your eyes and think about five people you are close to. A recent study has found that one in five people could potentially die from bad eating habits. That means that one of those loved ones you thought of could be at risk of a diet-related death! Sorry to say this so plainly, guys, but this is not an acceptable statistic! You shouldn’t have to worry about one in five people you know, heck, two in ten people you know and love dying from bad dietary choices — nobody should! In fact, this shouldn’t even be a statistic! Why? Because diet is something we can control — something we can choose to improve! This recent research review published by The Lancet found that poor diets are linked to 20 percent of all deaths worldwide! (There’s that one in five statistic!) This study analyzed nearly 20 years of dietary data from 195 countries! (That’s a lot of countries and a really long time!!) They did this study, alongside epidemiological studies, about nutrition-related health risks and benefits. They found that poor diets killed about 11 million people around the world in 2017!! Get this, most of the deaths were linked to cardiovascular disease and cancer, which are both related to a subpar diet! You might be thinking, “Oh, this study was for sure done in lower income areas — areas around the world that are poor and deprived.” According to the study co-author Dr. Ashkan Afshin, “Diet is an equal-opportunity killer. People — independent of age, gender, country of residence and socioeconomic status — to some extent are affected by poor dietary habits.” So what does that mean? It means that these results are showing up in every community — it’s showing up everywhere, for everyone! Dr. Ashkan Afshin goes on to say that, “Low intake of healthy foods and high intake of unhealthy foods is the leading cause of mortality, globally and in many countries.” It’s not necessarily the high intake of unhealthy food! (Raise your hand if that’s what you think it would be! Us too!) So, what does this tell us? It tells us that people WANT to do the right thing in most cases, it’s just that they don’t know HOW to eat healthy or what amounts are right for them! Despite all of the information we have on the what and how of healthy eating, people still need help! WE TAKE ACTION At ITN, it hurts our hearts to see information like this. When we hear stats like this, we don’t just sit back and hope someone else finds a solution. Oh, no no! We dive right in, and we take action! How are we making an impact on this epidemic? Well, for starters, we’re not teaching cookie cutter diets and practices that are outdated and quite frankly, don’t work! We train our Health Coaches on how to work with their clients to create a personalized health plan! Why? Because personalized health is the FUTURE of health! In fact, we’re the only health coaching school that teaches a proven system to create personalized nutrition plans that get clients REAL result! #realtalk We know that in order to help your clients, you have to understand them — understand where they are coming from and the trauma they have experienced. This study proves that people need personalized plans for their health! It’s clear that they aren’t providing their bodies with an adequate amount of healthy, life-giving foods that they require individually! 3 WAYS ITN IS CREATING A HEALTHIER WORLD WORLD 1. A PROVEN COACHING SYSTEM Are you currently a Health Coach? Do you find yourself full of questions like… - “I don’t know what to do! I’m totally responsible for my client’s health!” - “How do I ask the right questions?’ - “What do I have them eat?” - “Do they need supplements?” Or perhaps, you’ve been thinking about becoming a Health Coach, and these stats just made you even hungrier to become one! Here’s where many Health Coaches fall short and hold not only their clients back from success but also their coaching business. (Maybe you can relate!) You take an approach to health that has worked well for you, and you take the best parts of it to create a “plan.” You then push that plan on every client that walks through your door. (It’s okay if you have done this, you’re not alone!) After many years of research and following through on studies like the one in this article, ITN has created the world’s first and only health coaching system that provides personalized health coaching for your client! Do you know what that means? It means that there is NO guesswork! Yep, we’re talking getting your clients results, giving you tools to build a successful business, the opportunity to do something you love, a way to support your family financially, and to make a massive impact in the world! It means you get to live that dream life you’ve always wanted while doing good in this world! #herostatus 2. PERSONALIZED NUTRITION Yes, we keep saying this over and over again, but it’s THAT important! Mark Cuban said it so well, “Personalized health is the future of healthcare!” Long gone are the days of giving your clients a meal plan (which you’ve used with every other client), alongside a protocol (which you’ve also used with every other client.) People are looking (and need!) a plan to improve their health that fits their lifestyle — a plan that allows you to meet your clients where they are at and say, “Let’s start here!” They are looking for coaches, like you, who can see them as they are and give them the tools needed to get where they want to go — to a healthier version of themselves! If you’re coaching with old-school protocols and meal plans, for the love of the world, stop right now! Let this study light a fire in you to learn how to guide your clients through a personalized plan that fits their lifestyle and their needs! Not entirely sure how to do that? Head here to learn how you can become a Health Coach who has the education and knowledge of how to set their clients up for success with a personalized approach to nutrition and health! 3. A HOLISTIC APPROACH At ITN, we don’t just focus on the science of nutrition. We also pull in the psychology and spirituality of nutrition! We ask psychological questions like… - “Why do you know what to do but you still don’t do it?” - “What are those traumas that create those urges and those cravings and how do you get rid of them?” As a Certified Transformational Nutrition Coach, you learn to ask these questions because they play a huge role in your health! Spiritually (which can be religious or not!) is another game changer when it comes to your health! Feeling a spiritual connection to yourself, your community, something higher than you, and connection to your environment can change how you heal and how you maintain your health! Then, of course, you must understand the science of nutrition to tie this all together holistically! When you merge all of these together, you get something beautiful — you get Transformational Nutrition! Transformational Nutrition is the way you get your clients results and the only way you can build a successful health coaching business — it’s the way you show up and make a difference in the world! READY TO MAKE A DIFFERENCE IN THE WORLD Are you ready to be a part of this and stop the one in five statistics? Are you ready to become part of the #transformationgeneration? Whoohoo! We can feel your excitement, and we’re excited too! Head here to grab your FREE copy of the Ultimate Guide On How To Become A Health Coach and learn how you can become a successful Health Coach or take your coaching business to the next level with Transformational Nutrition!
<urn:uuid:248f56b3-9d1c-492e-9842-6f7f4ebff79e>
CC-MAIN-2019-18
https://blog.transformationalnutrition.com/healthier-world/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578596541.52/warc/CC-MAIN-20190423074936-20190423100040-00052.warc.gz
en
0.954049
1,791
2.859375
3
2.635242
3
Strong reasoning
Health
Today, President Obama will announce his plan for military action in Iraq and Syria. His strategy to defeat the ISIS militants who invaded Iraq in June will likely include a call for more airstrikes. After the brutal beheadings of two US journalists by ISIS militants, US support for military intervention is growing. And just last week, President Obama announced the formation of a coalition of nine countries committed to defeating ISIS through a combination of airstrikes and support funneled to US allies on the ground in Iraq and Syria. However, airstrikes may actually strengthen ISIS and help them attract more fighters. In the 13 years since the atrocity of 9-11, we've seen how US air raids and drone attacks in the Middle East and North Africa have added to violence and instability in the world, without addressing their underlying causes. Instead, we should prioritize a humanitarian response to deliver food, water, medical care and shelter to besieged communities. We must also stand with local women's organizations, like MADRE's partners, who are the first line of defense for vulnerable communities. We must echo their call for peace by addressing the root causes of the crisis. What is ISIS? ISIS is a brutal jihadist group working towards the creation of a Sunni Islamist state that transcends national borders as we know them. ISIS currently controls territory in eastern Syria and northern Iraq and has an estimated 10, 000 fighters among its ranks, including foreign fighters from Europe and the US. The group has gone through several incarnations since its formation in Iraq after the 2003 US invasion created a breeding ground for anti-occupation insurgency militias. Originally linked to al-Qaeda, ISIS shares a similarly reactionary and arbitrary interpretation of Islam. But al-Qaeda has distanced itself from ISIS because of ISIS' brutality against civilians (which al-Qaeda views as counter-productive to building a base of support) and their merciless executions of rivals, including some from al-Qaeda and other Islamist groups. What does this crisis mean for women? What does it mean for human rights and peace activists? ISIS uses violence against women to terrorize communities and impose their agenda for an Islamist state, one in which women would be stripped of basic rights. In areas of Iraq and Syria it controls, ISIS has barred women and girls from going to school, holding jobs or even being in public without male "guardians." MADRE's on-the-ground partners in Iraq and Syria have also shared horrific accounts of mass sexual slavery. In Iraq, days after taking control of Mosul, ISIS distributed pamphlets declaring "sexual jihad, forcing families to give over their daughters to be raped by ISIS fighters in the name of God's will. Those who refuse are beaten or killed. Throughout northern Iraq, hundreds of women have been captured by ISIS fighters. After being abducted, some women are stripped and photographed naked, bringing "shame" on their family to ensure that they can never return home. Currently, we know of at least three sites – a school, a movie theater and a sports center – where many women are imprisoned. From there they are taken to a market and literally sold as property to ISIS fighters. Some of these women have been trafficked to Syria as sexual slaves for militants there. Also at risk are ethnic and religious minorities and the human rights and peace activists who speak out against this violence and advocate for a secular society. ISIS has already shown no hesitation in eliminating anyone they view as a threat to their social vision. Is this a religious war? Many media portrayals have defaulted to a facile description of the relationship between Sunni and Shiite people, claiming that these religious groups are locked in an "age-old" conflict. This false claim conveniently conceals the ways in which the US manipulated Iraqis' religious affiliation to consolidate control during its 2003-2011 occupation of Iraq. Iraq's established history of secular nationalism was upended by the US occupation. Through the policy of "de-Baathification, intended to erase the influence of Saddam Hussein's Baath Party, the US gutted Iraq's army and civil service. To fill that vacuum, the US empowered Shiite political parties. It also trained, armed and funded Shiite militias to enforce occupation policies and combat the Sunni-led insurgency. US policies further exacerbated this sectarian divide by creating a governmental system that gave jobs, seats in parliament and other resources according to ethnic and religious divisions. These practices turned a doctrinal difference between the Sunni and Shiite branches of Islam into a deadly division. By pitting communities against each other for control of the state and its resources, the US triggered a sectarian civil war (2005-2008) whose resurgence we are now witnessing. Do Iraqis support ISIS? Many Iraqis reject ISIS and its brutality. But some, especially Sunnis, are wagering that a temporary alliance with ISIS will help them regain some of the political power they have been denied by the Shiite-dominated Iraqi government. Sunnis have met severe discrimination and violence at the hands of Iraq's government and its army. It is an indictment of outgoing Prime Minister Maliki that people are more willing to tolerate ISIS' presence than that of their own government. As Stephen Zunes points out, in 2007, the Maliki government reneged on an agreement to share more power with Sunni groups. Instead, it turned to torture and violence to solidify its authority. Despite the government repression, grassroots activists in Iraq have been resolute in their peaceful call for true democracy and an end to sectarianism. These activist mobilizations gained momentum throughout the Arab Spring, and the Organization of Women's Freedom in Iraq (OWFI), a MADRE sister organization, led many demonstrations in Baghdad. But despite growing opposition in recent years, the Iraqi government continued its failed and harsh tactics, rejecting calls for conciliation with Sunni and Kurd communities. When ISIS invaded in the summer of 2014, the government opted to once again rely on resurrecting abusive Shiite militias to target Sunnis. Sunni people who might otherwise recoil from ISIS find themselves with few other places to turn. Just this week, Iraqis approved the formation of a new and more inclusive government. However, the general sectarian dynamic is relatively unchanged, and many Sunni Iraqis remain skeptical. What does all this have to do with the conflict in Syria? In 2011, peaceful calls for freedom in Syria were met with brutal violence by the regime of President Bashar al-Assad, triggering a mass uprising and civil war. Islamist militant groups, including the then-named Islamic State of Iraq (ISI) took advantage of this turmoil to hijack the protests and assert their own political agenda. Amid the growing violence, ISI sent representatives into Syria to capitalize on Assad's diminishing control over land along the border with Iraq. ISI took control of the Syrian city of Raqqa, morphing the group into its current incarnation of ISIS. ISIS grew by attracting foreign jihadist fighters and military support from US allies like Qatar and Saudi Arabia. Even the so-called "non-lethal" military aid that the US has sent to support "moderate" rebels in Syria has ended up in the hands of ISIS, who have repeatedly vanquished other rebel groups and seized their military supplies. The relationship between ISIS and the Assad regime is complex. While ISIS is fighting the regime, their brutal tactics have also served to divide and weaken other opposition forces in Syria. And in some communities, the specter of living under ISIS rule has led people who were opposed to Assad's regime to conclude that he may be the lesser evil. Also boding well for Assad is the fact that ISIS' advance echoes his claim that the uprising is the work of foreign terrorists, a narrative that eclipses the legitimate grievances of the Syrian people. Further complicating matters is, as Patrick Cockburn points out, the inconsistent and contradictory US policy towards ISIS in Iraq and Syria. In Iraq, the US supports the government against ISIS. Meanwhile, in Syria, the US and ISIS both hope to destroy the Assad government. Now that President Obama seeks airstrikes against ISIS in Syria, he runs the risk of deepening this contradiction. As in Iraq, bombing Syria and arming militias that cooperate with the US will result in the killing of civilians. It will also allow ISIS to capture more US weapons and fuel the war without contributing to a political settlement that's needed to end the conflict. What should the US do? Instead of further military action, which will only exacerbate the crises in both Iraq and Syria, the US should support calls for peace and a diplomatic response that prioritizes human rights by: Ceasing airstrikes. Already a primary reason that people are fleeing into displacement, airstrikes would only put Iraqi and Syrian civilians at risk and further escalate violence. Terminating weapons transfers to the Free Syrian Army and other allies in Iraq and Syria, which will very likely end up in the hands of ISIS. Supporting progressive Iraqis demanding a genuinely democratic government and an end to sectarian politics. Amplifying the voices of Syrians who are currently marginalized within the opposition but share a peaceful, democratic vision for their country. Sending humanitarian aid and support to women, families and displaced Iraqis and Syrians including food, medical care and shelter. What is MADRE doing in Iraq? MADRE and our sister organization, the Organization of Women's Freedom in Iraq (OWFI), are mobilizing an emergency response to protect women and families from violence, enable women to escape sexual slavery and demand a human rights-based response to this crisis. Together, we are: Opening a women's shelter and emergency relocation route in the heart of ISIS-controlled territory, providing refuge, emergency care and counseling to women who have been forced to flee their homes and are escaping sexual slavery. Distributing humanitarian aid, including clothes and food packages of rice, lentils, sugar and milk to displaced women and families in Baghdad, Karbala, Samarra and the ISIS-controlled town of Hawijah. Offering support and protection to progressive human rights activists through OWFI's network of allies. What is MADRE doing in Syria? MADRE is partnering with local women's groups in Jordan, Lebanon, Turkey and inside Syria to provide: Humanitarian aid tailored to women's needs. Reproductive healthcare, including midwifery services and access to contraception and family planning. Trainings so that women can know their human rights and document violations against women in the war to be included in future justice processes. Consultations between Syrian refugee women, local women's organizations and international networks and policymakers, to ensure that women's priorities are integrated into humanitarian and peace-building efforts.
<urn:uuid:f873e6fb-419d-4cab-9ad0-1c8200b0304f>
CC-MAIN-2017-51
https://www.madre.org/press-publications/article/understanding-isis-womens-rights-perspective
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948530668.28/warc/CC-MAIN-20171213182224-20171213202224-00136.warc.gz
en
0.962351
2,150
2.921875
3
3.057483
3
Strong reasoning
Politics
It may be possible to grow old without developing Alzheimer’s disease pathology (ADP), although a wide range of very different types of protective factors are involved. A study published in JAMA Neurology looked at the differences in patterns of amyloid deposition and neurodegeneration that comprise ADP and found that, although challenging, “exceptional aging” without ADP is achievable.1 The main objective of the study, conducted by researchers at the Mayo Clinic in Rochester, Minnesota, was to identify and test the effectiveness of the full range of protective factors across a natural lifespan that prevent the development of amyloid deposits in the brain or neurodegeneration, or both. The investigators assembled a cohort of 942 individuals (519 men, 423 women) enrolled in the Mayo Clinic Study of Aging. The cohort was divided into 4 groups according to combinations of ADP patterns, using imaging biomarkers: amyloid (A)+/neurodegeneration (N)+, A+/N−, A−/N+, and A−/N−. The groups differed significantly by age, necessitating adjustment. Amyloid levels varied by sex and apolipoprotein E (APOE) status, whereas neurodegeneration patterns differed by sex, APOE, midlife obesity, smoking, and a composite value of 7 cardiac and metabolic conditions, including hypertension, hyperlipidemia, cardiac arrhythmia, coronary artery disease, congestive heart failure, diabetes, and stroke. The most important finding was that, apart from demographics and APOE genotype, no overlap in protective factors between the 2 patterns was apparent. History of dyslipidemia at midlife was the only factor that was significantly associated with amyloid deposits at the age of enrollment decades later (mean age, 79.7 years), whereas increased cardiac and metabolic condition values, smoking and obesity and diabetes, at midlife were all associated with increased risks for neurodegeneration, measured by cortical thickness. The Mayo investigators then looked at the patterns in a special subgroup of “exceptional agers” aged 85 years or older without ADP (A−/N−) compared with all others older than 85 years with ADP signs (A+, N+, or A+/N+). The main differentiating factor was the presence of the APOE ε4 allele, which conferred protection across both patterns (as did younger age), and was consistent with previous studies.2-5 The results of the study pointed to evidence of exceptional aging in the normal population, and somewhat quantified the multiple protective factors necessary, which included a range of modifiable risks, particularly at midlife. Ultimately, however, the 2 most significant factors in exceptional aging (carrying the APOE ε4 allele and age) are nonmodifiable. “[F]uture studies will need to further investigate how the cumulative sum of positive and negative factors across the lifespan may contribute to the risk of amyloidosis and neurodegeneration,” the researchers wrote. - Vemuri, P, Knopman DS, Lesnick TD, et al. Evaluation of amyloid protective factors and Alzheimer disease neurodegeneration protective factors in elderly individuals. JAMA Neurol. 2017;74:718-726. doi:10.1001/jamaneurol.2017.0244 - Jansen WJ, Ossenkoppele R, Knol DL, et al. Amyloid Biomarker Study Group. Prevalence of cerebral amyloid pathology in persons without dementia: a meta-analysis. JAMA. 2015;313:1924-1938. doi:10.1001/jama.2015.4668 - Jack CR Jr, Wiste HJ,Weigand SD, et al. Age, sex, and APOE ε4 effects on memory, brain structure, and β-amyloid across the adult life span. JAMA Neurol. 2015;72:511-519. doi:10.1001/jamaneurol.2014.4821 - Villemagne VL, Burnham S, Bourgeat P, et al. Australian Imaging Biomarkers and Lifestyle (AIBL) Research Group. Amyloid β deposition, neurodegeneration, and cognitive decline in sporadic Alzheimer’s disease: a prospective cohort study. Lancet Neurol. 2013;12:357-367. doi:10.1016/S1474-4422(13)70044-9 - Sojkova J, Zhou Y, An Y, et al. Longitudinal patterns of β-amyloid deposition in nondemented older adults. Arch Neurol. 2011;68:644-649. doi:10.1001/archneurol.2011.77 This article originally appeared on Neurology Advisor
<urn:uuid:148ded6c-6072-4ce4-88a0-72ebf3b97fb3>
CC-MAIN-2021-10
https://www.psychiatryadvisor.com/home/topics/neurocognitive-disorders/alzheimers-disease-and-dementia/aging-without-alzheimers-pathology-is-achievable/
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178374391.90/warc/CC-MAIN-20210306035529-20210306065529-00271.warc.gz
en
0.88887
1,013
2.765625
3
2.970934
3
Strong reasoning
Health
Scientists Prove DNA Can Be Reprogrammed By Words And Frequencies “If you want to find the secrets of the universe, think in terms of energy, frequency and vibration.” ― Nikola Tesla The human DNA is a biological internet and superior in many aspects to the artificial one. Russian scientific research directly or indirectly explains phenomena such as clairvoyance, intuition, spontaneous and remote acts of healing, self healing, affirmation techniques, unusual light/auras around people (namely spiritual masters), mind’s influence on weather patterns and much more. In addition, there is evidence for a whole new type of medicine in which DNA can be influenced and reprogrammed by words and frequencies WITHOUT cutting out and replacing single genes. Only 10% of our DNA is being used for building proteins. It is this subset of DNA that is of interest to western researchers and is being examined and categorized. The other 90% are considered “junk DNA.” The Russian researchers, however, convinced that nature was not dumb, joined linguists and geneticists in a venture to explore those 90% of “junk DNA.” Their results, findings and conclusions are simply revolutionary! According to them, our DNA is not only responsible for the construction of our body but also serves as data storage and in communication. The Russian linguists found that the genetic code, especially in the apparently useless 90%, follows the same rules as all our human languages. To this end they compared the rules of syntax (the way in which words are put together to form phrases and sentences), semantics (the study of meaning in language forms) and the basic rules of grammar. They found that the alkalines of our DNA follow a regular grammar and do have set rules just like our languages. So human languages did not appear coincidentally but are a reflection of our inherent DNA. The Russian biophysicist and molecular biologist Pjotr Garjajev and his colleagues also explored the vibrational behavior of the DNA. [For the sake of brevity I will give only a summary here. For further exploration please refer to the appendix at the end of this article.] The bottom line was: “Living chromosomes function just like solitonic/holographic computers using the endogenous DNA laser radiation.” This means that they managed for example to modulate certain frequency patterns onto a laser ray and with it influenced the DNA frequency and thus the genetic information itself. Since the basic structure of DNA-alkaline pairs and of language (as explained earlier) are of the same structure, no DNA decoding is necessary. One can simply use words and sentences of the human language! This, too, was experimentally proven! Living DNA substance (in living tissue, not in vitro) will always react to language-modulated laser rays and even to radio waves, if the proper frequencies are being used. This finally and scientifically explains why affirmations, autogenous training, hypnosis and the like can have such strong effects on humans and their bodies. It is entirely normal and natural for our DNA to react to language. While western researchers cut single genes from the DNA strands and insert them elsewhere, the Russians enthusiastically worked on devices that can influence the cellular metabolism through suitable modulated radio and light frequencies and thus repair genetic defects. Garjajev’s research group succeeded in proving that with this method chromosomes damaged by x-rays for example can be repaired. They even captured information patterns of a particular DNA and transmitted it onto another, thus reprogramming cells to another genome. So they successfully transformed, for example, frog embryos to salamander embryos simply by transmitting the DNA information patterns! This way the entire information was transmitted without any of the side effects or disharmonies encountered when cutting out and re-introducing single genes from the DNA. This represents an unbelievable, world-transforming revolution and sensation! All this by simply applying vibration and language instead of the archaic cutting-out procedure! This experiment points to the immense power of wave genetics, which obviously has a greater influence on the formation of organisms than the biochemical processes of alkaline sequences. Esoteric and spiritual teachers have known for ages that our body is programmable by language, words and thought. This has now been scientifically proven and explained. Of course the frequency has to be correct. And this is why not everybody is equally successful or can do it with always the same strength. The individual person must work on the inner processes and maturity in order to establish a conscious communication with the DNA. The Russian researchers work on a method that is not dependent on these factors but will ALWAYS work, provided one uses the correct frequency. But the higher developed an individual’s consciousness is, the less need is there for any type of device! One can achieve these results by oneself, and science will finally stop to laugh at such ideas and will confirm and explain the results. And it doesn’t end there.?The Russian scientists also found out that our DNA can cause disturbing patterns in the vacuum, thus producing magnetized wormholes! Wormholes are the microscopic equivalents of the so-called Einstein-Rosen bridges in the vicinity of black holes (left by burned-out stars).? These are tunnel connections between entirely different areas in the universe through which information can be transmitted outside of space and time. The DNA attracts these bits of information and passes them on to our consciousness. This process of hyper communication is most effective in a state of relaxation. Stress, worries or a hyperactive intellect prevent successful hyper communication or the information will be totally distorted and useless. In nature, hyper communication has been successfully applied for millions of years. The organized flow of life in insect states proves this dramatically. Modern man knows it only on a much more subtle level as “intuition.” But we, too, can regain full use of it. An example from Nature: When a queen ant is spatially separated from her colony, building still continues fervently and according to plan. If the queen is killed, however, all work in the colony stops. No ant knows what to do. Apparently the queen sends the “building plans” also from far away via the group consciousness of her subjects. She can be as far away as she wants, as long as she is alive. In man hyper communication is most often encountered when one suddenly gains access to information that is outside one’s knowledge base. Such hyper communication is then experienced as inspiration or intuition. The Italian composer Giuseppe Tartini for instance dreamt one night that a devil sat at his bedside playing the violin. The next morning Tartini was able to note down the piece exactly from memory, he called it the Devil’s Trill Sonata. For years, a 42-year old male nurse dreamt of a situation in which he was hooked up to a kind of knowledge CD-ROM. Verifiable knowledge from all imaginable fields was then transmitted to him that he was able to recall in the morning. There was such a flood of information that it seemed a whole encyclopedia was transmitted at night. The majority of facts were outside his personal knowledge base and reached technical details about which he knew absolutely nothing. When hyper communication occurs, one can observe in the DNA as well as in the human being special phenomena. The Russian scientists irradiated DNA samples with laser light. On screen a typical wave pattern was formed. When they removed the DNA sample, the wave pattern did not disappear, it remained. Many control experiments showed that the pattern still came from the removed sample, whose energy field apparently remained by itself. This effect is now called phantom DNA effect. It is surmised that energy from outside of space and time still flows through the activated wormholes after the DNA was removed. The side effect encountered most often in hyper communication also in human beings are inexplicable electromagnetic fields in the vicinity of the persons concerned. Electronic devices like CD players and the like can be irritated and cease to function for hours. When the electromagnetic field slowly dissipates, the devices function normally again. Many healers and psychics know this effect from their work. The better the atmosphere and the energy, the more frustrating it is that the recording device stops functioning and recording exactly at that moment. And repeated switching on and off after the session does not restore function yet, but next morning all is back to normal. Perhaps this is reassuring to read for many, as it has nothing to do with them being technically inept, it means they are good at hyper communication. In their book “Vernetzte Intelligenz” (Networked Intelligence), Grazyna Gosar and Franz Bludorf explain these connections precisely and clearly. The authors also quote sources presuming that in earlier times humanity had been, just like the animals, very strongly connected to the group consciousness and acted as a group. To develop and experience individuality we humans however had to forget hyper communication almost completely. Now that we are fairly stable in our individual consciousness, we can create a new form of group consciousness, namely one, in which we attain access to all information via our DNA without being forced or remotely controlled about what to do with that information. We now know that just as on the internet our DNA can feed its proper data into the network, can call up data from the network and can establish contact with other participants in the network. Remote healing, telepathy or “remote sensing” about the state of relatives etc.. can thus be explained. Some animals know also from afar when their owners plan to return home. That can be freshly interpreted and explained via the concepts of group consciousness and hyper communication. Any collective consciousness cannot be sensibly used over any period of time without a distinctive individuality. Otherwise we would revert to a primitive herd instinct that is easily manipulated. Hyper communication in the new millennium means something quite different: Researchers think that if humans with full individuality would regain group consciousness, they would have a god-like power to create, alter and shape things on Earth! AND humanity is collectively moving toward such a group consciousness of the new kind. Fifty percent of today’s children will be problem children as soon as the go to school. The system lumps everyone together and demands adjustment. But the individuality of today’s children is so strong that that they refuse this adjustment and giving up their idiosyncrasies in the most diverse ways. At the same time more and more clairvoyant children are born [see the book “China’s Indigo Children”by Paul Dong or the chapter about Indigos in my book “Nutze die taeglichen Wunder”(Make Use of the Daily Wonders)]. Something in those children is striving more and more towards the group consciousness of the new kind, and it will no longer be suppressed. As a rule, weather for example is rather difficult to influence by a single individual. But it may be influenced by a group consciousness (nothing new to some tribes doing it in their rain dances). Weather is strongly influenced by Earth resonance frequencies, the so-called Schumann frequencies. But those same frequencies are also produced in our brains, and when many people synchronize their thinking or individuals (spiritual masters, for instance) focus their thoughts in a laser-like fashion, then it is scientifically speaking not at all surprising if they can thus influence weather. Researchers in group consciousness have formulated the theory of Type I civilizations. A humanity that developed a group consciousness of the new kind would have neither environmental problems nor scarcity of energy. For if it were to use its mental power as a unified civilization, it would have control of the energies of its home planet as a natural consequence. And that includes all natural catastrophes!!! A theoretical Type II civilization would even be able to control all energies of their home galaxy. In my book “Nutze die taeglichen Wunder,” I have described an example of this: Whenever a great many people focus their attention or consciousness on something similar like Christmas time, football world championship or the funeral of Lady Diana in England then certain random number generators in computers start to deliver ordered numbers instead of the random ones. An ordered group consciousness creates order in its whole surroundings! When a great number of people get together very closely, potentials of violence also dissolve. It looks as if here, too, a kind of humanitarian consciousness of all humanity is created.(The Global Consciousness Project) Vacuum domains are self-radiant balls of ionized gas that contain considerable amounts of energy. There are regions in Russia where such radiant balls appear very often. Following the ensuing confusion the Russians started massive research programs leading finally to some of the discoveries mentions above. Many people know vacuum domains as shiny balls in the sky. The attentive look at them in wonder and ask themselves, what they could be. I thought once: “Hello up there. If you happen to be a UFO, fly in a triangle.” And suddenly, the light balls moved in a triangle. Or they shot across the sky like ice hockey pucks. They accelerated from zero to crazy speeds while sliding gently across the sky. One is left gawking and I have, as many others, too, thought them to be UFOs. Friendly ones, apparently, as they flew in triangles just to please me. Now the Russians found in the regions, where vacuum domains appear often that sometimes fly as balls of light from the ground upwards into the sky, that these balls can be guided by thought. One has found out since that vacuum domains emit waves of low frequency as they are also produced in our brains.To come back to the DNA: It apparently is also an organic superconductor that can work at normal body temperature. Artificial superconductors require extremely low temperatures of between 200 and 140°C to function. As one recently learned, all superconductors are able to store light and thus information. This is a further explanation of how the DNA can store information. There is another phenomenon linked to DNA and wormholes. Normally, these supersmall wormholes are highly unstable and are maintained only for the tiniest fractions of a second. Under certain conditions stable wormholes can organize themselves which then form distinctive vacuum domains in which for example gravity can transform into electricity. And because of this similarity of waves they are able to react to our thoughts. To run excitedly into one that is on ground level might not be such a great idea, because those balls of light can contain immense energies and are able to mutate our genes. They can, they don’t necessarily have to, one has to say. For many spiritual teachers also produce such visible balls or columns of light in deep meditation or during energy work which trigger decidedly pleasant feelings and do not cause any harm. Apparently this is also dependent on some inner order and on the quality and provenance of the vacuum domain. There are some spiritual teachers (the young Englishman Ananda, for example) with whom nothing is seen at first, but when one tries to take a photograph while they sit and speak or meditate in hyper communication, one gets only a picture of a white cloud on a chair. In some Earth healing projects such light effects also appear on photographs. Simply put, these phenomena have to do with gravity and anti-gravity forces that are also exactly described in the book and with ever more stable wormholes and hyper communication and thus with energies from outside our time and space structure. Earlier generations that got in contact with such hyper communication experiences and visible vacuum domains were convinced that an angel had appeared before them. And we cannot be too sure to what forms of consciousness we can get access when using hyper communication. Not having scientific proof for their actual existence (people having had such experiences do NOT all suffer from hallucinations) does not mean that there is no metaphysical background to it. We have simply made another giant step towards understanding our reality. Official science also knows of gravity anomalies on Earth (that contribute to the formation of vacuum domains), but only of ones of below one percent. But recently gravity anomalies have been found of between three and four percent. One of these places is Rocca di Papa, south of Rome (exact location in the book “Vernetzte Intelligenz” plus several others). Round objects of all kinds, from balls to full buses, roll uphill. But the stretch in Rocca di Papa is rather short, and defying logic sceptics still flee to the theory of optical illusion (which it cannot be due to several features of the location). All information is taken from the book “Vernetzte Intelligenz” von Grazyna Fosar und Franz Bludorf, ISBN 3930243237, summarized and commented by Baerbel. The book is unfortunately only available in German so far. You can reach the authors here: www.fosar-bludorf.com
<urn:uuid:576f07fd-8907-4af8-8146-9065c4ee6563>
CC-MAIN-2017-43
http://organicvirals.com/scientists-prove-dna-can-reprogrammed-words-frequencies/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823153.58/warc/CC-MAIN-20171018214541-20171018234541-00502.warc.gz
en
0.954494
3,444
2.640625
3
2.959821
3
Strong reasoning
Science & Tech.
Gestational diabetes: The basics November is National Diabetes Month, so we are talking about gestational diabetes, a type of diabetes that some women develop during pregnancy. Let’s address some of the basics. First, what is diabetes? Diabetes means the body has a problem with insulin. Insulin is a hormone that helps the body use sugar from the blood for energy. When you have diabetes, your body either does not make enough insulin or does not use insulin as well as it should. Glucose (sugar) builds up in the blood because the body cannot use sugar without the help of insulin. This causes blood sugar to stay high with damaging effects to the body. What is gestational diabetes? Gestational diabetes means that the body has a problem with insulin during pregnancy. When women are pregnant, the body needs more insulin to keep blood sugar at the right level, so women’s bodies produce more insulin. When the extra insulin is not enough to keep blood sugar normal, women get high blood sugar. This is called gestational diabetes. Blood sugar usually returns to normal after delivery. Am I at risk? About 7 out of 100 pregnant women get gestational diabetes. Gestational diabetes is more likely in: - Women who are overweight. - Women with family members who have had gestational diabetes. - Women with family members who have type 2 diabetes. - African American, American Indian, and Hispanic/Latina American women. - Women who delivered another baby that was “macrosomic” ( > 4,000g) - Women with polycystic ovarian syndrome (PCOS) - Women on medications for other conditions that affect glucose metabolism (e.g. steroids) - Women carrying more than one baby (e.g. twins, triplets) How do I know if I have gestational diabetes? Gestational diabetes usually is diagnosed at the end of the second trimester. Most of the time, doctors and midwives test for it in the 5th or 6th month of pregnancy. Early screening for gestational diabetes should be considered if a woman has had gestational diabetes in a prior pregnancy, if she is obese, has a family history of diabetes, if she has polycystic ovarian syndrome, if she is noted to have a lot of sugar in her urine. Women are tested by drinking a special sugary drink ( a glucose challenge test) and having their blood sugar checked an hour after drinking it. About The Author Dr. de Veciana has an international background and is multilingual. She is currently an Associate Professor in the Division of Maternal-Fetal Medicine of the Dept of OB/GYN of Eastern Virginia Medical School. She mentors Endocrine and Maternal-Fetal Medicine fellows and OB/GYN residents in training and has a passion for teaching. She directs the Diabetes in Pregnancy Program at EVMS, which is nationally and internationally recognized for state of the art management of DM in pregnancy. She is a member of the American Diabetes Association Diabetes in Pregnancy Council and the Diabetes Council of the Society of Maternal-Fetal Medicine. She is an active Board member on the Hampton Roads chapter of the Juvenile Diabetes Research Foundation. Dr. de Veciana, is well published and is internationally known for her research supporting the value of post-prandial glucose monitoring in pregnant diabetics. On a personal note, she grew up with a sister with Type 1 and a dad with Type 2 DM which taught her more than any textbook ever could.
<urn:uuid:b537cb07-e518-4b50-b271-83d26a914e42>
CC-MAIN-2019-04
https://www.sentara.com/woodbridge-virginia/healthwellness/data/blogs/gestational-diabetes-the-basics.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584431529.98/warc/CC-MAIN-20190123234228-20190124020228-00060.warc.gz
en
0.942261
738
3.25
3
1.660659
2
Moderate reasoning
Health
Biologists have found a hormone in the liver that spurs the growth of insulin-secreting cells in the pancreas, a discovery they hope will lead to new treatments for diabetes. A team led by Douglas Melton, co-director of the Harvard Stem Cell Institute in Cambridge, Massachusetts, identified the hormone, betatrophin, by inducing insulin resistance in mice using a peptide that binds to insulin receptors. That caused the animals' insulin-secreting pancreatic β cells to proliferate. The researchers then searched for genes that showed increased activity, zeroing in on one that they were able to link to betatrophin production. Further experiments showed that 8-week-old mice injected with betatrophin showed an average 17-fold rise in the replication of their insulin-secreting pancreatic β cells, the researchers report in Cell. Betatrophin is also found in the human liver, the team says. “It’s rare that one discovers a new hormone, and this one is interesting because it’s so specific,” says Melton. “It works only on β cells and it’s so robust and so potent.” Pancreatic β cells replicate rapidly during embryonic and neonatal stages in both mice and humans, but their growth falls off dramatically in adults. A decrease in the function of the cells late in life is the main cause of type 2 diabetes, a metabolic disorder that affects more than 300 million people worldwide. In the United States alone, the two forms of diabetes — type 2 and type 1, which is caused by an autoimmune attack on pancreatic β cells — account for US$176 billion in direct medical costs each year. Melton thinks that injections of betatrophin once a month, or perhaps even once a year, could induce enough activity in pancreatic β cells to provide the same level of blood-sugar regulation for people with type 2 diabetes as daily insulin injections do. But more importantly, he adds, they would cause fewer complications because the body would be making its own insulin. He also hopes that betatrophin will be able to help people with type 1 diabetes. Matthias Hebrok, director of the University of California, San Francisco, Diabetes Center, says that the work “is a great advance”. “The findings are very interesting,” he says, although he would like to see the experiments repeated in older mice. “Do mice that are on their way to becoming diabetic at an advanced age truly have an increase in proliferative capacity upon treatment with betatrophin?” he asks. Henrik Semb, managing director of the Danish Stem Cell Center in Copenhagen, says that "the identification of a factor, betatrophin, that stimulates mouse β-cell replication with remarkable efficiency is a very important discovery, because it provides the starting point for further studies to elucidate the underlying mechanism of β-cell replication." β-cell replication has proved difficult to control in humans. Producing enough betatrophin for testing in human clinical trials will take about two years, according to Melton, who is also working to identify the hormone’s receptor and its mechanism of action. Editor’s Note (12/28/16): The study cited in the story below has been retracted at the request of its authors.
<urn:uuid:8d8b22ed-31f9-4f46-8eb7-f247d431ce78>
CC-MAIN-2020-24
https://www.scientificamerican.com/article/liver-hormone-offers-hope-for-diabetes-treatment/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347407001.36/warc/CC-MAIN-20200530005804-20200530035804-00573.warc.gz
en
0.947536
704
3.421875
3
2.957333
3
Strong reasoning
Health
Loads of things happen throughout the pregnancy period. Some of them might be serious issues and others are quite normal. You may have many questions concerning your pregnancy. One of the questions that you may ask is, what is pregnancy induced hypertension? Generally, this is a state that brings high blood pressure during pregnancy. This condition is at times referred as gestational hypertension. If the condition goes to severe cases, it is termed as preeclampsia. It is not a condition and only affects about 8% of every pregnancy. Which are the types of high blood pressure during pregnancy? Generally, there are 3 types of high blood that occurs during pregnancy. They include Gestational hypertension – this condition occurs after the 20th of pregnancy and ends after delivery. Chronic hypertension – this develops before the 20th week and can continue after delivery. This condition is noticed and the woman is thought to have had high blood pressure even before her pregnancy. Pregnancy induced hypertension it occurs after the 20th week of the pregnancy. It also occurs in young women especially during their first pregnancy. It mostly happens to twin pregnancies and women who have had this condition previous pregnancy. What are the primary traits of PIH? This condition is always accompanied by 3 primary traits. They include - Edema or swelling - Protein in the urine - High blood pressure What are the major causes of PIH? Generally, there are recorded causes of PIH but there are conditions that increase its risk. They include diabetes, kidney disease, pre-existing hypertension, multiple fetuses, mothers age (normally less than 21 and older than 40) and PIH in previous pregnancy. Which are the symptoms of PIH? There are many symptoms of pregnancy induced hypertension. If incase you realize you have these symptoms, seek medical attention right away. These symptoms include - Severe headaches and blood vomiting - Unnecessary swelling of hands and feets - Rapid heartbeat and dizziness - Abnormal nausea and blood in the urine - Drowsiness, fever and excessive vomiting - Blurred or double vision or sudden blindness - Severe abdominal pain How does pregnancy induced hypertension affect the baby? Generally, this condition prevents the placenta from acquiring enough blood. This therefore means that, the baby is not getting enough food and oxygen. If this happen throughout the pregnancy, it means the baby will be underweight and unhealthy. If this condition is detected early, the woman can still deliver a healthy baby with the required weight. Treatment of PIH The treatment for this condition depends on how far or close you are to your delivery. If you are very close, the doctors recommend an early delivery. This means that you have to go through surgery in order to get the baby. If incase you are very far from delivery, the following will be recommended - Consumption of less salt - Prenatal checkups increases - Have plenty of water daily - Total rest either at home or in the hospital How to prevent PIH - Take only prescribed medicine - Obtain enough rest - Exercise regularly - Take plenty of water - Protein consumption should be increased - Mark the end of alcohol and caffeine beverages It is highly advised for a pregnant woman who experiences symptoms of PIH to seek medical assistance at once.
<urn:uuid:2780d11c-c50b-4b0a-8955-d36db6667d16>
CC-MAIN-2019-43
https://www.randomstuffido.com/what-is-pregnancy-induced-hypertension/
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986684226.55/warc/CC-MAIN-20191018154409-20191018181909-00364.warc.gz
en
0.956326
685
2.671875
3
1.135279
1
Basic reasoning
Health
The Basic Neurocellular Patterns (BNP) were developed by Bonnie Bainbridge Cohen as an integral part of the Body-Mind Centering® approach to somatic movement education. This video on the BNP is designed to accompany Bonnie’s book, Basic Neurocellular Patterns: Exploring Developmental Movement. It can also be useful for people who have studied the BNP: - in a course at a School for Body-Mind Centering® licensed training program - in a workshop with Bonnie - in classes, workshops, or sessions with qualified Body-Mind Centering® professionals - in other settings The Basic Neurocellular Patterns (formerly called The Basic Neurological Patterns), or BNP, are potential patterns of movement inherent first in the movement of fluid through the cellular membranes and then recorded and organized in the nervous system. They exist, both phylogenetically in the animal kingdom and ontogenetically in the developmental stages of the human infant. The BNP are stimulated into existence through relationship and interaction with the environment. They are called forth based on the relative simplicity or complexity of their structure and function and the supporting and challenging conditions in the environment. Because these patterns are an outer manifestation of inner motility and neurological organization, I have named them the Basic Neurocellular Patterns. Understanding and embodying these neurological patterns and their developmental progression can greatly facilitate full developmental potential. Because these movement patterns are most recognizable in animals, they are classified as prevertebrate and vertebrate movement sequences. There is a progression in which each pattern underlies all succeeding patterns and modifies each preceding pattern. This progression is not linear but occurs in overlapping waves. Patterns occur, integrate into the next pattern and then re-emerge in the next level of complexity. An understanding of the Basic Neurocellular Patterns is important in caring for infants and educating children — those who are on a normally developing path and those with developmental challenges. When there are developmental difficulties and/or neurological disorganization, these patterns can act as gateways to reorganizing the nervous system and significantly create greater ease and control. With adults, these patterns can facilitate greater ease in everyday movement and indicate underlying factors in alignment/movement difficulties. They offer a movement form within which we can further engage and deepen our aliveness and sense of possibility. Each of the Basic Neurocellular Patterns is viewed from the standpoint of normal development. They can be applied to anyone at any age of life to analyze areas of movement efficiency and inefficiency and to improve one’s proficiency of movement. If any patterns have become overly dominant and are preventing other patterns of behavior from emerging, we can explore which patterns are missing that would modify the restrictive patterns and discover ways to enhance them. This will allow the overly dominant patterns to integrate into the total matrix of development and thereby allow more mature behavior to emerge. The process of embodiment through these developmental pathways allows us to experience more the fullness of our being and our ability to move through life with greater ease, flexibility, confidence and understanding. The BNP are based upon the development of perception and movement through the embodiment of distinct changes in consciousness. Their understanding is gained by experience, both personally and shared with others. This is a map only, derived from the past experiences of others. The concepts and ideas expressed are not given as absolutes but as reference points. For it to have meaning for you, you must explore them experientially yourself and gain your own insights. It contains more than three hours of instruction covering: - prevertebrate and vertebrate patterns - step-by-step instruction - demonstration of the Basic Neurological Patterns - key points for learning and teaching the patterns - rare classroom footage of Bonnie teaching Bonnie Bainbridge Cohen’s innovative work has influenced many fields that utilize movement, development, education, therapy and the body-mind relationship. She is the author of Sensing, Feeling, and Action and the founder of the School for Body-Mind Centering®, where people from over twenty-five countries have come to study. The Basic Neurocellular Patterns can be used as the foundation for a personal movement practice and can be applied to: - athletics and martial arts - infant and child development - occupational and physical therapy - somatic movement practices - somatic psychology Three discs; 190 minutes; English subtitles.
<urn:uuid:1a7cb209-2bc7-43b7-a117-ff87be26d6f6>
CC-MAIN-2019-26
https://www.bodymindcentering.com/product/practicing-the-basic-neurocellular-patterns/
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999814.77/warc/CC-MAIN-20190625072148-20190625094148-00254.warc.gz
en
0.939455
895
3.171875
3
2.780181
3
Strong reasoning
Health
Dry Wines or Table Wines What are Dry Wines? Dry wines, also sometimes called "Table Wines", are wines which do not have an appreciable amount of residual sugar present in the finished, bottled wine. Because they do not have much or any sugar in the wine, they are not sweet. In other words, "dry", when referring to wine, basically means the opposite of "sweet". The large majority of basic table wines that are produced around the world and that we enjoy with food are dry, including dry white, rosé and red wines. While some may have very small amounts of residual sugar in them, for all intents and purposes they are dry. How do you know if a wine has residual sugar or is dry? There is generally no indication on the label. However, most basic wine styles are dry. For example, pretty much all basic Chardonnays, Sauvignon Blancs, Cabernet Sauvignons, Merlots, Pinot Noirs, Burgundies, Bordeaux, and the like are dry without appreciable sugar in the bottled wine. Only certain specific grapes and styles of wine, particularly dessert wines, consistently have considerable amounts of sugar and can be considered sweet. These include some fortified wines like Port and Madeira as well as some styles which are typically produced sweet such as Sauternes, Vouvray Moelleux, Alsatian Vendange Tardives, many German wines, etc. One important note: This terminology is sometimes confusing to beginners for a very good reason. Many full-bodied red wines are high in tannins, naturally occurring compounds in grapes which contribute to the structure and texture of the wine. Tannins are generally described as having a drying, almost gritty or sandy texture in the mouth. People who are new to wine often describe these wines as very dry because the coarse tannins feel dry and astringent in their mouth. While this is a perfectly acceptable way to describe the sensation of tasting these wines, it can get confusing. In fact, even some sweet red wines like Port can have tannins, despite the sweetness of the wine. So it is best to describe these wines as tannic or to have drying tannins, not as a dry wine necessarily. Also learn about Dry Red Wines, Rosé Wines and Dry White Wines. How Are They Made? In wine production, yeast convert the sugars in the wine grapes into alcohol through the process known as fermentation. If the fermentation is allowed to proceed unhindered and the yeast is hearty enough, all the sugar that was present in the initial grapes is completely converted to alcohol. This means that in the finished wine there is no residual sugar. Residual sugar is the term used for grape sugar which is left over in a finished wine after fermentation is over. While some table wines may have small amounts of residual sugar, it is very close to zero and the wine can still be considered dry for all intents and purposes. What Do They Taste Like and What Foods Do You Eat with Them? There is a huge range of styles of dry wines produced in the world. The specific characteristics of each depends on the region they came from, the grape varieties used to make the wine, the winemaking technique and many other factors. Dry, table wines can range from light and fruity to dense, full-bodied and powerful. Just because the wine is "dry" and does not have much or any sugar in it, this does not necessarily mean that the wine cannot have sweet, fruit aromas and flavors. The ripeness of the grapes often impart the sense of ripe, sweet fruit to wines even if there is no actual sugar present in the wine. Typically wines that come from very hot growing regions, such as Australia and California, come from riper grapes which often smell and taste riper and sweeter, even if they are technically dry. This is of course a generalization, but as you taste through wines from different regions you will begin to see the range of flavors that can occur even in dry wines. While pairing each wine with food is different, generally dry wines are good at table, hence the term "table wine". Very sweet wines often clash or feel too ponderous with food. However, dry wines pair nicely with many foods, lighter wines fitting nicely with lighter fare and heavier wines standing up nicely to rich dishes. For more information and tips about pairing specific dry wines with food, be sure to check out our Food and Wine Pairing section! Done with the Dry Wines page? Return to the Types of Wine page.
