text
stringlengths 198
621k
| id
stringlengths 47
47
| dump
stringclasses 95
values | url
stringlengths 15
1.73k
| file_path
stringlengths 110
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 49
160k
| score
float64 2.52
5.03
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
Warm weather during the 2012 grain harvest benefited producers, but it also benefited insects that feed in stored grain, says Brent Elliott, Infestation Control and Sanitation Officer at the Canadian Grain Commission. However, cold winter weather can help producers control insects.
"Now that winter's here, producers need to reconsider how they're managing insects in their stored grain," explained Mr. Elliott. "Because fumigation does not work below 5oC, it's not the preferred method for insect control. The good news is cold temperatures are very helpful for controlling insect populations."
Colder temperatures allow producers to control insects by using a combination of aeration and grain movement.
Aeration systems preserve stored grain and keep it dry by reducing the temperature of grain and reducing moisture migration. If you use an aeration system for your bins, you should turn it on during the winter months to cool your grain. The temperature of the grain and the ambient temperature outside will dictate how long to leave aeration on. More information about aeration is available on the Canadian Grain Commission's web site, www.grainscanada.gc.ca.
Prairie winters are usually quite cold, making winter the ideal time for cooling grain. At minus 20 oC, it only takes one week to disinfest or control all life stages of stored insect pests. The time needed for disinfestation changes depending on the grain's temperature as shown in the table.
|Constant grain temperature||Time period required for disinfestation|
Using grain movement
You can also use grain movement, which can kill insect pests such as the rusty grain beetle and red flour beetle.
Augering grain out of a bin and then back in will reduce the insect population. Augering also helps to break up any hot spots in the grain. Molds and secondary insect pests, such as the foreign grain beetle, can develop in hot spots.
In cold weather, grain exposed to cold air during augering will cool off quickly. This may help to reduce your aeration time. However, you should always monitor the temperature of the grain in storage to be sure.
|
<urn:uuid:70327adc-153d-4de6-a185-bfe42a471d99>
|
CC-MAIN-2017-13
|
http://www.farms.com/news/cold-winter-temperatures-naturally-control-insects-in-grain-58390.aspx
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190183.80/warc/CC-MAIN-20170322212950-00064-ip-10-233-31-227.ec2.internal.warc.gz
|
en
| 0.922217 | 433 | 3.109375 | 3 |
Some things never change and visiting your dentist every six months for a teeth cleaning and check up is one of them.
A cleaning leaves your teeth feeling and looking great.
And, while you’re here, we’ll provide you any information you might need to help ensure you’ve got top-notch oral hygiene. You might think you’ve got brushing and flossing all figured out, we’ll make sure that you do.
We’ll also discuss what you can do to protect your teeth moving forward, including fluoride treatment, which has proven to be an effective means of warding off tooth decay.
What is Tooth Decay?
Tooth decay is the destruction of the hard, outer layer of your teeth, which is known as the enamel. Plaque, a sticky film of bacteria, constantly forms on your teeth. When you eat or drink foods containing sugars, the bacteria in plaque produce acids that attack tooth enamel. The stickiness of the plaque keeps these acids in contact with your teeth and over time the enamel breaks down, which is when cavities form.
Aren’t Cavities Just Kid’s Stuff?
Cavities are more common among children but changes that occur with aging make them a problem with adults too. Recession of the gums away from the teeth, combined with an increased incidence of gum disease, can expose tooth roots (which are covered with a softer tissue than enamel). Decay around the edges of fillings is also very common for adults.
Because many older adults lacked fluoride treatments and modern preventative dental care when growing up, they often have a number of dental fillings. Over the years, these fillings may weaken and tend to fracture and leak around the edges, allowing bacteria to accumulate and buildup, leading to decay. Even with today’s advance technology, most fillings last about 10 to 15 years before needing replacement from daily usage.
Also, the less you take care of your teeth at home, the more susceptible to decay you are, no matter what your age is. Brushing morning and night helps prevent decay, as well as regular daily flossing and keeping your regular cleanings and checkups with us.
How Do I Prevent Tooth Decay?
There are many practices you can adopt to help prevent decay:
- brush after every meal and snack (at least twice a day)
- clean between your teeth daily with floss
- see if sealants are right for you (keep in mind many insurance plans have an age limit for coverage on sealants, so you’ll want to check with them first.)