<urn:uuid:35bef2c8-d653-441e-9495-fb08ec789bc6>
CC-MAIN-2013-20
http://www.wine-tastings-guide.com/dry-wines.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698238192/warc/CC-MAIN-20130516095718-00043-ip-10-60-113-184.ec2.internal.warc.gz
en
0.968446
960
2.671875
3
1.637875
2
Moderate reasoning
Food & Dining
The red shoveler is an attractive South American duck with a large, distinctive, spatula-shaped beak (3) (4) (5), from which it gains its species name, platalea, meaning ‘spoonbill’ (4). Both during and outside of the breeding season, the male red shoveler has a pale reddish-chestnut to deeper reddish-brown body, profusely marked with round black spots, and a contrasting pale buff head, which is finely stippled with black, particularly on the crown. The chin and throat are more lightly marked and may appear whitish. The lower back and rump are blackish, as are some of the wing feathers, which are slightly elongated and have conspicuous white margins. The tail is also blackish with white outer feathers, and is relatively long and pointed (3) (4) (5), while the upperwing bears a light blue patch, separated from the iridescent green speculum by a broad white bar (2) (3) (4) (5). The undersides of the wings are white (4) (5). The beak is black and the legs and feet are grey to yellowish or orange (3) (4) (5). The female red shoveler has a buffy, brown-spotted head and underparts, a whitish throat, a dark brown back with lighter feather edgings, and a dark tail, with creamy white edges. The blue patch on the wing is much duller than in the male and the white bar is reduced, while the speculum is blackish. The female also has a browner bill and dark brown eyes, in contrast to the distinctive white to light yellow eyes of the male (3) (4) (5). Juveniles resemble the female, although juvenile males have a brighter speculum (2) (3) (4). The male red shoveler gives a hollow tuk-tuk call, while the female gives a harsh quack (3) (4). - Also known as - Argentine shoveler, blue-winged shoveler, South American shoveler. - Length: 45 - 56 cm (2) (3) - Wingspan: 66 - 73 cm (3) - 523 - 608 g (2) Red shoveler biology The red shoveler is usually found in pairs or small groups (2) (4), although larger flocks may form when the birds are moulting (4). A poor walker on land (4), this species usually feeds in the water by dabbling, head-dipping and upending, filtering water or mud with the beak to obtain tiny aquatic invertebrates. The diet also includes seeds and other parts of aquatic plants (2) (4), and in winter birds have been recorded taking worms, insects, molluscs and even small frogs (4). The breeding season begins in September or October (2) (4) and the nest is built on the ground, being constructed from twigs, aquatic plants, reeds and dry grass (4). Five to eight eggs are laid and are incubated by the female. The eggs hatch after around 25 days (2) (4), and it is likely that the female alone provides care for the ducklings (4). The red shoveler is thought to first breed at about a year old (4). Red shoveler range The red shoveler occurs in southern South America, from southern Peru, Bolivia, south-eastern Brazil and Paraguay south to Tierra del Fuego (2) (3) (4) (5) (6). It is also occasionally recorded on the Falkland Islands (2) (4) (5) (6). This species is partially migratory, with birds in the south of the range moving northwards during winter (2) (3) (4). Red shoveler habitat This species inhabits both fresh and brackish waters, including shallow ponds, lakes, marshes, estuaries and coastal lagoons. It occurs at elevations of up to around 3,400 metres in the Andes Mountains (2) (3) (4) (5). Red shoveler status Classified as Least Concern (LC) on the IUCN Red List (1). Red shoveler threats The red shoveler is a relatively common and widespread species, and is not currently considered at risk of extinction (6). However, it may suffer to an extent from the degradation of its wetland habits, and is also hunted in some areas (4), although it is generally regarded as unpalatable (3). Red shoveler conservation There are no known conservation measures currently targeted at this widespread duck. ARKive is supported by OTEP , a joint programme of funding from the UK FCO which provides support to address priority environmental issues in the Overseas Territories, and Defra Find out more For more information on the conservation of waterfowl see: To find out more about conservation in the Falkland Islands and other UK Overseas Territories, see: For more information on this and other bird species please see: This information is awaiting authentication by a species expert, and will be updated as soon as possible. If you are able to help please contact: - Slightly salty water, usually a mixture of salt and freshwater, such as that found in estuaries. - To keep eggs warm so that development is possible. - Animals with no backbone, such as insects, crustaceans, worms, molluscs, spiders, cnidarians (jellyfish, corals, sea anemones), echinoderms, and others. - A diverse group of invertebrates, mainly marine, that have one or all of the following; a horny, toothed ribbon in the mouth (the radula), a shell covering the upper surface of the body, and a mantle or mantle cavity with a type of gill. Includes snails, slugs, shellfish, octopuses and squid. - Periodic shedding of (usually) the outermost body covering (such as feathers, fur or skin) during growth and development, or at specific times of the year. - In birds, a distinct patch of brightly coloured feathers, often iridescent or metallic in appearance, found on the secondary feathers of the wing (the shorter flight feathers along the inner edge of the wing). IUCN Red List (September, 2010) del Hoyo, J., Elliott, A. and Sargatal, J. (1992) Handbook of the Birds of the World. Volume 1: Ostrich to Ducks. Lynx Edicions, Barcelona. Ogilvie, M.A. and Young, S. (2002) Photographic Handbook: Wildfowl of the World. New Holland Publishers, London. Kear, J. (2005) Ducks, Geese and Swans. Volume 2: Species Accounts (Cairina to Mergus). Oxford University Press, Oxford. Blake, E.R. (1977) Manual of Neotropical Birds. Volume 1: Spheniscidae (Penguins) to Laridae (Gulls and Allies). University of Chicago Press, Chicago and London. BirdLife International (September, 2010)
<urn:uuid:e54cf925-c2c5-4902-a1ad-1130b4600345>
CC-MAIN-2016-30
http://www.arkive.org/red-shoveler/anas-platalea/
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257821671.5/warc/CC-MAIN-20160723071021-00146-ip-10-185-27-174.ec2.internal.warc.gz
en
0.918809
1,532
3.0625
3
1.899433
2
Moderate reasoning
Science & Tech.
[edit section] Security Topologies One of the most essential portions of information security is the design and topology of secure networks. What exactly do we mean by “topology?” Usually, a geographic diagram of a network comes to mind. However, in networking, topologies are not related to the physical arrangement of equipment, but rather, to the logical connections that act between the different gateways, routers, and servers. We will take a closer look at some common security topologies. [edit section] Screening Router In a screening router setup, the router acts as the sole gateway and gatekeeper between the un-trusted, outside network (i.e. the Internet) and the trusted network (i.e. LAN). The router maintains sole discretion on which traffic to allow in by implementing an ACL, or access control list. The router in this setup, which blocks traffic based on source, destination, and other header information, is analogous to Saint Peter, who acts as the gatekeeper into Heaven. Some of the advantages of screening routers include their transparency and simplicity. However, in the screening router setup, the router is the sole point of failure and depends heavily on the administrator to maintain a favorable ACL. Also, a screening router has difficulty in masking internal network structure. [edit section] Dual-Homed Gateway The dual-home gateway is a screening router setup that implements a bastion host between the screening (external) router and the trusted network. A bastion host is a host that is configured to withstand most attacks and can additionally function as a proxy server. By adding the bastion host, no direct communication exists between the external network and the trusted network, masking the internal network structure and allowing for traffic to be screened twice. It is considered fail-safe in that if one of the components (bastion host, router) fails, the security system remains available. However, it is cumbersome and rather slow in comparison to other topologies. [edit section] Screened Host Gateway A screen host gateway is essentially a dual-homed gateway in which outbound traffic (from trusted to un-trusted) can move unrestricted. Incoming traffic must first be screened and then sent to the bastion host, like in a dual-homed gateway. This is a less secure but more transparent system than dual-homed gateway. [edit section] Screened-Subnet A screened-subnet setup works to employ a bastion host between two screening routers. What this provides is a special zone for publicly available services (around the bastion host) and transparent access for users on the trusted network. The zone around the bastion host that operates publicly and whose traffic to the trusted network is screened is known as a DMZ zone; for this reason, bastion hosts are sometimes referred to as DMZ hosts. Remember for the exam that a DMZ host would always be well-secured, just like a bastion host would be. [edit section] IDS An intrusion detection system, or IDS, can track or detect a possible malicious attack on a network. For the exam, you will have to know about some division of IDS classifications: - Active v. Passive IDS: An active IDS will attempt to thwart any kind of detected attacks without user intervention. A passive IDS simply monitors for malicious activity and then alerts the operator to act, or in other words, requires their intervention. Passive IDS is less susceptible to attacks on the IDS system as it does not automatically act. - Network v. Host IDS: A network-based IDS is one that operates as its own node on a network, while host-based IDS systems require agents to be installed on every protected host.* - Knowledge v. Behavior IDS: A knowledge-based IDS works by assessing network traffic and comparing it with known malicious signatures, much like antivirus software. A behavior-based IDS analyzes baselines or normal conditions of network traffic; it then compares them to possibly malicious levels of traffic. Note that this type of IDS produces more false alarms. [edit section] Honeypot A honeypot is designed to lure attackers or malicious users into attempting an attack on a fictional or purposefully-weak host and then recording the patterns of their activity or the source of the attack. A honeypot can also act as bait for the rest of the network by luring attackers to an “easy target.” [edit section] Quick Review 1. Which of the following topologies features a demilitarized zone or DMZ? a. Active IDS b. Passive IDS c. Dual-Homed Gateway 2. Why would behavior-based IDS require less maintenance than knowledge-based IDS? a. Behavior-based systems necessarily work without user intervention b. Knowledge-based IDS can only work on a screened-subnet or screened host gateway topology. c. No DMZ host is required in a behavior-based IDS d. Behavior-based systems do not require signatures or libraries of attacks 3. Your company wishes to implement a web server, email server, and voice-over-IP server that are accessible to the rest of the Internet. However, it wants to ensure that the structure and hosts within the rest of the network are totally protected from outside access. Which of the following setups would provide this functionality? a. Dual-Homed Gateway b. Screened Host Gateway c. Screening Router [edit section] Answers 1. The screened-subnet topology features a DMZ between two screening routers, effectively isolating the publicly-accessible zone from the rest of the trusted network. The answer is D. 2. Because behavior-based systems compare baseline use levels to current or potentially malicious levels, they do not require signatures or libraries, decreasing the amount of active administrator maintenance that is required. The answer is D. 3. A screened-subnet gateway provides a protected zone for public services. The answer is D.
<urn:uuid:702e0db9-c510-420b-98d3-400b7637811c>
CC-MAIN-2014-49
http://www.proprofs.com/mwiki/index.php/Security_Topologies
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931013466.18/warc/CC-MAIN-20141125155653-00200-ip-10-235-23-156.ec2.internal.warc.gz
en
0.933696
1,256
3.3125
3
2.53903
3
Strong reasoning
Science & Tech.
A planet six times as massive as Earth orbits the star Gliese 667 C while two companion stars lie in the distance in an artist's conception. The low-mass planet is one of 32 planets found outside our solar system over the past five years. The find increases the number of known "exoplanets" to more than 400, adding evidence to the theory that the universe has many places where life could develop. Scientists using European Southern Observatory telescopes didn't find any planets as small as Earth or any that seemed habitable. Most planets discovered so far are Jupiter-sized or even larger. Two of the newly discovered planets were five times the size of Earth and one was five times larger than Jupiter. Astronomer Stephane Udry of the University of Geneva said the results support the theory that planet-formation is common, especially with certain type of common stars. It is likely millions of stars have Solar Systems that may include Earth size planets. Thanks to National Geographic After gearing up for the space agency's much-hyped mission to hurl two spacecraft into the moon, the public turned away on October 9, anything but dazzled. Photos and video of the impact showed little more than a fuzzy white flash from the LCROSS flight mission to the MOON. The small white spot (enlarged in the insets) seen within the dark shadow of lunar crater walls is the initial flash created by the impact of a spent Centaur upper stage rocket. But before crashing into the lunar surface itself, the LCROSS spacecraft's instrumentation successfully recorded close-up the details of the rocket stage impact, the resulting crater, and debris cloud. In the coming weeks, data from the challenging mission will be used to search for signs of water in the LUNAR material blasted from the surface. Credit: NASA, LCROSS Mission Team NASA's recent lunar mission apparently was not the high-profile flop as it first appeared. Officials at Ames Research Center in California, which managed the mission, released images shown in the Red Circle below that clearly show a plume of debris estimated to a mile above the Cabeus crater shortly after the space agency's LCROSS rocket plowed into it. Creating a plume was key to the mission's success because the goal was to measure dust kicked up by the Centaur rocket to find out whether ice might lie hidden in polar craters. To do that, the accompanying $79-million Lunar Crater Observation and Sensing Satellite was to fly through the debris cloud so its spectrometers and cameras could sample the lunar dust. Hundreds of members of the public, who had gathered at Ames' campus in Mountain View to watch the 4:30 a.m. event on a huge outdoor movie screen, were disappointed to see only a close-up of the craggy lunar surface before the screen went black when the satellite crashed. New images, lifted from a different camera aboard the spacecraft, show that a plume did occur. That means the satellite should have been capable of detecting water, if it was present. Alan Caviness states, “I have additional lunar anomaly images that have been submitted to me by viewers of The Caviness Report website and the Filers Files weekly UFO update.” Since your initial report, many individuals, worldwide, have scanned the moon on the Google Earth website looking for recognizable anomalous structure images. And, this type of lunar surface exploration continues as we attempt to get to the bottom of this matter. Whether these images are determined to be real or hoaxed, the final conclusion will be most interesting. In the meantime, I am creating a catalog of anomalous images and will update you as more images are discovered. Recent submissions have been sent to me by Andy Jonkers in The Netherlands and Everette Moore in the United States. Alan Caviness www.CavinessReport.com Editors Note. Alan and I research the newly released NASA images of structures on the moon. Alan and I are shown researching the images. Andy Jonkers of the The Netherlands sent this photo. Alan Caviness and I are shown researching the images. Alan Caviness of High Point, North Carolina found this photo. The red tinted images of the moon were sent by Everette Moore of Raleigh, North Carolina The Japanese Satellite takes 3D video of structures on the Moon just prior to crash. Note An object is resting on top of another. The JAPANESE caption states: “The movie was composed using images obtained with TC that respectively face slightly diagonally forward and aft of the satellite about 12 minutes prior to the KAGUYA's controlled impact on the Moon. Because the KAGUYA was in a very lower altitude orbit, the spatial resolution of 3D images taken this time was higher than previously captured data. Thus we can see the very precious features on the Moon's surface thanks to this low altitude observation.” The KAGUYA was launched on September 14, 2007, and was controlled to be dropped to the Moon on June 11, 2009, as its mission was completed. http://wms.selene.jaxa.jp/selene_viewer/en/observation_mission/tc/037/tc_037_last_operation.html NASA's intrepid Mars rover Opportunity has found yet another meteorite on the surface of the red planet. Opportunity stumbled upon this new meteorite, dubbed "Shelter Island”, less than three weeks after driving away from a larger meteorite that the rover examined for six weeks. The rover began its approach to the meteorite with a 92-foot backwards drive on October 1, the rover's 2,022nd day on Mars. Opportunity and its twin rover Spirit — which is currently embedded in a soft spot of soil called Troy — have been on the Martian surface for more than five years. Shelter Island is a pitted rock is about 18.5 inches (47 cm) long. The meteorite was first detected in images taken two Martian days earlier. A Martian day is 24 hours and 40 minutes long. Thanks to Space.com http://www.space.com/scienceastronomy/091012-opportunity-meteorite.html Veterinarian Dr. Richard I Buchli D.V.M. found this strange formation on Mars nine miles long located at 70 42 N 18 55 W. This massive structure area seems to have been deliberately smudged at 01-10 N and 61- 24 W. The smudged area is thirty miles long. Thanks to ESA and Dr. Richard I Buchli D.V.M. and Dorothy Buchli W.B.W. ESA DLR/FU Berlin. Image Editor's Note: Two anomalies at top center and center appear like faces. At bottom is pyramid like structure. Copyright 2000 - 2009 © European Space Agency TOKYO -- Miyuki Hatoyama, a former actress and wife of Japan's Prime Minister Yukio Hatoyama is Japan's most colorful first lady ever. The Democratic Party of Japan, which her husband heads, scored a sweeping victory in recent elections, ending the ruling party's virtually uninterrupted half-century domination of government. Miyuki Hatoyama, a former actress, dancer and singer wrote in her book, "Most Bizarre Things I've Encountered” about her surrealistic space trip. "While my body was sleeping, I think my spirit flew on a triangular-shaped UFO to Venus," she said. "It was an extremely beautiful place and was very green," she said. The book is a compilation of interviews with 26 prominent people published monthly in a spiritual magazine "Mu." She is also known for her healthy cooking and making her husband look presentable and healthy. Hatoyama is a strong believer in spiritualism, who was born to Japanese parents in Shanghai and met her husband in the United States where he was a PhD student at Stanford. Prime Minister Hatoyama credited Miyuki with his professional success and praised her enthusiasm. BUCKEYE – I spotted six lights from I-10 west at Watson Road, going south moving very slow at about 1000 feet altitude on October 15, 2009. The lights were about a quarter of a mile apart. I took this picture at the end of Miller Road at the river bed. Can you tell me what this is? Thanks to MUFON CMS LOS ANGELES -- Watching the Disneyland fireworks from the hill that I live on, I saw this light for almost one hour. The camera I used was of poor quality and did not capture the size or the many different changes in lighting and shape that the UFO transformed into during the sighting period. I have no idea what the object was, although the Indigo colors were like nothing that I have ever seen before in the sky from any kind of flying machine. It would change color; sometimes it was red, green, or white. The lights actually separated and then came back together. It appeared to be over the 91 Freeway, about 300 feet off the ground. It moved slightly from left to right but stayed in the same location for the hour that we observed it. CORONA -- We were driving to a local park on Saturday afternoon October 17, 2009, when I noticed a stunning bright light flashing about 4:30 PM. We were driving along the I 15 Freeway near the first exit to Corona when I first noticed it. I thought maybe it was a small plane, but then I zoomed in 4 x to 16 x and all I could see was this cigar shape or elongated oval shape glinting every few seconds. I took several pictures over five minutes, as it changed into a round oval shape with a massive glowing light emitting from it. After about a minute it seemed lose its beautiful glow and became duller. I then noticed a small cloud or gray object that seemed to be staying near it and at times going away from it. Then suddenly, they both were gone. Before they faded my husband reminded me to zoom back out and to attempt to get photos of something nearby to contrast the object. When I got home I viewed the pictures, blew them up and contrasted them with various pictures taken of planes at a similar distance. You can always see the wing and or tail, this object was mainly light, without a tail or wings. Thanks to MUFON CMS HANALEI KE'E BEACH -- I went to Ke'e beach at sunset, as usual, to take photographs. Right after the sun went down, the underside of the cloud cover lit up with an orange glow. It was beautiful so I snapped five photos in a row. When I got home, I downloaded the photos in my computer and was surprised to see a disc like object in the second to last photo. It does not appear in any of the other photos. I just had my sensor cleaned so my photos are not impaired by dust or other particles. I did NOT Photoshop, or alter this photo in any way. The image is grainy because the ISO was set at 1600 to eliminate blur. I have no explanation for the object in the upper right corner of the photo. Do you? Thanks to MUFON CMS OAK PARK – I saw a red light in sky for 15-20 minutes in one spot. It looked like a star but it was bright red and moved erratically with the wind at times. It was not a helicopter because it did not make any noise. Then a small white light came out in front of it then the object shot off to the east very quickly. I wonder if anyone else saw it? It looked like it was over NW Cicero, Illinois. I live in South Oak Park to the north and west of where I saw it. I did get it on film but need to figure out how to up load it. Thanks to MUFON CMS SHREVEPORT – A blue UFO was seen on October 18, 2009, at 9:45 PM, in same spot as previously reported about a month ago with slight quick movements. Thanks to MUFON CMS WESTMINSTER -- My sighting began Saturday evening, September 12, 2009, at 7:56 PM, when my wife, two nephews, and I were sitting on our deck when I noticed a small white ball appear three houses away and one hundred feet high. My nephews started screaming, “What in the world is that?” The ball of light started to stretch out into a big flat teardrop image that was being blown up from another dimension. It was being filled up with bright white particles, and flapping like a flag blowing in the wind. It was now a large whitish yellow ball almost twenty foot around sphere just sitting silently still in the sky. A dark bluish purple mist or fog like substance started emanating from the bottom of this sphere. After another twenty seconds this fog covered the sphere completely. Then very bright spot lights shot out the bottom of this sphere with a beam of light that went the whole way down to the ground. After sitting there for forty five seconds, the spotlight and the sphere blinked out at the exact same time leaving only the blue mist that took twenty seconds to dissipate. Suddenly, it was like nothing was ever there. My wife thinks I'm crazy, but I think I am lucky to have experienced this sighting. Thanks to MUFON CMS Patricia Griffore writes, “Howard was in the US Coast Guard and we were stationed as light house keepers of Eastern Point Light House Station, in Gloucester and were lucky to view out over the Atlantic Ocean. In the fall of 1959, we sighted a craft near the light house. Now we live in Michigan in view of another light house on Lake Huron and in August of 2008, we witnessed a flyby of a different type craft. We can never forget our sites and know how important your work is to all the Earth.” Thanks to Howard and Patricia Griffore. www.nationalufocenter.com FAYETTEVILLE -- I saw a white oval object with a white ring of light surrounding it on October 9, 2009, at 6:30 PM. It was coming from right to left without wings nor did I hear anything coming from it. There was a black airplane circling around the area for about an hour. The object was in my sight for about 30 seconds before it disappeared. Note: The sun set at 6:48 PM, according to solar tables. Skies were clear so the witness would have had good conditions to characterize the object. Given the report I have no explanation for this sighting. The witness's sketch above illustrates a "saucer-type" object. Thanks to William Puckett UFOS Northwest http://ufosnw.com COLUMBUS -- I use a Celestron CPC-800 telescope and Nikon D60 D-SLR to produce digital images of the lunar surface. I have numerous images of airborne objects near the lunar surface. Most are saucer shaped and show light signatures. They would have to be quite large craft, in my opinion. Photos sent in October 15, 2009. Thanks to MUFON CMS Pennsylvania Light Like Moon MURRYSVILLE -- On October 10, 2009, after filming many UFOs coming out of the usual patch of woods from a farm field across the road, I caught one shooting a beam of light that made vapors or excited molecule action that was visible like it was hot. Inspection of area next day showed no burn marks on ground nor unusual marks on tree. Frame by frame of video shows the beam bending as it is seen through the glass of my car's windshield indicating it was not a lens flare. Video is at: http://www.youtube.com/watch?v=GKTWmzLJxY0 On October 11, 2009, another UFO rose from woods and started to fly across the valley and suddenly lit up really bright like a big golden orb with a sun-like in appearance, traveled like that for a bit, then toned down and started flashing like a plane. On October 13, 2009: After another night of seeing multiple orbs descend into the woods and crafts rise from woods on surveillance camera, I decided to try and go closer to see if I could film them hiding in the woods before takeoff. I went by Blackthorn Golf Course and filmed several of them in the sky, and noticed a white blinking light that seemed close to edge of woods. The multiple objects seemed sphere like with many lights that constantly changed. http://www.youtube.com/watch?v=LMd60keWws8 MURRYSVILLE – A Pennsylvania Constable writes, “On the evening of September 15th, 2009, I searched YouTube for UFO video's and came across YouTube address www.seeingufospa and phoned this woman who lives 40 minutes from my home.” Alison has an open invitation for people to come and help observe these events. On September 24, 2009, my girlfriend Sandy and I arrived in her rural, hilly, heavily wooded UFO sighting area at 7:30 PM. I called Alison as we passed a car about 7:55 PM, and informed her we were in the area. Alison asked, “Was that was me that just passed her.” I replied, I think so. Alison said, “Pull over; there is one directly above you”. I pulled over and we jumped out of the car and found Alison with her camera in her hand recording a bright, slow moving object 300 feet above us at 8:01 PM. My first impression was this craft is completely silent and has an amber/golden glow and moves in a very slow constant smooth straight line. This sighting lasted 40 seconds or so. Alison, Sandy and I headed back to the golf course and recorded a golden orb that moved slowly and then suddenly streaked across the sky to reappear a mile away. We then headed to a farm field Alison knew and talked for thirty minutes and saw lights appear half way between the tops of the trees and the ground. I recorded eight separate objects while Alison recorded several for a total of twelve sightings that evening. They show a round globe, white to golden in surface color with red texture/lines under the surface, with an "eye" or round design within the lines. After thirty seconds the interior detail disappears and there is only a golden glow. After recording this glowing object for fifteen minutes, it appears to pulse. Several of these lights turn on and off and it would suddenly disappear. Several recordings made by Alison were also recorded by me from a different location. Most objects are silent but some make a plane like noise, that seems to be somewhat off or "late". I am totally convinced these objects/craft are nothing I have ever seen. Alison Kruse is completely forth right and her recordings, in my professional opinion, are some of the best evidence I have ever seen. I will personally testify that her recordings and her sightings to be 100% creditable and 100% real. There are many more hours of recordings by Alison and myself. http://www.youtube.com/watch?v=PKmgNNRad4c HORSHAM -- I was conducting zone inspections of our base at Willow Grove on October 19, 2009 and glanced up and noticed two amber orbs traveling ESE around 350 mph. They did not have any anti collision lights but slowly dimmed and brightened erratically. They were about a thousand feet apart, one behind the other moving in a straight line. After about 30 seconds they simultaneously dimmed out completely. My first thought was that they were military aircraft until they shut off their lights. Military aircraft only do that in a theater of war not in heavily congested airspace like Philadelphia. Aside from the heavy air traffic the skies were completely clear. I've spent the last 14 years in the Navy as an Aviation Structural Mechanic working on F-14 Tomcats, Sea Dragons, Sea Nights and MH-60s Night Hawks. The last four as a military police officer. I KNOW AIRCRAFT! They were not civilian or military. They were either Top Secret A/C or off world. Thanks to MUFON CMS LUBBOCK -- On October 17, 2009, I saw a bright triangle shaped object hovering for forty minutes and took some pictures and video with my cheap digital camera. I went inside for dinner and came out an hour later to see that it was a little bit dimmer. I could tell this object was not just reflecting the sunlight, but was actually glowing like a blue halogen light. I noticed a tiny red dot dropping below it for a short distance and the triangle slowly faded into a small dot like the one below it. Then they both slowly just faded and vanished. They didn't just fly away, they just faded off. I had a very similar experience a few years ago. LUBBOCK -- My wife and I had gone out to dinner on October 17, 2009, and upon returning to our car we saw this very bright object in the sky. We arrived home ten minutes later and noticed it was still hovering so I got my binoculars and was astonished to see that it was triangular shaped with big bright lights at the points. I then got my 8 inch reflecting telescope and heard my neighbor and drew his attention to it as well. We saw a smaller light drop several feet below the main object and then stop. Then both objects completely faded out and disappeared. Thanks to MUFON CMS CLE ELUM -- On October 9, 2009, at 8 PM, I took the dog out and glanced up towards the ridge north of us and saw the brightest orange red sparkly light above it until I gave up around 9:30 PM. I thought perhaps a plane on fire but it stayed stationary. I went inside to get my binoculars and watched a searchlight shine down from it over some trees so I know it was right over the top of the ridge not behind it. Then about 10 minutes later big blobs of lights shot out the side of it. I waited and sat on a lawn chair watching and saw two gigantic headlights ringed in dark green turn on the left side of it. They weren't pointed directly at me. I waited some more and I was getting cold. So I went inside and somehow forgot about it. I didn't deal with it until Sunday and made this drawing in Paint shop Pro. Nothing is to the north of me, but hills leading to forests with nothing for about 30 miles I am two miles from the foothills here. Note: I don't have an explanation for this sighting. The extended stationary position suggests that it may have been a celestial object and could have been distorted by the atmosphere. The witness mentioned this possibility. However, the projection of light from the red light would rule out a celestial object. Thanks to William Puckett UFOS Northwest http://ufosnw.com VITOSHA -- With friends we decided to go to Vitosha Mountains on September 16, 2009. The closer we come to it, the clouds rose over the ridge of before us. Suddenly I noticed in the background of white, fluffy clouds above the Belchov Peak, a dark gray to black (vretenoobrazen) flying object moving right along. The front of the object resembled the peak of a bird. Its tail was like a plane. Therefore, at first, thought it was a plane. But it was very low and too close to cliffs and mountain tops? It was like a descending eagle diving towards their prey. I told her friend: "See the Eagle!" The object continued to fly on its horizontal axis. I decided the object was not a bird, because the duration of flying required the use of wings, which I did not see. I realized its squat body round body like a boiler was a UFO and I reached for the camera hooked on my belt. After overtaking the Academica hut, it flew towards the village of Bistrica, and entered a fluffy white cloud and disappeared. The object was not more than 500 meters from them at 11:30 AM. The painting shows the objects. Thanks to MUFON CMS EDMONTON, ALBERTA -- I was driving east towards Manning Drive with my wife when we saw an unusually bright light to the south of us at 7:45 PM, on October 16, 2009. It was large and brilliant like a planet but slightly bigger and brighter, but we could see the clouds behind it. When we passed a house the light was gone. About 15 minutes later I was walking out of the Blockbuster Video store in Clareview, when I saw two lights now. The larger looking like the first light with a smaller light directly below the larger one. The smaller light moved up and down like a yo-yo, but instead of going back up, the larger higher light would pull towards it, losing altitude, at the same distance and speed the smaller light moved first. It was like watching a jellyfish move in slow-motion rewind. It must be huge, and moves so strangely, with eight of these yo-yo + pull down maneuvers the lights were behind a distant building about 300-500 metres away. It was like a jellyfish swimming backwards. OAKVILLE, ONTARIO – On October 17, 2009, during an interview the witness sounded very lucid and alert. He stated that “He noticed three orange orbs in the sky that looked unusual." He went inside and told three friends who came outside at 1:10 AM and one taped the orbs with a cell phone. The video captured the three orbs and other background lights street lights. The witness also got his 10.2 mega-pixel Sony camera and made another video. At that time the orbs had moved on the other side of the building and had diminished to two. However, the video showed that the two merged to one and then split again 15 miles southwest of Toronto. Listen to Audio Clip to Witness Interview (MP3) Note: The witness stated that the orbs in the videos are much dimmer and less prominent than their appearance. The witness's three friends were more skeptical about what they saw and thought that perhaps a conventional explanation could be made. (However, no explanation was offered.) At this time I have no explanation for this sighting. Thanks to William Puckett UFOS Northwest http://ufosnw.com CAIRO -- I have on occasion watched the pyramid cams at www.pyramidcam.com powered by Stardot.net Cam . Along with other users we capture UFO type objects....regularly!! We upload and discuss them on the forum, but the images don't seem well known, so I attach some of the best ones! I can assure the pics are not fakes. Thanks to Nathan CAIRO – Image taken on August 8, 2009 at 20:23 hours at www.pyramidcam.com high above the pyramids. Thanks to MUFON CMS JAKARTA -- Cindy Lau writes, “The latest Asian country to succumb to UFO fever appears to be Indonesia. A clear photo of a UFO or extraterrestrial spaceship was allegedly taken in the capital city of Jakarta.” The photographer claimed not to have been aware of the UFO in the image until he downloaded the photo, taken with a cell phone camera, onto his computer. The news of the flying saucer then ‘spread like wildfire' through the city. Many somehow linked the UFO to recent natural disasters that have occurred in Indonesia. A number of photographic experts who examined the photo declared the saucer was way too clear and detailed and it would have been impossible to capture with on a mobile phone camera. Thanks to: [email protected] http://www.yousaytoo.com/ufo-flied-on-jakarta-city/111431 The UK Sun reports, “The video shows the Shahab-3 rocket soaring into the sky.” A UFO shoots a beam at the warhead making a flash. In seconds a nearby cloud is mysteriously torn in two by a UFO travelling at thousands of mph. Nick Pope, a respected former UFO analyst for the Ministry of Defence, examined the remarkable footage. “He hinted that whatever ripped through the cloud was not manmade. “ See video at: http://www.thesun.co.uk/sol/homepage/news/2670396/UFO-tracks-Iranian-missiles.html#ixzz0UaJYvXKR ROME -- I didn't see anything when I made the picture of my daughter on August 10, 2009. I made several pictures and downloaded them on my computer and I noticed the strange fish like object in only one picture. I was outside my 4th floor apartment. I don't understand what it is, maybe an expert does? Thanks to MUFON CMS VERBANIA – At 9:20 PM, I sighted two luminous, large of triangular forms on October 18, 2009, as bright as moonlight through clouds. They were similar craft and the second followed slowly leaving similar wakes. They stop and continue for some minutes, and then disappear. I've never seen anything similar! Thanks to MUFON CMS I was riding my bike home after a night out on May 20, 2009, when something blinked in the corner of my eye. When I looked up i saw this very bright disc just hovering stationary in the sky. After one minute it began to move from its stationary position to my right. That's when I decided to take a picture. Now I had some beers that night, so the next morning I thought it was a plane until I saw the picture where you can clearly see the disc shape. WOUDRICHEM -- I was about to sit down and have dinner when a friend pointed out something red in the sky on October 17, 2009. It was moving very slowly in one direction at 7:30 PM. It stopped moving and then suddenly and quickly flew away. It was amazing! What was even more interesting is that it made no noise. I thought it could be a plane but then the planes do make noise and don't stop in the mid air. Another interesting feature was that the object had bright red light and was easily visible in a disc shape. I was shocked by the happening. Thanks to MUFON CMS CHUKOTKA -- Paul Stonehill writes, “In Mysterious Sky: Soviet UFO Phenomenon,” Philip Mantle and I described a number of cases involving strange, eerie clouds all over Russia and the newly independent countries. Also, the sightings of cosmonauts of unusual cloud formations have been described in detail. While many sightings can be explained by secret Soviet (and Russian) military tests in the atmosphere, a number of cases cannot be explained. Here is an example from the chapter about Chukotka. "In the summer of 1990 a ship was harbored in the Ust-Belaya Village. Its crew noticed cumulus clouds that suddenly formed a perfect circle. In the center of the circle one could observe clear blue sky. The watch officer, Aleksandr Polorotov, took pictures of the event unfolding before their eyes. Groups of aircraft exited the circle, and flew away, to disappear in the surrounding clouds. The Soviet sailor, who previously served in the Air Force, knew the types of the aircraft of his country. The aircraft he observed in the Chukotka sky appeared nine times.” Polorotov was able to take just several pictures before his camera malfunctioned. When the film was developed, a cigar-shaped object could be seen on some of the photos. It had a strange luminescence, and some black dots were visible at a distance. But the mysterious “aircraft”, also observed seven other crew members, were not on any of the photos. The Soviet crew members experienced weakness and headaches". http://www.thesun.co.uk/sol/homepage/news/2677449/Mystery-halo-in-cloud-over-Moscow.html Thanks to Paul Stonehill, Author, researcher, and lecturer CARLISLE – My friend and I came across a UFO while driving to work on October 17, 2009. The object was six miles south of Carlisle at an altitude of around 500 feet and passed within 200 yards of the roundabout. We pulled over to get a better look at this very strange glowing object which was moving very slowly across a very clear night sky. We managed to get a photo of this object using a 8 mega pixels camera phone. While we were watching the object as another car pulled up and a women got out and asked, “If we were watching the UFO,” (thank god someone else saw this). We said yes and tried to get some movie footage as the object faded away! After a few minutes we decided it was time to get to work so headed off to Carlisle. Around 100 yards down the road we were still looking into the sky to relocate the object when all of a sudden it reappeared from nothing and shot off in a northerly direction at what can only be described as impossible speed. I have seen the euro fighter quite regularly as the RAF train for operations. The object we saw was on a very different level altogether!!!! Hope this sheds some light!! Thanks to MUFON CMS I was stood in my parents back garden and saw a light on the horizon. It seemed to be 90 degrees off the normal flight path of jets going past my parent's house. This sighting was reported October 19, 2009. I could not see any craft, just a star like light in the sky. It was on a perfectly straight trajectory and it seemed to be doing a very high speed. Most planes are leaving the airport and gaining altitude or landing. The silent light that I saw did not seem to be slowing or changing its height. As it got closer, I could see the glare had not lessened and could not be from landing lights as they are directional. I saw it pass under the cloud and realized it was obviously not anything I could identify. I ran in the house and got my Panasonic camera out with stabilization and tried to film with 12 x zoom as it continued on its trajectory until it disappeared over the roof tops. I heard no sound. I watched it rise from one horizon and disappear over the other in ten minutes. Thanks to MUFON CMS WORDSLEY -- I was walking my dog Georgina up the local canal on October 12, 2009, with my digital camera in my pocket and I decided to take a few snaps of the winter scenery. I probably took around 25 shots. I thought little more about it until I loaded the photos to my PC later that evening. That's when I noticed the strange object. Thanks to Ufo Case Book and Ken Pfeifer Mufon New Jersey. Influenza vaccination is the primary method the medical profession uses to prevent swine flu. Dr. Mark Nicas, professor at the School of Public Health, University of California, studies "the exposure intensity of contaminants in the air," including the H1N1 virus. He says, “When an infected person coughs or sneezes larger particles settle out quickly within three feet of origination but in contrast, the smaller particles disperse throughout the room and can be inhaled deeply into the lungs.” The viruses in these small airborne particles can survive for hours and are able to travel from room to room. I have personally found a method to keep my immune system strong and fight flu, colds, and other illness with special colored light therapy. Adults typically get two to four colds a year, while children may get as many as ten. Several of my friends, my family and I use experimental light therapy to successfully prevent many illnesses and have not had colds or flu over the last several years. My wife and I started using green polyester light and have been free of colds and flu for several years. It's never too late to heal your body by helping your immune system to fight infection and disease. It's time to drop your old ideas about home remedies being “less powerful” than drugs or vaccines—it's just not true. Ancient treatments are often much safer and more effective, than vaccines. A green light will cause no harm and will likely improve your immune system and help you fight numerous ailments including the flu. The light theory also works successfully on cats, dogs. Several people have written encouraging the use of Vitamin D from the sun. Light is the medicine of the future that is a nonintrusive, very powerful tool, that resides at the core of the new 'energy medicine'. We are prepared to offer the special experimental flu lights for $50 which includes shipping and handling at the address below. I'm offering eleven years of Filer's Files on a DVD with thousands of photographs and sightings for a donation of $50 that includes this year's subscription. Please include your e-mail address and mailing address. I need your help. It is very time consuming and expensive to research and prepare the files. Only a few people who have enjoyed the files for years have chosen to provide a donation. I would greatly appreciate your contributions to help sustain my production, reporting and research efforts. I also want to thank everyone who has sent their UFO sightings, without your help there would be no files. I want to thank the few people who have sent $25.00 and more for donations to Filer's Files for this year. When you send in a subscription please include your latest E-mail address. Don't miss the latest images of UFOs from Earth and Mars. I'm concerned about UFOs, and their impact on the Earth. Sign me up right now for Filer's Files. PLUS, I can keep all the reports I've received — and receive a pro-rated refund on the unused portion of my subscription. Send check or money order to: George Filer, 222 Jackson Road, Medford, NJ 08055. You can also go Pay Pal to: https://www.paypal.com/cgi-bin/webscr Sign up for Pay Pal and my email is [email protected] Become a MUFON member today! Benefits of membership include a subscription to the monthly UFO Journal which contains current investigations, sightings reports, articles by world-renowned researchers and more. To join now, click here. www.mufon.com Filer's Files is copyrighted 2009 by George A. Filer, all rights reserved. Readers may post the COMPLETE files on their Web Sites if they credit the newsletter and its editor by name, and list the date of issue. These reports and comments are not necessarily the OFFICIAL MUFON viewpoint. Send your letters to [email protected]. Sending mail automatically grants permission for us to publish and use your name. Please state if you wish to keep your name or e-mail confidential. CAUTION MOST OF THESE ARE INITIAL REPORTS AND REQUIRE FURTHER INVESTIGATION. God Bless Our Troops and Georgie Filer and Eddie Pedrick my grandsons who drowned. Please subscribe or see the Filer's Files website for images in this weeks issue.
<urn:uuid:6c00ba15-e1a5-4630-aa87-4b7ac2e6d71a>
CC-MAIN-2016-26
http://www.ufoinfo.com/filer/2009/ff0943.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396872.10/warc/CC-MAIN-20160624154956-00049-ip-10-164-35-72.ec2.internal.warc.gz
en
0.973009
8,081
3.84375
4
2.682442
3
Strong reasoning
Science & Tech.
The annual Society for Neuroscience conference is currently underway in Washington DC and Technology Review has a couple of article that reports on some of the highlights. One piece is particularly interesting as it focuses on the use diffusion tensor imaging (DTI), a type of MRI scan that identifies the white matter nerve pathways in the brain, to detect otherwise undetectable brain damage. These white matter pathways are like cabling that runs through the brain and in some forms of head injury they can get twisted, pulled or suffer sheering injuries which may not be easily visible on standard MRI scans. A minority of people who suffer head injury with no detectable injury on standard MRIs will suffer emotion and behaviour disturbance, memory difficulties, diffuse headaches and problems with concentration. This is sometimes diagnosed as post concussion syndrome and the researchers hope that DTI scans will find that people with these sorts of complaints will be found to have clear white matter disturbance. Actually, this is one of the oldest debates in head injury and stretches back to the time when soldiers were first returning from the First World War with ‘shell shock’. One of the theories, largely championed by Maudsley psychiatrist Frederick Mott, was that the shock waves from the shells disturbed the brains of the individuals causing microscopic brain damage. However, it soon became clear that some soldiers who had ‘shell shock’ had never been near a shell explosion, while others had genuine brain injury but had similar sorts of problems which weren’t easily explained by the physical damage they’d endured. One of the key lessons from this time was that our expectations, beliefs, emotions and interpretation of experiences and injuries contributed as much to the actual symptoms and disability as the physical damage. Interestingly, similar sorts of problems have been reported in soldiers returned from Iraq and, as echoed in the TechReview article, there is a big push to clearly separate cases of ‘genuine brain injury’ from ‘emotional trauma’. History tells us that attempting a clear separation is likely to be futile, because the same symptoms can be produced by either one, or a combination, and knowing that one definitely plays a part doesn’t rule out the other. So it’s interesting to hear the people quoted in the article suggest that DTI imaging could help assess who is cognitively able or not, who has a ‘real injury or is faking’, or whether someone should be sent back to the battlefield, because it relies on a cut-and-dry distinction between ‘brain injury’ and ‘psychological problem’ which doesn’t exist in the real world. As an aside, white matter isn’t invisible on MRI or CT scans, as suggested in the article, although some white matter injuries might be. And if you’re still hungry for more SfN news, TechReview has another bulletin with several highlights.
<urn:uuid:1bf58420-1f09-482e-8ca4-1867b0bec7c6>
CC-MAIN-2014-15
http://mindhacks.com/2008/11/18/the-eternal-quest-for-the-cut-and-dry-brain-injury/
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609535775.35/warc/CC-MAIN-20140416005215-00482-ip-10-147-4-33.ec2.internal.warc.gz
en
0.958696
601
2.75
3
2.980744
3
Strong reasoning
Health
The greedy cities The future is urban, poor and polluted. Geoffrey Lean on a dangerous migration Sunday 14 April 1996 It happened in the Brazilian port of Belem while he was making a series of films on the destruction of the rainforest. Tracking the camera along a stack of mahogany being swung into a freighter, he noticed the word "London" stamped on it. "I suddenly realised the impact that cities had on the world," he said yesterday. "I started to take an interest in the connection between urban consumption and human impact on the biosphere." Now Professor of Environmental Planning at Middlesex University, he has just completed a study on London's effect on the planet. He has found that although it covers less than 400,000 acres, it needs nearly 50 million acres - 125 times its area - to provide it with food, timber and other resources and to absorb its pollution. "This means that, although it contains only 12 per cent of Britain's population, London requires an area equivalent of all the country's productive land to service it - though, of course, this extends to the wheat prairies of Kansas, the tea gardens of Assam, the copper mines of Zambia and other far-flung places." The city, he calculates, burns the equivalent of two supertanker loads of oil every week and takes in 1.2 million tonnes each of timber and metal, over 2 million tons each of food, paper and plastics, and 1 billion tons of water every year. In return, it churns out more than 15 million tons of waste and 7.5 million tons of sewage sludge annually - and emits 60 million tonnes of carbon dioxide as its contribution to global warming. Similar calculations could be done elsewhere. Vienna takes in so much material that it adds 36,000 tons to its weight every day. Aligarh City in India imports 1,000 tonnes of soil daily for use in construction, affecting natural drainage and thus increasing flooding in the surrounding region. Mexico City has sunk by more than 20 feet over the last century because it has drawn so much water from the aquifer beneath it. And an expanding "ring of destruction" surrounds many west African cities as trees are cut down to provide people with fuel. In all, says Giradet, "cities occupy 2 per cent of the world's land surface but use some 75 per cent of the world's resources and release similar percentages of wastes". Cities have always depleted the environment around them, and have often paid the price. When archaeologists excavated Ur in Mesopotamia - one of the world's first cities - they found it had been buried by a layer of mud in around 2,500BC, the result, it is thought, of flooding caused by felling forests in the surrounding hills. The fall of Rome may have partially resulted from exhaustion of cropland. "Hell," wrote Shelley, "is a city much like London - a populous and smoky city." But there has never been anything like the present explosive urban growth. As we report on page one today, the number of people living in towns and cities will outstrip those in the countryside for the first time in human history, by the turn of the millennium. Within another 30 years there will be twice as many urban as country people. Next weekend in Marmaris, Turkey, the United Nations will bring together more than 130 politicians, officials, academics and other experts, to plan the "intellectual framework" for a giant conference to be held in Istanbul in June - Habitat II (Habitat I was 20 years ago). "The future of humanity will be shaped largely by urban conditions," writes Professor Klaus Topfer, the German minister of urban development and a participant at Marmaris, in a forthcoming issue of Our Planet, the magazine of the UN Environment Programme. "The quality of life for generations to come - and the chance to solve conflict within nations and between them - will depend on whether governments find ways of coping with accelerating urban growth." TWENTY years ago, in the run-up to the last Habitat conference, the prophetic Barbara Ward, economist and environmentalist, reached for a simile to describe the coming cataclysm. "One has the obscure feeling," she wrote, "that only the distant billennia of geological time can provide any adequate concept of the scale of the upheaval. The Indian subcontinent detaching itself from Antarctica and sweeping across the Indian Ocean to its violent collision with Asia's landmass across the Himalayas, the sea pouring in to change the Caribbean or the South China Sea into a chain of islands, the grinding of continental plates against each other, heaving up the Andes and leaving volcanic chains where Asia and Europe collide - these surely are the images that are appropriate to the scale of the 20th-century urban deluge." London became the first city since ancient Rome to reach a million people in around 1800, during Shelley's lifetime: it then took about 130 years to grow to 8 million. But it has taken Mexico City only 50 years to grow from 1 million to 15 million, while Bombay has gone from 5 to nearly 15 million in less than quarter of a century, and will exceed 27 million in another 30 years. In 1800, only 50 million people lived in towns and cities worldwide. By 1975 there were 1.5 billion, by the millennium this will have doubled to 3 billion, which means that then there will be more people living in urban areas than made up the entire population of the Earth in 1960. And by 2025 there will be 5 billion. Nine-tenths of this growth is taking place in developing countries. About half is due to population increase, the rest comes from the greatest mass migration in history. Pushed by rural poverty and official neglect of the countryside, pulled by the hope of a better life in the cities, tens of millions of country people uproot themselves every year to join the swelling urban slums. The migrants find no houses waiting for them, no water supplies, no sewerage, no schools - and no welcome, for they are usually resented by wealthier citizens and ignored, at best, by the authorities. They have to settle on land no one else wants, that is too wet, too dry, too steep or too polluted for normal habitation. They throw up makeshift hovels, made of whatever they can find - sticks, fronds, cardboard, tar-paper, petrol tins, perhaps (if they are lucky) corrugated iron. In Brazil they call these slums favelas, in India bustees, in Tunisia gourbevilles, in Chile cullampas ("mushrooms", after the way they spring up overnight) and in Argentina villas miserias. In Bombay 3 million people are squeezed into such shantytowns, in Bogata and Kinshasa 60 per cent of the citizens live in them; in Addis Ababa, 79 per cent. They already contain one-third of all the urban dwellers in developing countries. But they are considered "illegal", and can be demolished without notice. Infant mortality rates in city slums in Bangladesh are 50 times higher even than in the deprived countryside the migrants left behind; in Manila they are three times higher - and tuberculosis is nine times more common - in the slums than in the rest of the city. Worldwide, the UN estimates, at least 250 million urban dwellers cannot get safe drinking water and many of those who do have to rely on standpipes that run for only a few hours a day. At least 400 million are without even latrines for sanitation. By 2000, most children born in Third World towns will be to such desperately poor families. Already more than 100 million homeless children struggle to survive on the streets. Rich-world cities have ceased to grow rapidly, but their relative prosperity has brought its own swiftly increasing problems, quite apart from their enormous impact on the world's environment and resources. Pollution from car exhausts has raised death rates in cities all over the industrialised world. Meanwhile congestion has limited traffic to average speeds slower than in the days of the horse in cities as diverse as London and Milan, Utsunomiya in Japan and Trondheim in Norway. Increasingly, cities are suffering simultaneously the problems of poverty and affluence: pollution and destitution. In Mexico City one quarter of all babies are born with enough lead in their blood permanently to damage their brains and physical development, while particulates help kill 12,500 people each year. Worldwide, the World Health Organisation estimates, more than one in every three urban dwellers - 1.1 billion people - have to breathe unhealthy air. Many inner cities of the industrialised world are sunk in dire poverty. Men have a better chance of living to 65 in Bangladesh, the world's 12th poorest country, than in Harlem, New York, part of one of the wealthiest. It is hard to imagine the cities long being able to withstand existing pressures, let alone accommodating the explosive growth of the next decades. But, as the organisers of Habitat II stress, the similarity of the problems all over the world at least provides common cause in tackling them. George Wilhelm, the conference's deputy secretary-general, likes to quote Shakespeare: "What are cities, but its people?" A former Brazilian minister of the environment in Sao Paulo, he remains an optimist. The concentration of people in cities is also "a concentration of opportunities", he says. Nowhere is this more true than in the apparently hopeless slums. Visiting Rio, I was surprised to find favela after favela, which their own people had turned into solidly built communities, with running water and sewerage, entirely by themselves, with little or no official help. One was once so dire that its people had called it the Scorpions' Nest: after they had rebuilt it they named it Happiness Park. Given security of tenure to their land, people will work hard to improve their slums. The authoritative World Resources Report - which will be published next week by the World Resources Institute, the UN Development Programme, the World Bank and the UN Environment Programme - gives examples of transformations wrought by people of the cities themselves, often with help from citizens' organisations or enlightened authorities. In Orangi, Karachi's largest slum, residents organised themselves into groups of 20 to 40 families, installed sewage disposal, provided simple health care and family planning, and brought down infant mortality four- fold in just nine years. There is a similar success story in Cali, Columbia's second largest city. In Chattanooga, Tennessee, the city authorities and local people cleaned up some of the worst air pollution in the United States. Some 1,200 local authorities in 33 countries have established grassroots campaigns to implement the recommendations of the 1992 Rio Earth Summit. Curitiba, a Brazilian city of 2.3 million people, recycles 70 per cent of its waste, has increased the amount of green space per inhabitant ten-fold, and has so improved public transport that it burns 30 per cent less petrol per head than other Brazilian cities. Jaime Lerner, three times mayor of the city, says the key is giving residents joint responsibility for solving its problems. Evidence from around the world bears him out. When "solutions" have been imposed by experts, they have rarely worked. When local people - particularly women - have been involved in design and implementation,they have succeeded much more frequently, and at much less cost. International organisations are increasingly promoting this. The UNDP has a project for searching out and helping grassroots urban groups. And Habitat II will include citizens' groups (the first to do so officially), rather than just governments at the heart of its deliberations. "We are trying to change the very way the United Nations operates," says Dr Wilhelm. "After all, it is not called the United Governments." - 1 Exclusive: Abusers using spyware apps to monitor partners reaches 'epidemic proportions' - 2 Margaret Thatcher 'expressed fears of Asian rising' at Anglo-Irish summit in 1984 - 3 Sussex couple die in suspected Christmas Day 'suicide pact' - 4 The 'Black Museum': After 150 years, public set to see exhibits from police’s grisly crime museum - 5 The Unluckiest People of the Year 2014 (and one very unlucky giraffe) Exclusive: Abusers using spyware apps to monitor partners reaches 'epidemic proportions' UK weather: Warning for more snow and ice as freezing temperatures and gales hit Britain UK weather: Travel chaos continues as King's Cross train delays add to snow on roads The Unluckiest People of the Year 2014 (and one very unlucky giraffe) North Korea calls Barack Obama 'a monkey' in latest attack as 'The Interview' row festers British actor Idris Elba cannot star as James Bond because he is black, says shock jock Rush Limbaugh Germany anti-Islam protests: 17,000 march on Dresden against 'Islamification of the West' Ukip member gets into Christmas spirit with Union Flag plea to Santa 'for our country back' Immigrants make UK racist, says Ukip councillor Trevor Shonk BBC director Danny Cohen: Rising UK antisemitism makes me feel more uncomfortable than ever Katie Hopkins speaks out on childhood obesity: 'Parents of fat children should be prosecuted for child cruelty' Not specified: Selby Jennings: VP/SVP Credit Quant Top tier investment bank i... £40000 - £43000 per annum + benefits: Ashdown Group: Senior Marketing Executiv... £40000 - £43000 per annum + benefits: Ashdown Group: An international organisa... £25000 - £30000 per annum: Ashdown Group: Internal Recruiter -Rugby, Warwicksh...