- visit your dentist regularly for professional cleanings and oral examinations
|
<urn:uuid:3c18cfbe-7236-4981-934c-00a793c07458>
|
CC-MAIN-2020-16
|
https://www.affiliateddentists.com/services/general-dentistry/cleaning-hygienefluoride-treatment/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371813538.73/warc/CC-MAIN-20200408104113-20200408134613-00154.warc.gz
|
en
| 0.949589 | 556 | 3.109375 | 3 |
1. The Quebec Act, 1774
New France fell to Britain in 1759 (Quebec City), 1760 (Montreal), and by virtue of the Treaty of Paris, 1763. The Quebec Act (1774) gave French-speaking Canadians a status that approximated the status of English-speaking Canadians. The Governor of Canada was Guy Carleton, 1st Baron Dorchester.
2. The Constitutional Act, 1791
After the American Revolutionary War, the United Empire Loyalists moved to Canada. The Constitutional Act of 1791 divided the large province of Quebec into Upper Canada and Lower Canada. Most of the inhabitants of Upper Canada spoke English. In Lower Canada, the majority of Canadians were French-speaking (Canadiens). English-speaking newcomers also settled in Lower Canada. The Eastern Townships would be home to a large number of English-speaking Canadians. But many French-speaking Canadians felt Lower Canada was their land.
Both the citizens of Upper Canada and Lower Canada rebelled in 1837-1838. The Crown levied money from its British North American colonies.
3. The Act of Union, 1840
4. Confederation Onwards
5. Canada, as it is
Love to everyone 💕
© Micheline Walker
15 October 2020
|
<urn:uuid:b8479c35-7b64-4dbb-ac66-ff1eb675d4f4>
|
CC-MAIN-2022-21
|
https://michelinewalker.com/2020/10/15/maps-of-canada/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662539049.32/warc/CC-MAIN-20220521080921-20220521110921-00241.warc.gz
|
en
| 0.954831 | 265 | 3.890625 | 4 |
At the start of the lesson, I say to the students, “Listen, do you hear that?” and then I press play on the ocean sounds file I have found to share with the students. I ask the students, “What is that?” and a student says “The ocean! It sounds like waves!” “Exactly! Nicely done! It is indeed the sound of the sea that we’re hearing! Isn’t it a nice sound? I love to be near the ocean and just listen!” Then, I continue to tell the students that we can learn so much from the ocean by using all of our senses, not just hearing! We can learn about the ocean by seeing information and pictures, by feeling objects that came from the sea or the temperature of the water, and even by listening sounds from the ocean or to what others say about their thinking about the ocean! Today, we’re going to use our senses to learn about the ocean! We’re going to use our eyes to find words in our KD Magazine: Oceans 2, we’re going to use our mouths to talk to each other about our ideas about these words, and we’re going to use our ears to listen to what others at our groups are thinking about the words!
To begin the lesson, I start by pulling up a Smart Notebook file that I’ve prepared (see the Resources section here). The first slide has a Wordle that I’ve made of the 10 words I’m going to introduce to the students today. I ask them to take a look at the words, as I read each of them for the students. I ask the students to think about how these words might be related for a moment on their own, then I tell them I want them to turn and talk to their partners about what they think these words mean and how they fit together. But, before I let them begin talking, I tell them that I want them to use their senses carefully: be sure if one student is talking, you use your sense of listening and think about their ideas, when it’s your turn, be sure to share your ideas about the words, and lastly, use your sense of hearing to listen for the sound of the waves! When you hear the ocean, stop and face me so that I know you’re ready to go on! Then I ask the kids to begin sharing their ideas. I give students a few moments to share their ideas together, and then, with the use of the ocean sounds, I regain the students’ attention. I ask the students to share with our class how they think these words go together.
After listening to a few different summaries, I tell the students that they just did something awesome: they used what they already knew, plus the information given (all of the words in the Wordle) to figure out what the words might mean. That means they’re figure out the meaning to words on the topic of oceans! That’s awesome!