<urn:uuid:27aae770-8929-41b1-9073-7998884924f6>
CC-MAIN-2014-52
http://www.independent.co.uk/news/uk/the-greedy-cities-1304809.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447554598.88/warc/CC-MAIN-20141224185914-00025-ip-10-231-17-201.ec2.internal.warc.gz
en
0.95366
2,852
3.140625
3
2.930768
3
Strong reasoning
Science & Tech.
What is Messianic Judaism? The earliest followers and disciples of Rabbi Yeshua (Jesus) of Nazareth believed that Yeshua was the promised Mashiach (Messiah) of Israel and the Redeemer of all nations. However, they did not believe that Yeshua came to start a new religion or to abolish the Torah (Teaching, Instruction) of Moses; instead, they continued to worship the God of Abraham, Isaac, and Jacob as participants in the ancient Israelite faith, now called Judaism. Within the last fifty years since the rebirth of the nation of Israel, a magnificent revival has taken place - thousands upon thousands of Jewish people are accepting Yeshua as the promised Jewish Messiah and many believing Gentiles are coming to this same conclusion, that Yeshua is the Jewish Messiah. Since the advent of Christianity around 300 CE, the original message of the earliest followers of the Messiah has been changed from its biblical viewpoint and has had elements of paganism added. However, now that Jewish people are again accepting Yeshua, a marvelous thing has been reborn - Messianic Judaism, the biblical Jewish faith of Yeshua's earliest disciples, a continuation of the faith of the ancient people of Israel. As many Jewish and Gentile believers are learning the truth of the Torah, it is influencing their lives in indescribable ways, transforming them into passionate lovers of the God of Israel. These Messianic believers are the people of the last days, whose mission it is to prepare the world for the return of King Yeshua by restoring all things lost to the Body of Messiah. The scales have fallen from the eyes of many people, when, after a lifetime of reading and studying the Scriptures, they began to question the traditional interpretations of God's Word that they had learned. When they first read our Redeemer's words, "Do not think that I came to abolish the Torah or the Prophets . . . Until heaven and earth pass away, not the smallest letter or stroke shall pass from the Torah until all is accomplished" (Matthew 5:17-18), their whole world is shaken to its very foundation. They think: Does this mean that I am responsible before God to observe all of those commandments found in the Five Books of Moses? They had always been taught that with the advent of the Messiah, the Torah's ceremonial and ritual laws were abrogated and replaced with the grace of God. They believed that the Israelites of the so-called "Old Testament" had to earn their salvation before God by observing all the commandments in the Torah and offering endless animal sacrifices. However, after much study and prayer, they feel God's Spirit gently wooing them home to His truth, and they slowly make a paradigm shift in their biblical worldview. As Rabbi Sha'ul (Paul) admonished the believers in his day, "Be renewed in the spirit of your mind" (Ephesians 4:23), these enlightened believers are allowing the Holy Spirit to renew their minds by thoroughly washing themselves in the waters of the Scriptures, thus cleansing themselves from all thoughts that are contrary to God's Torah. Having been taught differently for so long makes this journey difficult to say the least, but the Almighty slowly changes the heart and then the mind. Like a light dispelling the darkness from a room, the light of Torah illuminates the hidden aspects of the Scriptures and causes the Word to come alive in people's hearts! The Bible becomes a new book, full of life-giving instructions! The Scriptures finally make sense, and the overall revelation of the God of Israel begins to be clear for the first time in people's lives! They understand now that the children of Israel who lived before the coming of Yeshua were saved by the grace of God also except that they looked forward to the coming of the Messiah and His redemptive work. The Torah teaches that "Noah found chen (grace or beauty) in the eyes of the LORD" (Genesis 6:8). God's chesed, His grace or unmerited favor, has always been available to all those who call upon His Name for forgiveness of sin. Obeying the commandments of God brings life, not bondage. The Torah is now the blueprint for these believers for righteous living, and when they read the Holy One's promises to them in the Torah, they are encouraged and strengthened to walk in obedience and to choose life! Now they understand the Holy One's message to them: "See, I have set before you this day life and prosperity, and death and adversity; in that I command you today to love the LORD your God, to walk in His ways, and to keep His commandments and His statutes and His judgments, that you may live" (Deuteronomy 30:15-16). Living in obedience to the Torah of God is the truest form of freedom and liberty, not legalism, as King David proclaimed, "So I will keep Your Torah continually, forever and ever, and I will walk at liberty, for I seek Your precepts" (Psalm 119:44-45). Having discovered the truth that Yeshua the Messiah is the Torah incarnate, the Word of God made flesh (John 1:1), and that His disciples are to walk just as He walked (1John 2:3-6), in obedience to the commandments of His Father, these enlightened believers have truly been set free from the bondage of sin and death. This does not mean that they are perfect, but they are striving for perfection, for this should be the goal of every believer. Yeshua, their Redeemer and King, came to set them free from the bondage of sin, so that He could fill them with His Spirit and enable them to be truly free, becoming slaves to righteousness (Ezekiel 36:27). They now understand that Yeshua is the Torah. So, to love the commandments of God and to follow His Word diligently with all their heart, soul, and strength demonstrates to those around them that they are children of the God of Abraham, Isaac, and Jacob (Matthew 5:16). They become increasingly passionate about their Abba (Father) and His life-changing Word! They wish that everyone could experience the peace that can be theirs if they would simply choose to follow the simple, direct path of obedience to God's Word! As these Messianic believers study the Messianic Writings ("New Testament"), they see more than ever before that Yeshua and His disciples further explained and expounded upon the same truth found in the Tanakh ("Old Testament"). This truth can transform lives just as it did theirs! The Torah is the truth of God, just as Yeshua, the Living Torah, is that very same truth of God in human flesh! King David proclaimed, "Your Torah is the truth" (Psalm 119:142), and Messiah Yeshua proclaimed, "I am . . . the truth" (John 14:6). Messiah again exclaimed, "I am the Light of the world; he who follows Me will not walk in darkness, but will have the Light of life" (John 8:12). King Solomon taught us: "The Torah is light" (Proverbs 6:23). The Torah of Yeshua and the Torah of His Father are one and the same! What a wonderful and magnificent God we serve! The peace and joy of the Almighty overflows in the lives of these believers daily, as they remain faithful to His Word through the empowerment of His Spirit. Keeping the laws of kashrut (the dietary laws), for example, reminds them that their body is the temple of the Living God and it is to be kept holy and pure before Him in all areas, from what they allow to proceed out from their mouth to what they allow their eyes to behold. Keeping Shabbat (the Sabbath) is such a tremendous gift that they would not take anything in exchange for their weekly oasis of spiritual and physical relaxation and rejuvenation. They eagerly wait for the advent of the Sabbath each week, going so far as to count down the days until the next Shabbat and to plan early in the week what they will be serving for the Sabbath meals. From Friday afternoon a little before sunset until Saturday evening an hour or so after sunset, they relish in the intense presence of the Lover of their souls. Some especially enjoy the Shabbat evening dinner and rituals or the Shabbat morning Torah service at their synagogue! The moedim, the appointed times of the Holy One of Israel, are also so special to them; from the Feast of Matzot (Unleavened Bread) in the spring to the Feast of Sukkot (Booths) in the autumn, they cherish each of their Father's holy seasons. They have learned so much from the observance of Pesach, the Feast of Matzot, and the Feast of Shavuot (Weeks) about Yeshua's first coming as the Lamb slain before the foundation of the world and how God's Spirit writes the Torah on the hearts of all those who believe. They desire to be counted worthy to see the fulfillment of the autumn moedim, when their Master Yeshua returns to reign from Jerusalem as Melech HaMashiach, the King Messiah. What a joyous and blessed day that will be! In fact, the Good News of the Kingdom, i.e., the Jewish Gospel that Messiah and His Emissaries and even the Prophets before them so vociferously taught, not only involves a life-changing turn from sin to righteousness, but it also embodies the prophetic promise that The Fallen Tent (Sukkah) of David (Amos 9:11-15, Acts 15:14-18), the royal throne promised by HaShem to King David's descendants, will be rebuilt in preparation for Yeshua's soon return to Jerusalem to claim His throne as King of Israel. Biblically speaking, it is an anticipation for this soon-coming Kingdom of God upon the earth through the reign of the Jewish Prince of Peace that prompts and motivates true heartfelt, life-altering repentance. Indeed, the scales have fallen from the eyes of Jews and Gentiles all over the world, and they now understand that the Savior and Redeemer of the world is Jewish. Yeshua lived a Jewish life, going to synagogue, keeping the seventh-day Sabbath and all the feasts of His Father. His initial disciples were all Jewish, and the Body of Messiah was a sect of Judaism for the first 100 years or so after the death and resurrection of Messiah. The early followers of Yeshua, both believing Jews and grafted-in Gentiles, went to synagogue and kept the Shabbat holy. After all, the Bible was written exclusively by Jews to Jews and sojourning Gentiles. The Bible is a Jewish book! The roots of our faith are Jewish, and the trunk of the Olive Tree of Romans 11 is Jewish, and we derive all that we are by being grafted into that Jewish root and trunk, a root and trunk grounded in the Torah! As the sojourning Gentiles continue to study and seek guidance from the Spirit of the Holy One, they discover that the Scriptures speak clearly and concisely concerning the role believing Gentiles play in the Body of Messiah and the nation of Israel as a whole. God's Spirit has shown these grafted-in Gentiles through their study of the Scriptures that they are His children, members of the commonwealth of Israel, no longer aliens and foreigners to the covenants and promises of the God of Israel (Ephesians 2:11-13), but sojourners with God's chosen people, just as Ruth the Moabitess was. They are covenant members by faith, just as Avraham Avinu (Abraham our Father) was a covenant member by grace through faith. They have crossed over into the light of God's grace and truth. They understand that whether one is Jewish or a grafted-in Gentile is not ultimately important, but obeying the commandments of the Most High God is what truly distinguishes one as a follower of the Jewish Messiah (1Corinthians 7:19)! There is only one Torah for the native-born and the foreigner alike (Exodus 12:49)! Blessed be His holy Name! They now know who they are in Messiah - covenant members with His chosen people! God's covenants are established forever and can never be changed (Isaiah 40:7). Grace is not opposed to works, but both work together as two sides of the same coin (James 2:17). Without God's grace and His Spirit to empower them, these enlightened Jewish and Gentile believers would find it impossible to overcome their sinful natures. But now the Spirit has written the Holy One's Torah on their hearts (Jeremiah 31:33), and they can and must obey its words of truth and life (Deuteronomy 30:11-14). What blessings they have experienced from making the decision to choose life! In closing, it is frankly impossible to have a deeply intimate relationship with someone you know very little about. God's Spirit is enlightening people, and they are learning, growing, and understanding who their Father is and what He desires for their lives. As they grow, they begin to have a deeper and more intimate relationship with Him. He truly is the Lover of their souls, the One they live for in everything they do and say. They wish above all things to please Him and to demonstrate to those around them that they are His sons and daughters. Life in the Father through His Son, Yeshua - this is what Messianic Judaism is all about! Even so, come Master Yeshua and establish Your Father's eternal Kingdom!
<urn:uuid:27a2a795-4c65-48d8-8ddf-63c7eeaa51f2>
CC-MAIN-2021-31
https://beitshalom.us/about-us/what-is-messianic-judaism
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154158.4/warc/CC-MAIN-20210801030158-20210801060158-00474.warc.gz
en
0.961087
2,811
2.515625
3
2.953232
3
Strong reasoning
Religion
Bunker Hill After American and Japanese images of kamikaze pilots differ greatly. This web site explores diverse portrayals and perceptions of the young men who carried out suicide attacks near the end of World War II. When Japanese kamikaze pilots carried out their attacks between October 1944 and August 1945, Japanese and American people had opposite perspectives. Japanese people saw young smiling pilots as they waved goodbye. In contrast, American soldiers viewed death and destruction when the pilots' planes exploded upon crashing into their ships. These very different points of view continue to influence Japanese and American perceptions of kamikaze pilots even The first major section of this web site analyzes American and Japanese views of kamikaze pilots in two separate essays. Each essay's first part analyzes the principal images or perceptions that people currently have about kamikaze pilots. The second part explores the most important sources of these images. The page on American Views argues that most Americans perceive kamikaze pilots as faceless, lacking individual personalities. Lack of knowledge about kamikaze pilots has caused many Americans to speculate about their motivations, so many believe they were fanatical, suicidal, or forced to make attacks. Many people know little or nothing about the history of Japan's kamikaze corps, but they form their images of the pilots based on the Anglicized word "kamikaze," which has come to signify anyone having reckless disregard for personal welfare. Current terrorist suicide bombings have provoked comparisons to attacks made by Japan's The essay on Japanese Views shows that Japanese people today consider kamikaze pilots in a manner completely contrary to American views. Japanese believe that the brave young pilots suffered tragic deaths in defense of their homeland. The letters, poems, and diaries written by kamikaze pilots have had significant influence on Japanese people's views. The Chiran Peace Museum for Kamikaze Pilots, which opened in 1975, has contributed to Japanese people viewing the pilots as individuals who suffered tragic deaths. Also, two recent popular movies, Hotaru (Firefly) and Gekkou no Natsu (Summer of the Moonlight Sonata), have strongly influenced current Japanese perceptions about kamikaze pilots. Five Kamikaze Pilots The second major section includes reviews of various forms used to create kamikaze images, including Books, Writings, and Other Forms. Web pages in this section include evaluations of works of popular culture, such as comic books, television programs, fiction, animation, and children's books. This section also contains several other analytical essays covering topics such as personal narratives, Japanese films, and documentaries. This web site covers all of Japan's special attack forces, which carried out suicide attacks not only with planes but also with torpedoes rocket-propelled gliders (ohka), explosive motorboats, and midget submarines. The stories on this site focus on personal rather than military aspects of Japan's kamikaze operations. The site also includes many translations of You can find information in several ways. The expanding menu system at left shows most pages on the site, and the Site Map lists all pages with links. You can also use the search box at the top right to locate specific information on the site. I first became interested in Japan's kamikaze in April 2000 when I visited the museum at Yasukuni Jinja, located in Tokyo near the Imperial Palace. At that time the museum had a special exhibit of last letters written by kamikaze pilots. The letters contained a variety of sentiments, including resolve, patriotism, and love for family. Surprising to me, they did not reflect fear or bitterness. After reading these moving letters, I realized that Japanese views of kamikaze pilots differed immensely from opinions held by Americans. I consider this web site to be a collaborative effort of many people. If you have any questions or comments, please feel free to contact me in either English or Japanese. If you have material, photos, information, or opinions you would like to add to this web site, please contact me. Bill Gordon - Homepage 45 Midway Drive, Cromwell, CT 06416 e-mail address: [email protected]
<urn:uuid:d824470e-e044-4202-8e5c-1f2df98e56d7>
CC-MAIN-2015-35
http://www.kamikazeimages.net/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064019.39/warc/CC-MAIN-20150827025424-00014-ip-10-171-96-226.ec2.internal.warc.gz
en
0.927092
932
3.34375
3
2.983569
3
Strong reasoning
History
Türkçe versiyonunu okumak için linki tıklayınız: Güneş ve Altın Gold, for thousands of years was considered the metal of the Sun. Its chemical symbol is AU. The source is the Latin Aurum. It means, glittering, shining. Gold, impressive with its bright yellow color and its glitter, is a very heavy metal. As it is a very resistant element that does not get into a reaction easily, it doesn’t get affected by air and water. This is why it doesn’t get rusty, blackened or tarnished. It is very soft in its pure form. This way, it can be shaped easily by forging. Gold, with all its qualities considered as the most precious metal throughout history. The mythological story about the Golden Fleece, is based on gold dust, which could be understood by its name. It is not a coincidence that the focus of the story, the Golden Fleece is located at Kolkhis. This region, in that times, was rich in gold and silver. Furs of various animals was being used to sort out the gold particles in the rivers. The furs which was laid in the river towards its flow, was holding the gold particles. The furs with gold particles on were later on was getting dried and forged. It was by historians that because there was famine in Greece back then and people were trying to find new solutions. The Kolkhis region which was living in prosperity, naturally picked the Greeks’ interest. This legend is myth that gives clues about Greek settlers which arrive to Eastern Black Sea and find colony cities in there. Of course, these type of trade movement in the Eastern Black Sea region by the Greek colonists was not just limited by the mining sector. Slave trade, lumber trade, fishing, honey and many other various goods with trade potential was intrigued the Greeks. The trade missions was at first weak and circled trips but they continued increasingly because of the abundance of goods and the locals were backwards in terms of civilization. And at last, it reached to the point where they started to build the first colony cities in appropriate locations on the shore. Gold could be found everywhere on earth. It can be found in seas, underground, even in the highest segment of atmosphere. But, while it can be found everywhere, it is at low concentrations. The Sun is associated with gold and as well as with the heart and the life energy. In ancient times, it has written much about the existence of a golden made potion named the Elixir of Life. Colloidal gold can be bright yellow, red or lilac according to the gold concentration. In Hindu Chemistry, gold was used to create various potions. In the 16th century, founder of chemistry, astrologer Paracelsus created the “Aurum Potabile” (Latin: drinkable gold). In our day, doctors use gold to diagnose heart diseases and tumors. For the highest gold concentration is around the heart, Au, 195 isotope was developed. This isotope gives the image of the fabrics that contain blood in the heart: this process is called “heart imaging”. In older times, it was also being used for rheumatism diseases. Rheumatism diseases in astrology are symbolized by Saturn and the Sun is the traditional enemy of this celestial body. It is also convenient with the propositions of the founder modern chemistry, astrologer Paracelsus: “It should be destroyed with a similar body or an enemy of the celestial body that causes the disease.” Since it has been many years that the Sun – Gold price relationship was discovered by many, today in financial astrology, the Sun is not used as an inferential. Translate from Turkish: Mehmet Günüşen Devrim DÖLEN was born in 3 March 1977 in Istanbul. Before she began her professional career with many astrology and statistics groups which are active in USA and Turkey, she’ve spent 22 years on astrology researches. Since 1999, she shared some of these in peer-review journals and some of them on the internet. Within the Istanbul Aydin University, she’s the first astrology teacher in Turkey with a YÖK approved certificate. She is one of the founders of the Gizemciler group founded in 1999. One of the moderators of the Astrology and Astro-Diary group which founded in 2001 and which focuses on astrology and is one of the first communities in Turkey to give astrology lessons in Turkish, Dölen, became one of the 3 founders of the astroturkiye.com which she co-founded with Devrim Yilmazer and Hakan E. Kayioglu whom she knew more than 10 years. In 2011, she founded the Zodiac Astrology Publishing and the Astrology Academy with Devrim Yilmazer. She has various books and research projects going on. She created her life style around living with cats, making astrological paintings, designs and dioramas, eco-villages, diving, searching, failing and searching again…
<urn:uuid:8ef377dd-3436-45ae-b2e9-165fd478d26c>
CC-MAIN-2023-06
https://www.astrolojiakademisi.com/sun-and-gold/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500303.56/warc/CC-MAIN-20230206015710-20230206045710-00700.warc.gz
en
0.978477
1,080
3.1875
3
2.585313
3
Strong reasoning
Science & Tech.
It comes as no surprise that Millennials have become one of the most influential forces behind consumerism today. And while everyone is looking to find the best deal and save as much money as possible, Millennials are willing to spend more when it comes to sustainability. When it comes to beauty products, the first question on a lot of people’s minds is, “is it cruelty-free?”. When buying fresh produce, they want to know “is this locally grown?”. And when buying clothes, many Millennials are asking, “was it made by slave labor?”. Writer and activist Melanie Curtin shared that she willingly spent 38$ on a t-shirt because it’s a brand she trusts to be ethical and sustainable. According to her, Millennials are no longer looking for a product, they’re looking for a lifestyle, and buying Fair Trade has become just that. After the Rana Plaza factory collapse, consumers’ eyes were finally opened, and while some people were shocked to learn of the working conditions of the women and children in the factories, they soon forgot all about it as they stepped out for their next shopping spree. However, quite fortunately, some consumers did not forget. Over the years, there has been a growing awareness of reducing one’s carbon footprint, going zero-waste, and living a perfectly sustainable lifestyle: “According to Fair Trade USA, brands wanting the certification have grown like crazy the past two years”. To help bring awareness to the unethical and unsustainable practices that go into fast fashion, a social experiment was conducted in Berlin where consumers could purchase a t-shirt for roughly 2.22$ in a vending machine. The screen read, “People want fashion at a bargain but would they still buy it if they knew how it was made?” The video then goes on to show the dangerous and unsanitary work environment of the factory and explains the 16 hours days these women and children need to work to earn just 13 cents per day. Suffice to say, many consumers chose to no longer buy the t-shirt, but donate the money instead. The injustice that comes with unethical fashion has been able to go on for so long because consumers in developed countries are simply uninformed about the reality behind what happens to their clothes before it hits the market. Safia Minney, fashion designer, and activist shared on her blog: “Shockingly, it is easier today to buy products made by slaves, than to buy slave-free products”. Shockingly, only 5% of the current textile market is considered sustainable. But as more consumers are becoming aware that slavery is still very real today, more and more fashion companies are stepping up their game to be more ethically and sustainably driven. However, the responsibility to help create ethical and sustainable fashion doesn’t lie only with the companies and manufacturers. Consumers need to play their part, and as millennials have been demonstrating, the power of where we choose to invest our money – and just to clarify here that buying from sustainable sources is absolutely an investment into more durable clothes and shoes – impacts where companies will further choose to continue making their own investments. We have the power here, let’s do something with it.
<urn:uuid:1d0670d1-903a-4549-a055-90d00fd36205>
CC-MAIN-2019-09
https://www.thetalko.com/millennials-over-fast-fashion-prefer-fair-trade/
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247484928.52/warc/CC-MAIN-20190218094308-20190218120308-00204.warc.gz
en
0.975731
671
2.5625
3
2.925924
3
Strong reasoning
Fashion & Beauty
Establishing the APA Old fashioned paper Style Regardless of version of newspaper you could be producing according to the APA pieces of paper formatting, it needs to go along with some specific instructions. From margins and fonts to special sectors as well as a Useful resource Catalog, these data format recommendations stipulate the way your papers appearance. Pieces of paper type and size for any APA cardstock structure Use ordinary-dimension laptop document measuring 8.5a�? by 11a�?. Stay away from heavier keep-type paper. spacing and Margins in the APA newspaper style Margins and spacing each play the game crucial positions from the APA paper format. They current your data inside of a clear set up that helps followers in evaluating your site content. Utilize adhering to specifications for spacing and margins. - Use 1a�? margins for the top, both and bottom sides. - Use 2x line space concerning all facial lines in your system within your cardstock. - Use double locations between sentences. - Try a ? inch indentation for each new section. APA endorses using the a�?Taba�? key in lieu of by hand showing up in the room bar five times. Typeface type and size for the APA newspaper formatting Your size and type for the typeface you choose with the APA newspaper file format make any difference. Work with the subsequent specifications: - Use 12-pt font unless you are instructed to use 10-pt are your site content getting selects for for you? online paper formatting reviews how so as to respond by means of critics using your essay or 11-pt font. - Decide a simple-to-check out typeface. APA papers style advises applying Moments Roman Numeral. The 4 important parts of the APA document set up All research paperwork written in the APA pieces of paper style have several key parts: headline webpage, abstract, primary human body and research part. According to the variety of homework paper you could be producing, there are supplemental segments. - Subject internet page The headline web site of an APA newspaper includes a functioning go (often known as a header), your newspaper name, your byline because article writer, the institutional affiliation and an authora��s message (if neccessary). Performing scalp-This includes reduced version of the paper name including a site number. Your performing go can be quite a highest possible of 50 character types in accordance the APA newspaper set up. Spaces and punctuation are in the 50-characteristics maximum. The webpage number is put flush while using best border, and all of those other managing top of the head is put flush remaining. Put the shortened version of this label to all investment capital letters. Operating travel: Label Of This Papers The running scalp continues on on almost every webpage to your APA structure old fashioned paper. On virtually every web site once the title website page, the working travel looks like the here instance: Subject Of Your Own Papers Do not forget that just the website quantity is applied; the phrase a�?pagea�? is absolutely not put to use. Report name-The full headline is structured across the post and centered on top of the 50 % of the website. Do not use abbreviations in papers titles. The APA newspaper formatting also advises continuing to keep your title to 12 key phrases optimum when using a few queues. Use common subject condition. Increase living space following subject. Your Old fashioned paper Headline: Making use of Two Queues Author byline-Below the title is your name or the your name along with other authors of the paper if it is a group paper. Use your first identity, midsection preliminary and surname. The APA pieces of paper set up necessitates the omission of any titles, like Doctor. or Ph.D. Twice room right after the creator byline. Your Company Name Institutional affiliation-Here is the spot in places you executed exploration. Use the name of your school. Some teachers may possibly question that you choose to encompass their brand name, the particular date or lesson identity. For each one of these desires which are not involved in the APA data format papers specifications, twice room or space following institutional affiliation. Put every piece of data that is required in a separate range, and twice space or room in between each lines. If the paper is meant for publication, Authora��s note-The authora��s note is generally only required. Consult your instructor, and follow the APA format paper guidelines for the authora��s note. An abstract is basically an overview from your newspaper. The abstract is placed around the next web page just after your headline page. APA document formatting dictates than an abstract be amongst 150-200 terms long. Sometimes, your instructor could possibly arranged different desires for any abstract regarding proportions or subject matter. Therefore, before writing your abstract, make sure you understand the assignment. Normally, go through principles and rules for generating an abstract in APA papers file format. Main Human body The main physique of APA data format cardstock is comprised of an body and introduction paragraphs and some form of verdict. The most crucial system from your papers typically gets under way around the 3 rd webpage of the newspaper. Besides, other sectors may be needed for certain newspaper models. In any laboratory record or experimental record such as, you should will include a techniques department, a outcome segment including a debate department immediately after your introduction. With these even more parts, the topic section takes the area of your in closing. Other sections and constructions could also be desired. Constantly talk about papers instructions and guidelines to determine which pieces to incorporate in the most important physique of your APA format cardstock. The resource section or catalog to find an APA set up pieces of paper lists the materials you consulted throughout authoring your paper. The sources you do cite must be listed in this section, although it does not only include the sources you cited in your paper. The useful resource checklist is placed by itself page while using the concept a�?Referencesa�? centered at the top. Additionally it adheres to rules and guidelines for itemizing your origins. Although this is the usual data format for those APA newspaper file format, other guidelines and procedures utilize depending upon the method of advice you present and the particular kind of document it is necessary to create. There are certainly special details for using headings, preventing bias and introducing graphs, charts, appendices and more-among others instances, so be certain to stick to the standard formatting, any specialized formatting as well as the advice presented to you having an assignment that needs the APA papers file format.
<urn:uuid:acd53895-3ead-41e4-ae95-cd8611e9451b>
CC-MAIN-2018-43
http://finecause.com.my/how-at-improve-esl-essay-producing-formatting-essay-com/
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512014.61/warc/CC-MAIN-20181018194005-20181018215505-00507.warc.gz
en
0.907225
1,388
2.609375
3
1.484232
1
Basic reasoning
Education & Jobs
Baghdad Central Prison ||This article's introduction section may not adequately summarize its contents. (July 2013)| Abu Ghraib prison cell block in 2005 |Location||Abu Ghraib, Baghdad Province| |Former name||Abu Ghraib prison| The Baghdad Central Prison, formerly known as Abu Ghraib prison (Arabic: سجن أبو غريب Sijn Abū Ghurayb; also Abu Ghuraib, lit. 'Father of Raven', or 'Place of Ravens') was a prison complex in Abu Ghraib, an Iraqi city 32 km (20 mi) west of Baghdad. After years of shared use by United States-led forces and the Iraqi government beginning in 2003 after the invasion of Iraq, the U.S. transferred complete control of the prison to the Iraqi government in 2006 and Iraq closed it down in 2014. The prison was built by British contractors in the 1950s. The prison held as many as 15,000 inmates in 2001. In 2002, Saddam Hussein's government began an expansion project to add six new cellblocks to the prison. In October 2002, he gave amnesty to most prisoners in Iraq. After the prisoners were released and the prison was left empty, it was vandalized and looted. Almost all of the documents relating to prisoners were piled and burnt inside of prison offices and cells, leading to extensive structural damage. Known mass-graves related to Abu Ghraib include: - Khan Dhari, west of Baghdad - Mass grave with the bodies of political prisoners from Abu Ghraib prison in Baghdad. Fifteen victims were executed on 26 December 1998 and buried by prison authorities under the cover of darkness. - Al-Zahedi, on the western outskirts of Baghdad - Secret graves near a civilian cemetery contain the remains of nearly 1,000 political prisoners. According to an eyewitness, 10 to 15 bodies arrived at a time from the Abu Ghraib prison and were buried by local civilians. An execution on 10 December 1999 in Abu Ghraib claimed the lives of 101 people in one day. On 9 March 2000, 58 prisoners were killed at a time. The last corpse interred was number 993. Until August 2006, the site known as the Abu Ghraib prison was used for detention purposes by both the U.S.-led coalition occupying Iraq and the Iraqi government. The Iraqi government has controlled the area of the facility known as "The Hard Site". The prison was used to house only convicted criminals. Suspected criminals, insurgents or those arrested and awaiting trial are held at other facilities, commonly known as "camps" in U.S. military parlance. The U.S. housed all its detainees at "Camp Redemption", which is divided into five security levels. This camp built in the summer of 2004 replaced the three-level setup of Camp Ganci, Camp Vigilant and Abu Ghraib's Tier 1. The remainder of the facility was occupied by the U.S. military. Abu Ghraib served as both a FOB (Forward Operating Base) and a detention facility. When the U.S. military was using the Abu Ghraib prison as a detention facility, it housed approximately 7,490 prisoners there in March 2004. Later population of detainees was much smaller, because Camp Redemption had a much smaller capacity than Camp Ganci had, and many detainees have been sent from Abu Ghraib to Camp Bucca for this reason. The U.S. military initially held all "persons of interest" in Camp Redemption. Some were suspected rebels, and some suspected criminals. Those convicted by trial in Iraqi court are transferred to the Iraqi-run Hard Site. In the Abu Ghraib torture and prisoner abuse scandal, reserve soldiers from the 320th Military Police battalion were charged under the Uniform Code of Military Justice with prisoner abuse, beginning with an Army Criminal Investigation Division investigation on January 14, 2004. In April 2004, U.S. television news-magazine 60 Minutes reported on a story from the magazine The New Yorker, which recounted torture and humiliation of Iraqi detainees by U.S. soldiers and contracted civilians. The story included photographs' depicting the abuse of prisoners. The events created a substantial political scandal within the U.S. and other coalition countries. On April 20, 2004, insurgents fired 40 mortar rounds into the prison, killing 24 detainees and injuring 92. Commentators thought the attack was either as an attempt to incite a riot or retribution for detainees' cooperating with the United States. In May 2004, the U.S.-led coalition embarked on a prisoner-release policy to reduce numbers to fewer than 2,000. The U.S. military released nearly 1,000 detainees at the prison during the week ending August 27, 2005, at the request of the Iraqi government. In a May 24, 2004 address at the U.S. Army War College, President George W. Bush announced that the prison would be demolished. On June 14 Iraqi interim President Ghazi Mashal Ajil al-Yawer said he opposed this decision, followed by the ruling June 21 by U.S. military judge Col. James Pohl, who said that the prison was a crime scene and could not be demolished until investigations and trials were completed. On April 2, 2005, the prison was attacked by more than 60 insurgents in the engagement known as the Battle of Abu Ghraib. In the two hours before being forced to retreat, the attackers suffered at least 50 casualties according to the U.S. military. Thirty-six persons at or in the prison, including U.S. military personnel, civilians and detainees, were injured in the attack. The attackers used small arms, rockets, and RPGs as weapons, and threw grenades over the walls. A suicide VBIED detonated just outside the front wall after Marines fired on it. Officials believe that the car bomb was intended to breach the prison wall, enabling an assault and/or mass escape for detainees. Insurgents also attacked military forces nearby on highways in route to the prison for reinforcement and used ambushes along the roads. Al Qaeda in Iraq claimed responsibility. In March 2006, the U.S. military decided to transfer the 4,500 inmates to other prisons and transfer control of the Abu Ghraib prison to Iraqi authorities. The prison was reported emptied of prisoners in August 2006. The formal transfer was made on September 2, 2006. The formal transfer was conducted between Major General Jack Gardner, Commander of Task Force 134, and representatives of the Iraqi Ministry of Justice and the Iraqi Army. In February 2009, Iraq reopened Abu Ghraib under the new name of Baghdad Central Prison. It was designed to house 3,500 inmates. The government said it planned to increase the number up to 15,000 prisoners by the end of the year. A major prison break occurred on 21 July 2013, and media outlets reported a mass breakout of prisoners at Abu Ghraib. Reportedly, at least 500 prisoners escaped. A senior member of the security and defense committee in parliament described the prisoners as mostly those who were "convicted senior members of al-Qaeda and had received death sentences." A simultaneous attack occurred at another prison, in Taji, around 12 miles north of Baghdad, where 16 members of the Iraqi security forces and six militants were killed. The Islamic State of Iraq and the Levant (ISIL) issued a statement on a jihadist forum claiming that they were responsible for organising and executing the prison break, which had taken months of preparation, and claimed that the attacks involved 12 car bombs, suicide bombers and a barrage of mortars and rockets. They also claimed that they killed more than 120 government troops, though the Iraqi authorities claimed that 25 members of the security forces were killed, along with 21 prisoners and at least 10 militants. On April 15, 2014 the Iraqi Justice Ministry announced that it had closed the prison amid fear that it could be taken over by Sunni insurgents that control much of Anbar Province. All 2,400 inmates were moved to other high-security facilities in around the country. It was not made clear if the closure is temporary or permanent. |Wikimedia Commons has media related to Baghdad Central Prison.| - The Prisoner or: How I Planned to Kill Tony Blair, a documentary about the imprisonment and abuse of one Iraqi journalist, Yunis Khatayer Abbas, and his two brothers at Abu Ghraib prison. - Standard Operating Procedure (film) - US releases scores from Baghdad prison, Google News / Agence France-Presse, February 12, 2009 - Abu Ghrai translation - "Abu Ghurayb Prison". Global Security. 2005. Archived from the original on 8 March 2006. Retrieved 2006-03-11. - Archaeologists for Human Rights - General (Dept. of the Army), Inspector (2004). Detainee Operations Inspection. DIANE Publishing. pp. 23–24. ISBN 1-4289-1031-X. - "22 killed in Baghdad mortar attack". USA Today. April 20, 2004. Retrieved 2006-03-11. - "Nearly 1,000 Abu Ghraib detainees released". CNN.com. 2005. Archived from the original on 2 March 2006. Retrieved 2006-03-11. - Defend America (2005-04-13). "Marines Relate Events of Abu Ghraib Attack". Defend America. - "US to transfer Abu Ghraib prisoners". Fairfax Digital. 2006-03-10. Retrieved 2008-06-30. "Abu Ghraib prison[...]'s 4,500 inmates will be transferred to a new facility at the nearby Baghdad airport military base and other camps. [...] Abu Ghraib, where US soldiers abused Iraqi detainees, will be handed over to Iraqi authorities once the prisoner transfer to Camp Cropper and other US military prisons in the country is finished." - Nancy A. Youssef, "Abu Ghraib no longer houses any prisoners, Iraqi officials say", McClatchy Newspapers, 26 Aug 2006 - Associated Press (2006-09-03). "Inmates transferred out of Abu Ghraib as coalition hands off control". The Boston Globe. - Associated Press (2009-01-25). "Abu Ghraib set to reopen as Baghdad Central Prison". International Herald Tribune. - "Abu Ghraib Prison Break:Al Qaeda in Iraq Claims Responsibility for Raid". The Huffington Post. 2013-07-23. Retrieved 24 July 2013. - "Iraq:hundreds escape from Abu Ghraib jail". London: Guardian.co.uk. 2013-07-22. Retrieved 24 July 2013. - Leader (18 March 1990). "Farzad Bazoft". The Observer (London). Retrieved 3 September 2011. - Tucker, Michael (2007-02-20). "My Prisoner, My Brother". Vanity Fair. Retrieved 2008-06-11. - Risling, Greg (May 7, 2008). "Iraqi alleges Abu Ghraib torture, sues US contractors". The Seattle Times. Retrieved 2010-02-11. - Hettena, Seth (17 February 2005). "Reports detail Abu Ghraib prison death; was it torture?". Associated Press. Retrieved 23 June 2009.
<urn:uuid:da4c8932-0a14-48d0-a298-1a71c50a2099>
CC-MAIN-2014-35
http://en.wikipedia.org/wiki/Abu_Ghraib_(prison)
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500833115.44/warc/CC-MAIN-20140820021353-00148-ip-10-180-136-8.ec2.internal.warc.gz
en
0.951657
2,333
2.59375
3
3.045782
3
Strong reasoning
Crime & Law
Daily Bible Studies |Series Theme: Studies in 2 Samuel - "David as King"| Introduction to 2 Samuel - David as King Previous History & Context In 1 Samuel we saw Samuel's life (see “Samuel's Story” in these studies) followed by Saul's reign and then the exploits of David after he has been anointed as king but while Saul is still alive (see “David on the Run”) 2 Samuel starts with Saul's death and traces the following years of David reign as king. The chronology for both books is not clear but some have suggested the following: To cover all of 2 Samuel in this set of Studies, we have omitted some of the less significant passages and concentrated on the main key points of David's reign. The latter period where he hands over to Solomon will be covered in the studies on Solomon's reign. The structure of these studies is as follows: Part 1 : “David becomes King” The facts covered by this first Part are simply the death of Saul, David being made king over Judah, the ensuing conflicts between Saul's men and David's men, and the eventual (after 7 years) making David king over all Israel. However, more than the basic facts, observe in this Part David's emotions, his feelings generated by the death of Saul & Jonathan and his feelings about the death of various others. There is much to learn in this part about a “man after God's own heart.” Chapter: 2 Sam 1 Passage: 2 Sam 1:1-16 A. Find Out: 1. Where does this story start? v.1 2. What news does the man bring? v.2-4 3. What does David want to find out? v.5 4. How does the young man reply? v.6-10 5. What is David's first response? v.11,12 6. Why did David have the messenger killed? v.15,16 1. Also read 2 Sam 1:17-27. 3. Also read 1 Sam 24:5-7 & 26:8-11. 4. What did David understand about authority? Two particular things stand out in this first chapter. The first is David's response to the news of Saul's death. He anguishes and mourns deeply over what has happened. Many of us would have rejoiced that our enemy has died, but David, the man after God's own heart, mourns at the loss of a man who could have achieved so much, but who simply failed to rise to the occasion. David saw the tragedy of this, the potential greatness of Saul and Jonathan. He saw their good points and grieved over that loss. We so often major over the bad points and rejoice that they are gone. What a challenge! The second thing to note is David's response to the young man who claimed to have killed Saul. Whatever else he was, Saul was God's anointed. God had put him in the role and it was for God to remove him, and so heaven help any man who raised his hand against God's man. David displays again and again, a remarkable insight into the reality of leadership and authority. He sees they are put there by God and man is to respect that and leave it to God to deal with any of His agents (leaders) who do not come up to scratch! 1. Do we see as David saw, with spiritual insight? 2. Are our priorities those of God, like David's were? Chapter: 2 Sam 2 Passage: 2 Sam 2:1-7 A. Find Out: 1. What 2 things did David ask and what answer did he get? v.1 2. Who went with David? v.2,3 3. What happened there? v.4a 4. Who had buried Saul? v.4b 5. How did he bless them? v.5,6 6. What did he instruct them and why? v.7 1. Where had David been and where does he now go? 2. Why might the move have been dangerous, do you think? 3. How did it come about that he made the move? David had been staying at Ziklag (1:1) in the south west of Judah, an area largely outside the control of Saul. Now that Saul is dead, David wonders if he may return to the land. Note that he is not at all presumptuous about it; he first of all asks the Lord. Here is an example to follow. Again and again we see David seeking the Lord to know the right thing to do. It is the Lord who tells him where to go. Hebron was further into Judah yet still somewhat in the south. Saul's sons and his remaining army would still be in control in Israel and so it was by no mean certain that David would be safe in Israel. He, his family and his men move up to Hebron. There he is made king over Judah. This is a partial fulfilment of God's word through Samuel (1 Sam 16:1). Note that David does not force the pace, he is happy for God to bring about His declared will in His time. David does nothing to provoke a confrontation with Saul's family. Yet while he is there he hears that it was men from Jabesh Gilead (80 miles to the north east of Hebron on the other side of the Jordan) who had buried Saul. David, ever the peacemaking diplomat sends thanks and encouragement to these people and, indirectly, spreads the word that he has been made king in the south. Smart move! 1. David sought God for guidance. A good example for us. 2. David rested in God's timing and God's will. An example for us. Chapter: 2 Sam 2 Passage: 2 Sam 2:8-32 A. Find Out: 1. Who ruled in Israel and why? v.8-11 2. What happened when Abner's men met Joab's men? v.12-17 3. How did Asahel come to die? v.18-23 4. How did the fighting come to a stop? v.24-28 5. So what did Abner do? v.29 6. And what did Joab do? v.30-32 1. What was the power situation in Israel at this time? 2. Who were the main leaders in contention? 3. How do you think they were each left feeling at the end? We now observe the main followers of the two opposing parties. In the south is David with Joab as his commander, and in the north is now Ish-bosheth, Saul's son, with Abner as his commander. The difference between the two leaders in interesting: David is leader because he was anointed by God and has earned his position by what he has done; Ish-bosheth is leader because Abner made him leader and because he is Saul's son. Which is the real leader??? We then come to this encounter between foraging bands from the two sides. It is Abner who initiates the fighting, but then probably comes to regret it as his men are overcome by Joab's men. The result is that he and his men have to flee from the superior fighting of David's men. Abner appears considerate in that he does not want to kill Joab's brother, knowing that he is the superior fighter and if Asahel continues to pursue him, he will end up having to kill him, and that is what does eventually happen. It is only when Abner comes across reinforcements that Joab gives up the pursuit and returns home. At the end of the day Abner is wiser, having lost more men than Joab and Joab is probably plotting revenge for the death of his brother. Thus we see the balance of power in Israel at this time and the key participants. We have also seen the seeds sown for further disharmony! 1. Fighting others only brings grief. 2. WE are called to be peacemakers. Chapter: 2 Sam 3 Passage: 2 Sam 3:6-21 A. Find Out: 1. What had Abner been doing? v.6,7 2. How did Abner respond when Ish-bosheth criticised him? v.8-11 3. So what did Abner do? v.12 4. What did David demand, and what happened? v.13-16 5. To whom did Abner speak? v.17-19a 6. What did he then do? v.19b-21 1. What appears Abner's intention back at home? 3. What do you feel about the part concerning David here? Abner sees himself as the powerful second in command in Israel and everything he does seems to be to strengthen his own position. His actions and motivation seem to be purely to strengthen Abner himself, and are not for any other “good” motive. As soon as he is questioned by his king over his behaviour he flies into a rage and decides to change camps. He first sends messengers to David to sound out what David's response might be. He then approaches other leaders in Israel and seeks to persuade them of the wisdom of going over to David. Next he goes to Saul's own tribe, the Benjamites and seeks to convince them. Finally he goes in person to see David. Let's observe next David's response to all this. He is first of all willing to bring together the nation under his leadership but before that happens he wants his wife restored to him. Michal had been given to him as wife by Saul but had had to leave her behind when he fled from Saul. That she had been given to another had been wrong. Not a very tidy situation and the fact that David has other wives doesn't help it. That Ish-bosheth is willing to concede to David's demand for his wife to be sent back, indicates his weak position. Perhaps not the most glorious part of David's time! 1. The motives of self-centred men are always self-centred. 2. We increasingly live in a messy world of confused relationships. Chapter: 2 Sam 3 Passage: 2 Sam 3:22-39 A. Find Out: 1. Where was Abner where Joab returned? v.22,23 2. What did Joab feel about Abner having been there? v.24,25 3. So what did he do? v.26,27 4. What did David feel about this? v.28,29,38 5. What did David then instruct and do and why? v.31-37 6. What did he feel about Joab and his family? v.39 2. How would you summarise what David felt about Abner's death? 3. What do you think David's last comment means? While Abner had been discussing with David the handing over of Israel to him, Joab and his men had been away. The discussion comes to an end and Abner departs from David in peace. Joab returns, hears about it, pursues Abner and kills him in revenge for killing his brother. Those are the simple facts of what happened. In a tough day, when fighting was the norm for these men, it was perhaps a fairly natural thing to happen. The expression, “dog eats dog” perhaps applies aptly. If this is so, and everything about Joab seems to indicate this is the way things are, then David's reaction to it is all the more surprising. Instead of being glad that an obstacle to his total reign has been removed, he actually anguishes over Abner's death. He first of all disclaims any part in his death, then he declares a curse on Joab and his family and then he commands, what is tantamount to a state funeral for Abner. Abner's death was not death in battle; it was pure murder and as such it revolts David. Despite being a warrior king, he has a gentle and upright heart. These strong warriors-turned-murderers make him feel weak and dispirited. In this we perhaps see something of the man described as “a man after God's own heart.” 2. We are commanded to love our enemies & pray for them (Mt 5:44 ). Chapter: 2 Sam 4 Passage: 2 Sam 4:1-12 A. Find Out: 1. What had been the result of Abner dying? v.1 2. What did the two men do? v.5,6 3. What did they then do with the body? v.7,8 4. What did David think about this? v.9-11 5. So what happened? v.12 1. What do you think motivated the two men to do what they did? 2. How did David view what they had done? 3. What do you think David felt about those still in Saul's house? We see history repeating itself in this chapter. Originally an Amalekite had killed Saul and thought David would be pleased. Now these two men kill Saul's son and again think David will be pleased. What is it that makes people think like this? It is the simple human characteristic of revenge and wanting to do down your enemies, because after all that's what you do to enemies, isn't it? It took Jesus to say, “Love your enemies and pray for those who persecute you” (Mt 5:44), as he expressed his Father's heart. Now David was a man after God's own heart (1 Sam 13:14 & Acts 13:22) and again and again he expressed God's heart. It would take Ezekiel to prophesy, “I take no pleasure in the death of anyone, declares the Sovereign Lord” (Ezek 18:32) but David was already feeling it. Whether it was the ungodly king who had hounded him out of Israel, or that king's son who stood in the way of him becoming king, David did not rejoice in the death of them. As with the death of Abner, David considered the death of the Israelite king as murder, an innocent man hacked down while his defences were down. If this had occurred in battle, perhaps he might have felt differently, but this was an innocent man murdered by men who looked for an opportunity to get in with the new man. David, as with God, does not rejoice in this death. 1. Unrighteous men have unrighteous motives as well as acts. 2. The man after God's heart feels as God feels about such things. A. Find Out: 1. Who came to David at Hebron? v.1a 2. What did they acknowledge? v.1b 3. What 2 further things did they acknowledge? v.2 4. What then happened? v.3 5. How old was David & how long did he reign? v.4 6. How was that reign split? v.5 1. What 3 things stated here made David acceptable as king? 2. What additional factor probably prompted this at this time? 3. How must David have been a man of patience? The fact that Ish-bosheth has been killed and Israel is without a king probably prompts the action in today's verses. The word would have gone round Israel for a number of years that David was there in Hebron, anointed king over Judah. Some would have remembered how David had been a valiant commander in Saul's army. Some would have heard of the prophetic word that had come through Samuel about David being raised up by God as the new ruler over His people. And yes, he was a Hebrew, he was from the tribe of Judah and that was part of the whole nation of Israel. All these things helped contribute to what now takes place. It would have been the elders of each of the tribes of Israel who would have come down to Hebron and there with David's consent they make him king over all Israel. When we consider the time scale for David's life we realise the patience of this man. God's word came to him about becoming king over all Israel, a number of years pass while Saul is hunting him, another seven and a half years pass while he waits as king over Judah alone, all the while trusting God that He would fulfil His word and bring him to kingship in His time and in His way. What an example! David, in al this goes through a process to produce a king. It is long and protracted. 1. Can we rest in God's timing for our lives? RECAP - "David becomes King" - 2 Samuel 1-5 In this first group of 7 studies we have seen : - David's reaction to the death of Saul (1:1-16) - David being made king over Judah (2:1-7) - Conflict between Abner and Joab (2:8-32) - Abner seeking to make a treaty with David (3:6-21) - Joab killing Abner (3:22-27) - David's reaction to that (3:28-39) - Ishbosheth's death (4:1-12) - David being made king over all Israel. (5:1-16) In these early chapters we have seen about eight years of David's life following the death of Saul and up to David being made king over all Israel. It has been a time of conflict among those below David, but for David himself, he seems to have done little to promote himself. He has been an example of one who is content to allow the Lord to fulfil His word in His time and in His way. Now he is king. 1. Can we see the potential in others? 2. We are called to be peacemakers. 3. Guidance comes from God. We need to seek Him. 4. We are called to pray for our enemies. 5. The state of our heart determines our motives. 6. A godly man feels as God feels Ask the Lord to give you His heart, that sees people as they really are. Pray for those you don't find easy people to get on with. PART 2 : "Victory & Defeat" In this next Part we will see David establishing the kingdom and triumphing over all his foes. We'll also see him having a frightening encounter as he seeks to bring the ark to Jerusalem. This will be followed by his tragic defeat as he falls to temptation in respect of Bathsheba. This will be a glorious time which is then followed by a tragic failure. Note the contrasts in all this.