Now I tell the students that it’s time to get to know these words better! I switch to the next slide of my notebook file and I share the first word with the kids. We share the word, I uncover what page it’s on, and then the kids hunt for the word. Once the students find the word, I have them read the sentence it’s on, notice the text features (such as headings, diagrams, maps, etc.). Once students have looked around and read the sentence, I have them turn and talk with their table groups to determine what the word means. When students hear the sound of ocean waves, the students stop their conversations and I ask what they feel the word means. The students share their ideas, and then, using the notebook file, I have a student uncover the definition. We discuss it as a class, and then move on to the next word. We go through all 10 words, skimming pages, reading the word in context, and having purposeful talk with our partners, then sharing the actual definition and discussing. As students talk, my assessment is two-fold: 1) how they are collaborating with each other as related to the speaking and listening standards, and 2) how well are students making sense of unknown words using context clues to support their thinking.
To wrap up today’s lesson, I pull back up the Worlde and ask students if they think they have a better idea now how these words are related. I ask the students to grab their pencils and, while they hear the ocean sounds, write a note about what they think all these words mean together. I turn up the ocean sounds and let students write for a moment. Then, after about a minute or so, I turn down our music, ask students to stick their post-its to the front of their KD Magazines, and tell them that tomorrow, when we begin reading this magazine, we’ll connect our ideas about the words to the reading from the text.
|
<urn:uuid:bac69c80-ed00-4ece-85a3-5439a8dfb9f9>
|
CC-MAIN-2021-04
|
https://betterlesson.com/lesson/516023/sounds-like-the-sea-to-me?from=mtp_lesson
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704804187.81/warc/CC-MAIN-20210126233034-20210127023034-00384.warc.gz
|
en
| 0.961783 | 1,049 | 4.09375 | 4 |
Research and Policy Recommendations
The concept of medical professionalism has evolved substantially over the recent century. In the 1960s and 1970s, many commentators equated professionalism with the preservation of guild-like monopolies whose essential purpose was to restrict entrance and protect the interests of practitioners. In the 1990s, in the aftermath of the rise of managed care, professionalism assumed a very different meaning. Both physicians and consumers invoked its principles to defend their prerogatives and to protest the restrictions on service delivery imposed by health maintenance organizations. Alert to this record, the Division of Social Medicine and Professionalism maintains that the principles of professionalism have a vital role to play in the health care system.
Four key values underlie medical professionalism.
- Altruism and Commitment to Patients’ Interests. As changing market forces continue to confront the medical profession, physicians are increasingly challenged to maintain an unwavering commitment to their patients.
- Physician Self-Regulation. Group pressures not to report a colleague or indifference to the performance of others might lead doctors to ignore a colleague’s ineptitude or malfeasance, compromising patients’ health and safety.
- Maintenance of Technical Competence. The pace of innovation in medicine is unprecedented. Absent a commitment to life-long learning, the knowledge base of the best trained physician will soon be outmoded and fall short of best medical practice.
- Civic Engagement. Physicians should enlarge the scope of their concerns from the well-being of an individual patient to a concern for the welfare of all patients. They must make their voices heard by communicating their knowledge to the public.
|
<urn:uuid:c502d52f-6f6f-4b27-af66-fd7cb3348fe7>
|
CC-MAIN-2020-50
|
https://www.mhe.cuimc.columbia.edu/our-divisions/social-medicine-and-professionalism/research
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141171077.4/warc/CC-MAIN-20201124025131-20201124055131-00298.warc.gz
|
en
| 0.932886 | 327 | 2.9375 | 3 |
If you have a passion for helping others and an interest in the medical field, becoming a radiology technician may be the perfect career path for you. In this comprehensive guide, we will walk you through the process of becoming a radiology technician in the beautiful state of Kentucky.
Before diving into the requirements and educational path, let's first understand the essential role that radiology technicians play in the healthcare industry. As a radiology technician, you will work closely with doctors and other healthcare professionals to perform diagnostic imaging procedures. These procedures include X-rays, CT scans, MRIs, and ultrasounds, providing crucial visual information necessary for accurate diagnosis and treatment.
Radiology technicians are an integral part of the healthcare team, playing a vital role in patient care. They are responsible for capturing high-quality images that help physicians make informed decisions about a patient's health. By operating imaging equipment and collaborating with physicians, radiology technicians ensure that accurate and detailed images are obtained, leading to accurate diagnoses and effective treatment plans.