<urn:uuid:f2e4b6d6-cb6a-4465-ac92-67317cfb6dd9>
CC-MAIN-2020-10
http://www.readbiblealive.com/2Samuel1.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144027.33/warc/CC-MAIN-20200219030731-20200219060731-00370.warc.gz
en
0.980223
3,977
3.703125
4
2.926181
3
Strong reasoning
Religion
In recent years, Victoria has experienced an increasingly bad termite problem, which is not good news for homeowners. Ideal weather conditions have come together to create the perfect environment for termites to explore and breed. When there has been a wet spring and there is additional moisture, termites can tunnel easier and do more damage. Termites can destroy your house in a matter of months if they are not discovered and eradicated. In fact, these pesky pests cause more damage to homes than fires, floods, and storms combined. The thought of termites taking over your home and causing expensive and often irreversible structural damage is not pleasant. Homeowners need to exercise caution and termite control in Melbourne to ensure any problems are addressed quickly. Let’s take a look at a few useful tips you can use to ensure you avoid termite infestation in your home. What Exactly Is A Termite? Termites are soft-bodied insects, which are small in size, about the size of a match head. They have a well-ordered social system whereby the worker termite digests the wood, regurgitating it later to pass to the rest of the colony. In Melbourne, subterranean termites are common. These termites live underground, needing humidity and a temperature ranging between 25°C and 35°C to survive and breed. Melbourne has an average humidity of 66%, which is quite high, meaning termites generally thrive from late spring to early autumn. What is Making Melbourne’s Termite Problem Worse? Global warming is the first thing that comes to mind as termites thrive in the heat. Too much building in the suburbs also contributes as trees are cut down to make space for homes, which in effect, provide the termites with a food source to attack. Another factor is water conservation methods, which sometimes use mulch, another food source for termites. How Do You Know If You Have Termites? Unfortunately, it isn’t easy to know if you have termites until they have done a significant amount of damage. What you need to look out for are floorboards, which seem to be breaking easily, cracks in wood or plaster, mud-like dust around electrical sockets, and leaking water systems. These can all be telltale signs that you have a termite infestation and need to take action immediately. How to Prevent Termites Attacking Your Home Moisture attracts termites, so if you have a basement, check it to make sure there isn’t any moisture down there. This is an ideal place for termites to breed so it needs to be ventilated and dry, as does your attic and any crawlspaces you may have throughout your home. If you have any problems with your plumbing, it’s crucial that you sort them out quickly as leaks can encourage termites. Likewise, make sure that rainwater flows away from your house so check your gutters every so often to make sure they are free of any debris. Finally, be aware that a dripping air conditioning unit will encourage termites so be sure to keep an eye on your AC unit. Check your home for gaps around water and gas lines and seal them, as this is a very common way for termites to get into your house. Also, it’s important to ensure that any wood in your house is a minimum of six inches above the ground and that the timber is treated with anti-termite protection. If you are buying wood for any DIY projects, always check for termites before bringing it home. Keep Your Home Termite Free When it comes to termites, prevention is always better than cure. It often takes a while before a termite infestation can be recognised and by then, most of the damage will already be done. Take steps to ensure that your home is less attractive to termites by sealing up any cracks and ensuring that you remove any excess moisture from key areas of your home. By taking the right precautionary steps, you will give your home a better chance against termite infestation. Image Credits: Homesteading
<urn:uuid:0f2f90a4-d91f-4996-b0b8-d9750e8e7f9a>
CC-MAIN-2021-43
https://www.previousmagazine.com/the-damage-deterrent-how-to-avoid-termite-infestations
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585201.94/warc/CC-MAIN-20211018093606-20211018123606-00483.warc.gz
en
0.948361
838
2.78125
3
1.93643
2
Moderate reasoning
Home & Hobbies
|KJ Belonio |||Jul 01, 2015 09:57 PM EDT| NASA is preparing to test foldable glider drones that could conduct aerial surveillance for possible landing locations on Mars. Since drones are relatively inexpensive to build, launch and are expendable, the space agency is determined to launch them, which could be the first man-made object to take flight in the skies of Mars. Under the new program and currently under construction is the Prandtl-m (Preliminary Research Aerodynamic Design to Land on Mars), a prototype of an aircraft that could accompany the Mars 2020 rover mission carried as ballast with another lander if testing is successful. |Roguero Caler |||Jun 13, 2015 08:13 AM EDT| NASA is planning on making history by flying two tiny satellites called CubeSats in deep space—the first time ever the space exploration agency is relying on standardized small spacecraft to gather data from a celestial body. |Ana Verayo |||May 20, 2015 01:39 AM EDT| SpaceX revealed their version of vintage inspired travel posters to Mars as the next space tourist destination. |Ana Verayo |||May 19, 2015 10:32 PM EDT| With the new MARSDROP program, scientists aim to deploy hang gliders that will release tiny microprobes to explore difficult to reach geological regions on Mars. |Ana Verayo |||May 18, 2015 09:12 AM EDT| NASA just announced a contest encouraging participants to design and build a 3D printed habitat for astronauts on Mars. |Ana Verayo |||May 18, 2015 07:01 AM EDT| For future manned missions to Mars, scientists are now developing microbes to bring to the alien world to produce essential oxygen for humans. |Marco Foronda |||May 15, 2015 04:30 AM EDT| The organisms would use Mars' ample supply of regolith as fuel, and may even serve a dual purpose in removing nitrogen from the Martian soil. |Cristian Andal |||May 12, 2015 06:02 PM EDT| The Curiosity rover in Mars has taken spectacular images on the sunset in the red planet. Photographs show blue hues in the horizon. The rover, landed on Mars three years ago. Since then, it continues to send different images back to Earth. |Ana Verayo |||May 11, 2015 04:04 AM EDT| Taken last month, NASA's Curiosity Rover captured images of a sundown on the Red Planet and it's not a red orange sunset we're all used to seeing. |Marco Foronda |||May 05, 2015 07:16 AM EDT| Astronauts could incur brain damage when exposed to cosmic rays during travels to deep space, posing concerns on the upcoming manned Mars missions. |Ana Verayo |||May 02, 2015 01:29 AM EDT| A new study reveals that deep spaceflight can apparently cause cognitive brain damage to astronauts especially future missions to Mars. |Ana Verayo |||Apr 29, 2015 07:13 AM EDT| A new study reveals a network of salty lakes underneath Taylor Glacier, made famous by Blood Falls where primitive life forms dwell similar to those on Mars. |Marco Foronda |||Apr 08, 2015 08:55 AM EDT| NASA said recent findings may actually lead to finding life. Subscribe to CHINATOPIX ! Sign up for our free weekly newsletter for the latest in-depth coverage! China's former Chief of the Ministry of Public Security, Zhou Yongkang, has been given a life sentence after he was found guilty of abusing his office, bribery and deliberately ... Full Article China Pork Prices Expected to Stabilize As The Supplies Recover Elephone P9000 Smartphone is now on Sale on Amazon India There's a Big Chance Cliffhangers Won't Still Be Resolved When Grey's Anatomy Season 13 Returns Supreme Court Ruled on Samsung vs Apple Dispute for Patent Infringement Microsoft Surface Pro 5 Rumors and Release Date: What is the Latest?
<urn:uuid:30467020-4639-4d22-80dd-a1c6c62eb2fa>
CC-MAIN-2020-40
http://www.chinatopix.com/tags/mars/page5.htm
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400201699.38/warc/CC-MAIN-20200921112601-20200921142601-00718.warc.gz
en
0.892604
861
2.640625
3
2.457885
2
Moderate reasoning
Science & Tech.
Cataracts in dogsmiroslav What are the causes of cataracts in dogs? Cataracts in dogs most often develop as a consequence of diabetes (D. mellitus). Almost 90% of diabetic dogs develop cataracts in the first 12 to 18 months of diseases onset. In many breeds of dogs, cataracts are hereditary (congenital cataracts). Some dogs are born with hereditary cataracts, while others develop cataracts as they age. Cataracts can also occur as a result of trauma or inflammation. What is a cataract? A cataract is a clouding of the eye lens or its sheath (lens capsule) of varying degrees, from mild to complete opacity, resulting in reduced vision. Should we be worried if our pet is diagnosed with cataracts? When cataracts are diagnosed, it is very important to identify the cause that led to the cataract as well as to monitor the progression of the cataract. A lens affected by cataracts constantly leaks lens content material, which can be very irritating and harmful to the eye. The material which leaks from the lens is recognized by the immune system as foreign material, so aggressive autoimmune reactions can develop, resulting in pain, vision loss, and eventually eye loss. A cataract is an abnormal change in the composition of the lens, which results in a white, milky appearance of the lens (arrow). Sometimes diabetic cataracts progress rapidly over weeks or even days, resulting in sudden blindness. Rapidly progressive cataracts can be very harmful due to the inflammation and irritation they cause, and in some cases can result in the development of acute glaucoma. If you notice a weakening of your pet’s vision or the appearance of a milky white eye, contact your veterinarian immediately. Cataracts can change, and progression from small opacity to complete clouding of the lens can happen over a short period of time (several days), or a long period (several months or years). Any rapidly progressive cataract should be considered an emergency condition of the eye, and an ophthalmologist should be sought immediately. Small cataracts, which do not cause significant eye irritation or visual disturbance, are usually only monitored. Cataracts that cause significant vision problems or eye irritation must be surgically removed to restore vision and reduce the risk of possible eye loss associated with uncontrolled eye inflammation. Due to the numerous complications associated with cataracts, it is important to medically treat and monitor cataracts in all cases in which surgery is not performed. Medical treatments usually include topical anti-inflammatory eye drops that are applied once or twice a day. In some cases, systemic anti-inflammatory drugs may be required. Complications associated with cataracts The prolonged presence of cataracts can cause a number of complications that may eventually require surgical removal of the eye. This patient had cataracts (white arrow) for a long period of time, which resulted in glaucoma (increased intraocular pressure), pain, and redness of the eye (black arrow). How is a cataract treated? Cataract surgery is a routine procedure performed by veterinary ophthalmologists that is 95% successful. The amount of money spent on cataract surgery is equal to the amount of money invested in medical treatment over a period of 3-5 years in cases where surgery was not indicated. By performing cataract surgery, the patient’s vision is restored and the chances for the appearance of numerous complications are dramatically reduced. Complications associated with cataracts The chronic presence of cataracts in this patient resulted in chronic inflammation of the eye, glaucoma, the development of ulcers on the cornea, and finally the necessity for surgical removal of the eye. What are the possible complications associated with cataract surgery? Complications that can occur due to cataract surgery are very rare. The most common complications of cataract surgery are glaucoma (development of increased intraocular pressure), retinal detachment, and severe intraocular inflammation or infection. These complications can be remedied with aggressive medical treatment, but in some cases, an additional surgical procedure may be required to ensure a good outcome. A small hereditary cataract in a dog of a mixed breed These cataracts usually do not progress and rarely cause vision problems or eye irritation. Regular annual assessment of cataract progression should be performed by an ophthalmologist. What can be done to prevent surgical complications associated with cataract surgery? Your ophthalmologist will perform a detailed assessment of the eye before cataract surgery to identify potential problems (intraocular inflammation, predisposition to glaucoma, possible abnormalities in the function and structure of the retina). It is very important to clean the teeth before the surgery so that after the cataract surgery, an intraocular infection with teeth bacteria can be prevented. Many diabetic dogs have urinary tract infections (due to the presence of glucose in the urine), so they should be given systemic antibiotics prior to cataract surgery. Does cataract surgery need to be repeated? Cataract surgery is performed only once. At that time the lens affected by the cataract is completely removed and an artificial lens is placed in the eye. Is there a problem if an artificial lens is not placed in the eye during cataract surgery? In rare cases, an artificial lens cannot be placed in the eye, which can result in poorer vision in some dogs, while most dogs have almost normal vision. Dogs without an artificial lens usually have trouble seeing small objects near their eyes. Cataract surgery is a reliable method of permanent removal of cataracts and restoration of normal vision. An artificial lens (white arrow) is usually placed in the eye to improve vision. Cataract surgery eliminates the risk of chronic inflammation caused by cataracts as well as the occurrence of many other complications (retinal detachment, glaucoma, intraocular bleeding). I can’t afford cataract surgery – what are my options? Cataract surgery requires a significant financial commitment, and if resources are not available to perform cataract surgery, it is necessary to conduct a local (and in some cases systemic) anti-inflammatory therapy. Unfortunately, the progression of cataracts is always associated with many complications (secondary intraocular inflammation, lens luxation, intraocular hemorrhage, secondary glaucoma) which ultimately dictate the need for surgical removal of the eye.
<urn:uuid:a4a2f3b4-35cf-420a-8207-e1a729878e69>
CC-MAIN-2022-21
https://oculus-vet.com/en/cataracts-in-dogs/
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662520817.27/warc/CC-MAIN-20220517194243-20220517224243-00592.warc.gz
en
0.938583
1,365
2.953125
3
2.132386
2
Moderate reasoning
Health
Fleets of drones may one day soar the skies while delivering sneakers, pasta sauce, and basketballs that people order online. But before that happens, specialized air-traffic control systems must be developed to pilot the flying robots and keep them from colliding into each other. To help create these drone air-traffic control systems, NASA and a group of partners including universities, drone manufacturers, and technology giants like Amazon and Google, are working together to develop the technology that would make such a system possible. Amazon (AMZN) and Google (GOOG) stand to benefit because both companies are working on drone deliveries. As part of the project, a team of Stanford University researchers said on Thursday that they are building software that can alert multiple drones before they crash in mid-air and reroute them. At the heart of the system is a so-called conflict-avoidance algorithm that will prevent collisions after being integrated into an air-traffic control system, according to a Stanford announcement about the research. The collision avoidance technology is a variant of similar technology created to help airplanes steer clear of mid-air accidents. That technology was created by Stanford assistant professor of aeronautics and astronautics Mykel Kochenderfer during his stint at MIT. Kochenderfer is now modifying the technology for piloted aircraft to coordinate multiple drones. The researchers said that creating a similar system for drones presents a unique challenge because many drones could be flying in close proximity to one another in crowded cities while, for example, delivering items to a house simultaneously. “As the number of aircraft grows, the avoidance problem becomes exponentially more complicated, a challenge that mathematicians call the curse of dimensionality,” Stanford researcher Hao Yi Ong said in a statement. “So we have to come up with better ways than just brute-force searching and iterating through all possible solutions.” The researchers claim that they have performed over 1 million drone collision simulations using the software, but they acknowledge that it’s not quite ready for primetime. The software has to take in account bad weather, problems with the drones communicating with one another, and “deliberately disruptive drones.” The Stanford team expects the finalized software to be used in the overarching air-traffic control system that NASA hopes to complete by 2019. Over the summer, researchers at the University of Nevada, Reno created software that lets drones communicate with servers on the ground and tested the technology with a drone startup called Flirtey. Flirtey was the company behind the first federally sanctioned drone delivery in July. Subscribe to Data Sheet, Fortune’s daily newsletter on the business of technology. For more about drones, check out the following Fortune video:
<urn:uuid:0f07f8b6-b4c6-4db4-aa09-eb4ed1ff8e52>
CC-MAIN-2017-47
http://fortune.com/2015/12/10/stanford-drones-crash-nasa/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934804881.4/warc/CC-MAIN-20171118113721-20171118133721-00471.warc.gz
en
0.934174
565
3.09375
3
2.957324
3
Strong reasoning
Science & Tech.
What is an Aircon Refrigerant? Refrigerant is a chemical compound used in your aircon unit. It absorbs environmental heat and provides cool air once it runs through compressors and evaporators. However, there isn’t just one type of refrigerant, which makes it easy to get them confused. There are actually three different types, and using the wrong one can damage your aircon unit because they’re not interchangeable. With that in mind, it’s important to know as much as possible about these refrigerants. What are the different types of refrigerants? R-12 is a colorless and odorless CFC refrigerant that was completely banned from production by 1996 under the Montreal Protocol for depleting the ozone. R-12 has many applications in refrigeration and air conditioning including large to medium size chillers, automotive air conditioning, and as an aerosol propellant. R-12 is high-pressure and typically stored in white containers. R22 is what is commonly known as Freon, and has been used as a central aircon unit refrigerant for decades. However, like R12, it’s been linked to environmental damage such as ozone depletion. As a result, the Clean Air Act of 2010 was passed, and residential furnace repair pros and manufacturers have stopped using it. It has been completely phased out by 2020. Often referred to by a brand name such as Suva 407C or Genetron 407C. R-407C is a hydro-fluorocarbon (HFC) that does not directly contribute to ozone depletion with a GWP of 1774. Of the higher temperature HFC options, R-407C most closely matches the operating characteristics of R-22, it is a high-glide refrigerant with lower efficiency but provides the simplest conversion from R-22 due to its similar pressures. R454B is a mildly flammable, lower global warming potential refrigerant designed to replace R410A in new equipment designs. R454B offers the optimal balance of properties to replace R410A in positive displacement, direct expansion air conditioning, heat pump, and chiller applications. R410A also known as Puron is the R22 replacement for aircon units. Due to the lack of chlorine in the mixture, it’s less harmful to the environment while still retaining the same cooling characteristics as R22. System manufacturers have had great success with R-410A because of its energy-efficient properties and ease of use in their systems. In addition, components are widely available for designing efficient R-410A systems. R134a or HFC-134a is a non-flammable hydrofluorocarbon refrigerant that was introduced to commercial and industrial applications as an alternative to the R-12 CFC refrigerant. R134a performs similarly to R-12, making it an easy-to-use replacement, and is relatively safe to use as it has an ASHRAE classification of A1. R134a is also known as a tetrafluoroethane (CH2FCF3) since it consists of carbon, hydrogen, and carbon. One of the positives of R134a is that it doesn’t contain chlorine, making it significantly less toxic than R-12. While R134a is safe to use and a better alternative to R-12, its usage still has a significant impact on the environment. R134a has a 1,430 global warming potential (GWP) rating, which is a measurement of how much heat a greenhouse gas is trapped within the atmosphere versus the amount of heat that’s trapped by CO2. In this case, R134a traps 1,430 times as much heat per kilogram as CO2 does in a hundred-year timeframe, and because of this, the Environmental Protection Agency (EPA) has since listed the refrigerant as “Unacceptable” for certain automotive, commercial, and industrial applications. R32 refrigerant is also known as difluoromethane and belongs to the HFC family of refrigerants. This gas is poised to replace the other gaseous such as R-410A and R-407C as the preferred gas due to its lower Global Warming Potential. Its chemical formula is CH2F2. The discovery of the greenhouse effects of refrigerants that are used to replace ozone depletion gaseously has prompted the players in the aircon unit industry to look for better refrigerants. Global Warming is a serious problem that is plaguing the world and the overall temperature of the earth has been rising. This prompted many manufacturers to begin to plan to phase out refrigerants such as R-407C, R-410A, R-134A and replace them with lower GWP such as R32. It has a boiling point of -51°C. R32 uses 78% less refrigerant to operate compared to R-410A and most newer products in Japan have been phasing in this refrigerant since 2013. How To Tell Which Refrigerant To Use One way you can tell which refrigerant your aircon unit needs is by checking the large sticker or plate on its compressor or evaporator, which will state the refrigerant that’s required. It’s important to check these stickers before replacing the refrigerant, as they’re not interchangeable, and using the wrong type can damage your system. Many aircon units are designed to be used with R-410A for a reliable and more efficient operation. Because R-410A can absorb and release more heat than R-22, and aircon unit compressor can run at a cooler temperature, reducing the risk of compressor burnout due to overheating. R-410A also functions at a higher pressure than R-22, so new compressors are built to withstand greater stresses, reducing the chance of cracking. If someone were to put R-410A refrigerant into an aircon unit designed for R-22, the pressure could potentially be too high, causing the unit to potentially fail. Most aircon units use oil to keep the compressor lubricated during operation. R-22 aircon units use mineral oil (MO) and R-410A systems use Polyol Ester Oil (POE). For cases when you are retrofitting a system to an HFC refrigerant, it is recommended to remove at least 95% of the MO before replacing it with POE oil. (NOTE: Under no circumstances should R410a be used to ‘top-off’ an R22 system). POE oil is generally more soluble with R-410A than mineral oil is with R-22. This means the R-410A system operates more efficiently, reducing wear and tear on the compressor. In addition, temperature glide is a property of some HFC refrigerant blends or mixtures and is generally undesirable. Because the composition alters during a phase change, there is a slight change in evaporating and condensing temperature at constant pressure. Commercial aircon units that use higher glide refrigerants are usually designed to work around the aircon issues associated with glide, with little or no effect on system performance. As lower GWP refrigerants become available, it’s important to note it may not be possible to use all of them as a retrofit in existing systems because some have mildly flammable properties. Refrigerants should always only be used in systems specifically designed for them, as selected by manufacturers and system designers. What is the mechanism of an Aircon Refrigerant? As refrigerant transmutes from liquid to gas and back, it absorbs and releases heat. This is how it is capable of cooling down a home. The compressor changes liquid refrigerant into a high-pressure, high-temperature gas. The refrigerant moves to the outside coil of the aircon unit and releases its heat there through condensation, cooling down. By the time it reaches the indoor coil, it has cooled down to the point that it causes evaporation when it meets the warmer indoor air. This siphons heat from the air, cooling it down. The refrigerant, once again a liquid, returns to the compressor to restart the cycle. The refrigerant will remain at the same level for the life of the air conditioner—unless leaks occur. If the refrigerant level or charge starts to drop, you will need to have a professional aircon servicing company to repair the system as soon as possible. Low refrigerant will not only lower the cooling ability of your aircon unit, but it can also severely damage the compressor. It’s always a good time to talk about the common issues that aircon units have. This way, you’ll be able to spot if there are problems with your unit or not and prepare for its replacement accordingly. If you require our aircon servicing services, Whatsapp us at +65 9222 4141 for a fast and transparent quote. 338 Aircon Servicing Singapore provides an extensive range of Aircon Services including Aircon Servicing, Aircon Repairs, Aircon Installation of the best aircon brands, Chemical Overhaul, Gas Top-up, Aircon Leaking Water, and Aircon Not Cold Fix, and more. We have a team of professional technicians who are equipped with vast knowledge and experience in the Aircon industry. We have over 15 years of experience in dealing with aircon works and have completed thousands of aircon works for both residential (Landed, Condo, and HDB) and commercial. We are a highly recommended Aircon Company in Singapore, with many delighted customers and reviews over the years on Google and Facebook. WhatsApp us at +65 9222 4141 for a transparent quotation and honest pricing for all your aircon needs or Call us at +65 9222 4141. We offer a fast and efficient service to serve any of your aircon needs!
<urn:uuid:2f014666-5c0a-4cf6-b832-0b84f2938b0b>
CC-MAIN-2023-23
https://casaircon.sg/aircon-refrigerant-and-its-mechanism/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654606.93/warc/CC-MAIN-20230608071820-20230608101820-00748.warc.gz
en
0.945842
2,075
3.015625
3
2.474067
2
Moderate reasoning
Home & Hobbies
Although getting behind the wheel of your automobile might seem like child’s play, it can actually be the riskiest thing you do all day. Accidents are the sixth most common cause of death in the world. Depending on where you live and the vehicle you drive, your chances may even be greater. Even while you have no influence over the conduct of other drivers, you do have a lot of power over how you drive your car. This implies that by taking a few easy measures, you may improve your chances of having a safe journey. Here are five suggestions to keep you safe and sound while driving. Pay attention to the task at hand; ignore distractions Avoid being distracted from your duties as the driver by air conditioning, radio, kids in the backseat, or an argument with your spouse. Always keep an eye on the road and your car. According to the NHTSA, drivers under the age of 20 are most likely to be distracted behind the wheel, contributing to 11% of fatal collisions. Be prepared for mistakes made by other drivers Don’t trust anyone but yourself. A lot of studies back up the fact that no matter how vigilantly you drive, there would still be high chances of meeting accidents or collisions. Hence, it becomes extremely important to take care of the way others drive. Utilize the safety equipment Look for a vehicle with several airbags and a good safety rating. Don’t forget to utilize the seat belt adjusters and kid restraints that are best for your family. The CDC states that “putting children in booster seats and car seats that are suitable for their age and size lowers severe and fatal injuries by more than half.” Always buckle up Simple seat belt use might significantly reduce the number of fatalities in automobile accidents each year. According to the National Safety Council, seat belts cut the chance of injury in a collision by 50% and saved 75,000 lives between 2004 and 2008. Teenagers, rural drivers, drunk drivers, and truck drivers are the groups least likely to use seatbelts. Engage your blinkers Driving safely is threatened by confusion. Make lane changes and turns predictable and fluid, and indicate before making a turn. According to recent research done by Richard Ponziani for the Society of Automotive Engineers, turn signals that are ignored or used improperly are to blame for 2 million automobile accidents nationwide each year. Failure to signal may render your insurance claim null and void, leaving you liable for the cost of any damage. For more in-depth knowledge, book a driving instructor in Calgary and enable yourself to unleash your potential. Why choose us? With a pass rate of more than 95%, our knowledgeable and experienced male and female instructors will patiently and sympathetically guide you as you study. As some individuals prefer to learn to drive with an instructor of the same sex, kindly let us know if you prefer a male or female teacher so that we may arrange the best instructor for you. So, hurry! Book a driving instructor in Calgary today!
<urn:uuid:46afbdd8-f643-4dae-b987-38fce4106c04>
CC-MAIN-2022-33
https://a1advance.ca/driving-simplified-top-5-defensive-driving-tips-to-keep-you-safe/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00451.warc.gz
en
0.955205
624
2.546875
3
1.874591
2
Moderate reasoning
Transportation
Living Costs and Banking Studying abroad can be expensive, so knowing the average living costs in Australia is an important part of your financial preparation. Here is some useful information about Australian currency and living expenses, plus helpful tips on budgeting and setting up a bank account. The basic unit of Australian currency is the dollar (AUD). There are 100 cents in 1 dollar ($1). Australian currency is the only legal tender (payment of coin) in Australia. There are: - 5c, 10c, 20c and 50c silver cent coins, - $1 and $2 gold dollar coins; and - $5, $10, $20, $50 and $100 plastic notes. Minimum cost of living The Department of Home Affairs has financial requirements you must meet in order to receive a student visa for Australia. The Cost of Living financial requirements have increased and the new legislative instrument (www.legislation.gov.au/Details/F2018L00032) has updated the following annual living costs and expenses in line with the Customer Price Index (CPI) increases from June 2017 to June 2019: - for a primary applicant: an increase from AUD20,292 to AUD21,041 - for a spouse or de facto partner of the primary applicant: an increase from AUD7,100 to AUD7,362 - for a dependent child: an increase from AUD3,040 to AUD3,152 - annual school costs: an increase from AUD8,000 to AUD8,296 - personal annual income if there is no secondary applicant: an increase from AUD60,000 to AUD62,222 - personal annual income where there is a secondary applicant: an increase from AUD70,000 to AUD72,592 All costs are per year in Australian dollars. To convert to your own currency visit www.xe.com Other living expenses - Groceries and eating out - $80 to $280 per week - Gas, electricity - $35 to $140 per week - Phone and Internet - $20 to $55 per week - Public transport - $15 to $55 per week - Car (after purchase) - $150 to $260 per week - Entertainment - $80 to $150 per week All costs are in Australian dollars and are estimates only. See the Study in Australia website for more information. - The Australian Government provides information and guidance on managing your finances. You can read more at www.moneysmart.gov.au - The Insider Guides Cost of Living Calculator is a useful tool to help estimate your cost of living in Australia. Visit insiderguides.com.au/cost-of-living-calculator Australia has a large number of local and foreign banks and other financial institutions. Most banks provide telephone and internet banking, savings and cheque accounts, credit cards and debit cards, foreign currency exchange and travellers cheques, loans, transfer of funds and other financial services. Usual Banking hours Monday to Thursday: 9.30am - 4.00pm Friday: 9.30am - 5.00pm Most branches offer 24 hour Automatic Teller Machines (ATM). Opening a Bank Account In Australia, most income including salary or wages and government benefits are paid directly into a bank account. Here are some quick tips on setting up your bank accounts. - You can set up a bank account before or after you arrive. - To open an account you will need to have your Electronic Confirmation of Enrolment (eCoE), passport, Letter of Offer and other forms of identification - You may also need an Australian Tax File Number (TFN) from the Australian Tax Office Check if your current bank has a branch in Australia, they may be able to assist you with setting up a new account. While studying in Australia it is recommended you work out a budget covering costs including; clothing, food, accommodation, transport and entertainment. Travel costs and child care, if applicable, should also be taken into consideration. It’s important to be aware of how much money you spend and where you are spending it. Sticking to a budget will ensure you are aware of where your money is being spent. Read more about budgeting at www.moneysmart.gov.au If you experience financial trouble while living in Canberra and studying at CIT, please contact the CIT International for assistance.
<urn:uuid:cfdc35b1-a0ff-4ec7-935e-9af00d1d3bda>
CC-MAIN-2020-16
https://international.cit.edu.au/study/canberra/living_costs
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371611051.77/warc/CC-MAIN-20200405213008-20200406003508-00056.warc.gz
en
0.917793
913
2.703125
3
1.55448
2
Moderate reasoning
Finance & Business
Fish welfare depends on fish health Evira and the Finnish Fish Farmers’ Association organise an annual conference on fish health and other industry issues, Kalaterveys- ja yrittäjäpäivät. This year, the conference will take place in Jyväskylä on March 14 and 15. In their keynotes, Evira’s specialists will address the outbreaks of new diseases hampering fish farming. Evira taking an active role Evira’s fish research focuses on the analysis of laboratory samples and studies of fish diseases. Evira is responsible for monitoring fish welfare, and disseminating information on food hygiene for the industry. Providing up-to-date information on infectious fish diseases The current threats from infectious diseases include the infectious salmon anaemia (ISA) and the salmonid alphavirus (SAV). Neither of these has been found in Finland. ISA can become widespread through water, fish, fish waste and human activity. In Finland, ISA requires control measures under the Finnish Animal Diseases Act (eläintautilaki 55/1980) and is classified as a highly contagious disease. As there is no treatment for SAV, avoiding infection is the only method of preventing the losses caused by this disease. Diseases caused by the SAV viruses are also monitored under the Animal Disease Act and are classified as controlled diseases. Evira’s report on infectious pancreatic necrosis (IPN) clarifies the implications of the virus, detected in Finland’s inland waters during the previous year, to fish farming. Mortality in salmonoid fry, such as trout, rainbow trout and salmon, varies according to the IPN virus strain, fish species, fish age, and fish immune functions. The virus strain detected in Finland’s inland waters has not been found to cause high mortality rates. The conference will also discuss the prevention of flavobacteria-causing diseases in farmed fish. Vaccination of fish against the bacterial infection is highly recommended as one of the best prevention methods. Feeding and foods affecting fish health The effects of feeding and fish food on the health of fish are many, even though finding proof of a causal link between a foodstuff and the problems it has been suspected of causing remains difficult after the event has occurred. For example, fish food was suspected of causing an outbreak of constipation in rainbow trout fish fry in 2013. Reforming the guidance for controlling fish products Evira’s new guidance for the control, food hygiene, and product safety of fish products will be introduced at the conference. The guidance is targeted at the controlling authorities but it also provides useful information for the industry. In addition, the guidance explains the requirements for fishing products with relevance to primary production, processing, and retail. The key requirements related to fish farming include the sensory quality control of fish, storage and transport temperatures, safety of water and ice during refrigeration, and packaging labelling. Remembering to maintain good hygiene in the kitchen Safe cooking is based on good hygiene in the kitchen. Meals containing raw or undercooked burbot, pike, perch, and ruff may expose humans to fish tapeworm. Boiling and frying are safe methods of preparing fish. For information on fish diseases Perttu Koski, PhD, Senior Researcher, Head of Section, Production Animal and Wildlife Health Research Unit, tel. +358 40 569 4541.
<urn:uuid:60d09fbd-0182-4654-90a1-eac41784f841>
CC-MAIN-2017-09
https://www.evira.fi/en/shared-topics/news/fish-welfare-depends-on-fish-health/
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00121-ip-10-171-10-108.ec2.internal.warc.gz
en
0.930424
713
2.671875
3
2.93981
3
Strong reasoning
Health
A legend in her adopted city, Flint, Michigan, Mrs. E. Hill De Loney has spent nearly 60 years working to change the lives of the city's African Americans—especially its young people. "My parents told us that we always had to give back," she says. "Regardless of what we accomplished, we had to give back to our community. It did become very ingrained in me." Growing up in the Jim Crow South, De Loney was particularly aware of the debt she owed her enslaved forebears—"because of the hardships they went through, the psychological trauma. I was taught that we were all connected." Aware, too, of the persistent legacy of racism in the United States, De Loney hesitated when members of the U-M SPH faculty approached her about becoming a community partner in the early 1990s. Tuskegee—the infamous 20th-century study in which the U.S. Public Health Service withheld treatment from poor African-American men in order to study the natural progression of untreated syphilis—"was on us," she remembers. "Research was a dirty word to our community." But something drove De Loney to say yes to SPH, and she has since become one of the school's most loyal partners—a key player in collaborative, community-based initiatives to improve adolescent health, lower infant mortality, strengthen parent-child ties, and prevent youth violence in Flint. De Loney believes a successful academic-community partnership depends above all on three factors: "The African-American community is not going to accept a partnership unless it's someone you trust. Until I know you, observe you, see what kinds of feedback you offer, what kinds of words come out of your mouth, how you look at me, how you approach me—trust can't happen. Trust is difficult to come by, and it can dissipate quickly." "Communication is one of the hardest skills in a partnership. It's very, very important to be clear. You have to ask questions. If I explain something to you, but our definition of the same word is different, then we'll fail to communicate. So if you're in a meeting, find out what each partner heard, and make sure the interpretation is accurate." "Hand in hand with clear communication is listening—mindful listening, active listening, positive listening. When you're truly listening to a person, you're not just hearing words, you're comprehending, and you know what questions you need to ask. But if you're halfway listening, you're not even in the conversation." Twenty years ago, Ricardo Guzman, MPH '97, and his colleagues in Detroit's Hispanic community and the city's predominantly African-American east side community were worried. They'd seen researchers come into the city before and conduct what one community member called "drive-by research." "They'd essentially shoot in, take information, and leave," says Guzman, the CEO of southwest Detroit's Community Health and Social Services Center (CHASS). On one occasion, Guzman didn't know he and his fellow Detroiters were part of a research study until he stumbled on findings from the study in a peer-reviewed journal. So when SPH faculty members Barbara Israel, Rich Lichtenstein, and their colleagues asked Guzman and other community organizations in Detroit to partner with U-M researchers in a new venture focused on health equity, the Detroit Community–Academic Urban Research Center (URC), "there was a lot of apprehension," Guzman remembers. But he'd met Israel and several SPH faculty members, and sensed "that at the heart of it there was something that probably would be worthwhile." So he and his peers decided to give it a try. Trust was critical. So was an 18-month period when all of the partners—faculty from throughout U-M and more than eight community organizations in Detroit—met to "set down a level playing field that we all understood and agreed to and talked about," says Guzman. Among the principles they agreed on: - Equal data-sharing - Collective action - Mutual respect - Equal participation "One of the really critical things about a collaborative research process is the recognition and understanding that community partners have a knowledge and experience base that we as outside researchers just don't have," says Israel. "As a consequence, the research itself, and the nature of the questions we ask, are much more relevant and valid to the community context." Since its inception in 1995, the Detroit URC and its affiliated partnerships have launched over 30 community-based participatory research projects in Detroit—including air-quality assessments, walking groups, and a domestic violence–prevention project. The partnership has also helped bring more Latinos into SPH, among them Guzman himself, who earned an MPH in 1997 through the school's executive master's program. "Twenty to 25 years ago, U-M was not welcomed in Detroit," Guzman says. "That has significantly changed. I believe the Detroit URC helped pave the way for the larger U-M involvement you see today in Detroit." Corporations team up with SPH researchers for a variety of reasons. Some, for example, hope the collaboration will result in a profitable consumer product, and others seek SPH expertise in conducting risk assessments. While every research project is individual, certain basics apply to all such partnerships, says SPH Associate Dean for Research John Meeker. Academic integrity is a given, and projects are ideally investigator-initiated and maintain intellectual property within U-M. Meeker knows firsthand what he's talking about—he's partnering with NSF International on a study of the reproductive and childhood-development impacts of exposures to everyday chemicals. "One of the main reasons we embrace these partnerships is that we want to get our research out into communities," Meeker adds. "If an SPH researcher has discovered something that can improve public health, we want to get that out there in the form of a product or as information. Many times it's much more effective to do that in a strategic partnership than on our own."
<urn:uuid:bff4e37a-c2a9-4366-b781-3160a06f1537>
CC-MAIN-2020-24
https://sph.umich.edu/findings/fall2014/world/partners.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347419639.53/warc/CC-MAIN-20200601211310-20200602001310-00263.warc.gz
en
0.972454
1,254
2.859375
3
2.939231
3
Strong reasoning
Education & Jobs
Spanning a number of varying styles, Australia’s period architecture boasts distinctive designs that are full of character and charm. Much of the residential architecture built in the early 1900’s owes its development to the prosperity of the gold rush era. However, period homes began evolving considerably from around the mid 1800’s. Influenced by both English and American styles of architecture Australian period homes were shaped by the way of life and the economic climate of the time. From the steady advancement after World War II, to the California bungalow which reflects Hollywood’s influence on Australia, to the boom of the gold rush days, Australia has developed a richly eclectic urban landscape of houses that are innately beautiful. From 1840 – 1980, we have researched extensively into the different types of period homes to bring you a guide to the top eight iconic styles that characterise Australia’s neighbourhoods today. Learn more about these styles below. Click on the style era to jump to that section - Victorian Era - Boom Town Era - Federation Era - Edwardian Era - Californian Bungalow Era - Art Deco Era - Contemporary Era - Brick Veneer Era - Also discover our guide to Period Home exterior colour schemes Victorian Era Homes 1860-1880 Victoria era homes are often over 100 years old and were built between 1840-1890 during the reign of Queen Victoria. Simple elegance is the centre feature of these homes, making them timeless and still very appealing to this day. Victorian style terrace houses are very common in suburban Melbourne and Sydney. Some key features of Victorian Era Homes are: - Intricate stucco facades and verandas sporting cast iron lacework - Arched and double hung timber windows - Roofs made from slate or corrugated iron Boom Style Era 1875-1890 Boom style homes came to the forefront during the economic boom of the gold rush during the late 19th century. These homes are noted for their intricate brickwork and lavish style and building became endowed with excess columns, balustrades and exaggerated entrances. This style of housing is quite common in Melbourne, thanks to the gold rush era. Some key features of Boom Style homes are: - Intricate brickwork featuring complex patterns of different coloured bricks - Highly decorated facades and parapets featuring sculptures and intricate designs - The roof is often as well decorated as the walls, featuring slate tiles arranged in polychromatic patterns - Arched, double hung windows with elaborate decorations Federation Era 1895-1915 These lavish home came about during Australia’s coming of age as a nation. Federation Era homes are reminiscent of Old English Tudor style homes and also known as “Queen Anne Style”. Carrying on the intricate style from the boom era, these homes often feature red brick and steep pitched roof with the occasional Tudor style weatherboard. Some key features of Federation homes are: - Elaborate verandas which are integrated into the roof of the home - Asymmetrical design with multi-faceted roofs. - Victorian era homes often feature red bricks - Stucco chimneys topped off with a terracotta chimney pot - Timber framed windows with intricate leadlight - High ceilings with highly decorated plasterwork Even in today's modern times, the Federation style has remained extremely popular and continues to flourish in Australia's new build homes. Visit our article about the Story of Annette's Home to step inside a Federation style home. Edwardian Era 1910-1915 Edwardian houses were built during the reign of King Edward and often come across as a toned down version of Federation Era homes. Some key features of Edwardian homes are: - The home is often built with red brick or weatherboards - The roof is often made from slate or corrugated iron - The facade may often be decorate to emphasize the apex of the roof - Timber framed windows that may feature leadlight glass Visit our article on Rich Glen Olive Estate to discover a home that beautifully blends a mix of Edwardian, Bunglow and Tudor style architecture. Californian Bungalow Era 1920-1930 A style that arrived from America during the 1920s, which became very popular. These homes featured lower pitched roofs when compared to previous era homes and often featured thick columns beneath the veranda. Some key features of Californian Bungalow homes are: - Low pitched roof - Veranda held upright by large, thick columns - Interior walls featuring stained plywood - Double hung windows with leadlight, similar to federation and Edwardian style homes Visit the articles below to step inside a gorgeous Californian Bungalow or discover more about about the Californian Bungalow Style. Art Deco Era 1930-1950 Art Deco style was extremely forward thinking and modern at the time and are still quite striking to this day. Architects aimed and creating something completely different from previous eras and used different materials and shapes to achieve a unique style. Some key features of Art Deco homes are: - Weatherboard or brick walls to create a solid appearance - Rounded edges and occasionally symmetric and imposing designs - Hipped roofs and the use of terracotta tiles - Use of whites and creams Contemporary Era 1950-1960 Contemporary architecture hasn’t stood the test of time as well as previous eras and often looks very dated in the modern era. These homes usually featured open plan interiors and featured brown and cream brick finishes with low pitched roofs. Designs of the houses can be quite unusual and in a lot of ways are similar to the art deco style that preceded it. Some key features of Contemporary homes are: - Low pitched roofs featuring corrugated iron or steel decking - Open plan interiors and low ceilings - Big windows often extending across entire front of the house - Cream, brown or light coloured bricks. Alternatively vertical weatherboards were also used. Brick Veneer Era 1960-1980 This era of homes saw a step back from the ambitious designs of the Art Deco and Contemporary eras and ushered in the conservative and plain brick veneer, which was easy to build and relatively affordable. It is not uncommon to see entire streets of very similar brick veneer homes. Some key features of Brick Veneer homes are: - Homes often feature hipped roofs with simple concrete tiles often in bleak or low profile colours - Sliding timber framed windows - Very plain interior with timber flooring - Red, cream or white brick finishes In Australia we are blessed to be surrounded by so many beautiful examples of period style architecture and landscapes that not only reflect our culture, but also remind us of our rich history and the important era's gone by. At House of Home we bring together everything for making your house a home. We make it easy to discover and buy homewares, furniture, lighting, art and building products for your home. Any time, anywhere from your computer, mobile device or even in store. We bring together all the products you're searching for, along with all the latest home design trends, renovation advice and the best of bathrooms, kitchens, dining rooms, living areas, bedrooms and everything else you need to make your house feel more like home.
<urn:uuid:b566f097-0791-4adc-a784-d67eb751c983>
CC-MAIN-2019-22
https://www.houseofhome.com.au/blog/australian-home-periods
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256494.24/warc/CC-MAIN-20190521162634-20190521184634-00213.warc.gz
en
0.939397
1,546
3.046875
3
1.824396
2
Moderate reasoning
Art & Design
Epithelial tissue covers the outside of the body and lines organs, vessels, and cavities epithelial cells are very closely packed together. Figure 1 four types of tissue: body the four types of tissues are exemplified in nervous tissue, stratified squamous epithelial tissue, cardiac muscle tissue, and. Human body is made up of tissues and cells here is the list of 4 types of tissues, with examples and their functions in the body. Animal tissues are grouped into four basic types: connective, muscle, nervous, and epithelial collections of tissues joined in structural units to serve a common. Connective tissue (ct) is one of the four basic types of animal tissue, along with epithelial tissue, muscle tissue, and nervous tissue it develops from the mesoderm. Epithelial tissue is a really important tissue in our bodies epithelial tissue lines all our body surfaces both inside and out and it also forms glands. Epithelium study guide epithelial tissue comprises one of the four basic tissue types the others are connective tissue (support cells, immune cells, blood. Eight types of epithelial tissue by antranik 16 comments first name of tissue indicates number of cell layers simple—one layer of cells stratified—more than. Animal’tissues’ there%are%four%types%of%tissues%found the%function%of%epithelial%tissue%varies%depending%on%its%location%%as%you%explore%the animal. Types of epithelial tissue diseases epithelial tissue is made up of epithelial cells what is human body tissue - definition, types & examples related study. Histology a microscopic study of human body there are more than 200 different types of tissues of the name of the epithelial tissue describes its. This lesson will cover the different shapes and structures of epithelial tissue, including simple, columnar, cuboidal, stratified, transitional. Epithelium (epi-+ thele + -ium) is one of the four basic types of animal tissue, along with connective tissue, muscle tissue and nervous tissue epithelial tissues. Classification of tissues the form and function of the different types of tissues in the human body the epithelial tissue previously discussed. Overview of the four basic tissue types epithelial tissue covers body surfaces (epi, on + thelium, surface) epithelial tissue consists of cells attached to. There are two major types of epithelia: nutrients and waste products between the blood and surrounding tissues these epithelia are usually simple squamous type. Epithelial tissue i b types of epithelia there are three types of epithelia, each distinguished by the number of cell layers comprising the epithelial membrane. Characteristics of epithelial tissue the human body consists of four types of tissue: epithelial, connective, muscular, and nervous epithelial tissue covers the. Epithelia tissue cells differentiate thus epithelia tissues are composed of cells that specialize to carryout the function three types of chrondrocytes. The four types of tissue in the body are epithelial, connective, muscle, and nervous epithelial tissue is made of layers of cells that cover the surfaces of the body.
<urn:uuid:519c3f90-8892-4977-8b41-d2c4b3afcb56>
CC-MAIN-2018-43
http://behomeworkkyfd.weblogparkeren.info/epithelial-tissue-and-its-types.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583515564.94/warc/CC-MAIN-20181023002817-20181023024317-00402.warc.gz
en
0.941423
662
3.546875
4
1.47992
1
Basic reasoning
Science & Tech.