In addition to performing diagnostic imaging procedures, radiology technicians also play a crucial role in ensuring the safety and comfort of patients. They carefully position patients to ensure accurate image capture and monitor them during procedures to address any concerns or complications that may arise. Their compassionate and empathetic nature helps patients feel at ease during what can sometimes be an intimidating experience.
As a radiology technician, your primary responsibilities will include:
These responsibilities require a high level of technical expertise, attention to detail, and the ability to work well under pressure. Radiology technicians must follow strict protocols and guidelines to ensure that images are captured accurately and safely.
Furthermore, radiology technicians must possess excellent communication skills to effectively interact with patients and medical professionals. They must be able to explain procedures to patients, address any concerns or questions, and collaborate with physicians to provide accurate and comprehensive imaging reports.
To excel in this role, you will need a combination of technical skills, interpersonal skills, and attention to detail. Some essential skills for a successful radiology technician include:
Technical skills are crucial for radiology technicians as they need to operate complex imaging equipment and software. They must be proficient in adjusting imaging parameters, selecting appropriate imaging techniques, and ensuring that images are of high quality.
Additionally, a strong knowledge of anatomy and medical terminology is essential for radiology technicians to accurately identify structures and abnormalities in images. This knowledge allows them to collaborate effectively with physicians and provide accurate reports.
Interpersonal skills, such as effective communication and empathy, are also vital for radiology technicians. They must be able to communicate clearly with patients, explain procedures, and address any concerns or anxieties. Building rapport with patients helps create a comfortable and trusting environment, enhancing the overall patient experience.
Lastly, radiology technicians must stay updated with advancements in technology and techniques in the field. The field of medical imaging is constantly evolving, and technicians must be adaptable and open to learning new skills and procedures.
In conclusion, radiology technicians play a crucial role in the healthcare industry by performing diagnostic imaging procedures, ensuring accurate image capture, and providing vital information for accurate diagnoses. Their technical expertise, interpersonal skills, and attention to detail make them invaluable members of the healthcare team.
Now that you have a clear understanding of the role and responsibilities of a radiology technician, let's explore the educational path required to pursue this career in Kentucky.
As a high school student aspiring to become a radiology technician, you can start preparing early by focusing on science and math courses. Classes in biology, chemistry, physics, and anatomy will provide a strong foundation for your future studies in radiologic technology.
After completing high school, the next step is to enroll in a radiologic technology program. Kentucky offers a range of accredited programs that will equip you with the necessary knowledge and skills to become a successful radiology technician. Many educational institutions offer comprehensive radiologic technology programs are designed to prepare students for a rewarding career in the field.
These programs provide a combination of classroom instruction and hands-on clinical experience. You will learn about radiation safety, patient care, image evaluation, and the operation of different imaging equipment. The programs also emphasize the importance of professionalism and ethical conduct in the healthcare industry.
While an associate degree is the minimum requirement to become a radiology technician, pursuing a bachelor's or master's degree can open up additional career opportunities and advancement potential. These advanced degrees delve deeper into specialized areas within radiologic technology and may lead to roles in research, management, or education.
Bachelor's and master's degree programs in radiologic technology allow you to further refine your skills and knowledge. These programs provide advanced coursework and clinical experiences, preparing you for leadership roles and specialized practice within the field.
After completing your education, obtaining the necessary licenses and certifications is crucial to legally practice as a radiology technician in Kentucky. Let's explore the requirements in more detail.
In order to practice as a radiology technician in Kentucky, you must first obtain a license from the Kentucky Board of Medical Imaging and Radiation Therapy. The requirements include completing an accredited education program, passing a certification examination, and submitting the necessary application and fees.
While not mandatory, obtaining national certification through the American Registry of Radiologic Technologists (ARRT) is highly recommended. ARRT certification is widely recognized and may enhance your employment prospects, as many employers prefer certified technicians.
To become certified by the ARRT, you must meet their eligibility requirements, which include completing an accredited education program, adhering to their code of ethics, and passing their certification examination. Maintaining your certification requires ongoing continuing education to stay updated with the latest advancements and best practices in the field.
Now that you have completed your education and obtained the necessary licenses and certifications, you may be wondering about the job market and salary expectations for radiology technicians in Kentucky.