AI from its beginning has been plagued with duality. Success in AI has always been accompanied by increased responsibility, social responsibilities, educational challenges and impact that decision makers and the general public vaguely understand. Considerable progress has been made in understanding the how and what of AI, including common modes of reasoning. Research shows, that combinations of deductive, case based, inductive, uncertainty, and default reasoning are just a few of the aspects of intelligence that need to be incorporated into successful AI systems. The duality between the role of humans in the universe and what role machines will play is only beginning to play out. AI offers humans benefits, including less boring repetitive workplaces, safer manufacturing, better travel, increased security, and smarter decisions that may help preserve a volatile habitat (Buchanan, 2006). Since the beginning, AI has been concerned with creating intelligent machines that formalize reasoning and understanding in all areas of the human experience. The direction has always been toward formalizing knowledge in a way that makes working with computers easier and more helpful. The impact of AI on living has the potential to meet and or exceed the impact of any prior technologies. Exploring psychology, reasoning, decision science and behavior puts AI in the position to solve intellectual problems, control robot motions, interpret human language, learn new skills and acquire knowledge by continually analyzing data. Both AI and ML are terms that ascribe to a variety of meanings. The near-term future indicates that a technology that has been coming for decades and has finally tipped, will continue to grow. Fueled by the very familiar Moore’s Law, which states that the capacity of computer chips will double every year while the costs decrease by half, along with new innovations such as quantum computing, assures the continued exploration and integration of AI and ML in many workplaces. Fueled by rapid expansion in computing power, the IBM 360/75, the mainframe computer of its day, in 1969 helped to land our first astronauts on the moon. It had 6 megabytes of computing power. Today that equates to 10% of the computing power needed for the game Candy Crush. On the factory floor, robots are likely to replace humans in redundant tasks and repetitive jobs. This relative fast grow in an expansion of power has led to the factory floor being populated by robots and not just at Tesla. Apples’ supplier Foxconn replaced 60,000 workers in a factory in China with robots in 2017. Amazon continues to rollout robot staffed warehouse and distribution centers and most of the shipping from ports like Los Angeles to Baltimore is now conducted by robots. Even law enforcement has gone robotic. Knightscope security robots patrol the parking lot, while high speed bots, like the Cheetah, chase down criminals at speed in excess of 28 MPH. Robots are building houses, aiding the military, delivering pizza and making meals at McDonalds. They are helping to drive cars and soon trucks, play music and turn lights off and on. Smart chabots and vocally activated technologies are everywhere. Some good, some not so good but always more prevalent and getting better. These devices are helping hire babysitters and acting as lawyers. They are and will continue to take the jobs they can take. They pretend a massive impact on jobs, the workplace and employment. Although they offer the potential of opening up new positions and roles, what and how this will all play out has yet to be determined. Undoubtable there will be upheaval and redefinition of workplace performance. Certainly, it is the agile workplace that will have the best chance of surviving and thriving into the future (Hirsch, 2017).
<urn:uuid:064f9479-425a-41d1-9d3d-4abc294a9689>
CC-MAIN-2020-05
https://a-l-t.com/ai-and-the-agile-workplace/duality-from-the-beginning/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250604397.40/warc/CC-MAIN-20200121132900-20200121161900-00026.warc.gz
en
0.962009
727
3.609375
4
2.926985
3
Strong reasoning
Science & Tech.
Now is the time that we make Sanskrit mandatory at all levels of education, not only for the sake of its revival, but also for increasing the life of our own culture and spreading the knowledge of our history and heritage. When Prime Minister Narendra Modi was to be sworn in, rumours suggested that he will do so in Sanskrit. But it did not happen. Maybe it was the failure of popular expectation that led to four of Lok Sabha MPs take oath in the ancient Indian language today. Bhartiya Janata Party leader and external affairs minister Sushma Swaraj, along with water resource minister Uma Bharti, health minister Dr Harsh Vardhan and BJP MP from East Delhi Maheish Girri took oath in the 16th Lok Sabha in Sanskrit. With this, the language of the Gods became the new cool on social media and electronic media. People were tweeting about it and liking the news on facebook. But does this complete our homage towards Sanskrit? The foundation of India culture is based on the Sanskrit language. In ancient India, it served as the means of communication and vehicle for passage of knowledge from one generation to the other. But the ‘pure’ language is now confined to the auspices of temples and rituals conducted by brahmanas. Although we teach Sanskrit in schools, it is not a compulsory/mandatory subject. In colleges, it has very few takers for it does not ensure a ‘lucrative’ job in your hand after completion of the degree. It only offers you a teaching position in schools or universities which ‘tech’-loving generation of the country and their parents find distasteful these days. So, if one is opting for Sanskrit in college this means that the person is unable to achieve the cut-off required for other subjects, which are more in demand., or is making a compromise for a better college in place of better subject. However, one has an option of writing for civil services which offers Sanskrit as an elective. But that is a gamble and simply not enough for one in the current want of diversification. The language of rare sublimity, as recognized by the world, has lost its base in its own land. How did this happen? How did we lose our mother tongue? Unlike the current situation of Sanskrit where it has become a language of religion and rituals, once it flourished because of our grammarians, poets, literature, mathematicians, scientists, philosophers, doctors, political scientists, historians and legal scientists. The language kept changing from around 2000 B.C. when the Rig Veda was composed to about 500 B.C. i.e. for about 1500 years as it was present only in the oral form. In the 5th Century B.C. the great grammarian Panini wrote `Ashtadhyayi’ – book of eight chapters – to fix the rules of Sanskrit. Panini refined, purified and systematized Sanskrit and made it a language of great logic, precision and elegance. In his first fourteen Sutras arranged alphabets in the Sanskrit language in a very scientific and logical manner, after close observation of the sounds in human speech. Thus, for example the vowels, a, aa, i, ee, u, oo, ae, ai, o, ou are arranged according to the shape of mouth and sounds they emit while speaking. Like a and aa, are pronounced from the throat, i and ee from the palate, o and oo from the lips, etc. In the same way the consonants have been arranged in a sequence on a scientific pattern. The (ka) varga (i.e. ka, kha, ga, gha, nga) are emitted from the throat, the (cha) varga from the palate, the ( ta ) varga from the roof of the mouth, the (ta ) varga from the teeth, and the (pa ) varga from the lips. With such rational and logical changes he, thus, made Sanskrit a highly developed and powerful vehicle of expression in which scientific ideas could be expressed with great precision and clarity. This uniform language helped people to understand each-other pan-India. Thereafter no further changes in the language were permitted. Except for the slight changes by two other great grammarians, namely, Katyayana who wrote ‘Vartika’, and Patanjali who wrote his commentary on the Ashtadhyayi called the ‘Maha Bhashya’, Sanskrit as it exists today is really Panini’s Sanskrit or Classical Sanskrit. But the change of regimes over the period of time, illiteracy and sheer ignorance led to the loss of the language. The language lost touch with the masses. Even when we had time to revive it, sheer elitism and acceptance of a foreign language made it difficult for both – the language and the masses – to survive. Swaraj, Bharti, Vardhan and Girri are from the fewer lots who are well versed with the language. You can see the impact of it on their oratory, diction and writing. Now we have a generation which does not know Sanskrit at all and another generation which could not even speak its younger sister Hindi well. But we have not lost all. It may take time, but we can revive Sanskrit. For example, renaissance scientists of Europe, who often were aristocrats, used to worked in Latin. After sitting through Newton’s story about the ‘pomum’ falling to the ‘terra’ from the ‘arbor’ for the umpteenth time, they realised that they all spoke English and could transform their understanding of the universe much quicker by communicating in their own language. Similar thinking passed the minds of French, Italians, and German. This made imparting scientific knowledge as easy as narrating a folk lore. Science and scientific temper grew as their languages. MPs taking oath in our mother language as a display of respect and affection towards it is indeed a good step. Now is the time that we make Sanskrit mandatory at all levels of education, not only for the sake of its revival, but also for increasing the life of our own culture and spreading the knowledge of our history and heritage. P.S. Till the latest news, over 20 MPs took oath in Sanskrit. Most of them hailed from Uttar Pradesh. Four out of Seven MPs from Delhi took oath in Sanskrit as an ode to the language.
<urn:uuid:cf1c26f4-9d04-4df4-b8b0-13c0da320280>
CC-MAIN-2024-10
https://www.youngisthan.in/india/4-mps-take-oath-in-sanskrit-is-it-enough-for-the-language/7769
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474595.59/warc/CC-MAIN-20240225103506-20240225133506-00679.warc.gz
en
0.961712
1,359
2.53125
3
2.835374
3
Strong reasoning
Literature
Short-finned pilot whale clicks Among short-finned pilot whales click vocalizations occur during near all periods of vocal activity. It is generally believed for toothed whale species that clicks functionally serve for echolocation. Though clicks can also have a communicative function, researchers rather argue that communication between conspecifics is assured by tonal sounds such as calls and whistles (...here...). Click ...here... to hear regular clicks (.mp3 file with 1.2 MB) Own research (...here...) showed that short-finned pilot whale clicks are short pulses mostly having a broadband frequency composition. Many sequences during which the whales emitted regular clicks ranged 5 - 60 s or even longer in duration. The inter-click interval (ICI) is about 0.5 seconds between clicks. The sound example was recorded during apparant foraging behavior at night. Though own observations showed that short-finned pilot whales also feed during daylight hours, they are generally believed to be night-time feeders. During the night their main prey -cephalopod species- ascend from deeper waters to the water surface (...here...). Click ...here... to hear click trains (.mp3 file with 1.3 MB) Own research further showed that pilot whales increase the pulse repetition rate ranging 20 - 80 pulses per second. These sequences were termed click trains. During this sound example, several pilot whales simultaneously emitted clicks trains and directed them towards the recording hydrophone. The animals sometimes increased and decreased their ICI. Such click train sequences were also observed during human-pilot whales in-water encounters where certain or several individuals direct their vocalizations to the snorkelers (...here...). Click ...here... to hear buzzes (.mp3 file with 2.2 MB) During apparant foraging sequences pilot whales can increase their pulse repetition rates up to 90-280 pulses per second. These sequences were termed fast click trains or buzzes. Whereas regular clicks generally have a continous energy distribution from 0.1 to more than 24 kHz, during buzzes the energy distribution for frequencies becomes less broadband. The spectrogram shows a buzz lasting several seconds with concentrated frequency compositions from about 5 to 14 kHz. Buzzes supposingly represent pre-catch indicators. During the last stage of the prey catch, pilot whales (as several other clicking cetacean species) may use buzzes to focus on individual prey items.
<urn:uuid:a5402a6c-85de-4ad6-9cd6-d3a204fa1c8f>
CC-MAIN-2015-18
http://www.pilot-whales.org/www/en/globicephala_macrorhynchus_vocalizations.php?WEBYEP_DI=3
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246657588.53/warc/CC-MAIN-20150417045737-00173-ip-10-235-10-82.ec2.internal.warc.gz
en
0.957702
504
3.640625
4
2.636187
3
Strong reasoning
Science & Tech.
(not to be confused with Bevin Boys) The Bevin Trainee Scheme was introduced by Ernest Bevin, Minister of Labour and National Service during 1941. The proposal was to bring 2,000 Indians into the United Kingdom for industrial training with a view to developing Indian industry particularly in relation to the war effort. The first 50 Bevin Trainees came over in May 1941 and were sent to a training centre in Letchworth, Hertfordshire, after which the Trainees were sent to industrial centres in Manchester, Birmingham, Rugby and Glasgow. The scheme was not without problems as many were fully qualified with technical, workshop and engineering degrees, all receiving elementary training. Additionally there were further problems involving religious and political activities as well as complains of insufficient clothing, food, and gross interference of personal liberty and intimidation. Little is known about the above and it should be made clear that there is no connection between the 1941 Bevin Trainees from India who worked in the factories and the 1942-1948 Bevin Boys conscripted in the UK to work in the coal mines. Source: Warwick H Taylor MBE Badge can be issued to men who were conscripted directly into the mines, those who opted for mine work in preference to joining the Armed Forces, or those who were in the Armed Forces and volunteered to become miners during the period 1942-1948. The Bevin Boys scheme was introduced in 1942 by the then Minister for Labour and National Service, Ernest Bevin. The scheme ran between 1942 and 1948 and involved recruiting men to work in coal mines during and immediately following World War 2. The badge is available to all surviving Bevin Boys and formally recognises their work in the UK coalfields during and immediately after World War II. The badge can only be issued posthumously to the widows of men who died on or after 20 June 2007 and fall into the above category. The application form for the badge can be found here: Or you can contact the Department of Energy and climate change who administer the badge on 0300 068 5716 Bevin Boy Commemorate Medal For the relatives of deceased Bevin Boys who do not qualify for the Government Bevin Boy Badge (those Bevin Boys who died before 2007) a Commemorative Medal has been commissioned by the Bevin Boys' Association. The Bevin Boy Medal is available to Ballotees, Optants, Volunteers and next of kin called up between 1943 and 1948. The medal is solid silver and can be ordered here:
<urn:uuid:4dfeb9a2-ad7c-4b53-963c-17fdde15f964>
CC-MAIN-2020-10
http://www.theforgottenconscript.co.uk/who-were-the-bevin-trainees/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146940.95/warc/CC-MAIN-20200228012313-20200228042313-00527.warc.gz
en
0.977314
523
2.6875
3
2.484708
2
Moderate reasoning
History
With respect to cancer treatment, chemotherapy has been extremely beneficial and effective. Unfortunately, it brings with it a common and undesirable side effect: hair loss. In fact, a small percentage of women will actually decline chemotherapy out of a desire not to lose their hair. Fortunately, research and practice in Europe have brought new promise in minimizing the side effect of hair loss. Researchers have discovered that by reducing the temperature of the scalp during chemotherapeutic sessions, the cooling measure has a significant protective effect in preventing or greatly reducing the hair loss experienced by many patients undergoing the cancer treatments. The concept is rational and straightforward: The cooling of the skin of the scalp causes the blood vessels to shrink, and it reduces the total blood flow in the skin of the scalp that surrounds the hair follicles. With less blood flowing to the area, there is much less of the chemotherapeutic drug available to affect the hair follicles. Less drug exposure results in less hair loss. Both studies used a scalp cooling system where a chilled liquid coolant is continuously circulated inside a cooling cap that covers the head. The cooling is started before the initiation of chemotherapy, and the scalp cooling is continued for 90 minutes after the chemotherapy is discontinued. This machine-regulated, circulating system offers better temperature regulation over the older versions where caps filled with liquid coolant were kept frozen and changed out every 30 minutes or so. The treatment itself is very well tolerated. No patient discontinued their participation in either study due to treatment discomfort. Most patients reported that the treatments were a bit chilly and mildly uncomfortable for just the first few minutes, after which the treatment became almost undetectable. The results are both impressive and promising. It should be noted that there are several different chemotherapeutic agents used, so results are both dependent on the participant’s individual genetic response and the chemotherapeutic medicine used. Overall, among patients undergoing chemotherapy and using the scalp cooling system, 55 percent kept at least half or more of their hair, and approximately seven percent of the treated patients kept all their hair. In contrast, women undergoing chemotherapy who did not use the cooling system experienced a significant or total scalp hair loss a frustrating 95 percent of the time. The scalp cooling systems used in the two studies were 1) the Digni Cap and 2) the Paxman Scalp Cooling System. Both systems have received FDA cleared. Experts comment that this type of treatment is best for the chemotherapy required for solid cancers, such as breast cancer, but not for liquid/blood cancers. Currently, the scalp cooling systems are not widely available but are becoming more so. It is rarely covered by insurance, so the cost is paid out-of-pocket by the majority of patients using it, and the cost averages about $2,000 for a set of treatments. Patients and physicians alike are hopeful that insurance providers will provide better coverage as the procedure gains popularity and demonstrates continued effectiveness. Patients and physicians both acknowledge that not every patient will want scalp cooling treatments. This choice is analogous to the case where not every woman has breast reconstructive surgery or elects to wear a hairpiece. For some patients, hair retention helps to preserve self-esteem; for others, it offers a measure of control over an involuntary and very difficult situation. Nevertheless, most believe that every person should have the option of using a scalp cooling system to preserve hair during chemotherapy treatments. Fortunately, the scalp cooling systems are here now and becoming more readily available. Charles E. Crutchfield III, MD is a board certified dermatologist and Clinical Professor of Dermatology at the University of Minnesota Medical School. He also has a private practice in Eagan, MN. He received his M.D. and Master’s Degree in Molecular Biology and Genomics from the Mayo Clinic. He has been selected as one of the top 10 dermatologists in the United States by Black Enterprise magazine. Dr. Crutchfield was recognized by Minnesota Medicine as one of the 100 Most Influential Healthcare Leaders in Minnesota. He is the team dermatologist for the Minnesota Twins, Vikings, Timberwolves, Wild and Lynx. Dr. Crutchfield is an active member of both the American and National Medical Associations.
<urn:uuid:ced639bf-23dd-4bf9-ae4c-022e45303eac>
CC-MAIN-2021-25
https://www.crutchfielddermatology.com/blog/a-cool-solution-to-hair-loss-from-cancer-chemotherapy/
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487611089.19/warc/CC-MAIN-20210613222907-20210614012907-00591.warc.gz
en
0.964166
857
2.765625
3
2.780476
3
Strong reasoning
Health
Location: Vegetable Crops Research Unit 2012 Annual Report Efficacy of alternative insecticides. Preliminary research with the novel insecticide tolfenpyrad has shown a high level of toxicity to CPB larvae and adults in the lab and field. In 2012, we will conduct bioassays to measure LC50 levels and to determine optimal rates of this chemical to use in the field. In addition, we will evaluate the efficacy of several other novel insecticides including cyantraniliprole, spinetoram, and others. CPB resistance and diapause. We do not know whether resistance acceleration may be occurring as later emerging portions of CPB populations are exposed to sub-lethal, systemic insecticide doses. A proportion of populations may be selected for later emergence when, or if, in-plant insecticide levels decline. Over time, the continual exposure of late emerging insects to sub-lethal doses will aid in hastening resistance development. The long term impacts of a protracted emergence are currently unknown and may compromise the efficacy of current and future systemic registrations. Field experiments in 2010 were set up to investigate the extent to which extended diapause or delayed emergence is associated with insensitivity among populations. Specifically, experiments consisted of caged beetles (approximately 500-1,000 adult CPB / cage) collected from sites with measured levels of neonicotinoid resistance and compared with sites possessing no evidence for insensitivity. To date, we have observed unique differences in the emergence phenology of populations collected from different locations each with unique estimated resistance ratios. During the fall, winter, and spring of 2011-12, we will again monitor the temporal patterns of adult emergence. Here again, populations will be collected from sites with a documented history of CPB resistance associated with elevated resistance ratios and the associated emergence phenology will be examined over the emergence interval. Efficacy of alternative insecticides. Registered and experimental foliar insecticides to control CPB and potato leafhopper (PLH) in potato. Experiments were conducted at Hancock Agricultural Research Station (HAES) on a loamy sand soil. Potato, Solanum tuberosum cv. ‘Superior,’ seed pieces were planted and spaced 12 inches apart within rows. Rows were 3 ft apart. The two-row plots were 6 ft wide by 20 ft long, for a total of 0.003 acres. Two guard rows separated plots while 12 ft tilled alleys separated replications. All plots were maintained according to standard commercial practices conducted by HAES staff. Four replicates of 18 experimental foliar treatments and one untreated control were arranged in a randomized complete block design. The foliar treatments were applied twice in succession when 75-90% of the first generation CPB was within the first and second instar larval stadia. Control of CPB was assessed by counting the number of egg masses (EM), small larvae (SL), large larvae (LL) and adults per plant on 10 randomly selected plants in each plot. Percent foliage defoliation (%DF) ratings were assessed by visual observation of each plot. Control of PLH, Empoasca fabae, was assessed by counting the number of adults collected from 25 sweep net samples in each plot. Insect counts occurred on several dates and reported means were averaged across those dates. Populations of CPB were considered average to above-average as measured defoliation in the plots was nearing 5% by the time the initial foliar applications were applied. Increased levels of early larval CPB control were achieved with higher rates of DPX HGW86, Belay, Voliam Flexi, and Coragen compared to the untreated check. Lower than average levels of adult PLH were observed in the experimental plots as no significant differences were observed among registered or experimental compounds. No overt signs or symptoms of phytotoxicity were observed. Evaluation of systemic insecticides for the control of the CPB, PLH, and aphids in potato. This experiment was conducted at HAES. Potato, Solanum tuberosum cv. ‘Russet Burbank,’ seed pieces were planted and spaced 12 inches apart within rows. Rows were 3 ft apart. The four-row plots were 12 ft wide by 20 ft long, for a total of 0.006 acres. Two untreated guard rows separated plots. Plots were arranged in an 8-tier design with 12 ft alleys between tiers. All plots were maintained according to standard commercial production practices by HAES staff. Four replicates of 21 experimental treatments and two untreated controls were arranged in a randomized complete block design. All in-furrow treatments were applied in 2.0L of water. Furrows were cut using a commercial potato planter without closing discs attached. Seed treatments were applied in 0.016L of water. Immediately after the in-furrow treatments were applied and all seed piece treatments were placed in open furrows, all seed was covered by hilling. Stand counts were conducted by counting the number of emerged plants per 20 ft. section of row. Control of CPB, PLH nymphs, and aphids was assessed by counting the number of these insects per plant on 10 randomly selected plants in each plot. Defoliation was evaluated by visual observation of each plot. Percent defoliation was determined for each plot through visual observation. CPB were recorded in the following life stages: adults (A), egg masses (EM), small larvae (SL), large larvae (LL). PLH were recorded as nymphs (N) or adults (A). Adult PLHs were sampled using sweep net. Insect counts occurred on several dates, and means are reported as averages over dates. Insect count averages reflect time periods during the summer when specific life stages peaked in the plots. Experimental plots were mechanically harvested from a single row of the four-row plots and weighed and graded at the HAES. Populations of CPB in this field trial were considered average to above average as defoliation in the plots was nearing 10% by the time first generation CPB larval numbers began to peak in mid-June. Significant treatment effects were observed relative to the untreated control including CPB larvae and percent defoliation. All treatments except the DPX HGW86 alone provided effective control of PLH adults and nymphs. All treatments resulted in significantly higher tuber yields than the untreated check plots. No signs of phytotoxicity were observed following plant emergence. Delayed Diapause and Relationships to Resistance. An important and recent observation surrounding the emergence of neonicotinoid resistance is the concept of extended emergence, or delayed diapause. Diapause is a genetically determined behavior of an insect’s lifecycle designed to synchronize its biology with seasonal variation in the environment. Insects inhabiting more dynamic or unstable environments with unpredictable resources may extend diapause for longer periods, resulting in delayed emergence. Portions of Wisconsin’s resistant CPB populations may be temporally avoiding the highest titers of in plant insecticide by emerging later. Emergence and colonization over longer periods of time will result in extended egg deposition, resulting in multiple resistant life stages present simultaneously in the crop. Anecdotal evidence suggests several of Wisconsin’s insensitive populations are smaller, less fit, and may emerge over a longer period. Acceleration of resistance will occur as later emerging portions of populations are exposed to sub-lethal systemic insecticide doses. Population scale selection for later emergence will coincide with reduced in-plant insecticide levels. Over time, the continual exposure of late emerging insects to sub-lethal doses will produce even greater resistance issues. If true, rapid natural selection may fix the protracted emergence trait in the gene pool. Long-term impacts of protracted emergence will compromise the efficacy of current and future systemic registrations. Field experiments were set-up to investigate the extent of extended diapause or delayed emergence associated with insensitivity among populations. Specifically, experiments consisted of caged beetles collected from sites with measured levels of neonicotinoid resistance and compared with sites possessing no evidence for insensitivity. To date, we have observed unique differences in the emergence phenology of populations collected from different locations each with unique estimated resistance ratios. The temporal patterns of adult emergence were recorded through the emergence period; the points after which no more adult CPB were emerging. Similar studies were again conducted and here again, populations were collected from sites with a documented history of CPB resistance associated with elevated resistance ratios and the associated emergence phenology will be plotted over time. This research relates to Objective 1, Develop adapted potato clones with enhanced resistance to major potato diseases, Objective 2, Evaluate exotic potato germplasm for flavor and nutritional components, and introgress valuable genes into the cultivated potato, Objective 3, Examine exotic potato germplasm for resistance to low temperature sweetening and introgress valuable genes into the cultivated potato, and Objective 4, Characterize molecular, physiological and environmental parameters that are determinants of potato quality, especially seed vigor and tuber processing quality.
<urn:uuid:ad47bb95-4ee4-47e3-bb84-44f266728561>
CC-MAIN-2015-40
http://www.ars.usda.gov/research/projects/projects.htm?ACCN_NO=421746&fy=2012
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736678861.8/warc/CC-MAIN-20151001215758-00140-ip-10-137-6-227.ec2.internal.warc.gz
en
0.962532
1,853
2.71875
3
3.043925
3
Strong reasoning
Science & Tech.
Undeveloped goods include materials that are dug up, caught, harvested from fields, chopped down or picked from trees. In our tutorial, we are counting 'bricks' as a raw material because our use of the term is meant to include stone; however, a more proper and detailed system would have separate references for stone and count bricks as manufactured products made from clay and other materials. Similarly, while it would seem that animals are 'naturally' born and therefore collected as undeveloped goods, the fact is that before an animal can become valuable it must be fed for periods up to several years - the cost of this feed represents a form of 'processing' that we are not taking account for in this system at this time. Later, I will be describing how to make these sorts of distinctions - but for now, our primary goal is to create a simple system that accounts for most things the players will want to buy. We can add nuance later. describing my trade system in 2010. It should be clear that I have made adjustments to the details described on that post in the last year - changing the overall behaviour of my trade prices. While much of what I described 6 years ago still reflects things I do today, my old method should not be confused with the method described here. Also, the details below will be presented as calculations done in Microsoft Excel. While calculations for the system can be done with pencil and paper, the reader will discover that once ten or more markets have been added to the system that working without a computer calculating tool will quickly make the system impractical. My use of excel will be simple and I shall try to make it as easy to understand as possible for those who have never taken the plunge and used the system. Gold StandardBefore beginning this section, the reader should be sure to be familiar with details about determining quantity of goods, locating references and transport. We can begin to build prices for any other unprocessed good by first addressing gold. Gold is a convenient standard because, most importantly, it occurs naturally as nuggets or flakes (placer deposits) and as such can be easily hammered into shapes. The first tokens representing currency were made of gold; it is rare, measurable, consistent (unlike a system based upon, say, labour or grain production) and is therefore practical for our purposes. Because gold is the standard measure, we must ensure that the value of gold from place to place differs only slightly - otherwise, the effect on the price of gold will cause all other prices in the system to fluctuate wildly (and make the availability of gold the only meaningful factor in determining those prices). My most recent method for doing this has been to make the price of gold 100 times less flexible than other prices in the system, as shall be seen. Let's begin with the value of gold in one of our three markets: Marzarbol. The reader will remember that there are 1.2 references for gold in Marzarbol after transport adjustments. The total references in our entire system equals 2 and the total production of gold (using my number of 1320 oz. per reference) equals 2,640 ounces. I suggest creating an excel page that looks like this: Each box shown below contains exactly what is shown except for the one that is highlighted, D4. By typing in "=1320*C4" (as shown on the function line, above), it calculates the value in C4 x 1320. Next, we will want to determine how much physical gold is flowing around Marzarbol. To do this, we divide the production by the total number of references and multiply that by the local references. In excel, that looks like this: Here I will skip two columns that will become important with other goods: the world value of that product in gold and the local value of that product. Where gold is concerned, the world value is equal to the total production, while local value is equal to the physical gold in the area. It won't be relevant at this stage, but keep in mind that one reference is always worth that reference as it applies to gold, so that a reference of sheep, timber or fish equals in value a reference to gold. As well, the value in gold ounces per local availability always equals 1 where it comes to gold: that is, gold = gold. To show these aspects (and I understand they are difficult to grasp at this time - it will become more clear as we move to other goods), I will include this table update: Now, before we can calculate how much an ounce of gold is in coins, we will need an adjustment for the relative rarity of gold in the market as compared to other markets. This is the adjustment for rarity: the total number of references divided by local references, multiplied by 0.02, plus 1, as shown: Note that the calculation must be made inside brackets before the 1 is added. This formula creates a multiplier that is always above the original price for gold. Why 0.02 as a controlled variable in the equation? I tried several alternatives and settled on it as a reasonable control adjustment; 0.01 offered too little variance and 0.03 too much. Call it an approximation based on experience. If it seems that a rarity adjustment of 1.03 is too little, remember that Marzarbol has more than half the 'world's gold' at this point in the system. It is where the gold comes from, so we want to represent that by making as small an adjustment to the price as possible. Compare this with the Heap in the Hills, which has only 0.3 references: Good, let's go back to Marzarbol and continue. My personal preference for pricing things is to convert everything into copper pieces. When I create a price table for the players, I convert copper into more convenient gold and silver (and we will eventually get to this process), but for base calculations, using the smallest coin is easiest. It is universal to every product and covers the lowest price as well as the highest, with a minimum of fractions. It does not actually matter what the silver or copper coin is made from: we can always assume that the proportion of metals in each coin, along with the exact weight of metal, matches up to the value of the coin in the system. The number of copper coins per ounce of gold equals the amount of gold found in a given gold coin (as I said, one ounce of gold in my world is enough to create 8.715 gold coins), times the number of copper pieces per gold coin (in my world, 192), times the adjustment for rarity. For Marzarbol, this is 1 x 8.715 x 192 x 1.03, or expressed in excel: Congratulations. We now have a total number of copper coins that is needed to buy 1 ounce of gold in our system in Marzarbol. While this seems like a very long process, in fact once the numbers are put together in excel, calculating them for a different market is near-instantaneous. Let's move on to other products. Footnote: in a small system, like this one, where every market is relatively close to the source for gold, it is probable that the value of gold will shift only slightly from place to place, as shown above. However, as the system grows larger (and distances between markets and gold production increases), the potential for gold to fluctuate a great deal can threaten the system. What happens is that gold becomes the only meaningful factor in determining prices from market to market. My answer to this has been to stabilize the price of gold by reducing the modifier for rarity by 100 times, from 0.02 to .0002. As I say, in a very large system, adjustments this tiny can still massively affect the amount of gold available in a given market. I suggest that users pay attention to the numbers and - after becoming familiar with the system - consider making very slight adjustments to the value of gold. Contrariwise, I strongly urge the reader not to make similar adjustments to other products; these products do not affect the value of every other thing in the system and therefore can exist in isolation to those other things. As well, strong fluctuations in the presence of these things will create scarcity and game drama. These aspects should not be smoothed out in the way that the price of gold should be. Other Undeveloped GoodsThe process for calculating the price of undeveloped goods other than gold is nearly the same, except that now the value of these products is measured against the gold standard. Like before, I will go through the process of creating prices for these products as patiently as I have for gold. For a first undeveloped good, let's start with ore. From the quantity of goods page, we can use 2000 tons of ore per reference. Assume that most of this ore is iron, since that is the most useful ore and by far the least valuable. Other ores, like copper or tin, will be much more valuable - but these can be added to the system later as we wish. For now we will just think of them as "ore." Marzarbol has 1.2 references in ore. I would recommend setting up your excel page like the above. Note that I have multiplied the number of tons of ore per reference by 2000, in order to produce a number of pounds. Like using copper pieces over gold pieces, it is easier to use smaller units instead of larger ones. Of course, if the reader prefers metric, that's always a choice - but personally I can't reconcile metric with a fantasy campaign. It sounds too modern. Oh, and do forgive me; I am so used to describing references to four significant digits that I've done so here without thinking about it. So far, so good. This looks just like the gold calculation. We can move forward to local availability: Marzarbol market shifts 60% of the closed system's ore (1.2 out of 2.0). I want to be sure that those who don't understand excel all that well can follow along. Let's move on. The value of ore in terms of gold ounces is a little tricky. Whereas 2 references of ore ARE the same value as 2 references of gold, remember that local gold has been adjusted for rarity. That means we want to multiply the total references of ore in the world against the value of gold (in c.p.) in Marzarbol ~ since this is the point of view we have right now. "Value" is mutable, depending on one's location ~ and we want our trade system to reflect this. The calculation is very simple: ** Sorry, there is an error in the above table. The cell H7 should read "world value (c.p./oz. gold). I am sorry about any confusion this has caused and will correct the images as soon as I have the opportunity. For those unfamiliar with this aspect of excel, the dollar signs in $K$4 are there so that if the cell is copied, the cell referenced is not. This will be important later; when we fill out our table with other goods, we will want that calculation not to change. Note how much more valuable 2 adjusted references of ore are compared with gold above. This is what I mean by a very small adjustment in the rarity of gold having large effects upon the rest of the system. We want to always keep an eye on this, as it can threaten to compromise the whole system. This brings us to the local value of those 4.8 million lbs. of ore noted in cell G8. While local value of gold was equal to the local availability of same, the same is not true of ore. To get our value, we want to divide the local references by total references for the product and multiply that number against the world value (in Marzarbol): This is simple algebra. The local value is 60% of the world's value because Marzarbol has control over 60% of the world's iron (in our closed system). Now we want a value for exactly how much a physical pound of ore is in ounces of gold. Since there are so many more pounds of ore than ounces of gold in the system, we can assume this will be a very small number. We get it by dividing the number of local ounces (I8) by the total availability of ore (G8): There, we see that 1 lb. of ore = 0.0004 oz. of gold (to emphasize, in Marzarbol). From here we simply repeat the steps we've already used for gold: adjusting first for rarity and then multiplying 0.0004 by the number of gold coins in an ounce, the number of copper coins in a gold coin and that rarity adjustment: Now we have built a template for all the undeveloped goods on our list. All we have to do is repeat the line containing ore and adjust the numbers for how many local references there are, how many total references (we made everything equal to 2 but the user can play with that and see how the other numbers change) and how much production we assign per reference. Everything else is an exact repeat of the calculations we've already created (being sure that H8's $-sign attribution to K4 is repeated on every line). Here is the list that fits with numbers I've already given in the tutorial: On the whole, apart from seeing for the first time the comparison between the amount of goods and the actual cost of things, there are no surprises here. Where the total number of references is so small, there isn't much room for the sort of rarity we will eventually want in place. We will address this later, when we are ready to expand the system in various ways. For the present, the important thing is to build the tools that we will need - this table and the next one, which we will use to determine the price of manufactured goods. See this link for a break down of the work we've done so far. See Trade System
<urn:uuid:0f5439fb-a0ec-4c5a-992c-5177b97e5f6c>
CC-MAIN-2018-30
https://tao-dndwiki.blogspot.com/2018/04/undeveloped-goods-prices-trade.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591455.76/warc/CC-MAIN-20180720002543-20180720022543-00221.warc.gz
en
0.952499
2,884
3.28125
3
2.919114
3
Strong reasoning
Games
From: Washington Technology By Chris Smith As the new era of Big Data steams ahead, federal agencies have to quickly come to terms with how to access, prioritize, manage, analyze, store and exchange the crush of data coming their way. It is straining their ability to handle the tremendous volume. Structured, unstructured and semi-structured data are in documents, websites, social networks, mobile channels and relational databases. Data is culled from countless sources, including internal file networks, data centers, sensors, other agencies and the cloud. And, it’s being created at a rapid-fire pace. In fact, according to IDC, the data being reated around the world more than doubles every two years. It’s obviously important for government to get its arms around this enormous influx of data, but it’s even more important to be able to realize the great potential that can be derived from managing and using data effectively in making good decisions and providing necessary services to citizens. A flurry of Big Data activity has begun across the federal community. The Obama administration has announced a $200 million Big Data initiative. The Defense Department is investing $250 million annually and a host of other federal agencies – from the Homeland Security and Education departments to NASA and the Food and Drug Administration – all have Big Data programs under way. Harnessed correctly, Big Data is poised to truly change the way government works. But first, agencies will have to break through the buzz – and clear up a number of myths about Big Data – in order to create strategies that can unlock new opportunities. Myth #1 Big Data is someone else’s problem No matter what kind of system a federal organization has – legacy, in-house, public or private cloud – the organization has a Big Data problem. Those who subscribe to this myth assume that because they are ultimately moving to the cloud, Big Data will be their managed services provider’s problem. The truth is, however, that moving to the cloud requires agencies to understand the data going into the cloud, integrate cloud-based data with other systems, and retain a snapshot of their entire data picture. Myth #2 Big Data is only about size Size does matter, but Big Data is much bigger than size. It’s an entirely new paradigm comprised of data that keeps growing from seemingly infinite sources and locations, all of which must be accounted for in the processes, tools and technologies used to collect, store, analyze and share it. Myth #3 Big Data is solely a technology issue Although federal organizations must adapt technology to handle the influx of Big Data, technology is only part of the solution. Advanced analytics will help agencies make meaning of and extract insight from data and provide the bridge required to shift from creating reactive to proactive solutions. Agencies must commit to building the internal capabilities to make insight-based decisions; secure people with the right skills to collect, store, structure and format data from analytical and statistical perspectives and develop governance and workflow structures to support an entirely new way of working. Myth #4 Government cannot learn from private sector Big Data solutions Although government data management is often centered on securing citizens’ personal information, administering government services and sharing intra- and inter-agency data, there are lessons government can learn from business. Industries such as financial services and retailing have been on the front lines of the Big Data revolution and have great experience to offer as government seeks to challenge the status quo and work in new ways. The U.S. Postal Service, for example, has been harnessing Big Data to create a new revenue stream by selling a variety of licenses, for up to $175,000 annually, giving organizations access to its National Change of Address database. Commercial enterprises conduct similar licensing transactions regularly. Myth #5 There is a silver bullet for solving the Big Data problem The complexity of managing unprecedented amounts and types of data from every quarter makes it impossible to find a single solution to the Big Data challenge. It’s clear that agencies need a suite of tools and platforms, processes and personnel to effectively collect, store, manage and draw insights from this data. And, in such a dynamic environment, agencies must adopt a continuous improvement mindset, where the Big Data roadmap is continuously reassessed and recalibrated.Big Data is here to stay. While the move from massive information overload to insight- powered operations will be difficult, federal agencies that are grounded in the reality of today and take a holistic approach to tackling Big Data will reap bigger rewards—and so will the citizens and businesses they serve.
<urn:uuid:0aad0e0c-e9c6-4f11-8749-5f300e443c2b>
CC-MAIN-2023-40
https://www.thecre.com/fisma/?p=2455
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233508977.50/warc/CC-MAIN-20230925115505-20230925145505-00355.warc.gz
en
0.945109
936
2.578125
3
2.98637
3
Strong reasoning
Software
While coloring and zentangle-styled doodling books seem to be everywhere, there has not been much research in its benefits. However, recent research shows that the brain’s reward pathway is activated while doodling, drawing, and coloring, which can improve mood and sense of pleasure. I consider myself a skeptical optimist. If someone says, “research shows that drawing is good for the brain,” I want to believe them, but I also want to dig a little. If that research also includes some sort of brain imaging, well, then I’m really going to get excited. Excited, but skeptical. In this research, Functional near Infared Spectoscopy (fNRIS) was used to show brain activation by measuring blood flow to parts of the brain involved in the reward system, specifically the medial prefrontal cortex (mPFC). While wearing the fNRIS, a headband-like device, participants colored a mandala, doodled within a circle, and also free drew anything they wanted. Participants also completed before and after surveys regarding previous art experience and self-perception of creativity. The results showed that on average, when compared to the rest condition, all three forms or creative self expression showed increased activity in the reward center of the brain. However, the artist subgroup showed negative activity for coloring, whereas non-artists saw an increase. While not statistically significant (boring, but important math/research stuff), doodling showed the most increase over the rest condition. In addition, after the art making activities, participants reported improvements in their self perception around having good ideas and their ability to solve problems. What does this mean, and why is this important? It shows that even brief periods of creative self-expression – the entire experiment was about 20 minutes including the rest periods – activates the reward pathways of the brain, which in turn can improve our mood and sense of pleasure. While this can help all of us navigate our day-to-day lives and stresses, it could be especially beneficial to those at risk for mood disorders, such as depression, or in regulating addictive behaviors (which also activate the reward pathway). As I said before, I always like to approach research, especially that which I want to believe, as a critical thinker. This was a small pilot study, so while the results are promising, they are not conclusive, but instead provide a solid platform for future research as well as insight into the therapeutic benefits of creating art for all skill levels. As a sometimes-artist myself, I thought it was interesting that artists did not respond to the coloring activity. While I have created many coloring pages, especially mandalas, I enjoy creating them, but not coloring them. It also emphasizes the importance of finding a mode of therapy that suits the individual, and that the obvious answer may not always be the best. An example of this was a few years ago when I was in hospital, I remember being offered a bedside art session. It was the last thing I wanted to do, especially when I was cheerfully told that “you don’t need to be good at art.” But I know that for many in hospital this low-stakes way of being creative is a beautiful form of bedside therapy, often during one of the most difficult times of life. This research builds on existing evidence to the benefits of creative expression as therapy, but also how simple and brief this therapy can be to be effective. With cost and access concerns around healthcare, especially mental health, this becomes ever more important. Girija Kaimal, Hasan Ayaz, Joanna Herres, Rebekka Dieterich-Hartwell, Bindal Makwana, Donna H. Kaiser, Jennifer A. Nasser, Functional near-infrared spectroscopy assessment of reward perception based on visual self-expression: Coloring, doodling, and free drawing, The Arts in Psychotherapy, Volume 55, 2017, Pages 85-92, ISSN 0197-4556, http://dx.doi.org/10.1016/j.aip.2017.05.004. (http://www.sciencedirect.com/science/article/pii/S019745561630171X) Artwork: Lesley Taylor © 2017
<urn:uuid:f0d32d1a-64e4-4e90-944b-adb4221aef17>
CC-MAIN-2020-16
http://babadoodle.com/blog/doodling-drawing-and-coloring-is-rewarding-at-least-your-brain-thinks-so/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371830894.88/warc/CC-MAIN-20200409055849-20200409090349-00092.warc.gz
en
0.959377
893
3.09375
3
2.884506
3
Strong reasoning
Health
Experimenting with colours and textures is an innate human ability, as our Neanderthal forefathers used a variety of pigments from coal to red and yellow ochre extracted from plants in order to create animal forms. So saying artists are born not made can be challenged! We definitely have come a long way in terms of advanced visual literacy from our ancient predecessors. Here's ow to improve your design skills, especially if you aren't a trained graphic designer. Why are visual design skills important? We live in a more visual society than ever, yet design literacy lags behind most other skills. What are the pitfalls of bad design? What are the simple steps you can take to improve your visual design skills and visual literacy? You will find the answers to these questions in our list below. We explain design essentials for a better understanding of what makes visually engaging content. 1. Creative sparks Inspiration can be derived from the smallest of things in life. Water lilies inspired Monet, while the irregularities and unfairness of life inspired Van Gogh to paint in such exaggerated and intense strokes. You can broaden your horizons by studying books on not only visual literacy, but anything that gets your creative juices flowing. The peculiar thing about inspiration is that it often strikes you at the most unexpected hours, so keep your pen and paper ready at all times to jot down the ideas and draw images to support them, and build upon those ideas by adding details later on. 2. Negative and positive space Balanced negative and positive spaces make the eye travel to the object of attention with ease. Negative space is the background, while positive space is the foreground if you are working on a bi-layered design layout. A very busy negative space may cause fatigue to the eyes and may divert the viewers’ attention from the primary subject of your content. You can create an illusion of a third dimension and depth on a two dimensional surface by overlapping, shading, highlighting and shadowing, building up on linear and atmospheric perspective by changing how air and fog perceive distant objects. For example, for a kids’ website, a negative space that is fluid and without any block images is preferable for easy eye movement. We created the infographic shown below for our Inclusion and Diversity compliance course The numbers in white - in contrast to the background - is a good balance of positive and negative space 3. The colour scheme Color psychology plays a pivotal role in brand selling and retaining a wide client base. Picking a colour is not an easy task, as many options seem to work together just fine, so it is important that you make several colour layouts that you think represent the philosophy behind your brand sufficiently. You may have noticed that food brands usually range from hues of yellow to oranges and reds, while social media sites are predominantly blue, like Facebook, Tumblr, Instagram, Twitter, and Skype. Know your target market, and then proceed accordingly with your colour scheme. To create a strong colour palate for the visual content, Adobe Kuler colour wheel tool will help you create shades and find complementary colours with ease. A colourful scheme in one of our eLearning courses, which reflects the brand of our client in the ICT sector - eir 4. Textures in design Textures in a design are used to create depth and warmth to the overall layout. In digital art, texture means the way a surface is perceived to feel, and can be added to gain or avoid attention for an element. Visual textures include adding the illusion of peaks and valleys, or adding lush leaves to a tree. Repeating a motif or a linear form throughout is also termed as adding texture. Texture can be used as a tool to harmonise negative and positive space as well. But make sure you don’t use too much of texture in your design because it creates a highly busy space and can put a strain on the eyes. Moreover, ensure that the focal point of your design is enhanced, and not diminished by adding a certain texture. Textures are often useful for backgrounds to help emphasise text in the foreground and to reinforce an particular message 5. Harmony in designs After you are done with your form, space, colours, and texture, focus on the balance and harmony of your layout. Do you feel your design appears heavier on one end and lighter on the other? Or you think the base of your design is not wide enough to support heavy motifs on top? These details need to be addressed accordingly if a visually appealing design is to be created. Achieving visual unity is the main goal in graphic designing, and all elements need to be in agreement. Pay special attention to the perspective, continuation, repetition, and rhythm to create a unified design. This doesn’t mean your designs should always be strictly symmetrical, as asymmetrical designs can also be a way to strike an informal balance in a layout. Think order in chaos. A scenario design from one of our eLearning courses - shows a harmonious blend of colours and balanced negative and positive space 6. Design hierarchy Hierarchy guides the eye movement of the viewer. It gives you the power to make viewers look at one place, and then guide their eyes to fall on the next. This can be achieved by various methods including using complementary colours, fluid negative space, and interactive foreground. For example, for a kids’ website, you can form a hierarchy in your text by using a specific font for a specific subject. You can also achieve this by using particular colours. It is easy to see which information is most important here. Without even reading the instructions , I can quickly figure out what I need to do. That is the hallmark of good design. Design hierarchy is an important part of user experience design (UX) 7. Scale and proportion Scale and proportion are significant in keeping the balance and harmony of your design. Make sure that the forms, motifs, and texts in your design don’t downplay the importance of your focal point.This is because using the relative size of elements against each other can attract attention to a focal point. When it comes to scale, if elements are designed larger than life or incredibly diminished, scale is being used to show drama. Disproportionate designs and misplaced elements put off the viewer. Also, it is a rookie mistake to not follow the scale and proportion guidelines. You can enhance your understanding of scale and proportion by drawing design elements and forms manually on a paper. Moreover, studying and understanding the golden ratio may also prove to be helpful in this regard. The larger than life elements of this design are being used to make an important learning point in one of our eLearning courses. 8. Dominance and emphasis Ideally, every design should have a key area of interest or focal point that assists as a way into the design. Moving along from this primary dominant design element, a layout flow can be achieved by creating elements with secondary and tertiary dominance. Dominance of a focal point depends on contrast, as without contrast everything would be identical. The absence of dominance between elements leads to competition between them. If there are three yellow squares of equal size in your design, which one should the viewer look at first? It takes away the chance of an interactive communication between the viewer and your design. The green highlight dominates when you are reading one section, with the other sections remaining the same colour 9. Using similarity and contrast creatively Developing a consistent and similar design is a vital facet of a designer's job to make their focal point stand out. Too much similarity is uninteresting, but without similarity key elements will not exist. An image without contrast is flat and mundane, thus the key here is to strike a balance between similarity and contrast. To create a similar design, you can manipulate images and text to correlate, and develop a style manual that remains consistent in all your layouts. Also, you can express continuity in your web pages by including the same headers, borders, footers, and themes. To develop contrast in your layout, you can control space, position, form, direction, structure, size, colour, texture, and density by positioning the contrasting characters of stability/movement, organized/chaotic, isolated/grouped, grey scale/colour, and transparent/opaque together. 10. Keeping it simple Piling up too much on your plate, and then regretting it later will not prove to be a fruitful work strategy. So instead of adding all the textures, and colours in one layout, follow the less is more mantra. Making the user experience hassle free and easy to consume, thus your design must not feature too many contrasting elements and tacky textures piled on top of each other. Remember, effective designs are clear cut, balanced, and follow the rules of simplicity. Learning the art of visual communication and design requires patience, and you are going to make many mistakes before finally grasping the science behind this digital art. One of our eLearning courses, which follows a simple, clean navigation layout Learn more about design We blog regularly about design topics, such as - UX design tips, avoiding graphic design sins, how to make eLearning design awesome - and much more. We also follow blogs like Aisle One, Design Observer and Dexigner in order to get in depth knowledge of graphic design and visual literacy. If you want to see our design skills in action, take a look at our Content development services
<urn:uuid:03322c63-2bb5-4479-a6bd-38f2da9b8a1c>
CC-MAIN-2019-43
https://blog.logicearth.com/10-tips-to-improve-your-visual-design-skills-and-visual-literacy-for-non-designers
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986668994.39/warc/CC-MAIN-20191016135759-20191016163259-00054.warc.gz
en
0.926106
1,934
3.453125
3
2.394728
2
Moderate reasoning
Art & Design
Universal Plug and Play (UPnP) is a set of computer network Protocol (computing)|protocols promulgated by the UPnP Forum. The goals of UPnP are to allow Peripheral device|devices to connect seamlessly and to simplify the implementation of computer network|networks in the home (data sharing, communications, and entertainment) and corporate environments. UPnP achieves this by defining and publishing UPnP device control protocols built upon open, Internet-based communication standardization|standards. The term UPnP is derived from plug-and-play, a technology for dynamically attaching devices directly to a computer. - 1 Overview - 2 Protocol - 3 Problems with UPnP - 4 Future developments - 5 Books - 6 External links The UPnP architecture allows peer-to-peer networking of Personal Computer|PCs, networked appliances, and wireless devices. It is a distributed, open architecture based on established standards such as internet protocol suite|TCP/IP, User Datagram Protocol|UDP, HTTP and XML. The UPnP architecture supports zero-configuration Computer network|networking. A UPnP compatible device from any vendor can dynamically join a network, obtain an IP address, announce its name, convey its capabilities upon request, and learn about the presence and capabilities of other devices. Dynamic Host Configuration Protocol|DHCP and Domain Name System|DNS servers are optional and are only used if they are available on the network. Devices can leave the network automatically without leaving any unwanted state (computer science)|state information behind. Other UPnP features include: - Media and device independence - UPnP technology can run on many media that support IP including Ethernet, FireWire, IR (IrDA), power lines (Power line communication|PLC) and RF (Bluetooth, Wi-Fi). No special device driver support is necessary; common protocols are used instead. - User interface (UI) Control - UPnP architecture enables vendor control over device user interface and interaction using the web browser. - Operating system and programming language independence - Any operating system and any programming language can be used to build UPnP products. UPnP does not specify or constrain the design of an API for applications running on control points; OS vendors may create APIs that suit their customer's needs. UPnP enables vendor control over device UI and interaction using the browser as well as conventional application programmatic control. - Programmatic control - UPnP architecture also enables conventional application programmatic control. - Each UPnP product can have device-specific services layered on top of the basic architecture. The foundation for UPnP networking is IP addressing. Each device must have a Dynamic Host Configuration Protocol (DHCP) client and search for a DHCP server when the device is first connected to the network. If no DHCP server is available, that is, the network is unmanaged, the device must assign itself an address. If during the DHCP transaction, the device obtains a domain name, for example, through a DNS server or via DNS forwarding, the device should use that name in subsequent network operations; otherwise, the device should use its IP address. Given an IP address, the step 1 in UPnP networking is Discovery. When a device is added to the network, the UPnP discovery protocol allows that device to advertise its services to control points on the network. Similarly, when a control point is added to the network, the UPnP discovery protocol allows that control point to search for devices of interest on the network. The fundamental exchange in both cases is a discovery message containing a few, essential specifics about the device or one of its services, for example, its type, identifier, and a pointer to more detailed information. The UPnP discovery protocol is based on the Simple Service Discovery Protocol (SSDP). The next step in UPnP networking is description. After a control point has discovered a device, the control point still knows very little about the device. For the control point to learn more about the device and its capabilities, or to interact with the device, the control point must retrieve the device's description from the URL provided by the device in the discovery message. The UPnP description for a device is expressed in XML and includes vendor-specific, manufacturer information like the model name and number, serial number, manufacturer name, URLs to vendor-specific web sites, etc. The description also includes a list of any embedded devices or services, as well as URLs for control, eventing, and presentation. For each service, the description includes a list of the commands, or actions, to which the service responds, and parameters, or arguments, for each action; the description for a service also includes a list of variables; these variables model the state of the service at run time, and are described in terms of their data type, range, and event characteristics. The next step in UPnP networking is control. After a control point has retrieved a description of the device, the control point can send actions to a device's service. To do this, a control point sends a suitable control message to the control URL for the service (provided in the device description). Control messages are also expressed in XML using the SOAP|Simple Object Access Protocol (SOAP). Like function calls, in response to the control message, the service returns any action-specific values. The effects of the action, if any, are modeled by changes in the variables that describe the run-time state of the service. The next step in UPnP networking is event notification, or "eventing". A UPnP description for a service includes a list of actions the service responds to and a list of variables that model the state of the service at run time. The service publishes updates when these variables change, and a control point may subscribe to receive this information. The service publishes updates by sending event messages. Event messages contain the names of one or more state variables and the current value of those variables. These messages are also expressed in XML and formatted using the General Event Notification Architecture (GENA). A special initial event message is sent when a control point first subscribes; this event message contains the names and values for all evented variables and allows the subscriber to initialize its model of the state of the service. To support scenarios with multiple control points, eventing is designed to keep all control points equally informed about the effects of any action. Therefore, all subscribers are sent all event messages, subscribers receive event messages for all "evented" variables that have changed, and event messages are sent no matter why the state variable changed (either in response to a requested action or because the state the service is modeling changed). The final step in UPnP networking is presentation. If a device has a Uniform Resource Locator|URL for presentation, then the control point can retrieve a page from this URL, load the page into a web browser, and depending on the capabilities of the page, allow a user to control the device and/or view device status. The degree to which each of these can be accomplished depends on the specific capabilities of the presentation page and device. UPnP AV (Audio and Video) standards UPnP AV stands for UPnP Audio and Video, and is a grouping within the UPnP standards supervised by the Digital Living Network Alliance|DLNA (Digital Living Network Alliance), (formerly: Digital Home Working Group), which is a forum of vendors and manufacturers who work in the home entertainment industry, and offer a "DLNA CERTIFIED™" branding for those products which follow their Networked Device Interoperability Guidelines. The Digital Living Network Alliance|DLNA forum members "share a vision of a wired and wireless interoperable network of Personal Computers (PC), Consumer Electronics (CE) and mobile devices in the home enabling a seamless environment for sharing and growing new digital media and content services," and "DLNA is focused on delivering an interoperability framework of design guidelines based on open industry standards to complete the cross-industry digital convergence". On 12 July 2006 the UPnP Forum announced the release of 'Enhanced AV Specifications', this release was version 2 of the UPnP Audio and Video specifications (UPnP AV v2), with new MediaServer version 2.0 and MediaRenderer version 2.0 classes. These enhancements are created by adding capabilities to the UPnP AV MediaServers|UPnP AV MediaServer and MediaRenderer device classes that allow a higher level of interoperability between MediaServers and MediaRenderers from different manufacturers. Some of the early devices complying with these standards were marketed by Philips under the Streamium brand name. . UPnP AV components - UPnP MediaServer DCP - which is the UPnP-server (a 'master' device) that shares/streams media-data (like audio/video/picture/files) to UPnP-clients on the network. - UPnP MediaServer ControlPoint - which is the UPnP-client (a 'slave' device) that can auto-detect UPnP-servers on the network to browse and stream media/data-files from them. - UPnP MediaRenderer DCP - which is a 'slave' device that can render content. - UPnP RenderingControl DCP - control MediaRenderer settings; volume, brightness, RGB, sharpness, and more). - UPnP Remote User Interface (RUI) client/server - which sends/receives control-commands between the UPnP-client and UPnP-server over network, (like record, schedule, play, pause, stop, etc.). - Web4CE (CEA 2014) for UPnP Remote UI - CEA-2014 standard designed by Consumer Electronics Association's R7 Home Network Committee. Web page|Web-based Protocol (computing)|Protocol and Software framework|Framework for Remote User Interface on UPnP Computer networking|Networks and the Internet (Web4CE). This standard allows a UPnP-capable home network device to provide its User interface|interface (display and control options) as a web page to display on any other device connected to the home network. That means that you can control a Computer networking|home networking device through any Web browser|web-browser-based communications method for Consumer Electronics Association|CE devices on a UPnP home network using ethernet and a special version of HTML called CE-HTML. - QoS (Quality of Service) - is an important (but not mandatory) service function for use with UPnP AV (Audio and Video). Quality of Service|QoS (Quality of Service) refers to control mechanisms that can provide different priority to different users or data flows, or guarantee a certain level of performance to a data flow in accordance with requests from the application program. Since UPnP AV is mostly to deliver streaming media that is often near real-time or real-time audio/video data which it is critical to be delivered within a specific time or the stream is interrupted. Quality of Service|QoS (Quality of Service) guarantees are especially important if the network capacity is limited, for example public networks, like the internet. - Quality of Service|QoS (Quality of Service) for UPnP consist of Sink Device (client-side/front-end) and Source Device (server-side/back-end) service functions. With Class (computer science)|classes such as; Traffic Class that indicates the kind of traffic in the traffic stream, (for example, audio or video). Traffic Identifier (TID) which identifies data packets as belonging to a unique traffic stream. Traffic Specification (TSPEC) which contains a set of parameters that define the characteristics of the traffic stream, (for example operating requirement and scheduling). Traffic Stream (TS) which is a unidirectional flow of data that originates at a source device and terminates at one or more sink device(s). One solution for NAT traversal|NAT (Network Address Translation) traversal, called the Internet Gateway Device Protocol|Internet Gateway Device (IGD) Protocol, is implemented via UPnP. Many router|routers and firewall|firewalls expose themselves as Internet Gateway Devices, allowing any local UPnP controller to perform a variety of actions, including retrieving the external IP address of the device, enumerate existing port mappings, and adding and removing port mappings. By adding a port mapping, a UPnP controller behind the IGD can enable traversal of the IGD from an external address to an internal client. Problems with UPnP Lack of Authentication The UPnP protocol does not implement any authentication, so UPnP device implementations must implement their own authentication mechanisms, or implement the Device Security Service. Unfortunately, many UPnP device implementations lack authentication mechanisms, and by default assume local systems and their users are completely trustworthy. Most notably, Routers and firewalls running the UPnP IGD protocol are vulnerable to attack since the framers of the IGD implementation omitted to add any standard authentication method. For example, Adobe Flash programs are capable of generating HTTPU (HTTP over UDP) requests. This allows a router implementing the UPnP IGD protocol to be controlled by a malicious web site when someone with a UPnP-enabled router simply visits that web site. The following changes can be made silently by code embedded in an Adobe Flash object hosted on a malicious website: - Port forwarding|Port forward internal services (ports) to the router external facing side (i.e. expose computers behind a firewall to the Internet). - Port forwarding|Port forward the router's web administration interface to the external facing side. - Port forwarding to any external server located on the Internet, effectively allowing an attacker to attack an Internet host via the router, while hiding their IP address. - Change Domain name system|DNS server settings so that when victims believe they are visiting a particular site (such as an on-line bank), they are redirected to a malicious website instead. - Change the Domain name system|DNS server settings so that when a victim receives any software updates (from a source that isn't properly verified via some other mechanism, such as a checking a Public key certificate|digital certificate has been signed by a trusted source), they download malware|malicious code instead. - Change administrative credentials to the router/firewall. - Change Point-to-Point Protocol|PPP settings. - Change IP address|IP settings for all interfaces. - Change WiFi settings. - Terminate connections. This only applies to the #NAT traversal|"firewall-hole-punching"-feature of UPnP; it does not apply when the IGD does not support UPnP or UPnP has been disabled on the IGD.Template:Fact Also, not all routers can have such things as DNS server settings altered by UPnP because much of the specification (including LAN Host Configuration) is optional for UPnP enabled routers. - UPnP uses HTTP over User Datagram Protocol|UDP (known as HTTPU and HTTPMU for unicast and multicast), even though this is not standardized and is specified only in an Internet-Draft that expired in 2001. - UPnP does not have a lightweight authentication protocol, while the available security protocols are complex. As a result, some UPnP devices ship with UPnP turned off by default as a security measure. The standard Devices Profile for Web Services|DPWS is a candidate successor for UPnP. It solves many of the problems of UPnP. A DPWS client is included in Microsoft Windows Vista as part of the Windows Rally technologies. Another alternative, NAT Port Mapping Protocol|NAT-PMP, is an IETF draft introduced by Apple Inc in 2005. - Golden G. Richard: Service and Device Discovery : Protocols and Programming, McGraw-Hill Professional, ISBN 0-07-137959-2 - Michael Jeronimo, Jack Weast: UPnP Design by Example: A Software Developer's Guide to Universal Plug and Play, Intel Press, ISBN 0-9717861-1-9 - UPnP™ Forum - DLNA (Digital Living Network Alliance) - The Jini, Vision - technique comparison - Microsoft WHDC UPnP webpage & links - Universal Plug and Play in Windows XP - Programmatically Controlling a UPnP-Capable Firewall is a document providing some basic information about coding UPnP software controllers (VBScript example source code included). - Hacking with UPnP - DLNA certified: how your computer, cellphone, games console, media streamer and other devices can play nicely together - Vulnerability Note VU#347812 - UPnP enabled by default in multiple devices at United States Department of Homeland Security - Computer Emergency Readiness Team (Wednesday, 9 April 2008). - Security firm predicts Microsoft Windows UPnP exploit by the end of the week at The Inquirer (Wednesday, 11 April 2007). - Microsoft security updates for April 2007 to fix the above Microsoft Windows UPnP security issue. - How to use Flash and UPnP to punch holes in most home firewalls at GNUCITIZEN (Saturday, 12 January 2008). - UPnP Port Works (alias UPnPW) is a software implementation to configure UPnP devices via commandline. - GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. - Portable SDK for UPnP Devices provides an API and open source code for building control points, devices, and bridges compliant with UPnP Device Architecture Specification v1.0 and support operating systems like Linux, *BSD, Solaris and others. - Barracuda UPnP Device and Control Point SDK for embedded devices. - Unplug n' Pray Utility to disable unnecessary UPnP servers running on home Windows machines. - Coherence Some free DLNA/UPnP tools (MediaServer/MediaRender) with a python framework. Running on Linux/BSD/Windows - AdoubleU IntelligentShare UPnP SDK for J2SE / J2ME / MIDP 2.0 Running on Linux/BSD/Windows/Mobile Devices - BRisa BRisa is written in Python for Internet Tablet OS or other Unix platforms. It enables to create MediaServer/MediaRenderer devices allowing users to share and search content from UPnP A/V devices. It will offer a plugin architecture enabling new services such as Flickr to be added as UPnP services. - J. River Media Center includes a UPnP server (aka UPnP Device) for its library.
<urn:uuid:681e3c52-bb42-4ac8-9732-c9a42eca9ad4>
CC-MAIN-2017-34
http://www.elinux.org/index.php?title=UPnP&oldid=72001
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105712.28/warc/CC-MAIN-20170819182059-20170819202059-00396.warc.gz
en
0.850711
3,950
3.125
3
2.604636
3
Strong reasoning
Software
Advanced Automation for Space Missions/Chapter 5.7 5.7 Conclusions and Recommendations The Replicating Systems Concepts Team reached the following technical conclusions: - The theoretical concept of machine duplication is well developed. There are several alternative strategies by which machine self-replication can be carried out in a practical engineering setting. - There is also available a body of theoretical automation concepts in the realm of machine construction by machine, in machine inspection of machines, and machine repair of machines, which can be drawn upon to engineer practical machine systems capable of replication. An engineering demonstration project can be initiated immediately, to begin with simple replication of robot assembler by robot assembler from supplied parts, and proceeding in phased steps to full reproduction of a complete machine processing or factory system by another machine processing system, supplied, ultimately, only with raw materials. The raw materials of the lunar surface, and the materials processing techniques available in a lunar environment, are probably sufficient to support an automated lunar manufacturing facility capable of self-replication and growth. Tentative design of a lunar manufacturing facility capable of self-replication can begin, when current knowledge and state-of-the-art technologies are employed, but final design awaits the initial results of the demonstration-development program. Significant further research in lunar materials processing and in the design and operation of automated factories, should be conducted at once. In addition, the team considers that the replicating systems concept, if implemented, can have the following important consequences: - It will accelerate the design and development of sophisticated automated assembly techniques useful in carrying out future NASA missions. - It will accelerate the design and development of improved automated assembly and processing techniques applicable to the problems of achieving increased Earth-based manufacturing productivity. - By establishing an automated, growing, selfreplicating, multipurpose, multiproduct lunar manufacturing facility, NASA capacity for space exploration and research can be enormously expanded and permanently enhanced with only modest continuing expenditures. - The virtually cost-free expansion of mining, processing, and manufacturing capacity, once an initial investment is made in an autonomous SRS, makes possible the commercial utilization of the abundant energy and mineral resources of the Moon for the benefit of all mankind. - The establishment of a replicating lunar manufacturing facility can be a stepping stone to the design and construction of replicating manufacturing complexes on the surfaces of other planets. These new complexes themselves may be products of automated, self-replicating manufacturing facilities located elsewhere. Finally, the team offers the following general recommendations to NASA in furtherance of the basic objective of achieving practical self-replicating, growing machine systems in the shortest reasonable time: - NASA should begin immediately the development of a simple demonstration replicating system on a laboratory scale, with teleoperated to fully automated phased steps to higher levels of sophistication as the technology is proven and matures. - The space agency should support significant further research in lunar materials processing, lunar resource exploration, and the design and operation of automated manufacturing facilities. - NASA should implement the design, development, and construction of an automated, multiproduct, remotely reprogrammable lunar factory system to begin operation on the lunar surface early in the next century. - Studies should be conducted of scenarios in which a succession of replicating, multipurpose, multiproduct, automated, remotely reprogrammable factories could be placed in orbit or on other planets, these systems perhaps themselves products of earlier established nonterrestrial replicating facilities. - NASA should initiate additional studies of the social, political, military, and economic consequences of the proposed work, and of various other as yet unresolved issues and concepts (see app. 5K). Albus, James A.: People's Capitalism: The Economics of the Robot Revolution. New World Books, College Park, Maryland, 1976. Alvarez, L. W.; Alvarez, W.; Asaro, F.; and Michel, H. V.: Extraterrestrial Cause for the Cretaceous-Tertiary Extinction. Science, vol. 208, 6 June 1980, pp. 1095-1108. Arbib, Michael A.: Simple Self-Reproducing Universal Automata. Information and Control, vol. 9, 1966, pp.177-189. Arnold, James R.; Criswell, David R.; and Waldron, Robert D.: Progress Report on Experimental Program to Develop HF Acid Leach Process for Refining Lunar Soils. Paper presented at the 5th Princeton/AIAA/SSI Conference on Space Manufacturing, 18-21 May 1981, Princeton, NJ. Asimov, Isaac: I, Robot. Doubleday and Company, N.Y., 1950. Banks, E. R.: Universality in Cellular Automata. Proc. of the 11th S.W.A.T., 1970, pp. 194-215. Bejczy, Antal K.: Sensors, Controls, and Man-Machine Interface for Advanced Teleoperation. Science, vol.208, 20 June 1980, pp .1327-1335. Bekey, Ivan; Naugle, John E.: Just Over the Horizon in Space. Astronautics and Aeronautics, vol.18, May 1980, pp. 64-76. Bock, Edward: Space-Based Manufacturing from Lunar Derived Materials. Convair/General Dynamics Contractor Report, 1979. Burger, J.; Brill, D.; and Machi, F.: Self-Reproducing Programs. Byte, vol. 5, June 1980. Burhoe, Ralph Wendell: What Specifies the Values of the Man-Made Man? Zygon, vol. 6, September 1971, pp.224-246. Burks, Arthur W.: Von Neumann's Self-Reproducing Automata. In Essays on Cellular Automata, A. W. Burks, ed., University of Illinois Press, Urbana, Illinois, 1970, pp.3-64. Business Week, 9 June 1980. Calder, Nigel: Spaceships of the Mind. Viking Press, New York, 1978. Carson, Gordon B.: Production Handbook. Ronald Press Company, New York, 1959. Cliff, Rodger A.: An Hierarchical System Architecture for Automated Design, Fabrication, and Repair. Paper presented at the 5th Princeton/AIAA/SSI Conference on Space Manufacturing, 18-21 May 1981, Princeton, NJ. (See also app.5H.) Codd, E. F.: Cellular Automata. Academic Press, N.Y., 1968. Donata, G.; and Camera, A.: A High Level Programming Language for a New Multi-Arm Assembly Robot. First International Conference on Assembly Automation, Brighton, England, D.E.A. SPA, CSO, Torino, 21-27 March 1980. Dunning, Jeremy D.; and Snyder, Robert S.: Electrophoretic Separation of Lunar Soils in a Space Manufacturing Facility. Paper presented at the 5th Princeton/ AIAA/SSI Conference on Space Manufacturing, 18-21 May 1981,Princeton,NJ. Dyson, Freeman J.: Search for Artificial Stellar Sources of Infrared Radiation. Science, vol. 131, 1959, pp. 1667-1668. Dyson, Freeman J.: Disturbing the Universe. Harper and Row Publishers, N.Y.,1979. Freitas, Robert A., Jr.: A Self-Reproducing Interstellar Probe. J. of the British Interplanetary Soc., vol. 33, July 1980a, pp.251-264. Freitas, Robert A., Jr.: Xenology: An Introduction to the Scientific Study of Life, Intelligence, and Civilization in the Universe. Xenology Research Institute, 1980b. 1400 pp. Freitas, Robert A. Jr.: Alien Sex. In Xenology, chapter 12; 1980c. 33 pp. Also Analog, vol.102, May 1982. Freitas, Robert A., Jr.: Interstellar Probes: A New Approach to SETI. J. of the British Interplanetary Soc., vol. 33, March 1980d, pp.95-100. Freitas, Robert A., Jr.: Xenobiology, Analog, vol. 101, 30 March 1981, pp. 30-41. Freitas, Robert A., Jr.; Healy, T. J.; and Long, J. E.: Advanced Automation for Space Missions. Proc. of the 7th International Joint Conference on Artificial Intelligence,24-28 August 1981, Vancouver, Canada. Freitas, Robert A., Jr.; and Valdes, Francisco: Search for Natural or Artificial Objects Located at the Earth-Moon Libration Points. Icarus, vol. 42, June 1980, pp.442-447. Freitas, Robert A., Jr.; and Zachary, William B.: A Selfreplicating, Growing Lunar Factory. Paper presented at the 5th Princeton/AIAA/SSI Conference on Space Manufacturing, 18-21 May 1981, Princeton, NJ. Gardner, M.: Mathematical Games. Scientific American, vol. 224, February 1971, pp. l 12-117. George, Frank H.: Machine Takeover. Pergamon Press, New York, 1977. Gettlemen, K. M., ed.: Modern Machine Shop 1979 NC/CAM Guidebook,1979. Goeller, H. E., and Weinberg, A. M.: The Age of Substitutability. Science, vol. 191, 20 February 1976, pp. 683-689. Good, Irving John: Speculations Concerning the First Ultraintelligent Machine. Advances in Computers, vol. 6, 1965, pp. 31-88. Hamilton, W. D.: The Genetical Theory of Social Behavior (I and II). J. Theoret. Biol., vol. 7, 1964, pp. 1-16, 17-52. Hay, Louise: Self-Reproducing Programs. Creative Computing, vol. 6, July 1980, pp.134-136. Heer, Ewald: Prospects for Robots in Space. Robotics Age, vol. 1,Winter 1979,pp.20-28. Heiserman, David L.: Build Your Own Working Robot. Tab Books, Blue Ridge Summit, PA, 1976. Hogan, James P.: The Two Faces of Tomorrow. Ballantine Books, N.Y.,1979. IAF Conference: Robots To Produce Robots At Fujitsu. From an English-language newspaper handout at the Conference, Tokyo, 21-28 September 1980. Ingel, L. Kh.: Gravitational Focussing. Soviet Astronomy, vol.17, 1974, p. 836. Industrial Robots International, vol. I, no. 5, August 1980, p.2. Jacobson, Homer: On Models of Reproduction. American Scientist, vol. 46,1958, pp.255-284. Johnsen, Edwin G.: Man, Teleoperators, and Robots: An Optimum Team for Space Exploration. J. Spacecraft and Rockets, vol.9, July 1972, pp. 554-556. Johnson, Richard D.; and Holbrow, Charles, eds.: Space Settlements: A Design Study. NASA SP413, 1977. 185 pp. Kemeny, John G.: Man Viewed as a Machine. Scientific American, vol.192, 1955, pp.58-67. Laing, Richard A.: Some Alternative Reproductive Strategies in Artificial Molecular Machines. J. Theoret. Biol., vol. 54, 1975, pp. 63-84. Laing, Richard A.: Automation Introspection. J. Comp. System Sci., vol. 13,1976, pp. 172-183. Laing, Richard A.: Automaton Models of Reproduction by Self-Inspection. J. Theoret. Biol., vol. 66, 1977, pp.437-456. Laing, Richard A.: Automaton Self-Reference. Dissertation, State Univ. of New York, Binghampton, Univ. Microfilms, Ann Arbor, MI, Publication No. TSZ 78-05, 542, 1978. Laing, Richard A.: Machines as Organisms: An Exploration of the Relevance of Recent Results. BioSystems, vol.11, 1979, pp.201-21S. Lee, C. Y.: A Turing Machine Which Prints Its Own Code Script. Mathematical Theory of Automata. Polytechnic Press, Brooklyn, N.Y., 1963, pp.15S-164. Martin, A. R., ed.: Project Daedalus - The Final Report on the BIS Starship Study, JBIS Supplement. Unwin Brothers Ltd., London,1978. Matloff, Gregory L.: Utilization of O'Neill's Model I Lagrange Point Colony as an Interstellar Ark. J. of the British Interplanetary Soc., vol. 29, December 1976, pp.775-785. McCulloch, W. S.; and Pitts, W.: A Logical Calculus of the Ideas Immanent in Nervous Activity. Bulletin of Mathematical Biophysics, vol.5,1943, pp.115-133. Miller, James G.: Living Systems. McGraw-Hill Book Company, N.Y., 1978. Miller, Rene H.; and Smith, David B. S.: Extraterrestrial Processing and Manufacturing of Large Space Systems, NASACR-161293, vols.1-3, September 1979. Minsky, M.: Toward a Remotely-Manned Energy and Production Economy. MIT Artificial Intelligence Laboratory, A.I. Memo No.544, Boston, MA, September 1979. l9pp. Minsky, M.: Telepresence. Omni, vol. 2, June 1980, pp.44-52. Moore, Edward F.: Artificial Living Plants. Scientific American, vol.195, October 1956, pp.118-126. Morowitz, Harold J.: A Model of Reproduction. American Scientist, vol. 47,1959, pp.261-263. Myhill, J.: The Abstract Theory of Self-Reproduction. In Essays on Cellular Automata, A. W. Burks, ed., Univ. of Illinois Press, Urbana, Illinois,1970, pp. 206-218. Numeric Control Equipment, Aviation Week and Space Technology, vol . 113,29 December 1980, p .249. Oliver, B. N.: Proximity of Galactic Civilizations. Icarus, vol. 25, June 1975, pp.360-367. O'Neill, Gerard K.: The Colonization of Space. Physics Today, vol.27, September 1974, pp.32-40. O'Neill, Gerard K.: The High Frontier: Human Colonies in Space. William Morrow and Co., New York,1976. O'Neill, Gerard K.; Driggers, G.; and O'Leary, B.: New Routes to Manufacturing in Space. Astronautics and Aeronautics, vol. 18, October 1980, pp. 46-51. Parkinson, R. C.: Project Daedalus: Propellant Acquisition Techniques. In Project Daedalus - The Final Report on the BIS Starship Study, JBIS Supplement, A. R. Martin, ed., Unwin Brothers Ltd., London, 1978, pp. S83-S89. Penrose, L. S.: Self-Reproducing Machines. Scientific American, vol. 200, June 1959, pp. 105-114. Phinney, W. C.; Criswell, D. R.; Drexler, E.; and Garmirian, J.: Lunar Resources and Their Utilization. In Space Based Manufacturing from Extraterrestrial Materials, Gerard K. O'Neill, ed., AIAA Progress in Astronautics and Aeronautics Series, vol. 57, AIAA, New York, 1977, pp.97-123. Preston, K., Jr.; Duff, M. J. B.; Levialdi, S.; Norgren, Philip E.; and Toriwaki, Jun-Ichiro: Basics of Cellular Logic with Some Applications in Medical Image Processing. Proc. of the IEEE, vol. 67, May 1979, pp. 826-856. Rao, D. Bhogeswara; Choudary, U. V.; Erstfeld, T. E.; Sagan, Carl, Chmn.: Machine Intelligence and Robotics: Report of the NASA Study Group, NASA TM-82329, March 1980. Sagan, Carl; Drake, F. D.; Druyan, A.; Ferris, T.; Lomberg, J.; and Sagan, L. S.: Murmurs of Earth: The Voyager Interstellar Record. Ballantine Books, N.Y., 1978. Sandell, N. R., Jr.; Varaiya, P.; Athans, M.; and Safonov, M. G.: Survey of Decentralized Control Methods for Large Scale Systems. IEEE Transactions on Automatic Control, vol. AC-23, April 1978, pp. 108-128. Smith A. R., III: Cellular Automata and Formal Languages. IEEE Conference Record of 11th Annual Symposium on Switching and Automata Theory, Santa Monica, 28-30 Oct. 1970. N.Y., IEEE, 1970, pp. 216-224. Smith, J. Maynard: The Evolution of Sex. Cambridge Univ. Press, Cambridge, 1978. Stakem, Patrick H.: Life Versus Computer Capacity. Byte, vol. 4, February 1979, p. 58. Taneja, Vidya S.; and Walsh, Peter J.: Growth Considerations of a Self-Replicating Field Dependent on External Factors. IEEE Transactions on Systems, Man, and Cybernetics, vol. SMC-11, Aug. 1981, pp. 558-563. Thatcher, James: The Construction of a Self-Describing Turing Machine. Mathematical Theory of Automata. Polytechnic Press, Brooklyn, N.Y., 1963, pp. 165-171. Thatcher, James: Universality in the von Neumann Cellular Model. In Essays on Cellular Automata, A. W. Burks, ed., Univ. of Illinois Press, Urbana, Illinois, 1970, pp. 132-186. Trivers, R. L.: The Evolution of Reciprocal Altruism. Quart. Rev. of Biology, vol. 46, 1971, pp. 35-57. Turing, Alan: On Computable Numbers with an Application to the Entscheidungsproblem. Proc. London Math. Soc., vol. 42, 1936, pp. 230-265. U.S. Bureau of the Census: Statistical Abstract of the United States, 98th Annual Ed., Washington, D.C., 1977 U.S. Bureau of the Census: Statistical Abstract of the United States, 99th Annual Ed., Washington, D.C., 1978. U.S. Bureau of the Mines: Metals, Minerals, and Fuels. In Minerals Yearbook 1976, vol. I, GPO, Washington, D.C., 1978. Valdes, Francisco; and Freitas, Robert A., Jr.: Comparison of Reproducing and Nonreproducing Starprobe Strategies for Galactic Exploration. J. British Interplanetary Soc., vol. 33, November 1980, pp. 402-408. Vondrak, Richard R.: Creation of an Artificial Atmosphere on the Moon. In Advances in Engineering Science, vol. 3, NASA CP-2001, 13th Annual Meeting of the Society of Engineering Science, sponsored by JIAFS, Hampton, Virginia, 1-3 November 1976, pp. 1215-1223. Vondrak, Richard R.: Environmental Impact of Space Manufacturing. In Proceedings of the Third Princeton/AIAA Conference on Space Manufacturing Facilities, Princeton, N.J., 9-12 May 1977, Paper no. 77-539. Von Neumann, John: The General and Logical Theory of Automata. In Cerebral Mechanisms in Behavior - The Hixon Symposium, L. A. Jeffress, ed., John Wiley & Sons, N.Y., 1951, pp. 1-31. Also in Collected Works, vol. 5, pp. 288-328. Von Neumann, John: Probabilistic Logics and the Synthesis of Reliable Organisms from Unreliable Components. In Automata Studies, C. E. Shannon, J. McCarthy, eds., Princeton Univ. Press, Princeton, N.J., 1956, pp. 43-98. Also in Collected Works, vol. 5, pp. 329-378. Von Neumann, John: Theory of Self-Reproducing Automata. Edited and completed by A. W. Burks. University of Illinois Press, Urbana, Illinois, 1966. Von Tiesenhausen, Georg; and Darbro, Wesley A.: Self-Replicating Systems - A Systems Engineering Approach. NASA TM-78304, July 1980. Waldron, R. D.; Erstfeld, T. E.; and Criswell, D. R.: The Role of Chemical Engineering in Space Manufacturing. Chemical Engineering, vol. 86, 12 February 1979, pp. 80-94. Wesley, J. P.: Ecophysics: The Application of Physics to . Biology. Charles C. Thomas, Publ., Springfield, Illinois, 1974. Williams, R. J.; and Chang, Y. A.: Extraction Processes for the Production of Aluminum, Titanium, Iron, Magnesium, and Oxygen from Nonterrestrial Sources. In Space Resources and Space Settlements, J. Billingham, W. P. Gilbreath, B. O'Leary, and B. Gossett, eds., NASA SP428,1979, pp.257-274. Williams, R. J.; McKay, D. S.; Giles, D.; and Bunch, T. E.: Mining and Beneficiation of Lunar Ores. In Space Resources and Space Settlements, J. Billingham, m W. Gilbreath, B. O'Leary, and B. Gossett, eds., NASA SP428, 1979, pp. 275-288. Zachary, William B.: A Feasibility Study on the Fabrication of Integrated Circuits and Other Electronic Components in Space Utilizing Lunar Materials. Paper presented at the 5th Princeton/AIAA/SSI Conference on Space Manufacturing, 18-21 May 1981, Princeton, NJ.
<urn:uuid:2409fd35-a569-441e-a592-f9bdc4080409>
CC-MAIN-2015-11
http://en.wikisource.org/wiki/Advanced_Automation_for_Space_Missions/Chapter_5.7
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463658.66/warc/CC-MAIN-20150226074103-00251-ip-10-28-5-156.ec2.internal.warc.gz
en
0.732407
4,801
2.9375
3
3.074527
3
Strong reasoning
Science & Tech.
McKendall, Sherron Benson PhD; Kasten, Kasandra MPA; Hanks, Sara; Chester, Ann PhD Health disparities and educational disparities are national issues.1–5 They are particularly troublesome in rural West Virginia, a state that ranks among the worst in obesity-related illnesses6–8 and in educational attainment.9,10 To add to the complexity of addressing these issues, health care professionals from underserved backgrounds are more likely than others to provide health care to underserved populations.11–14 However, the process of nurturing educationally disadvantaged students to be successful in college and in health professions school is costly,15,16 time consuming, and energy intensive.17 Programs targeting students in grades K–12 must wait 20 to 30 years for results. Furthermore, programs targeting students for the first time at the college level often miss students from underserved populations because of the barriers these students face before reaching college.18,19 In the early 1990s, the Association of American Medical Colleges’ Project 3000 by 2000 spurred the West Virginia University School of Medicine to action. University leaders started the West Virginia Health Sciences and Technology Academy (HSTA), a precollege program, in 1994 to address the serious problems of an undereducated workforce and a large medically underserved population in West Virginia. We began the program with three beliefs. First, if underrepresented high school students have potential and the desire to pursue a health professions career and are given the support, they can reach their goals, including obtaining a health professions degree. Second, underserved high school students are able to predict their own success if given the right resources. Finally, community engagement would be key to the program’s success. The partnership between the community and the HSTA has allowed for the program’s sustainability and has nurtured the students’ success, in turn strengthening the communities in which graduates live and work. In this Perspective, we offer findings from the first 14 years of the program. We focus on key aspects of the HSTA’s success in recruiting and preparing health professionals from underserved populations. About the HSTA Of all HSTA students, 32% are African American, 63% financially disadvantaged, and 73% the first in their families to attend college. We select students from a pool of capable applicants recruited by community leaders. Those who express the strongest interest, the greatest potential, and the most need for support are chosen. In 1994, the HSTA began with 44 students from two West Virginia counties. Now, the program serves approximately 800 underrepresented high school students (grades 9–12) each year from nearly half the counties in the state. Students enter the HSTA in the ninth grade and matriculate if they maintain a 3.0 or better GPA, attend 70% of the HSTA functions, attend two summer campus experiences (camps), complete 75 hours of community service, and adhere to all disciplinary policies. Successful graduates are eligible for tuition waivers to all state-supported colleges or universities, health professions schools, and many graduate schools. Each summer, students have the opportunity to participate in one of four sequential camps at different college/university campuses. These camps include laboratory and classroom training as well as enrichment activities designed to equip students with skills and experiences suitable for a seamless entry into college. The camp curriculum, for each successive grade, builds on that of the previous grades to expose students to increasingly more rigorous educational experiences associated with careers in the health sciences. Throughout the academic year, HSTA-trained teachers lead students in local, community-based after-school clubs. The students engage in scientific research to produce projects that focus on health-related issues relevant to their interests and endemic to their local communities. As part of these clubs, scientists, peer mentors, and community leaders provide guidance for students. Leadership, communication, and resource skills along with teamwork are woven into the experience, with the expectation that each student present his or her project’s findings formally in a public setting and engage in at least 75 hours of community service over the four years. HSTA Framework and Philosophy The HSTA employs a framework of yearly, multilayered, and multifaceted strategies and support systems to increase access to college for underrepresented students. The program’s philosophy for achieving this goal includes theories and pedagogy from research in the fields of education and the behavioral/social sciences. Below, we describe these strategies and the underlying theories and provide examples from the program and representative quotes from students. High expectations for all students Research has shown that having high expectations of students translates to high rates of academic success as well as elevated levels of self-concept.20–22 The HSTA creates an environment in which all students are expected to achieve at high levels through academically rigorous scientific activities and the promotion of higher-order thinking skills. HSTA staff and faculty surround students with these expectations, measured by rubrics, requirements, and grades in college-level courses (taken during their final summer camp). These expectations are embedded in the encouragement students receive to help them achieve their goals. Experts argue that students who take challenging courses and participate in academically rigorous work are more likely than those who do not to enroll in and complete bachelor’s degree programs.23 HSTA clubs, with a 10:1 student-to-teacher ratio, allow teachers to provide individualized academic support for each student. According to one participant, “[b]eing in HSTA my grades in science went from a C to an A so HSTA is one of the best things that has happened to me.” Learning by doing Education expert John Dewey24 posited that students do best in environments where they are allowed to interact and experience the curriculum so that they have the opportunity to take part in their own learning. Faculty at the HSTA embrace this theory through hands-on, experiential activities in which students construct meaning from their experiences. During a campus-based experience, one student reflected the following: I liked how we got to dissect the sheep hearts, kidneys, eyes, and how we could dissect the cow eyes. We learned how to cut in the right places and how to focus on the chambers of the heart and the lens of the eye because those were the two features that were closer to humans. Through repeated project work and summer camps, the HSTA builds students’ skills year after year. A constructivism/discovery learning approach is used to encourage students to construct new ideas or concepts based on their existing knowledge. Students also apply their skills and past learning experiences to discover the relationship between facts and experiences in their research projects.25 We believe that students with a strong sense of efficacy are more likely to pursue increasingly difficult tasks and become more motivated. Over the four years, the HSTA immerses students in increasingly rigorous activities that reaffirm their action steps towards developing skill sets for success. Through this process, students realize their capacity to succeed and have stronger beliefs that they can achieve success. Social scientist Albert Bandura26 argued that providing social support is a key to promoting student achievement and fostering self-worth, which make academic success seem attainable. Constructs of observational learning and peer modeling as well as social development theory indicate not only that social interaction is crucial to cognitive development but also that students learn through modeling and peer observations.27 The HSTA surrounds students with opportunities for both social interaction and peer modeling. One student noted that “[t]he people in my HSTA group are longtime friends and when I may not understand something, they are there to help me with any problem that may occur.” Students also receive social support during the campus-based camps—they have mentors from similar backgrounds who have successfully completed the HSTA program and now attend college or a health professions school. One participant noted that “[m]y mentor is going to school to be an occupational therapist, and I was interested in physical therapy, and she gave me more of an idea about what the classes were like.” The HSTA also includes an informal mentoring program in which alumni periodically visit clubs and mentor the students on their yearly research projects as well as on the process of preparing for college. The alumni use stories of their personal success to motivate the current students to reach their goals. Finally, we have found that parent/family involvement in a student’s education results in better scholastic achievement.28 The HSTA recognizes the importance of including students’ cultural references in all aspects of learning. Thus, the program provides support for parents, teachers, community leaders, extended family, and friends. The HSTA coordinates parent meetings and encourages parental involvement in the science symposia, a community-based component of the program during which students present their project’s findings publicly. By understanding the social and cultural environment of our students, the HSTA is better able to meet their needs and encourage their success. Success of the HSTA The HSTA has had a great deal of success tracking students after their high school graduation. Staff collect data through yearly telephone, social media, and e-mail interviews with students, and the Web information maintenance form that students complete yearly provides additional data. Of the 1,402 students who successfully completed the HSTA from 1997 to 2010, we were able to track the educational status of 1,311 (94%) students to college and beyond. Each year, we also survey each summer camp participant for his or her intentions to pursue college and intended degree choice. Despite the robust data on HSTA students we have collected, we cannot draw comparisons between this and other populations. First, relative to the West Virginia population, African American, first generation to college, and financially disadvantaged students are overrepresented in the HSTA population. In addition, the same relationship exists for these groups relative to the national population. Finally, for a number of reasons—including issues with gaining consent from an already distrustful population and the difficulty with tracking for decades a large cohort with no incentive to participate—we did not identify a control population against whom to compare our students. With these limitations in mind, however, we can report on HSTA students’ success. We compared each summer camp participant’s intentions to pursue a college degree with the outcomes achieved by HSTA graduates. Not all HSTA students attended summer camps each year, but all graduates attended at least two camps over their four years in the program. As 9th to 12th graders, HSTA students were fairly accurate, slightly underestimating their college-going rates. Of summer camp participants, 93% (3,537/3,813) indicated that they would definitely attend college, whereas 96% (1,263/1,311) of HSTA graduates actually attended college. These trends held for African American students, for whom the college-going rate was high. Of African American summer camp participants, 95% (884/932) indicated that they would definitely attend college, whereas 97% (375/386) of African American graduates actually attended college. We also compared each summer camp participant’s intentions to choose a health professions major (medicine, premed, physician assistant, nurse, nurse practitioner, dentistry, pharmacy, etc.) (see Table 1) with the outcomes achieved by HSTA graduates. Again, HSTA students, as 9th to 12th graders, were fairly accurate in predicting their high rates of choosing a health professions major. Of summer camp participants, 66% (2,500/3,767) indicated that they would pursue a health professions major, whereas 59% (725/1,226) of HSTA graduates actually did. Of African American summer camp participants, 60% (548/921) predicted that they would pursue a health professions major, whereas 52% (189/367) actually did. Overall, HSTA graduates have been successful in pursuing postsecondary education—they attend college, stay in college to graduate, and major in science, technology, engineering, and math (STEM) subjects at higher rates than both the general West Virginia and the national population (see Figure 1). For example, 96% of HSTA graduates attend college, 90% graduate with a four-year degree or better, and 65% major in a health or STEM subject, with 59% specifically choosing a health professions major. Furthermore, of the 2008–2010 economically disadvantaged HSTA graduates, 96% (191/200) immediately transitioned to college, compared with 20% of low-income West Virginian students and 25% of low-income American students in 2008.29 The African American HSTA graduates outperformed their West Virginian and American counterparts as well. The 97% of HSTA African American graduates to attend college was greater than the 6% of West Virginian and 12% of American high school graduates to do so in 2009.30 In addition, 84% of HSTA African American graduates have received a four-year degree, compared with 29% of West Virginian and 41% of American graduates in 2007.31 Finally, 90% of HSTA graduates live and work in West Virginia. An important tool for combating issues like the health and academic challenges faced by adults and children who live in rural and poverty-stricken areas is community involvement.28 Community–academic partnerships can serve a pivotal role in reshaping a community’s economic, health, and education systems.32–36 The primary goals of the HSTA are to increase the college-going rate among underrepresented students in West Virginia, to improve students’ science and math skills acquisition, to empower communities through the leadership development of their youth, and to increase the number of health care providers in West Virginia’s currently underserved communities. In 1996, West Virginia University reached out to community leaders to develop the HSTA with the expectation that local youth, after receiving academic or professional degrees, would return to their communities to fuel the economy and improve the quality of life for local citizens. The purpose of this collaboration was to encourage higher education faculty members and administrators, public school teachers, and community leaders to assume, as a team, the responsibility for mentoring high school students. Joint Governing Board Citizens from local communities make up the governing body known as the HSTA Joint Governing Board. It includes two representatives and one alternate from each of the 14 regional local governing boards (encompassing 26 West Virginia counties), and one ex officio member from each of the following: West Virginia Higher Education Policy Commission, West Virginia Board of Education, the health professions schools in the state, and the colleges and universities that host the summer camps. The Joint Governing Board is responsible for all HSTA policies and procedures and decisions related to financial and budgetary, personnel, curriculum, recruitment and retention, and public relations issues. Local governing boards The 14 HSTA regions are governed by local governing boards responsible for communicating all appropriate matters to the Joint Governing Board for action and decision making; communicating these decisions to the appropriate HSTA regional entity; and ensuring that all HSTA policies and procedures are followed. The local governing boards include volunteers representing the community, local schools, local health care professions, and HSTA parents and students. The HSTA governance structure mandates that 51% of governing board members must be community volunteers. We believe that the success of the HSTA rests in the communities’ feelings of ownership and control and in the trust that is built through these long-term partnerships between higher education entities, including public education institutions at the state and local levels, with a particular emphasis on rural communities. Continuing community support Evidence of the success of the community engagement portion of the HSTA includes legislative language providing tuition waivers and a budgetary line item devoted to the program.37,38 In 1997, the HSTA local governing boards partnered with West Virginia University leadership to gain unanimous backing for legislative language allowing a tuition waiver for HSTA graduates at any West Virginia public college/university in any undergraduate through health professions school program. In addition, that same year, the legislature inserted a line item in the budget with only HSTA’s name on it. In a state where colleges and universities are numerous and competition for the limited state budget is fierce, community support for the HSTA was critical as both policy changes applied to all public colleges/universities, not just West Virginia University, home of the HSTA. Sustainability is always an issue for programs like the HSTA. We attribute 20 years of successful funding to (1) multiple and varied funding sources and (2) the support of community leadership. The HSTA began with a grant from the Howard Hughes Medical Institute, which provided funding for 19 years under the precollege initiative (see Figure 2).39 Other funding sources included foundations such as Coca Cola, Kellogg, Robert Wood Johnson, and Claude W. Benedum. Many of these original funding sources have ended. However, new funding sources have taken over, supporting the budget of approximately $2M/year. Current funding sources include the state of West Virginia, the National Institutes of Health, which has been supporting the program since 1996, and the Claude W. Benedum Foundation. In 2013, community partnerships contributed to securing all of the funding sources. In addition, we believe that these partnerships were the only reason that, during a state budget crunch, the HSTA line item in the state budget increased, whereas overall funding for higher education (where the line item is housed) decreased. Recognizing the limitations of the data, we do encourage replication of this program in the hopes of repeating its successful outcomes. To evaluate the success of such a program takes many years. Until the numbers of underrepresented students pursuing college and health professions degrees in West Virginia and nationally begin to rise, a solution will not be realized. Still, we can safely conclude that HSTA students attend college more often than their parents, and they do well there. They choose STEM majors more often than their peers and mostly return to work in their communities.40 The HSTA’s commitment to providing underrepresented students in West Virginia with these educational opportunities has resulted in a pool of qualified individuals ready to serve the health care needs of the state’s rural and underserved populations. For example, rural Webster Memorial Hospital was struggling to find qualified employees in 1994. Today, eight HSTA graduates serve the hospital and the community in positions ranging from MD to emergency medical technician.41 With the support of the community, and the resources and opportunities to succeed, students from at-risk populations are able to predict their intended educational outcomes. Furthermore, if they have potential and the desire to pursue a health professions career and are given the support to do so, they can reach their goals. 4. Merchant JL, Omary MB. Underrepresentation of underrepresented minorities in academic medicine: The need to enhance the pipeline and the pipe. Gastroenterology. 2010;138:19–26.e1 5. Sullivan LW, Suez Mittman I. The state of diversity in the health professions a century after Flexner. Acad Med. 2010;85:246–253 11. Wade ME, Brokaw JJ, Zollinger TW, et al. Influence of hometown on family physicians’ choice to practice in rural settings. Fam Med. 2007;39:248–254 12. Matsumoto M, Okayama M, Inoue K, Kajii E. Factors associated with rural doctors’ intention to continue a rural career: A survey of 3072 doctors in Japan. Aust J Rural Health. 2005;13:219–225 13. Ward AM, Kamien M, Lopez DG. Medical career choice and practice location: Early factors predicting course completion, career choice and practice location. Med Educ. 2004;38:239–248 14. Laven G, Wilkinson D. Rural doctors and rural backgrounds: How strong is the evidence? A systematic review. Aust J Rural Health. 2003;11:277–284 16. Hughes SA. The MSEN Pre-College Program: What are the costs and benefits based on estimates of its impacts on black high school graduates? High School J. 2002;85:53–60 17. Reid KJ, Feldhaus CR. Issues for universities working with K-12 institutions implementing prepackaged pre-engineering curricula such as Project Lead the Way. J STEM Educ. 2007;8:5–14 18. Bailey DF, Bradbury-Bailey ME. Empowered youth programs: Partnerships for enhancing postsecondary outcomes of African American adolescents. Prof School Couns. 2010;14:64–74 19. Hughes SA. An early gap in black–white mathematics achievement: Holding school and home accountable in an affluent city school district. Urban Rev. 2003;35:297–322 20. Johnson JP, Livingston M, Schwartz RA, Slate JR. What makes a good elementary school? A critical examination. J Educ Res. 2000;93:339–348 21. Marzano RJ What Works in Schools: Translating Research Into Action. 2003 Alexandria, Va Association for Supervision and Curriculum Development 22. Schmoker MJ The Results Fieldbook: Practical Strategies From Dramatically Improved Schools. 2001 Alexandria, Va Association for Supervision and Curriculum Development 23. Newman FM Authentic Achievement: Restructuring Schools for Intellectual Quality. 1996 San Francisco, Calif Jossey-Bass Publishers 24. Dewey J Democracy and Education: An Introduction to the Philosophy of Education. 1944 New York, NY Free Press 25. Bruner JS The Process of Education. 1960 Cambridge, Mass Harvard University Press 26. Bandura A Social Foundations of Thought and Action: A Social Cognitive Theory. 1986 Englewood Cliffs, NJ Prentice-Hall 27. Vygotsky LS, Cole M Mind in Society: The Development of Higher Psychological Processes. 1978 Cambridge, Mass Harvard University Press 28. Ladson-Billings G The Dreamkeepers: Successful Teachers of African American Children. 1994 San Francisco, Calif Jossey-Bass Publishers 32. Rye JA, Chester AL. WVU–community partnership that provides science and math enrichment for underrepresented high school students. Acad Med. 1999;74:352–355 33. McKendall SB, Simoyi P, Chester AL, Rye JA. The Health Sciences and Technology Academy: Utilizing pre-college enrichment programming to minimize post-secondary education barriers for underserved youth. Acad Med. 2000;75(10 suppl):S121–S123 34. Kennedy BM, Prewitt TE, McCabe-Sellers B, et al. Academic partnerships and key leaders emerging from communities in the lower Mississippi Delta (LMD): A community-based participatory research model. J Cult Divers. 2011;18:90–94 35. Hamos JE. Framing K–12 partnerships in order to make a difference. Acad Med. 2006;81(6 suppl):S11–S14 36. Goodrow B, Olive KE, Behringer B, et al. The Community Partnerships Experience: A report of institutional transition at East Tennessee State University. Acad Med. 2001;76:134–141 39. . Howard Hughes Medical Institute Original Award Letter. HHMI#:72594-517302. HSTA Archives. Awarded May 5, 1994. 41. Johns A. Hometown heroes. WVU Health. 2012;3:2–5 Spring 45. U.S. Department of Education. . National Center for Education Statistics. 1998–1999 and 2008–2009. Integrated Postsecondary Education Data System, “Completions Survey” (IPEDS-C:99); and Fall 2009. http://dashboard.ed.gov/statechart.aspx?i=m&id=54&wt=0 . Accessed September 25, 2013.
<urn:uuid:29618850-ffe6-4fde-bd4c-067b4d655b04>
CC-MAIN-2016-40
http://journals.lww.com/academicmedicine/Fulltext/2014/01000/The_Health_Sciences_and_Technology_Academy___An.16.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661915.89/warc/CC-MAIN-20160924173741-00201-ip-10-143-35-109.ec2.internal.warc.gz
en
0.945639
4,988
2.828125
3
2.986745
3
Strong reasoning
Education & Jobs
| STORY BY MEGHAN MCMAHON | Nothing can ruin a picnic faster than ants, at least if cartoons are to be believed. Although an army of ants may not be able to carry away your al fresco lunch piece by piece, these mighty insects are exceptionally strong relative to their size. A single ant can carry up to 50 times its body weight, and working together with other ants they can move even larger objects, National Geographic reports. Most of us don’t give ants a second thought unless an invasion of them happens to be ruining our time outside. In reality, though, ants are a critically important part of the ecosystem. Ants are essential for turning and aerating soil, even more so than earthworms in some areas. They help spread plant seeds and pollinate plants and flowers, and many ants are decomposers, creating healthy habitats in the soil all around us, according to the San Diego Zoo. Lastly, ants serve as an important food source for many animals, and not just for anteaters. The world is home to more than 12,000 species of ants, and these essential insects live on every continent except Antarctica. Ants are so populous across the globe that the combined weight of all the ants on Earth is about the same as the combined weight of all the humans on Earth, according to the San Diego Zoo. Ants are social insects that live in large colonies. As many as 8 million ants can live in a single colony, and each ant has a specific role to perform, according to the San Diego Zoo. The social behavior of ants allows them to work together to achieve the common goals of survival, growth and reproduction, reports Arizona State University. Like beehives, ant colonies have queens, and the queens’ responsibility is to lay eggs to allow the colony to survive, according to National Geographic. The worker ants in a colony are all female, and those are the ants we normally see outside the nest. The worker ants are responsible for foraging for food, building the nest, protecting the colony and caring for the queen’s offspring. Male ants typically have just one purpose to the colony, mating with the queen, and after this function is complete the male ants may die. Ants must communicate with one another to keep the colony organized. Rather than talking or otherwise vocalizing, ants secrete chemicals called pheromones to communicate with other ants, according to the San Diego Zoo. These pheromones each have a scent that the other ants can sense through their antennae. The scent trails can lead other ants to a food supply or warn of an intruder. Even dead ants have a scent that communicates to other worker ants to remove its body from the colony. Ant colonies can exist for decades, even as the resident ants die off. A worker ant can live for a few years, while queen ants can live for 15 or more. As the ants die, though, they are replaced by new insects that will continue the work of previous generations, according to the Illinois Department of Public Health.
<urn:uuid:cdeb6be7-fe4a-4468-ae31-f14aede98333>
CC-MAIN-2021-25
https://www.reconnectwithnature.org/News-Events/Big-Features/Ants-on-parade
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487611445.13/warc/CC-MAIN-20210614043833-20210614073833-00155.warc.gz
en
0.946897
628
3.78125
4
2.210096
2
Moderate reasoning
Science & Tech.
What Is Drug Addiction? Even in today’s modern society, drug addiction is still looked down upon in many respects and widely thought of as something that afflicts the weak-willed, poor, downtrodden, or uneducated. Quite the contrary is true. While certain demographics and risk factors will predispose one person to addiction over another, addiction knows no bounds. A survey published in the International Journal of the Addictions questioned 256 Americans as to what comes to their minds when they hear the term “drug addict,” and the majority produced a description of a disoriented, sickly, skinny, lower class, diseased, male “hippie” that has skin problems and behavioral issues. The stigma that plagues drug addicts began long ago, and despite our current knowledge on it, most people still align drug addiction with criminal activity and negative thoughts of their personal experiences with addicts and their common bad behavior. According to the National Institute on Drug Abuse, stigma is partly to blame for why some addicts don’t receive the treatment they need, in addition to the reason many physicians won’t treat addicts and why some drug companies aren’t trying to develop new addiction treatments. Some efforts to reduce stigma toward addicts have proven to be beneficial, but the big picture of drug addiction still poses the idea to non-addicts that addiction is nothing more than a series of bad choices. In all actuality, addiction is a chronic, lifelong battle to hold onto your life and your identity. Experiencing it changes the way you view the world and often the way you view yourself, frequently resulting in feelings of low self-worth for many that are compounded by society. Addiction is an inability to stop using a substance even if the user really wants to, as defined by the National Institute on Drug Abuse. The Mayo Clinic lists the following categories as risk factors for drug addiction: - Addiction runs in your family, giving you a genetic predisposition. - You’re a man, doubling your risk. - You have another psychiatric condition. - You are subject to peer pressure. - Family and strong support systems are lacking. - You are troubled with depression and/or anxiety or feel alone. - The drug you’re abusing is known to be very addictive. There are valid questions many non-addicts have, such as why someone would ever try drugs in the first place, as though never experimenting would deter someone from the fate of dependency. This simply isn’t true though. Some addicts never intended to abuse a drug in their lifetime; they were given a prescription for pain or while recovering from injury and got hooked on drugs supplied by their very own doctor that they’ve come to trust. Others grow up in homes where drug abuse is prevalent and are given illicit substances during childhood and the adolescent years, when they know no better. Tolerance and Dependency Many people wrongly assume that developing a tolerance to a substance is the same thing as being addicted to it. Actually, tolerance — wherein the body no longer reacts accordingly to past doses of a drug, requiring larger doses to achieve the same effects — forms even in cases where dependence does not. Dependence is when addiction begins to form. The body becomes physically reliant upon the abused substance. Sometimes — in the case of hard substances like heroin — dependency can occur after only a few uses. For most drugs, however, regular use over a period of weeks to months will lead to dependency. According to the National Institute on Alcohol Abuse and Alcoholism, drugs and booze are close cousins and abuse of one makes the other more likely, as shown in the results of one study in which 64 percent of 248 treatment-seeking alcoholics were eligible for a drug use disorder diagnosis at some point during their life. In addition, the Substance Abuse and Mental Health Services Administration reported that 37.2 percent of substance abuse treatment admissions in 2009 alone were for patients struggling with alcohol abuse accompanied by at least one drug. The 2012 National Survey on Drug Use and Health states that 10.3 million individuals over the age of 11 admitted to driving while under the influence of an illicit drug in the preceding year. CNN Health reported on testing for drug involvement in 12,055 drivers of fatal car accidents in 2009 that led to positive drug results for 3,952 drivers, a 5 percent increase in the past five years. The National Council on Alcoholism and Drug Dependence states that 80 percent of incarcerated individuals engage in substance abuse and nearly half of all inmates are suffering from clinical addiction. Since drug addiction is still largely treated as a crime in the United States rather than a chronic health problem, the repeated failure of successful inmate rehabilitation programs and the increased rate of recidivism continue to be overlooked. The NCADD also accounts for around 85 percent of incarcerated drug abusers picking up their habits after being released, and 60 to 80 percent engaging in criminal activity again post-release too. The Drug Abuse Warning Network attributed 4.6 million visits to American emergency rooms in 2009 to drugs. In the United States alone, 41,340 people died due to drug overdose in 2011, according to the Centers for Disease Control and Prevention. As of late 2013, the Washington Post reported that drug overdoses were responsible for more deaths than vehicle accidents in 29 states and the District of Columbia. Addicted to What? Of the 13.5 million opioid users across the globe, 9.2 million are using heroin, according to the Foundation for a Drug-Free World. The National Institute on Drug Abuse states that approximately 23 percent of heroin users end up dependent on the drug. The New Haven Register relayed CDC statistics touting 3,036 deaths attributed to heroin overdose in 2010, a number the CDC admits is likely at least 25 percent short. Research shows the popular club drug Ecstasy has been growing in popularity over the years among our nation’s youth, with 10,176 documented ER visits for patients under 21 years old in 2011, a drastic jump from the 4,460 in 2005, per SAMHSA. Nonetheless, 695,000 US citizens over the age of 11 reported themselves as current or past-month users of the drug in 2010, according to Drugs.com. Commonly referred to as MDMA or Molly, the drug is frequently cut with other substances that can seriously endanger the life of the user. The Huffington Post reported comments made by an official from the Drug Enforcement Administration warning that 80 to 90 percent of the time, the substance they’re handling that is allegedly Molly turns out to be something else, often other illicit drugs. The National Institute on Drug Abuse for Teens notes the results of a 2012 study wherein 6.5 percent of 8th grade students, 17 percent of those in 10th grade, and 22.9 percent of high school seniors had used marijuana at some point during the month preceding the survey. While controversy looms over the addictive potential of cannabis, NIDA affirms that around 9 percent of marijuana users develop an addiction to the drug, with variants up to 17 percent for early-onset users, and 25 to 50 percent for those who use it every day. The results of a 2013 Gallup poll indicate 38 percent of adult Americans have tried marijuana, but only 7 percent admit to being current pot smokers. Designer drugs — also known as research chemicals — have gained massive popularity in America over the past few years. Because of such, emergency room visits for bath salts reached an alarming 22,904 incidents in 2011, per the National Association of Boards of Pharmacy, and spice was responsible for over 28,500 that same year, according to Health.com. A 2011 report from SAMHSA detailed measures of an approximate 1.1 million adult users of inhalants in the previous year. As inhalants are popular among youths, SAMHSA states nearly 1 million teenagers used inhalants in the year leading up a 2007 survey, and around 99,000 of them qualified for a diagnosis of inhalant dependence or abuse. Speed and Methamphetamines A research report by NIDA found that more than 12 million Americans have used methamphetamine one or more times. A 2012 CBS News report relayed study results showing 1.6 percent of surveyed high school sophomores confessed to using the stimulant in 2010. A study published in the Journal of Epidemiology and Community Healthmade note of the increased likelihood of depressive symptoms in high school juniors who used methamphetamines, Ecstasy, or both during their sophomore year.Blurring the line a bit between amphetamines and prescription drugs are medications like Adderall — used in the treatment of attention deficit hyperactivity disorder. The Huffington Post reports that doctors wrote over 18 million prescriptions for Adderall in 2010, signaling a growing demand for the drug. Stimulant medications like Adderall were misused by 10.8 percent of college students in the year prior to being surveyed — many in need of the boost a study drug can deliver, according to WJLA News. - Rx Marks the Spot Prescription drugs are being abused more than ever, with a staggering 5.1 million individuals abusing prescription pain medications alone, per the Washington Times. The Boston Globe reported that 16,651 deaths in 2010 were associated with opioids, 29 percent of which the analgesic was solely responsible for the death. Intended as a method of treatment for opioid addiction, methadone has brought with it its own addicts and remains responsible for almost one-third of opioid-related prescription drug overdoses, according to the PEW Charitable Trusts. Cocaine was linked with 4,183 overdose deaths in America in 2010, a 44 percent decline from 7,448 in 2006, per a 2013 White House press release. Fortunately, cocaine abuse has slowly declined in America since the mid-1980s when it was at its peak with a reported 5.7 million users in 1985, via the National Criminal Justice Reference System. A 2012 statistic illustrates 1.6 million current cocaine users over age 11. Approximately 18 percent of American adults smoke cigarettes, 13.4 million smoke cigars, 2.5 million are users of pipe tobacco, and 9 million are spit or smokeless tobacco users, per the American Cancer Society. An NBC News report touts premature death in smokers, citing 13 to 14 years of life lost in comparison to non-smokers. Each year, cigarette smoking alone is responsible for nearly one in every five deaths, totaling around 480,000 in all, per the CDC. The Picture of a Drug Addict While many are guilty of holding the aforementioned stereotypical image of addicts in their mind, addiction does target certain people more than others and they aren’t always down-on-their-luck, poverty-stricken individuals with “drug addict” written across their face. So, who’s doing it? Bypassing the stigma, let’s get real; every single child, adolescent or adult struggling with addiction is somebody’s son or daughter, someone’s siblings perhaps, or somebody’s someone special. While having a mother or father who abused drugs or alcohol predisposes someone to a heightened risk of carrying on the detrimental habit, you aren’t exempt from addiction even with the most pristine of parents. Data from 2007 accounted for 8.3 million American children living with a parent who was a substance abuser or dependent on alcohol or drugs in the previous year, per the Child Welfare Information Gateway. These parents don’t always fit the mold society has created for the typical addict. In fact, moms all over the nation attempting to successfully juggle kids, careers, marriages, and more were responsible for a great deal of the 750 percent influx in Adderall prescriptions between 2002 and 2010 among females ages 26 to 39, per ABC News. In recent years, the number of senior citizens addicted to drugs has increased greatly. According to Psych Central, some are merely delving back into the drug abuse they entertained in their youth while others are getting hooked on prescriptions given to them by their doctors, with almost three in every 10 individuals ages 57 to 85 using a minimum of five prescribed drugs. The fact of the matter is, drug abuse starts early for many. Unfortunately, the earlier an individual starts using illicit substances, the more probable it is they’ll go on to abuse harder drugs and develop addiction in the future. According to U.S. News & World Report, one-fourth of Americans who started using an addictive substance before they turned 18 were addicted as of 2011, compared to one in 25 who began using addictive substances after turning 21. The Florida Institute of Technology states that the average age for first-time drug use is 13 years old. On the other side of the planet, it isn’t uncommon for young children to be addicted to illicit substances, especially in countries that produce them. In Kabul, Afghanistan, CNN News reported on a tight-knit family consistent of a grandmother, her three children, and two grandchildren — ages 5 and 8 — all of whom are addicted to opium, as are roughly 1 million other Afghans. United We Stand Active duty military members are now considered to be at an increased risk of drug abuse too. The number of service members who are misusing prescribed medications has steadily been on the rise over the last decade. The National Institute on Drug Abuse notes that 11 percent of military members admitted to the misuse of a prescription medication in 2008, with the majority being opioid painkillers. That, coupled with the fact that military doctors exhibited a fourfold increase in the number of prescriptions they wrote for painkillers from 2001 to 2009 to nearly 3.8 million, presents serious concern for the well-being of American’s troops. The National Alliance on Mental Illness accounts for 53 percent of drug addicts having one or more serious mental health disorders. Many meet the criteria for mental illness and have no idea, and some are perfectly aware but choose not to, or they don’t have the means to treat their condition. In either case, the number of people with mental health disorders who are self-medicating with illicit drugs is staggering. Furthermore, these substances only provide a temporary fix for the symptoms that plague the user — symptoms that always return with a vengeance and can worsen without treatment. NIAAA attests that mental illness is also substantially more common among those with both drug- and alcohol-related disorders than it is for either one alone. Consequently, the risks to their health are also increased, as well as the likelihood that they’ll ever try to take their life. Everyday Health discussed the prevalence of mental illness among substance abusers, noting the results of one study showing over 21 percent of adults who had dealt with a depressive episode in the previous year had abused some substance, while only 8 percent of individuals without depression did. Per WebMD, up to 60 percent of persons diagnosed with bipolar disorder engage in substance abuse. According to one Psychiatric Times article, those diagnosed with generalized anxiety disorder carry a 25 to 30 percent rate of drug abuse and dependency. Get Help Now The National Institute on Drug Abuse reports that 20 percent of all admissions into drug and alcohol treatment programs in America in 2008 were for opiates, with heroin making up 14.1 percent of the total, and marijuana was responsible for 17 percent. These statistics prove you’re not alone. Currently, the most popular methods of medicated detox for opioid addicts are drug treatment therapies using methadone or buprenorphine. According to the California Society of Addiction Medicine, methadone boasts an impressive success rate at 60 to 90 percent. In one buprenorphine study, 196 of the 408 opioid addicts being treated with the drug had recovered successfully after one year’s time, with the majority continuing treatment and nine of them being tapered off the drug after remaining abstinent and cooperating with the program for six months, per Medscape. While buprenorphine’s success rate is lower, it may be more effective during treatment. The downfall of these medications seems to be the higher incidence of relapse after stopping the medication; for some, that means lifelong maintenance of their drug addiction, a choice they’re willing to make when faced with the alternative. Here at Axis, both our outpatient and inpatient therapy modules are geared for the successful remediation of drug addiction, along with the treatment of any present co-occurring conditions. Our world-renowned physicians and mental health care professionals work in tandem to treat your addiction in conjunction with effective remedies for your mental health diagnosis, such as cognitive behavioral therapy and motivational interviewing. We offer individual and group therapy options, providing you with the all the benefits of both. Call now to speak with our admissions staff about the treatment experience only we can give you. - Rx Marks the Spot
<urn:uuid:d6ff7891-00bc-4ddb-8bc7-89185b094a38>
CC-MAIN-2019-22
https://axisresidentialtreatment.com/drug-addiction/statistics/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256100.64/warc/CC-MAIN-20190520182057-20190520204057-00486.warc.gz
en
0.94883
3,440
2.9375
3
3.023694
3
Strong reasoning
Health
This appendix presents state-level mortality rates calculated from the United States Census mortality data for 1850 to 1900. The appendix includes a discussion of various issues involved in the calculation of the mortality rates for certain diseases, an examination of the accuracy and reliability of the census mortality data, and a listing of the data sources. For specific causes of death for nearly two dozen major infectious diseases, we present cause-specific mortality rates for the entire population for each disease for each census year for each state for which data exist. For all causes of death, we present mortality rates for the entire population as well as mortality rates for (1) four age cohorts—adults (20 years and older), children/adolescents (5 to 19 years), young children (1 to 4 years), and infants (under 1 year), (2) two ethnicity cohorts (whites and blacks), and (3) two nativity cohorts (native born and foreign born) for each census year for each state for which data exist. The mortality rates are reported as rates of death per 10,000 people or per 10,000 of the relevant cohort (adults, children/adolescents, young children, for example). The cause-specific mortality rates for the major infectious diseases are presented in tables C.1 to C.11. The mortality rates for all causes of death for the entire population and for each of the eight cohorts are presented in tables C.12 to C.16. If no mortality rate is shown for a state for a specific disease, a particular cohort, or the population for a given census year then the census did not report deaths for that state for that category in that year. If a mortality rate of 0.00 is shown for a specific disease or a particular cohort for a particular state, that means the census reported deaths for that category for that state but reported that there were no deaths. The census reported deaths on the basis ethnicity (race) in all census years from 1850 to 1900 except 1860. As a result, no 1860 mortality rates by ethnicity are calculated. The mortality rates reported here for “blacks” for four of the census years (1850, 1870, 1880, and 1900) were calculated from “negro” deaths. For the other census year (1890), the reported “black” mortality rates were calculated from “colored” deaths, which included negroes, Chinese, Japanese, and civilized Indians; the 1890 census did not report separate mortality data for the various ethnic groups. The census reported deaths on the basis of nativity (native born and foreign born) in four census years (1850, 1870, 1890, and 1900). In 1850, the census nativity mortality data were reported for whites and “free colored” but not for slaves. As a result, native-born deaths included both native-born white and native-born “free colored” deaths, and foreign-born deaths included both foreign-born white and foreign-born “free colored” deaths. In 1860 and 1880, no census mortality data were reported on the basis of nativity. In 1870, the census reported nativity mortality data for the entire population (native born and foreign born population), which included whites and “colored.” In the 1890 and 1900 censuses, deaths on the basis of nativity were reported for whites only, identifying deaths as native-born white deaths and foreign-born white deaths. For 1850, the “malarial fever” mortality rates are calculated from the total deaths reported for bilious, congestive, intermittent, and remittent fevers. For 1860, the “malarial fever” mortality rates are calculated from the total deaths for intermittent and remittent fevers; no other malaria-symptomatic fevers were reported in 1860. For 1870, the “malarial fever” mortality rates are calculated from the total deaths for intermittent, remittent, and typho-malarial fevers; no other malaria-symptomatic fevers were reported in 1870. Beginning with 1880, the census included data on the number of deaths for malarial fever, and bilious, congestive, intermittent, and remittent fevers were identified as malarial fever (United States Bureau of the Census 1886, p. xxxv). Drake ([1850, 1854] 1964, p. 703) also lists bilious, congestive, intermittent, and remittent fevers, among other idiosyncratic names, as malarial fevers. For 1850 to 1870, the census reported deaths for cholera. For 1850 to 1900, the census also reported deaths for cholera infantum, a common name for cholera symptoms among infants and children, which also was called the “summer complaint” and found primarily in the middle Atlantic and South during the summer months and hot weather. For 1850, 1880, and 1900, the census also reported deaths for cholera morbus, a common name for nonepidemic cholera as well as simple cholera, a disease with cholera symptoms most common in hot climates at the close of summer or early autumn. As a result, the cholera mortality rates are reported in two alternative ways: (1) For all six census years, cholera (all variants) mortality rates are calculated for a particular census from the total deaths from all the types of cholera that were reported in that census. (2) The mortality rates for cholera, cholera infantum, and cholera morbus are reported separately for each census year for which the data were reported. The 1850 typhoid mortality rates are calculated from the total deaths reported as caused by “fever, typhoid” in Alabama, Connecticut, and South Carolina and from the total deaths reported (nearly certainly mistakenly) as caused by “fever, typhus” in all other states. For the 1860 to 1900 census, “fever, typhoid” was reported as a cause of death in all states. “Fever, typhus” was reported as a cause of death in all states (except Alabama, Connecticut, and South Carolina in 1850) in 1850, 1870, and 1880. The 1860 census (United States Bureau of the Census 1866, table 12, p. 215) presents a summary table of deaths in the United States for specific causes for 1850 and 1860 and lists “fever, typhoid” but not “fever, typhus.” Moreover, the number of deaths listed for “fever, typhoid” for 1850 correspond to the total number of deaths reported in the 1850 census for “fever, typhus” and “fever, typhoid” combined. The 1870 Census (United States Bureau of the Census 1872, p. xvii) presents a summary table of deaths in the United States for specific causes for 1850 to 1870, indicating there were barely two thousand “typhus” deaths during 1850 to 1870. The summary table also indicates there were nearly 55,000 “typhoid” deaths in 1850 to 1870, which correspond exactly to the total number of deaths reported in 1850 as caused by “fever, typhus” and “fever, typhoid” and reported in 1860 and 1870 as “fever, typhoid.” As a result, we surmise that the deaths reported as “fever, typhus” in 1850 were likely deaths caused by “fever, typhoid.” (The 1860 census, United States Bureau of the Census 1866, p. 239, also indicates that the deaths reported as caused by “typhoid” in 1860 likely included some deaths that were actually reported as caused by “typhus.”) Finally, the pneumonia mortality rates for 1850 are calculated from the total deaths reported for pneumonia and winter fever, a common name at the time for pneumonia. Deaths for winter fever were reported in 1850 only. Several issues have been raised about the accuracy and reliability of the 1850 to 1900 mortality data reported in the federal censuses (see Condran and Crimmins 1979). (1) There is underenumeration of deaths in the 1850 to 1900 censuses, at least in part because retrospective questions about deaths were asked; respondents are unlikely to accurately recall the past concerning deaths during an entire year preceding the census enumeration (the period of the report). (2) The census mortality data are for one year only and the 1850 to 1900 responses were collected at a time when there was much year to year variation in the leading causes of death, epidemic and infectious diseases. (3) The recollection of age-specific deaths appears to be much worse for infants and the aged, which appear to be especially underenumerated. (4) There are variations in the completeness and quality of the enumeration of deaths and populations across states and over time. While the quality of the mortality censuses appears to have improved over time, scholars consider the 1870 mortality census to be the least complete (especially in the South) and the 1880 mortality census the most complete of the six censuses (Fisher 1899; Condran and Crimmins 1979). (5) By 1900, essentially all of the northeastern portion of the nation had death registration systems, which record more deaths than the retrospective censuses. Massachusetts had a registration system during all of 1850 to 1900 with other eastern states adopting such systems throughout the second half of the nineteenth century; only minor parts of southern and western states had any registrations of deaths by 1900. As a measure of the gap between the census enumeration and deaths recorded in registration systems, we can use an 1880 census comparison between the two different measures of deaths for Massachusetts (exclusive of Boston). In 1880, the census enumeration of deaths for all ages was 79 percent of the Massachusetts registration of deaths; the census enumeration of infant deaths was only 68.5 percent of the Massachusetts registration of infant deaths (United States Bureau of the Census, 1886, table 52, p. 650). (6) Many diseases had not been scientifically identified during the early part of the 1850 to 1900 period, leading to possible misidentification in earlier censuses but more accurate identification in later censuses. And (7) respondents might not have accurately identified any particular disease as a cause of death. Condran and Crimmins (1979, p. 16) indicate that there is general agreement that overall mortality declined in the 1850 to 1900 period, as indicated in the census data. Yet they note that some suggest the decline began pre-1850 while others suggest that it began circa 1880. They recognize that the census mortality data show that overall infant deaths increased from 1850 to 1890 but suggest that the increase may not be real; it is likely due to the improving nature and greater completeness of the censuses later in the period. Condran and Crimmins (1979, p. 16) also recognize, though, that infant deaths likely did increase in some areas (urban areas, for example). They further note that infant deaths reported in the 1850 to 1890 censuses are not strictly comparable to those reported in 1900 because the 1900 census did not include stillborn deaths in infant deaths as was the case in the 1850 to 1890 censuses. Despite underreporting of deaths, especially for infants and the aged, the fact that diagnosis of diseases at the time was problematic, and other issues with the census mortality reports, what we are interested in is examining differences in death rates among various cohorts and across states (disease ecologies) for different diseases; we are not interested in the absolute level of mortality per se. We will have problems if there were systematic differences in the classification of diseases and the reporting of deaths across states in each census. We are not certain if there were such systematic differences, and even more troublesome, we do not believe the data would allow us to identify all such differences if they did exist. Is there evidence that different states reported, say malaria, or any specific infectious disease, differently or reported deaths differently in a given census? We are not sure if there is such evidence. Some scholars maintain that the relative level of mortality across states is reasonably accurate even if the absolute levels are not (Yasuba 1962); others, however, suggest there was large variation in the quality of the reports and completeness of enumeration from state to state (Condran and Crimmins 1979, pp. 10, 14). While the absolute values of some of the death data reported in the 1850 to 1900 censuses are underenumerated, viewed cautiously, we believe the mortality estimates in this appendix can shed light on how widespread certain infectious diseases were and their trends in the second half of the nineteenth century. In particular, the mortality rates do well at indicating the relative prevalence of various groups of infectious diseases (warm-weather fevers, upper respiratory diseases, gastrointestinal tract diseases, and intestinal parasites/worms) in the second half of the nineteenth century across various regions of the United States (Northeast, East North Central, and the South), and among most age cohorts and ethnicities (race or ancestral heritages). Moreover, the US Census mortality data are the only data available on a (approximately) uniform basis for the 1850 to 1900 period for causes of deaths for specific diseases for all states. The mortality and population data necessary to calculate the mortality rates are contained in United States Bureau of the Census (1854, 1855, 1864, 1866, 1872a, b, 1882, 1885, 1886, 1894, 1895, 1896, 1897, 1902a, b, c) and Historical Census Browser (University of Virginia Library). For 1850, the mortality data are from United States Bureau of the Census (1855, pt. 1, table 6; pt. 2, app., pp. 50–301). The 1850 population data are from United States Bureau of the Census (1854) and Historical Census Browser (University of Virginia Library). For 1860, the mortality data are from United States Bureau of the Census (1866, tables 1, 3, 4). The 1860 population data are from United States Bureau of the Census (1864, Recapitulation, pp. 592–97) and Historical Census Browser (University of Virginia Library). For 1870, the mortality data are from United States Bureau of the Census (1872b, tables 2, 5, 7, 9). The 1870 population data are from United States Bureau of the Census (1872a, table 1). For 1880, the mortality data are from United States Bureau of the Census (1885, app., tables 1, 2, 4; 1886, tables 13, 18, 57). The 1880 population data are from United States Bureau of the Census (1882, table 1). For 1890, the mortality data are from United States Bureau of the Census (1894, tables 1, 2, 5, 7; 1896, table 1). The 1890 population data are from United States Bureau of the Census (1895, table 9; 1897, table 2). For 1900, the mortality data are from United States Bureau of the Census (1902b, table 19; 1902c, tables 4, 8). The 1900 population data are from United States Bureau of the Census (1902a, table 2).
<urn:uuid:0c8ef73f-c2a7-4aab-ba94-9fa1eca6d7c3>
CC-MAIN-2021-49
https://covid-19.mitpress.mit.edu/pub/ck3xd8ee/release/1
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363327.64/warc/CC-MAIN-20211206224536-20211207014536-00465.warc.gz
en
0.951983
3,158
2.96875
3
3.013285
3
Strong reasoning
Health
Veterinary Therapies – Combining Therapies Should I be concerned about combining alternative treatments? The underlying philosophy of all alternative medical therapies is the 'holistic' approach, in which the patient is treated as a whole being rather than as a collection of organs and parts. The patient is treated as an individual rather than as a diagnosis, and the treatment is determined by the way that he or she is responding to illness. Once treatment has begun, it is necessary to observe and assess the patient's response, determine if the response is appropriate, and adjust the treatment if necessary. If multiple therapies are given to a patient at one time, it is impossible to know which treatment caused which response. The combination of treatments may have acted additively (each treatment worked without interfering with the other treatment), synergistically (the combination of treatments has produced a much greater effect than would be expected from an additive effect) or antagonistically (the treatments interfered with each other, canceling out some or all of their effects). Which forms of treatment can cause problems when combined? The alternative treatments most likely to act deeply on the body (initiating internal responses or reactions that can last for prolonged periods) are acupuncture, herbal medicine (including Traditional Chinese Medicine), and homeopathy. Therefore, combining these therapies is more likely to cause interactions that are less predictable. Properly qualified practitioners in these forms of alternative medicine have a sound understanding of how the treatments should be applied, whether a combination is appropriate, and how to assess the patient's response. In some circumstances, because of differences in anatomy and physiology, animals will react in a very different manner than humans. Therefore, when treating animals, acupuncture, herbal therapy or homeopathy should only be prescribed or combined under the advice of a properly trained veterinary professional to avoid interference between the various modalities and enhance the chances of a synergistic or additive reaction. Caution must always be used when combining these therapies with conventional treatments, including surgery. The use of steroids or anti-inflammatory drugs can mask symptoms of value in prescribing homeopathic remedies, herbs, and even acupuncture. The use of potent compounds such as antibiotics, corticosteroids, pungent ointments, and strong-smelling products such as camphor or tea tree oil may interfere with the action of some alternative medicines, especially homeopathy. Are there any treatments that may be combined safely? In general, Bach flower remedies, massage therapy, physical therapy, chiropractic, nutritional therapy, and some supplements may be safely combined with most other forms of conventional or alternative therapy. Usually, mild products such as slippery elm, green tea, psyllium husks, and aloe vera juice will not interfere with other treatments. "...prudent to determine how much each treatment is contributing individually to a patient's wellbeing." In some cases, it may be necessary or prudent to determine how much each treatment is contributing individually to a patient's wellbeing. In order to simplify these assessments, the different treatments should be given at different times or even on different days, allowing the patient's response to each treatment to be assessed. To summarize, combining alternative medical therapies, either with other alternative therapies or with more conventional treatments, may improve the patient's health or speed the healing of lesions. However, combined incorrectly, these same therapies have the potential to interfere with healing or cause serious health consequences. Veterinary practitioners trained in acupuncture, herbal therapy and homeopathy are the best sources of information on what conventional and alternative treatments will combine well and which ones should not be used together. Ideally one veterinary practitioner should assume the responsibility of coordinating the pet's treatments and care, in cooperation with the pet's owner or caregiver. This client information sheet is based on material written by: © Copyright 2009 Lifelearn Inc. Used and/or modified with permission under license.
<urn:uuid:fca94ef0-509e-4bee-af66-7a032e36bc9e>
CC-MAIN-2020-29
https://dutchforkanimalhospital.com/pet-health-resources/pet-health-articles/articles/?rid=695
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657142589.93/warc/CC-MAIN-20200713033803-20200713063803-00141.warc.gz
en
0.93109
784
2.640625
3
2.952441
3
Strong reasoning
Health
The Technology First team at element14 is proud to bring you an excerpt from the latest issue XVII - coming soon to you. Here's an Op-ed by Vandana Lokeshwar, Joseph Alderson as part of our editorial retrospective Open-source software, hardware and applications are undoubtedly some of the biggest ideas changing the electronic engineering industry. This democratisation of design and technology is inspiring a new generation of engineers – element14 team takes a closer look Open-source as a concept is not new and in computing terms has been around since the 1950s. Looking back at the early part of the 21st century, there is little doubt that the open-source movement has already gained an enormous amount of momentum across many areas of life and will radically impact our collective future. From the free software movement that spawned Linux to the all pervasive Arduino platform, which finds its way into almost every corner of electronic engineering, there has been a change in the attitudes of individual engineers and even global corporations towards open-source. Companies such as CircuitCo have taken the Arduino model of an open-source platform and applied it to high end ARM® Cortex™-A8 based Texas Instruments OMAP™ processors, ensuring that there is a whole spectrum of open-source support from 8-bit to 32-bit architectures. Other companies such as the US-based Digilent and Bulgarian Olimex have also embraced the open-source movement as a core aspect of their development kit and software range, producing Arduino footprint compatible boards such as the and OlimeXino. It is in 32-bit architectures that some of the most exciting developments are happening in the open-source movement. Embest element14 are now introducing an ARM® Cortex™-M based prototyping platform known as . By combining the familiar Arduino footprint with supporting hardware and software building blocks which have been developed by Embest element14, the COOKIE platform aims to make 32-bit architecture as accessible as 8-bit architecture. Like the Arduino platform, the Cookie platform can be programmed in C or C++ and is supported by Embest element14’s IDE, Flash programmer and debugger (CoIDE, CoFlash and CoLinkEx respectively). There is no doubt that the philosophies held by ARM and the open-source community are intertwined in some important aspects, though it can be difficult and daunting to break into a 32-bit architecture, especially compared with the easy and accessible IDEs so prevalent in 8-bit platforms. This is where the CooCox steps up to the plate, offering a set of embedded tools backed up by a strong community and open hardware under a Creative Commons BY-SA license which includes the schematic, bill of materials and PCB design files. From Schematic to Secrecy Other development platforms are also released as schematics, though the board layout itself is occasionally a closely guarded secret as companies put emphasis on the time and skill required to turn a schematic into a board layout. In spite of the auto-routers available in most CAD tools, it is often a human eye and human touch that are crucially important. This is why Arduino clones which rely on the Uno and Mega footprints are so popular: the idea that greater advances come from building on firm foundations rather than developing from scratch is one deeply ingrained in engineering. However, for many engineers there is an inherent need to protect certain aspects of a design and boards such as the Raspberry Pi which have an open-source background also contain proprietary features. It is in education that open-source hardware and software are often most widely embraced. Whether it is using gEDA for schematic simulation, or CooCox as an IDE, there is a vast constellation of tools available for teaching. With growing forums, from Stackoverflow and GitHub to our own element14 community, the support for open-source projects has never been as great or accessible, adding another dimension to open-source development. University courses are now frequently taught using boards such as the chipKIT Uno 32™ and commonly the original Arduino Uno, allowing students to take their first steps into Microchip’s PIC32MX or Atmel’s 8-bit ATmega328, though there is also increasing interest in teaching ARM 32-bit architectures. Affordable ARM®Cortex™- M series boards such as the Cookie, coupled with IDEs that are either free as trials from major manufacturers or completely open-source, have lowered the barrier to entry. A new generation of engineers inspired by the open-source movement is already emerging and with a whole universe of open-source IDEs, debuggers, programmers and development platforms to support them we are witnessing a hardware revolution akin to what Linux achieved for operating systems. Just as Android presents the sleek face of tens of thousands of hours of combined effort worldwide and has become by far the biggest smart phone operating system, the humble beginnings of hardware projects that we see on Hack a Day and element14 may one day lead to phenomenal global advances. Vandana Lokeshwar is Regional Technical development manager and Joseph Alderson is Technical Marketing engineer at element14
<urn:uuid:ca92430a-f439-4f28-85ac-4c701c057ce9>
CC-MAIN-2016-22
https://www.element14.com/community/community/news/blog/2012/10/24/the-source-of-the-revolution--open-source-hardware-is-hacking-education
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464051035374.76/warc/CC-MAIN-20160524005035-00113-ip-10-185-217-139.ec2.internal.warc.gz
en
0.953863
1,043
2.546875
3
2.906569
3
Strong reasoning
Science & Tech.
Statistics Definitions > Morisita Index What is the Morisita Index? The Morisita Index of Dispersion (or Morisita overlap index) is a measure of how similar or different two sets of data are. The index ranges from 0 (no similarity) to 1 (complete similarity). It can, however, give values larger or smaller than 1, which may lead to misleading interpretations. This is especially true for small samples (Chao et. al, 2006). How to find the Morisita Index It’s not common to find the Morisita index built into statistical software packages. - xi = number of times an item appears in sample 1. - yi = number of times an item appears in sample 2. - Dx and Dy = Simpson’s diversity index for samples 1 and 2. - S = number of unique items. The index has been criticized for being complicated to use and interpret. For example, researchers Gaden and Tuck (1996) attempted to use the index on their data and concluded that “…computation of the Morisita index is difficult and we find it impossible to conceptualize what we are actually measuring.” The index has been known to give two completely different sets of data an index of more than one, and two completely identical sets of data scores of less than one (Chao, 2006). Several authors have offered modifications in order to make the index more usable, including Krebs (1999) who converts it to a scale of -1 to +1. However, this easier scale comes with the drawback of many more steps to calculate the index (see: Bakus p.126). Bakus, G. (2007). Quantitative Analysis of Marine Biological Communities: Field Biology and Environment. John Wiley & Sons. Chao, A. et. al. (2006). Abundance-Based Similarity Indices and Their Estimation When There Are Unseen Species in Samples. Biometrics. 62, 361–371. Gaden, R & Tuck, K. (1995). Diversity of Small Moths in Borneo. In Tropical Rainforest Research — Current Issues. Springer Science & Business Media. Krebs, C. J. 1999. Ecological Methodology. 2nd ed. Benjamin Cummings Publishers. Morisita, M. (1959). “Measuring of the dispersion and analysis of distribution patterns”. Memoires of the Faculty of Science, Kyushu University, Series E. Biology. 2: 215–235. Morisita, M. (1962). “Iδ-Index, A Measure of Dispersion of Individuals”. Researches on Population Ecology, 4 (1), 1–7. Horn, H. S. (1966). Measurement of “Overlap” in comparative ecological studies. The American Naturalist” 100:419-424. Stephanie Glen. "Morisita Index" From StatisticsHowTo.com: Elementary Statistics for the rest of us! https://www.statisticshowto.com/morisita-index/ Need help with a homework or test question? With Chegg Study, you can get step-by-step solutions to your questions from an expert in the field. Your first 30 minutes with a Chegg tutor is free! Comments? Need to post a correction? Please post a comment on our Facebook page.
<urn:uuid:6f767b01-e85c-4f7e-948c-3fff3751d59a>
CC-MAIN-2021-43
https://www.statisticshowto.com/morisita-index/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585281.35/warc/CC-MAIN-20211019202148-20211019232148-00691.warc.gz
en
0.865431
726
3.265625
3
2.600188
3
Strong reasoning
Science & Tech.
This set of conservation biological control experiments data was collected as part of five field experiments investigating agricultural biological control techniques, particularly the effect of wild field margins on pests and predators. The study is part of the NERC Rural Economy and Land Use (RELU) programme. Despite the widespread concerns regarding the use of pesticides in food production and the availability of potentially viable biological pest control strategies in Integrated Pest Management (IPM) systems, the UK cereal crop production remains a bastion of pesticide use. This project aimed to understand further the reasons for this lack of adoption, using the control of summer cereal aphids as a case study. Reasons for this lack of adoption of biocontrol remain a complex interplay of both technical and economic problems. Economists highlight the potential path dependency of an industry to continue to employ a suboptimal technology, caused by past dynamics of adoption resulting in differential private cost structures of each technique. Further, risk aversion on the part of farmers regarding the perceived efficacy of a new technology may also limit up-take. This may be particularly important when IPM rests on portfolios of technologies and when little scientific understanding exists on the effect of portfolio and scale of adoption on overall efficacy. Faced with this, farmers will not adopt a socially superior IPM technology and there exists a clear need for public policy action. This action may take the form of minimising uncertainty through carefully designed research programs, government funding and dissemination of the results of large-scale research studies or direct public support for farm landscape and farm system changes that can promote biocontrol. This research looked at alternatives to the use of insecticides in arable agriculture and the difficulties facing producers in switching over to them. Two approaches were explored: habitat manipulations, to encourage predators and parasites, and using naturally occurring odours to manipulate predator distribution as model technologies. Scale and portfolio effects on biocontrol efficacy have been investigated in controlled and field scale experiments. Aim is to improve the way research and development of new products and techniques are carried out to help break the dependence on chemical pesticides. 'Semiochemical experiment data, 2005-2009 - RELU Re-bugging the system: promoting adoption of alternative pest management strategies in field crop systems' from this same research project are also available. In addition, socio-economic research has been used to help direct natural science research into the development and evaluation of a combination of habitat management and semiochemical push-pull strategies of appropriate scale and complementarity to yield viable, commercially attractive and sustainable alternatives to the use of insecticides in cereal crop agriculture. These socio-economic data are available through the UK Data Archive under study number 6960 (see online resources). Further information and documentation for this study may be found through the RELU Knowledge Portal and the project's ESRC funding award web page (see online resources). Publication date: 2013-07-26 Research funded by Economic and Social Research Council, Natural Environment Research Council and Biotechnology and Biological Sciences Research Council. Award Number: RES-224-25-0093 This data was collected as part of five field experiments, respectively aiming to: - determine whether floristically enhanced field margins improve levels of cereal aphid control by natural enemies and whether this varies with distance from the margin. - investigate the colonisation of cereal fields by pest natural enemies for fields withand without floristically enhanced wide field margins. - determine whether levels of biocontrol are influenced by landscape complexity and in particular the proportion of enhanced field margins. - determine whether abundance and distribution of flying natural enemies are influenced by landscape complexity and in particular the proportion of enhanced field margins. - investigate the spatial distribution of flying predators and their aphid prey in fields with flower rich margins. Full details of the five experiments and the data collection methodologies used can be found in the user guide, which is included in the data download package.
<urn:uuid:7b7fa336-98ec-4896-8583-c876603e1539>
CC-MAIN-2018-13
https://catalogue.ceh.ac.uk/documents/5e7b868b-890f-4246-b818-026ff19e60e2
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647519.62/warc/CC-MAIN-20180320170119-20180320190119-00128.warc.gz
en
0.893469
780
3.046875
3
3.098197
3
Strong reasoning
Science & Tech.
Worldwide users of plastic are leaving a negative impact on the oceans and wildlife all around the world. In this article, I will take you through plastic users analysis with Python which is a very simple task of data analysis for beginners. Plastic Users Analysis As this is a beginner level task based on data analysis with Python, so I will only use 3 Python libraries here. Pandas for data handling, NumPy for numerical calculations and Matplotlib for data visualization. Now let’s import all these libraries and get started with the task to analyse the plastic users with Python: I will analyse the plastics users based on how much a country uses plastic for the packaging of its food products. So the data I am using is based on food facts which can be easily downloaded from here. Now let’s import the data and move further with the task of Plastic users analysis with Python: Now before moving further let’s have a quick look at how our data looks like so that we could know what we are going to work with. I will use the pandas.head() method to look at the first 20 rows in the dataset: manufacturing_places packaging_tags 137 Canada plastic 397 china plastic 478 uk plastic 629 USA plastic 735 Crèmerie Soignon,Poitou-Charente,France plastic 771 Royaume-Uni plastique 964 United States plastic 967 États-Unis plastique 992 United States plastic 1001 United States plastic 1254 États-Unis plastique 1403 Mexico plastic 1438 Ravens Oak Dairy,Nantwich,Cheshire,England,Uni... plastic 1440 Thailand plastic 1519 Ireland plastique 1806 Moray,United Kingdom plastic 1897 Canada plastic 2075 Switzerland plastic 2079 Canada plastic 2223 Switzerland plastic Hopefully, this dataset does not contain any missing values. So we can move further to analyze the plastic users without any data preparation and cleaning. Now to analyze the worldwide plastics users let’s sort the countries according to their usage of plastic to pack food products: Australia 153 France 146 Allemagne 24 Belgique 22 Germany 14 Italie 12 Italy 10 United Kingdom 9 Union Européenne 9 United States 9 Name: manufacturing_places, dtype: int64 The output shows that Australia is the biggest user of plastic. To get more detailed insights, let’s prepare the data and visualize it in the form of a bar plot by using the matplotlib library in Python. I will also annotate the graph that will highlight the biggest user of plastic by using an arrow. Let’s see how to visualize the bar plot with a text annotation: So this is how to analyze such data with a text annotation by using the Python programming language. I hope you liked this article on Plastic users analysis with Python. Feel free to ask your valuable questions in the comments section below.
<urn:uuid:b1c115c2-bafd-421a-a8f4-5d1a0f68b663>
CC-MAIN-2021-39
https://thecleverprogrammer.com/2020/11/09/plastic-users-analysis-with-python/
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780061350.42/warc/CC-MAIN-20210929004757-20210929034757-00719.warc.gz
en
0.80807
610
2.921875
3
1.966579
2
Moderate reasoning
Software Dev.
UK plastic waste is being sent out to Turkey and afterward unlawfully unloaded and consumed, as per a report. Greenpeace said about 40% – or 210,000 tons – of the UK’s plastic waste fares were shipped off Turkey a year ago. than being reused, agents saw some of it unloaded by streets, in fields and in streams. The UK is in handling plastic contamination”, the public authority said – after Greenpeace called for it for” the issue. Greenpeace’s report cautioned Turkey was turning into Europe’s “biggest plastic waste dump”. The cause said it southern Turkey sacks and bundling from UK grocery stores and retailers at all of them. Bundling for a Covid antigen test was likewise found, showing the waste was not exactly a year old, the report said. Where the UK’s reusing truly goes The UK creates more plastic waste some other the US, the report added. Turkey, Malaysia and Poland got the biggest measures of plastic waste fares from the UK in 2020. A year ago, the unloading of plastic waste in Turkey was the subject . Journalist Angus plastic bundling left by the side of the road. media captionThe UK sends more plastic waste to Turkey than to some other country, yet not every last bit of it gets reused Turkey got almost 40% of the UK’s plastic waste fares in 2020 – an expansion by 18 since 2016, when 12,000 tons were sent. European Union part multiple times more plastic waste to Turkey a year 2016. Nihan Temiz Atas, biodiversity projects lead from Greenpeace Turkey, said: “Around 241 loads of plastic waste come to across Europe and it overpowers us. “To the we can see from the information and the field, we keep on being Europe’s biggest plastic waste dump.” Nina Schrank, senior plastics campaigner at Greenpeace UK, said the essence of overproduction, and encouraged the public authority to boycott plastic waste fares plastic by half by 2025. The UK’s Department for Environment, Food and Rural Affairs said: “We are certain that the UK should deal with a greater of its loss at home, and that is the reason we are focused on prohibiting the fare of plastic waste to cinching down fares – including Turkey – through harder controls. “The UK is in handling regarding bundling, a plastic bundling duty waste following will support reusing and ” recyclable waste homegrown landfill and can assist regions targets. A year ago, Malaysia’s said the public authority had sent back 150 steel trailers of unlawfully imported plastic waste to beginning – 42 of which had a place with the UK. Yeo Bee Yin said the move was South East Asia country didn’t turn into “the landfill of the world”.
<urn:uuid:2986932f-1d4e-4692-871c-0a1f175d9261>
CC-MAIN-2021-39
https://theubj.com/science/11771/uk-plastic-waste-being-unloaded-and-consumed-in-turkey-says-greenpeace/
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057580.39/warc/CC-MAIN-20210924201616-20210924231616-00050.warc.gz
en
0.946383
597
2.546875
3
2.947481
3
Strong reasoning
Science & Tech.
Chapter 05 - Solid Waste Chapter 05 - Solid Waste As used in this chapter, the words in this section shall have the following meanings unless the context otherwise requires: (a) "Bins" means a receptacle capable of containing 3 or more cubic yards of solid waste and designed for mechanical handling. (b) "Business" means any individual proprietorship, partnership, corporation, association, joint venture or other project which carries on commercial or industrial activity for gain or profit, including but not limited to any motel, hotel or apartment, and cannery. (c) "Construction and demolition waste" means all soil, rock, construction debris, demolition debris and all similar materials generated by construction and demolition projects. (d) "Department" means the department of public works of the government. (e) "Director" means the director of public works. (f) "Disposal facilities" means all landfills, baling stations, transfer stations, recycling plants, composts, shredding stations and incinerators operated or regulated by the government. (g) "Executive secretary" means the executive secretary of the environmental quality commission of the government. (h) "Government" means the American Samoa Government. (i) "Hazardous waste" means a substance defined as hazardous waste under United States regulations, 40 CFR 261.3, and other United States laws and regulations. Hazardous waste is excluded from any other definitions of waste in this section for purposes of these rules and shall be handled, stored, disposed or otherwise processed solely in accordance with applicable federal and other territorial laws and rules or regulations. (j) “Incinerator” means any apparatus owned or regulated by the government where solid waste is treated by a method of burning. (k) “Industrial waste” means waste generated by industrial processes and manufacturing; (l) “Infectious waste” means all equipment, utensils of disposable nature used to treat patients with communicable disease, all laboratory wastes, all surgical room waste containing pathological specimens and similar matter. (m) “Institution” means any individual proprietorship, partnership, corporation, association, joint venture or other project which carries on nonprofit activities. (n) “Licensed collector” means and includes any person who has been licensed by the government to collect solid waste. (o) “Licensed operator” means any person who has been licensed by the government to operate disposal facilities. (p) “Motel, hotel or apartment” means an establishment which has 2 or more dwelling units and has been licensed by the government to provide lodging for hire. (q) “Owner” means the occupant of a dwelling unit or place of business or institution; provided, however, that if said dwelling unit or place of business or institution is rented to any such occupant, then the term “owner” means the person to whom the rent is payable. (r) “Person” means any individual, corporation, partnership, firm, association, trust estate, owner, business, institution, public agency, or political subdivision. (s) “Solid waste” means: (1) “garbage” which consists of putrescible animal and vegetable wastes and all organic wastes resulting from the handling, preparation, cooking, serving and consumption of food; (2) “rubbish” which consists of non-putrescible wastes and including such materials as paper, cardboard, yard trimmings, clothes, shoes, and non-combustible such as bottles; cans, china, glass, and any other material of similar character; and (3) “special waste” which consists of: (A) bulky wastes such as lumber, scrap iron pipes, tree branches over 2 inches in diameter, refrigerators, stoves, radios, television sets, phonographs, bedsteads, bed spring tables, sofas, chairs, water heaters, sinks and other similar materials or equipment of a weighty or bulky nature; and (B) mineral wastes such as slag, Tailings, rubble and other similar materials usually found around or resulting from mining, dredging or similar operations. (t) “Treasurer” means the treasurer of the government. (a) The department shall have charge of and shall administer the collection and disposal of solid waste. No solid waste shall be collected by the department or a licensed collector from any building or place when: (1) the owner thereof has made provision for solid waste collection by his own vehicles, except for solid waste prepared and placed in accordance with 25.0503; (2) the owner thereof has installed or provided the premises an incinerator or other solid waste disposal facilities which have been approved by the director of health and executive secretary as conforming to the provisions of law relating to nuisances and sanitary rules and in compliance with environmental rules established to achieve and maintain high levels of air, surface water and ground water qualities. (b) The director shall approve schedules and work hours for solid waste collection submitted by licensed collectors. The licensed collectors shall keep the public informed on the current schedule and work hours, and each licensed collector to whom they are applicable shall comply with them. The director shall make arrangements with licensed collectors and businesses to meet collection needs for special events, e.g. Flag Day and other holidays. (c) Any solid waste collected by the department or licensed collectors and accepted at government-operated disposal facilities shall become the property of the government. Upon closure of the disposal facility or any portion thereof, the solid waste at the disposal facility shall become the property of the landowner. (a) The department or a licensed collector will not collect (1) Any soil, rock, concrete, explosives, liquids, radioactive materials, construction and demolition solid waste, trees, branches, hedges and plant cuttings, leaves, palm and coconut branches, banana stalks, vines, weeds and other similar materials; (2) any solid waste not prepared for collection as provided by 25.0503; (3) any solid waste not placed for collection as provided by 25.0503; (4) any solid waste placed for collection in a place which is unsafe and hazardous or is likely to cause injury to the persons collecting said solid waste; (5) any solid waste from any business where the owner thereof shall have failed to pay the service charges hereinafter provided for; (6) any infectious waste, except as provided in 25.0506(d). (b) If a licensed collector does not collect solid waste for any of the reasons set forth in subsection (a), the licensed collector shall provide written notice of the reason for non-collection to the owner and submit a copy thereof to the director. (a) No unauthorized person shall: (1) remove or disturb any solid waste receptacle from the place where the same has been placed for collection. (2) collect, or haul away any solid waste receptacle from the place where the same has been placed for collection; (3) use bins on other solid waste containers for other than their intended use; (4) burn materials in any solid waste receptacle used for collection. (b) For purposes of this section, authorized persons shall mean: (1) an owner and his employees and agents; (2) department employees during authorized working hours; and (3) a licensed collector and his employees. (a) The department or a licensed operator shall accept the following solid waste at all of its disposal facilities: garbage and rubbish. (b) The department or a licensed operator shall accept the following types of solid wastes only at specified disposal facilities designated by the director and approved by the director of health and executive secretary: (1) special wastes; (2) industrial wastes; and (3) construction and demolition waste. (c) The department or a licensed operator shall not accept deliveries of any solid waste which are not made during hours of operation as posted at each facility. (d) All infectious wastes shall be disposed by incineration. If mechanical problems prohibit incineration, special arrangement should be made with the director to have the wastes buried in an isolated area at government operated disposal facilities. (a) Every owner of dead animals shall remove such animals, or cause the same to be removed, within a reasonable time after death, or before the same shall constitute a nuisance. (b) Any person other than the owner who has actual knowledge of a dead animal shall contact the director for the removal of such animal. (c) Dead animals weighing up to 70 pounds may be collected and disposed by a licensed collector, provided they are placed in an open area winch is accessible to the collector. Such animals will also be accepted at disposal facilities during operating hours. (d) Dead animals weighing over 70 pounds will be accepted at disposal facilities during operating hours. No person shall place special wastes upon or at any area authorized for placement of solid waste for collection under 25.0503(b), or upon any public street, road, highway or other public thoroughfare, or any part thereof, or upon or at disposal facilities which have not been designated by the director for the disposal of special wastes. No person shall dump or dispose of any solid waste upon any public or private premises, including any water course or drainage facility, except upon or at disposal facilities. The director shall establish and administer a comprehensive disposal facility site management plan for each disposal facility designated by the director of health. Each plan shall be provided to the licensed operator of the disposal facility to which it applies, and a public information program on its contents shall be conducted. No person shall engage in any business which involves the collecting of any solid waste from any building or premises other than his own solid waste without first obtaining a solid waste collection license as provided in 25.0522 and a business license as provided in 27.0201 ASCA et seq. (a) Application. Application for a solid waste collection license to engage in the business of solid waste collection shall be made to the director. The applicant shall state thereon his name and business address, the nature of materials to be collected, the manner in which and the location where the same shall be disposed. (b) Bond. Every applicant for a license shall execute and submit a security bond in favor of the government in the penal sum of $100,000, which bond shall be subject to all the conditions set forth in 25.0523, including the cost of collecting and disposing of solid waste by the government in case the licensed collector fails to collect and dispose of solid waste which the licensed collector has contracted to collect and dispose. The bond shall be issued by a security company authorized to do business in American Samoa. (c) Vehicular public liability and damage insurance. The applicant shall secure a standard automobile liability insurance policy covering the applicant, or any person driving vehicles to be operated by the applicant with his permission in the amount of $100,000 for bodily injury to or for the death of one person in any accident and in the amount of $300,000 for bodily injury to or for the death of two or more persons in anyone accident respectively, and property damage insurance in the amount of $50,000 in case of damage to or destruction of property of others in anyone accident. At the time of application, the applicant shall present evidence of such insurance to the director. (d) Comprehensive non-vehicular public liability insurance policy. The applicant shall secure a standard comprehensive non-vehicular public liability insurance policy covering the applicant and his employees and agents, which shall also include a rider covering the government, in the sum of $300,000. Such rider shall be in the form of an endorsement issued by the insurer. At the time of application, the applicant shall present evidence of such insurance to the director. (e) Term of licenses. A solid waste collection license shall be issued on a calendar year basis, regardless of when issued and expire on December 31 of the year issued or renewed. (f) License fee. The fee for an annual solid waste collection license shall be $100 payable in advance to the treasurer on or before January 1 of each year. The original fee shall be prorated in the amount of one-fourth of the annual fee for each quarter or portion of a quarter remaining in the year from the date of issuance. No license fee shall be refundable. Every solid waste collection license issued under this article shall be subject to the following conditions: (a) All vehicles used by the licensed collector for the collection of solid waste shall be so designed and constructed as to prevent the spilling and scattering of its contents upon the public streets. All such vehicles and equipment shall be kept in a clean, inoffensive and sanitary condition. The name of the licensed collector shall be visibly and clearly marked on the left side of all such vehicles in letters not less than 2 inches in height. Vehicles shall not be loaded in excess of the gross vehicle weight. (b) All solid waste shall be handled and transported by the licensed collector in such a manner as to prevent scattering, spilling or leaking of the same and to otherwise avoid committing a nuisance or violation of any law or rule of the government. The licensed collector shall immediately gather up and remove any solid wastes which the licensed collector or any of his employees has scattered, spilled or leaked. (c) All solid waste collected by the licensed collector shall be disposed of at a disposal facility designated by the director and approved by the director of health and the executive secretary. (d) All vehicles used by the licensed collector for the collection of solid waste and all drivers of such vehicles shall be licensed as provided by law. (e) The licensed collector shall not violate any provisions of this chapter or any law relating to the collection and disposal of solid waste within the territory. (a) No person shall operate or maintain a business or institution without arranging or providing for the collection of all solid waste therefrom. (b) Where the collection of solid waste is to be made by a licensed collector, the owner or occupant of the business or institution shall prepare and place solid waste for collection in the manner set forth in 25.0503. Every owner of a private or public dwelling shall prepare and place solid waste for collection by a 1,icensed collector in the manner set forth in 25.0503, unless such owner has made other provisions for solid waste collection or disposal in accordance with 25.0502. In the case of a private or public dwelling occupied by persons other than the owner, the occupant thereof may be made responsible for preparation and placement of refuse pursuant to this section in place o of the owner, if the owner and occupant have so agreed and the licensed collector is notified of this fact in writing. Such notice must be signed by both the owner and occupant. A licensed collector shall provide solid waste collection services to buildings of the government and the U.S. Government, including public schools, upon being requested to do so by the authorities responsible for such buildings. All solid waste hauled to disposal facilities by any person other than a licensed collector shall be handled and transported in such a manner as to prevent scattering, spilling or leaking of the same and to otherwise avoid committing a nuisance or violation of any law or rule of the government. Such person shall immediately gather up and remove any solid waste which such person or any of his employees or agents has scattered, spilled or leaked. (a) For the receipt and disposal of solid wastes delivered to disposal facilities, the following unit charges shall apply: (1) For garbage and rubbish, $1 per cubic yard or fraction thereof. The minimum charge per truckload shall be $3. (2) For derelict vehicles, $25 each to dispose in disposal facilities approved by the director. (3) For all other special wastes, industrial wastes, and construction and demolition wastes, in such amounts as are approved by the director. (b) Except when the licensed operator and licensed collector delivering wastes to a disposal facility owned or leased by the government are the same entity, licensed operators shall issue to each hauler, including licensed collectors of wastes, a written receipt which shall include the type and quantity of wastes received at the disposal facility and the amount of the disposal charges therefor to be paid to the treasurer and which shall be signed by both the licensed operator and hauler. Licensed operators shall weekly submit copies of all receipts to the treasurer, who shall monthly send invoices to the haulers for amounts shown on the receipts. There shall be a $ 25 charged to the landowner or occupant, payable to the licensed collector or director, for the collection or disposal of dead animals described in 25.0507 from nonpublic property. All fees and charges collected by the government under this chapter shall be deposited into an earmarked "solid waste collection fund." Any persons violating any provisions of this chapter is guilty of a class C misdemeanor under 25.0110 ASCA and may upon conviction be punished by a fine not exceeding $300 or imprisonment for a period not exceeding 15 days, or both. (a) If a licensed collector; has been convicted, under 25.0110AsCA, the director shall have the power to suspend, for any part of the remaining term of the license, or revoke the solid waste collection license issued to the licensed collector. Suspension and revocation proceedings shall be conducted in compliance with the Administrative Procedure Act, 4.1001 ASCA et seq. (b) No solid waste collection license shall be issued to any person whose license has been revoked pursuant to subsection (a) for a period of 2 years after the date of revocation.
<urn:uuid:258b7fe6-f67a-4d77-ab62-3d5f835fae60>
CC-MAIN-2016-36
http://www.asbar.org/index.php?option=com_content&view=category&id=891&Itemid=294
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982292330.57/warc/CC-MAIN-20160823195812-00082-ip-10-153-172-175.ec2.internal.warc.gz
en
0.939773
3,672
2.71875
3
2.011585
2
Moderate reasoning
Crime & Law
SHRIYA YENDLURI, 4, offers a yellow daisylike flower to a visitor at the garden in the North Bay Children's Center. When the flower is accepted, the little girl explains: "It's edible." It's a typical day at the center's 8,000-square-foot Garden of Eatin' in Novato, a nine-year-old experiment in nutrition education and healthy families — not to mention kale, carrots, cabbage, radishes, beets, parsley, sage, rosemary and thyme (well, maybe not the last four). The program has caught the eye of researchers at the University of California at San Francisco, who will be studying its methods for the next four months. "(The children) are actively involved in planting, maintaining and harvesting the crops," said Claudia Chaufan, an assistant professor of health policy and social medicine at UCSF's Institute for Health and Aging. "The vegetables they grow are served at breaks and school meals. We want to find out if these learned habits practiced at school impact practices at home among children and their families." The study will analyze and document what happens when children are educated on proper nutrition and play an active role in dietary decisions at home. Back at the garden, "anybody want some kale?" asks teacher Audrey Mingin. In a response likely to catapult many a parent into a state of shock, the group of about 30 children choruses, "yes!" As Mingin tears a leaf from a gigantic green kale bush, children cluster around eagerly. "Every Tuesday, children bring home fresh produce we get from the food bank," said Susan Gilmore, the center's executive director. "We print out recipes in Spanish and English. The children are training their parents in healthy eating." The Garden of Eatin' isn't the only such fresh-produce program in Marin schools. "The greater majority of our schools have them (gardens)," said Miguel Villarreal, food and nutrition director for Novato Unified School District. As with the Garden of Eatin', Villarreal said, the children plant and cultivate the vegetables. "Loma Verde and Olive elementary schools are two of the most active," he said. Also, schools in the Sausalito Marin City School District have gardens as well as classroom cooking programs, and schools throughout Marin have been encouraging gardens and gardening among students. In the case of the Garden of Eatin', the program started in 2004 at the children's center, which provides full-day child care for infants, toddlers and preschool children and before- and after-school care for school-age kids. The center was founded in 1986 and has six campuses, the main one being in Novato at the former Hamilton Air Force base. "In 2004, I read a report about the childhood obesity epidemic. It said today's children are on track to have shorter life spans than their parents because of preventable diseases caused by poor eating habits and inactivity," Gilmore said. "I realized at the time that we were part of the problem. We provide breakfast, lunch and snacks for the children that are funded by the state, and we were using canned goods," she said. "So we set out to overhaul our meal program and created an age-appropriate nutrition program integrated into our curriculum at all six sites." Now the center, which serves a total of 340 children at its six facilities, uses fruits and vegetables from the garden, the Marin Food Bank and other sources. These practices drew the attention of UCSF's Chaufan and her fellow researchers. The assistant professor was studying Type 2 diabetes and the obesity epidemic when she learned about the garden, and decided to augment her study with the results being achieved at the campus. Chaufan and her fellow researchers will interview parents as well as many of the center's 72 workers and observe in the classrooms. They will take baseline measurements, recording the diets of new students at the center and monitoring their shopping habits over time. "They're looking into whether their food choices change, things like how many times a week you have broccoli, how many times a week do you sit down as a family for dinner," Gilmore said. Outside at the garden, nutrition educator Patty Sherwood looks on as Sinead Ferrell-Bell, 5, and Liam Bonifas, 5, both of Novato, plant peas. Though they're having fun planting, as far as consumption is concerned, carrots are big with this crew. Not only Sinead and Liam name the skinny orange root vegetables their favorites, but Ryan Markrack, 5, of Novato — clearly a leader in the group with his backward blue and green cap and red baseball jersey — says, "I love to pick carrots." According to Gilmore, youngsters like Sinead, Liam and Ryan are educating their folks in nutrition. "They are the ones in the shopping cart," Gilmore said. "One grandparent told us her youngster kept saying, 'bracca, bracca.' She thought he was saying, 'grandma, grandma,' but he really wanted broccoli. He was used to fresh broccoli in the garden, and when she bought frozen broccoli with cheese sauce, he wanted nothing to do with it." Gilmore hopes the UCSF study will verify this kind of anecdotal evidence. "By partnering with UCSF, we will be able to develop metrics and measurements to quantify our results," she said. Meanwhile, the 4-year-old Shriya continues to hand out the yellow flowers, which, it turns out, are calendula, according to program manager Lori Kemmer, and are, indeed, edible — another lesson from one of the children of the Garden of Eatin'.
<urn:uuid:8ca71534-1950-4c66-b513-107e1d8f3de5>
CC-MAIN-2014-35
http://www.marinij.com/novato/ci_22955521/novato-childrens-veggie-garden-sparks-ucsf-study
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500811391.43/warc/CC-MAIN-20140820021331-00282-ip-10-180-136-8.ec2.internal.warc.gz
en
0.969462
1,176
2.890625
3
2.860625
3
Strong reasoning
Health
Islam states that men and women are totally equal in their humanity, basic human responsibilities and rights. This was a concept that was radically new to the world, as compared to the other civilizations at the time of the inception of the Islamic Message through the Prophet Muhammad (s), and remains so for many people of the globe until today. Islam also states that men and women have complimentary roles and obligations in society, which are commensurate with their natural physical, psychological and social differences. Demands for women's rights Islam spread its light through the revealed scriptures of the Book of Allah, the Qur’an, and the inspired traditions of the Sunnah (Way) of the Prophet ﷺ Muhammad which are the undisputed basis of the Islamic law. The Islamic teachings and system of law had a profound impact on the lives of the followers of Islam, and consequently, this impact affected the societies in the lands where Muslims traveled and settled.Read more + Status of women throughout the ages Women suffered great injustices in the pagan Arab society and were exposed to diverse kinds of humiliation prior to the mission of the Messenger of Allah (s). They were treated like material property to be disposed of at the whim of the male guardian. They were not entitled to inherit from their parents or husbands.Read more + Women as kinfolk and neighborsThe same general rights are legislated in Islamic jurisprudence for women as are required for men. A concern for the general public welfare and mutual support of one another is a trademark of the Islamic social system. The Prophet (s) said: “The similitude of the believers in their mutual care, love and kindness to one another is like one human body. If one organ aches, this prompts the entire body to be feverish and remain awake.” [Muslim] Read more + It is a great injustice to accuse Islam of wrongdoing and oppression to women when there are many statements of the revealed book of Allah, the Qur’an, and of the teachings of the Prophet ﷺ which negate and disprove this false slander. Allah, the Exalted, says:“O Mankind! We have created you from male and female and made you peoples and tribes that you may know one another. Indeed, the most noble of you in the sight of Allah is the most righteous of you. Indeed, Allah is Knowing and Acquainted.” [49:13] In the Islamic scriptures, there are many eloquent expressions of not only the woman’s equality with man, but even her superiority at times, and the special relationship and bond between man and woman. The male and female are in need of each other in a way similar to how the naked body of the human stands in need of clothes to face his natural and social environment.
<urn:uuid:0e68fa1f-0fd5-4ebe-b67a-fa55915b0b0a>
CC-MAIN-2018-51
http://womeninislam.ws/en/
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824912.16/warc/CC-MAIN-20181213145807-20181213171307-00069.warc.gz
en
0.971534
573
3.4375
3
2.916322
3
Strong reasoning
Religion
Staying warm in the winter is hard. Chickadees eat constantly in order to survive long, cold winter nights. Squirrels spend precious time and energy creating complex insulated nests. Deer browse on nutrient-poor twigs to get as many calories out of their surroundings as possible. Yet compared to fish and other aquatic organisms, terrestrial wildlife breathe easy – literally. As fish battle the cold through the long winter, they are steadily running out of oxygen. Life underwater would be impossible without a unique characteristic of water: its solid form is less dense than its liquid form. In other words, ice floats. As air temperatures plummet in the fall, ice forms on the tops of lakes and ponds and stays there. In deep lakes, the temperature under the ice remains above freezing and allows fish and other aquatic organisms to remain active. However, the same ceiling of ice that allows aquatic life to persist causes one of the main problems for fish in winter. When fish respire through their gills, they absorb oxygen that has been dissolved into the water through two main mechanisms. Aquatic plants produce oxygen during photosynthesis, and waves and currents mix oxygen from the air with surface water. When the surface of the water is frozen in place, both mechanisms stall. Most fish cope with the low oxygen levels and cold temperatures by slowing down. The less they swim, eat and breathe, the less oxygen they need. Some fish go so far as to burrow into the lake bottom and reduce their metabolisms so that they go into diapause, a state of suspended development. Other fish migrate toward areas with more oxygen, like inlets or the upper regions of the water column. Despite these behavioral and evolutionary adaptations, low oxygen levels are one of the main causes of winter mortality in Vermont’s fish. Different fish species are more and less susceptible to winterkill. Despite being considered a coldwater fish, trout populations can be decimated when oxygen levels drop too far. Other groups of fish like mud minnows and fathead minnows rarely succumb to mass die-offs. Species popular to ice fishermen, like northern pike and perch, generally are moderately tolerant of low oxygen. Winterkill is fairly common during long cold winters. When the ice melts, winterkilled fish provide a boon of nutrients to scavengers, such as bald eagles and river otters. Fish populations usually rebound within a few years. However, for fish populations already stressed by invasive species, overfishing or low population levels, winterkill can be catastrophic. Most importantly, lakes that suffer from nutrient-loading are most susceptible to winterkills. During winter the overabundant algae and aquatic plants in these eutrophic lakes decompose and use precious oxygen. This causes oxygen levels in these lakes to decrease to dangerous levels long before the ice melts. So the next time a harsh wind blows in from the north and sends a chill down your back, or when you resort to heroic measures to regain feeling in your fingers or toes, take a deep breath of that cold oxygen-rich air. You have it good. Claire Polfus is a second-year ecological planner who is very happy with the plentiful oxygen in the winter air, especially when she is struggling up a steep hill on her skinny skis.
<urn:uuid:1207c880-25f0-4840-9f8d-727692b14dab>
CC-MAIN-2017-39
http://blog.uvm.edu/fntrlst/2013/02/24/trapped-under-the-ice/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687740.4/warc/CC-MAIN-20170921101029-20170921121029-00209.warc.gz
en
0.942936
668
4.0625
4
2.661374
3
Strong reasoning
Science & Tech.
Sleep is controlled by the brain and is essential for human life. Impaired sleep can adversely affect every organ in the body. Obstructive sleep apnoea is a common breathing disorder characterised by narrowing and closure of the upper airway during sleep, leading to reduced oxygen levels and disrupted sleep. Untreated sleep apnoea is associated with major co-morbidities, including neurocognitive impairment and increased risk for cardiovascular disease. In addition to more broad sleep physiology interests, the key focus of our sleep research program at NeuRA is to investigate the multiple pathogenic causes of sleep apnoea and to develop and test novel, targeted therapeutic approaches for individual patients. We run a comprehensive basic sciences and translational research program in our world class sleep research facilities here at NeuRA. We utilise a variety of neurophysiological techniques to study human upper airway muscle function and airway mechanics during wakefulness and sleep and other key mechanisms contributing to sleep apnoea. We also conduct clinical trials to test the utility of new targeted treatments for patients with sleep apnoea. Click below to access Dr Danny Eckert's research papers: ORCID ID: 0000-0003-3503-2363 Approximately 5% of adults report using sleeping pills to promote sleep with higher rates in the elderly. We are conducting several NHMRC-funded studies in healthy individuals and patients with sleep apnoea to examine the effects of common sleeping pills on the upper airway muscles and breathing during sleep. While some sleeping pills may make sleep apnoea worse, others may actually be beneficial for certain patients. We are undertaking mechanistic upper airway physiology and clinical studies to provide insight into these seemingly paradoxical effects. The use of opioid medications in our community is quite common and can cause serious breathing problems, particularly during sleep. The goal of this NHMRC-funded project is to investigate the effects of opioids on upper airway muscle activity, respiratory control, and breathing during sleep in patients with obstructive sleep apnoea. These studies will help us to understand reasons why breathing responses to opioids vary between individuals and which sleep apnoea patients are most at risk of developing breathing complications during sleep. There are important protective reflexes in the human upper airway that help keep the airway open when suction pressures (as occurs in sleep apnoea) are present. We are conducting research to understand how these important reflexes in the upper airway including the tongue and surrounding muscles function to gain insight into the causes of obstructive sleep apnoea. While continuous positive airway pressure (CPAP) is highly effective in treating sleep apnoea (See: What is obstructive sleep apnoea?), approximately 50% of patients are intolerant or non-adherent. Responses to alternative therapies are variable and are currently difficult to predict. We are undertaking research using a variety of novel physiological approaches to understand the key causes of sleep apnoea on a per patient basis. Using this approach our goals are to develop simple accurate tools to identify the varying causes of sleep apnoea, develop targeted novel therapies for individual patients, and to determine who is most likely to respond to existing non-CPAP therapies. Associate Professor Danny Eckert has been actively involved in human sleep and respiratory physiology research since 2001. In 2006, he completed his PhD at the University of Adelaide, based at the Adelaide Institute for Sleep Health, investigating the effects of low oxygen levels on protective respiratory reflexes and sensory processing in humans during wakefulness and sleep. He was subsequently awarded the Thoracic Society of Australia and New Zealand Allen and Hanburys Respiratory Research Fellowship, followed by an NHMRC CJ Martin Fellowship to pursue postdoctoral studies. After three years of postdoctoral training at the Brigham and Women’s Hospital, Harvard Medical School, he was promoted to Faculty; first to Instructor in Medicine in 2009, and subsequently to Assistant Professor. After a highly productive five and a half years in the United States, in late 2011 Associate Professor Eckert returned to Australia to establish a sleep and respiratory physiology research program at NeuRA to continue his research investigating the causes of sleep apnoea and developing new treatments. He currently serves on the board of the Australasian Sleep Association and is Chair of the Research Committee.
<urn:uuid:45a07a9c-f77f-4a78-b5ae-a9dd2d8fe002>
CC-MAIN-2016-18
http://www.neura.edu.au/research/themes/eckert-group
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860109830.69/warc/CC-MAIN-20160428161509-00061-ip-10-239-7-51.ec2.internal.warc.gz
en
0.948743
897
2.875
3
2.981025
3
Strong reasoning
Health
© 1998 – Psychology Press This book is devoted to identifying the precursors of adolescents' health problems and risk taking behaviors and the developmental processes that accompany them. It presents data on lay conceptions of health and illness, physical maturity, causes of mortality and morbidity, and patterns of utilization of medical and psychosocial health care services. Developmental changes in risk perception, self-disclosure behavior, and in dealing with nudity are linked with doctor-patient communication to illustrate the typical obstacles health experts are faced with when trying to assess diagnostic information in this age group. Developmental barriers that hinder adolescents' compliance are highlighted and factors accounting for their aversion to counseling are reviewed. This book also presents findings on typical stressors occurring during adolescence and their effect on health status as well as factors mediating the effect of stress on health. Throughout, readers gain valuable insight into gender differences, physical and psychological symptoms, and help-seeking behaviors. Special attention is directed to deficits in coping behavior, social support, and network structure of distressed adolescents and the current state of research relative to coping with chronic illness in adolescence is reviewed. Implications of these findings for the development of intervention strategies or for improving the health care of chronically ill adolescents and particularly troubled adolescents are detailed. This volume will appeal to clinical and school psychologists, psychiatrists, physicians, counselors or other healthcare professionals working with adolescents as well as researchers in the field of adolescent health. It also serves as a text in graduate level courses on adolescent health, psychopathology, and developmental pediatrics. "…makes an important contribution to the literature in a number of different ways. First and foremost, it maintains a sustained focus on developmental considerations such that it becomes clear why adolescent health issues are likely to be different from children's health issues and different from adult health issues….A second strength…is the focus on important themes that transcend specific disorders. This can be clearly seen in the listing of the chapter titles….A third strength…is the attention given to methodological problems that plague research on adolescent health….It is heartening to have a well-crafted volume on adolescent health available, and perhaps this book will be the much-needed stimulus that promotes greater emphasis of this important topic in classes on either adolescent development, health psychology, or behavioral pediatrics." "The book is a useful compendium of research findings, is based largely on North American and German samples, and is geared mainly to the senior undergraduate student in the health sciences and health professionals working with adolescents." —Journal of Health Psychology Contents: Preface. Theoretical Perspectives on Health and Illness. Problems in Assessing Health-Related Information. Epidemiological Findings on Health Problems, Diseases, and Health-Risk Behavior. Dealing With the Body. The Links Between Stress and Health. Social Support and Coping Style as Risk and Protective Factors. The Challenge of Coping With Chronic Illness. Health Care-Seeking Behavior in Adolescence. Some Implications for Prevention, Intervention, and Future Research.
<urn:uuid:856b14c4-37f1-4b2e-b634-b48415a5dc5f>
CC-MAIN-2017-34
https://www.routledge.com/Adolescents-Health-A-Developmental-Perspective/Seiffge-Krenke/p/book/9780805818390
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886124662.41/warc/CC-MAIN-20170823225412-20170824005412-00039.warc.gz
en
0.93566
608
2.6875
3
3.062587
3
Strong reasoning
Health
Arabs (; Arabic: عَرَب ISO 233 ‘arab, Arabic pronunciation [ˈʕarab] ( listen)) are a population inhabiting the Arab world. They primarily live in the Arab states in Western Asia, North Africa, the Horn of Africa, and western Indian Ocean islands. They also form a significant diaspora, with Arab communities established around the world.The first mention of Arabs is from the mid-ninth century BCE as a tribal people in eastern and southern Syria, and the north of the Arabian Peninsula. The Arabs appear to have been under the vassalage of the Neo-Assyrian Empire (911–612 BCE), and the succeeding Neo-Babylonian (626–539 BCE), Achaemenid (539–332 BCE), Seleucid and Parthian empires. Arab tribes, most notably the Ghassanids and Lakhmids, begin to appear in the southern Syrian Desert from the mid 3rd century CE onward, during the mid to later stages of the Roman and Sasanian empires. Tradition holds that Arabs descend from Ishmael, the son of Abraham. The Arabian Desert is the birthplace of "Arab", as well other Arab groups that spread in the land and existed for millennia.Before the expansion of the Rashidun Caliphate (632–661), "Arab" referred to any of the largely nomadic and settled Semitic people from the Arabian Peninsula, Syrian Desert, North and Lower Mesopotamia. Today, "Arab" refers to a large number of people whose native regions form the Arab world due to the spread of Arabs and the Arabic language throughout the region during the early Muslim conquests of the 7th and 8th centuries and the subsequent Arabisation of indigenous populations. The Arabs forged the Rashidun (632–661), Umayyad (661–750), Abbasid (750–1517) and the Fatimid (901–1071) caliphates, whose borders reached southern France in the west, China in the east, Anatolia in the north, and the Sudan in the south. This was one of the largest land empires in history. In the early 20th century, the First World War signalled the end of the Ottoman Empire; which had ruled much of the Arab world since conquering the Mamluk Sultanate in 1517. This resulted in the defeat and dissolution of the empire and the partition of its territories, forming the modern Arab states. Following the adoption of the Alexandria Protocol in 1944, the Arab League was founded on 22 March 1945. The Charter of the Arab League endorsed the principle of an Arab homeland whilst respecting the individual sovereignty of its member states.Today, Arabs primarily inhabit the 22 Arab states within the Arab League: Algeria, Bahrain, Comoros, Djibouti, Egypt, Iraq, Jordan, Kuwait, Lebanon, Libya, Mauritania, Morocco, Oman, Palestine, Qatar, Saudi Arabia, Somalia, Sudan, Syria, Tunisia, United Arab Emirates and Yemen. The Arab world stretches around 13 million km2, from the Atlantic Ocean in the west to the Arabian Sea in the east, and from the Mediterranean Sea in the north to the Horn of Africa and the Indian Ocean in the southeast. Beyond the boundaries of the League of Arab States, Arabs can also be found in the global diaspora. The ties that bind Arabs are ethnic, linguistic, cultural, historical, identical, nationalist, geographical and political. The Arabs have their own customs, language, architecture, art, literature, music, dance, media, cuisine, dress, society, sports and mythology. The total number of Arabs are an estimated 450 million.Arabs are a diverse group in terms of religious affiliations and practices. In the pre-Islamic era, most Arabs followed polytheistic religions. Some tribes had adopted Christianity or Judaism, and a few individuals, the hanifs, apparently observed monotheism. Today, about 93% of Arabs are adherents of Islam, and there are sizable Christian minorities. Arab Muslims primarily belong to the Sunni, Shiite, Ibadi, and Alawite denominations. Arab Christians generally follow one of the Eastern Christian Churches, such as the Greek Orthodox or Greek Catholic churches. Other smaller minority religions are also followed, such as the Bahá'í Faith and Druze. Arabs have greatly influenced and contributed to diverse fields, notably the arts and architecture, language, philosophy, mythology, ethics, literature, politics, business, music, dance, cinema, medicine, science and technology in the ancient and modern history. Arab people are generally known for their generosity and hospitality as well as their beliefs and family values. View More On Wikipedia.org
<urn:uuid:8d623c85-2764-487f-ac61-2d4d7ef62013>
CC-MAIN-2019-26
https://nirjonmela.com/tags/arabian/
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999539.60/warc/CC-MAIN-20190624130856-20190624152856-00420.warc.gz
en
0.930662
962
3.453125
3
2.719028
3
Strong reasoning
History
Almost all screens we have seen on our devices, from mobile phones to computer screens have utilized liquid crystal display technology. Liquid crystals are a chemical solution in a state of mater in which it behaves like a liquid, but its molecules are arranged in a crystalline manner. Liquid crystals exist in nature but as some very clever people found out, by squeezing certain LC’s between sheets of polarizing material and modulating its flux with an electromagnetic field, you can force the LC into what we now know as pixels. Behind the screens. While it may have said “LED” on the side of your TV box, this is not a reference to pixels, but its source of illumination. LCD panels do not emit light themselves and need a light source shining through them. The panel that is responsible for sharpness, colors, and smoothness of motion in your modern LED TV is still a form of liquid crystal. Flat-screen televisions of old used cathode fluorescent tubes to backlight the LCD panel. This combination has worked well and has seen LCD/LED combinations become the dominant form of screen. Plasma televisions tried and failed due to problems with heat, burn-in, and weight. By the time plasma technology had matured, and these problems were solved, it was too late; sadly, this still didn’t save plasma technology from falling into obscurity. LCD televisions are light, slim, and are capable of producing stunning images. So, what is OLED? Another form of backlight? Unlike LCD that needs a backlight, OLED TVs are fundamentally different from all other screens. OLED stands for “Organic Light Emitting Diode,” and the difference is in that name. Unlike the pixels in an LCD screen that need a light shining through them, the pixels in an OLED display emit their own light. At the time of writing, only LG can manufacture this type of screen and the difference in price to a regular LCD screen can be confronting. So we know that the pixels in an LG OLED TV are different, but how does this translate into a superior viewing experience? Can this technology perform better than the tried and tested combination of liquid crystal pixels and LED backlights? Because each pixel in an OLED can change brightness, one pixel can be completely off (black) while the adjacent pixel can be as bright as possible. This contrast proximity is impossible in an LCD panel and as a result, OLED screens possess far superior black levels and more importantly, contrast ratio. Contrast ratio is the fundamental measure of picture quality; it is the difference your TV can display between bright and dark. A screen with a low contrast ratio will look flat and dull, while a high contrast ratio will give you a more realistic, more in-depth picture. It cannot be overstated that OLED completely blows LCD away in terms of picture quality. Win, lose, or draw. While OLED may have LCD beat in terms of picture quality, there are other factors that we must consider when deciding which technology is superior. In other metrics of screen performance, LCD and OLED are neck and neck. Response rate (the screens ability to refresh its self per second) differs from screen to screen, but comparting top-level displays, neither OLED or LCD have the advantage, and it’s the same story with resolution. LCD screens are capable of being brighter, but this can affect your contrast ratio. They can also be built much cheaper and as a result, come in larger sizes than the OLED. So, an LCD can be bigger, brighter, and cheaper but can’t offer the same rich colors and depth of an OLED, so which is the superior technology? Only you can answer that question. If you are on a budget and want a small bedroom TV, LG’s range of impressive screens will be useless to you. If you want the biggest TV possible, then you will need to stick to LCD. Because LCD has been around for so long, it has had time to mature and become reliable. Even those chasing a TV with stunning picture quality will still be satisfied by a top range LCD. With more variety and brands to choose from, in many ways, LCD remains the superior technology. When it comes to raw picture quality, OLED is leagues ahead of any other technology. Once you have experienced the difference, there is no doubt OLED is superior, but it comes at a hefty price, one that not many are comfortable with paying. For now attest, LCD technology offers much better value and is accessible by more people. The future of OLED looks bright, if you’ll excuse the pun, and hopefully in the coming months we see a new batch of OLED TVs and a drop in price so that more of us may experience this new technology in our homes.
<urn:uuid:fd97ee84-cd4b-465e-a643-145cc3934970>
CC-MAIN-2019-51
https://www.newlywedsonabudget.com/2019/09/what-is-an-oled-tv-and-is-it-superior-to-led/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540510336.29/warc/CC-MAIN-20191208122818-20191208150818-00330.warc.gz
en
0.957709
974
2.734375
3
2.720769
3
Strong reasoning
Hardware
The immune system depends on both macro and micro (different) nutrients for proper functioning. These nutrients cannot be sourced from a single food rather by consuming a variety of healthy foods. A healthy diet will, therefore, strengthen the immune system and enable it to play its role of defending the body against diseases and fighting infections. Examples of these macronutrients and micronutrients include; proteins, vitamins A, B6, B12, C and D, copper, folate, iron, selenium and zinc, omega 3 and omega 6 fatty acids, etc. Variety is the spice of life… right? To obtain these nutrients, food selection should be done from different food groups; these include: 1. Cereals and Grains: The foods in this group include rice, wheat, bread, pasta, hungry rice (acha), sorghum and others. 2. Roots and Tubers: Examples include yam, cassava, garri, fufu, plantain, alibo and others 3. Legumes and Nuts: Examples include beans, Bambara nut, (okpa), African yam bean (Azam or Ijiriji or Ozaki), soybeans, walnut, cashew nut, groundnut and others. 4. Meat, poultry and fish: Examples include beef, chicken, egg, fish and meat. 5. Milk and Milk products: Examples include milk, yoghurt, cheese, fura, and other milk products. 6. Fruits: Examples include banana, avocado pear, mango, watermelon, pawpaw, orange, apple, African star apple (udara or agbalumo), Velvet Tamarind (Icheku, Awin/Tsamiyar Kurm) and many more. Consume fruits at least 2 servings daily. 7. Vegetables: Examples include all leaves we use in cooking our meals, carrot, garden egg, cucumber, green beans, onions and many others. Consume at least 3 servings of vegetables daily for micronutrient supply (vitamins and minerals). 8. Water: Drink clean uncontaminated water at least 3 litres a day (that is about 6 sachets of water). Do not wait until you are thirsty. 12 Key Advice for Nutrition in COVID-19 - No diet can prevent or cure COVID-19 at present. An adequate diet will help support the body’s immune system. - An adequate diet is obtained from a combination of different foods from which we derive the nutrients that are required for the optimum functioning of the immune system. - Single food items are not adequate in all nutrients. - No diet, single food or supplement can boost your immunity. - No supplement is currently approved by the Food & Drug Administration (FDA) to prevent or cure COVID-19. - Wash properly and snack on fruits and vegetables especially coloured fruits in season. - Drink at least 3 litres of water daily (about 6 sachets of “pure water” per day). Do not wait till you are thirsty. - Do not engage in panic buying. Store essential and non-perishable food items. You can get some air-tight containers for this. - Disinfect cooking area surfaces, clean and cook food properly. Separate cutting boards for raw and cooked foods (important). - Sanitize and wash your hands regularly, sneeze or cough into your elbow, maintain social distance and stay at home. - Consult a Registered Dietitian-Nutritionist (RDN) for expert dietary advice. You can reach out to us at www.diet234.com to book an online appointment. - Get medical information, COVID-19 updates and media resources from authorized channels only via the Nigeria Center for Disease Control (NCDC) minisite, Ministry of Health (MOH) and World Health Organisation (WHO).
<urn:uuid:a5ede25c-9770-4036-87bd-141eebfac401>
CC-MAIN-2020-34
https://diet234.com/covid-19-nutrition-advice-general-public/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738723.55/warc/CC-MAIN-20200810235513-20200811025513-00585.warc.gz
en
0.880384
813
3.640625
4
1.616733
2
Moderate reasoning
Health
One of these following facts about Upton Sinclair might probably give you much information about him. Upton Sinclair was an American author who wrote close to one hundred books in many genres. He achieved popularity in the first half of the twentieth century, acquiring fame for his classic muckraking novel, “The Jungle” (1906). It exposed conditions in the U.S. meat packing industry, causing a public uproar that contributed in part to the passage a few months later of the 1906 Pure Food and Drug Act and the Meat Inspection Act. To get to know more about him, here are some other facts about Upton Sinclair you might want to know. Facts about Upton Sinclair 1: Career In 1904, Sinclair spent seven weeks in disguise, working undercover in Chicago’s meatpacking plants to research his political fiction expose, “The Jungle”. When it was published two years later, it became a bestseller. Facts about Upton Sinclair 2: Helicon Home Colony With the income from “The Jungle”, Sinclair founded the utopian Helicon Home Colony in Englewood, New Jersey. He ran as a Socialist candidate for Congress. The colony burned down under suspicious circumstances within a year. Facts about Upton Sinclair 3: Political Career In the 1920s the Sinclairs moved to Monrovia, California, near Los Angeles, where Sinclair founded the state’s chapter of the American Civil Liberties Union (ACLU). Wanting to pursue politics, he twice ran unsuccessfully for United States Congress on the Socialist ticket: in 1920 for the House of Representatives and in 1922 for the Senate. Facts about Upton Sinclair 4: Marriage In 1902, Sinclair married Meta Fuller, who had been a childhood friend and whose family was one of the First Families of Virginia. The couple had a child named David, born on December 1, 1901. Around 1911, Meta left Sinclair for the poet Harry Kemp, later known as the Dunes Poet of Provincetown, Massachusetts. Facts about Upton Sinclair 5: Second Wife In 1913, Sinclair married Mary Craig Kimbrough, a woman from an elite Greenwood, Mississippi, family who had written articles and a book on Winnie Davis, the daughter of Confederate States of America President Jefferson Davis. In the 1920s, they moved to California. They were married until her death in 1961. Facts about Upton Sinclair 6: Dignity and Meaning Sinclair was opposed to sex outside of marriage and he viewed marital relations as only necessary for procreation. He told his first wife Meta that only the birth of a child gave marriage “dignity and meaning”. Despite his beliefs, he had an adulterous affair with Anna Noyes during his marriage to Meta. Facts about Upton Sinclair 7: Writing Sinclair devoted his writing career to documenting and criticizing the social and economic conditions of the early twentieth century in both fiction and non-fiction. He exposed his view of the injustices of capitalism and the overwhelming impact of the poverty. He also edited collections of fiction and non-fiction. Facts about Upton Sinclair 8: The Jungle His novel based on the meatpacking industry in Chicago, “The Jungle”, was first published in serial form in the socialist newspaper “Appeal to Reason”, from February 25, 1905 to November 4, 1905. It was published as a book by Doubleday in 1906. Facts about Upton Sinclair 9: Other Works Sinclair was keenly interested in health and nutrition. He experimented with various diets, and with fasting. He wrote about this in his book, “The Fasting Cure” (1911), another bestseller. He believed that periodic fasting was important for health, saying, “I had taken several fasts of ten or twelve days’ duration, with the result of a complete making over of my health”. Facts about Upton Sinclair 10: Film Adaptation “The Jungle” (1906) was adapted for film in 1914, with George Nash playing Jurgis Rudkus and Gail Kane playing Ona Lukozsaite. Sinclair appears at the beginning and end of the film “as a form of endorsement.” Hope you would find those Upton Sinclair facts really interesting and useful for your additional reading.
<urn:uuid:a07228a7-c2ec-4ddf-9f0e-e556e8c5a341>
CC-MAIN-2019-09
https://infactcollaborative.com/people/facts-about-upton-sinclair.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550249468313.97/warc/CC-MAIN-20190223041554-20190223063554-00125.warc.gz
en
0.975102
892
2.671875
3
2.452164
2
Moderate reasoning
Politics
With the advancement of technology and the continuous development of the electronics industry, more and more boards are now using patch components. SMD components are increasingly popular with manufacturers due to their small size and low cost. In the production enterprises, the welding chip components are mainly based on automatic welding equipment, but when repairing electronic products, testing and welding require manual operation. For many beginners, they will feel that they have no way to start and think that they are themselves. Without the ability to weld, it is not as easy to solder as traditional inline components. In fact, these concerns are completely unnecessary. The following ALLPCB gives a brief introduction to the welding method. A soldering iron that can be automatically thermostat (the temperature can be adjusted), the tip can be selected first, or a small cutter head. (In addition, I am used to the small cutter head, can be welded, or can be welded. I use this kind of ARM single-chip microcomputer that has been soldered over 100 feet, and it is used to remove the soldering.) Of course, depending on personal habits, some people like to use hot air guns for integrated circuits, but for small patch components, It is suitable to use an electric soldering iron. A pointed tweezers make it easy to pick up and place the patch components. At the high end, you can buy an electric tweezers, which is equivalent to two electric irons, professional tools. A magnifying glass can be easily welded for poor eyesight. The solder wire is generally selected from a rosin core solder wire having a diameter of 0.6. SMD resistors and capacitors, soldering of some components at both ends: adjust the temperature of the soldering iron at 250-300 degrees Celsius (the temperature will be too high will damage the components), first tin on one end of the pad, clamp the components on both sides with the tweezers on the other end, solder the other end and then solder the other end. After the proficiency, you can use the tweezers. After soldering on the solder pads on both ends, use a soldering iron to solder the solder to one end. If the resistance is too small, it will stick to the soldering iron tip and quickly place it on the pad to melt the solder at both ends of the pad. Automatic alignment and welding completed. Dismantling method: Use a soldering iron to tin on both ends of the component. When the tin is completely melted, use a pair of tweezers to lower it. Soldering of integrated circuits: For integrated circuit chips with many pins and dense, the chip needs to be placed on the pad first. After the alignment, it is melted with a small amount of solder and soldered to several pins on the chip, so that the chip can be accurately Fix it, fix it and then put tin on other pins. After skill, you can perform "drag welding", that is, the foot tin on one side of the pin, then use the soldering iron to melt the solder to the remaining pins on the side. After the solder wire is melted, it can flow, and the soldering iron guides the molten tin to the other pins to ensure that all the pins can be uniformly tinned, and then the excess tin is scraped outward along the lead with the soldering iron tip. Until the pins are no longer connected. For the removal of integrated circuits, it is best for beginners to use a welding torch, use a hot air nozzle to move rapidly along the peripheral pins of the chip, evenly heat until the solder melts, and then use a pair of tweezers to get down. However, there are a few points to note when using a hot air gun: the hot air nozzle is 1 to 2 mm from the solder joint and cannot be directly attached to the chip pins, nor too far. Do not blow continuously for more than 20 seconds. It is best not to blow more than three times in the same position. For different welding objects, through trial and error, the appropriate temperature and air volume can be selected. Generally, there are two rows of pins, or you can directly use a soldering iron to place a sufficient amount of tin on the two rows of pins to form a tin block. Then use a soldering iron to quickly heat the solder blocks at both ends and move along all the pins. After the chip pins are completely loose, the chip can be removed with tweezers.
<urn:uuid:2e3091fd-8a5d-4db0-8ded-9973f76af031>
CC-MAIN-2023-06
https://www.allpcb.com/sns/smd-component-welding_26192.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500456.61/warc/CC-MAIN-20230207102930-20230207132930-00775.warc.gz
en
0.935425
948
2.890625
3
2.262689
2
Moderate reasoning
Hardware