The healthcare industry in Kentucky continues to grow, and the demand for well-trained radiology technicians is expected to rise. Hospitals, clinics, imaging centers, and other healthcare facilities are actively hiring skilled technicians to meet the needs of their patients.
The salary of a radiology technician in Kentucky can vary based on factors such as experience, specialization, and geographic location. On average, radiology technologists and technicians in Kentucky earn a competitive salary ranging from $28,320 to $62,150 per year. It is important to note that these figures are approximate and may be subject to change.
Factors that can influence pay include the level of education, additional certifications, years of experience, and the specific healthcare facility or organization. Radiology technicians who specialize in certain areas, such as mammography or MRI, may have higher earning potential due to their specialized skills.
As a radiology technician, your career path doesn't have to be limited to just performing imaging procedures. There are numerous opportunities for advancement and specialization within the field.
By pursuing additional certifications and continuing education, you can specialize in areas such as mammography, computed tomography (CT), magnetic resonance imaging (MRI), or nuclear medicine. Specializing in a specific area can lead to higher-paying roles and increased job satisfaction.
The field of radiologic technology is constantly evolving, and it is essential to stay updated with the latest advancements and techniques. Continuing education and professional development opportunities play a vital role in ensuring that radiology technicians provide the best possible care to their patients.
There's a wide range of continuing education programs and professional development opportunities designed to expand your knowledge, refine your skills, and keep you at the forefront of the field. By regularly participating in these programs, you can enhance your career prospects and provide the highest standard of care to your patients.
Becoming a radiology technician in Kentucky offers a rewarding career path filled with opportunities for personal and professional growth. With the right education and training, you can make a difference in the lives of patients by providing crucial diagnostic information to healthcare professionals.
If you are ready to take the first step towards your exciting career as a healthcare professional, reach out to Dreambound today. Let us guide you towards a fulfilling future in the field of radiologic technology.
Athena is Co-founder and CEO of Dreambound.
|
<urn:uuid:b1271387-e7c7-4656-b222-f9d389756686>
|
CC-MAIN-2023-40
|
https://dreambound.com/blog/how-to-become-a-radiology-technician-in-kentucky
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510730.6/warc/CC-MAIN-20230930213821-20231001003821-00445.warc.gz
|
en
| 0.94143 | 1,669 | 2.84375 | 3 |
Argumentative essay lesson plans and worksheets from thousands of teacher-reviewed resources to help you inspire students learning. Planning the essay introductory paragraph • introduces your topic and provides necessary background information • captures the reader’s interest and attention. Development planning preparation worksheet information on this worksheet will assist you in defining your career interests and writing a development plan to help. Teach esl essay writing for intermediate level students using this simple procedure worksheets on how to write an outline, introduction, and conclusion. This is an opinion essay outline worksheet exercise based on the essay topic distracted driving with a matching exercise to help students understand essay format. Here you can find worksheets and activities for teaching writing essays to kids, teenagers or adults, beginner intermediate or advanced levels. Narrative essay worksheets author: scott motlik created date: 4/9/2012 7:07:57 pm. Informative essay writing checklist worksheet about this worksheet: this will help you find anything you might have forgot to add and left out.
Expository essay characteristics of an expository essay the purpose is to inform, describe, or explain describes important facts writer is a teacher presents exhaustive information on a. Essay writing worksheets and printables these essay writing worksheets help make learning engaging for your child browse through and download our essay writing. • state the thesis and projected plan in the last 1-2 sentences 2 the body consists of 3 paragraphs literary analysis essay: outline. How to make an essay plan in just 5 minutes this document contains everything you the essay plan below is for a hypothetical essay question about the film. This page covers the planning stages of essay writing, which are important to the overall process the second page, writing an essay.
Quick tips for tutors factsheet: how to plan your writing wt/l11 plan and draft writing written plan not always necessary use of planning methods such as diagrams, lists and writing. This worksheet is adapted from the genesee valley center’s rationale worksheet, the center for distance learning’s web resources and previous versions of the.
Ged extended response step-by-step if you've done a lot of writing and you're ready to practice using the specific type of writing expected for the ged essay, this is the place to be if you. Narrative essay planning worksheet name_____ period ___ the conflict (struggle, problem) i face in my story is. Argumentative essay analysis worksheet what is the author’s claim, and where does he or she state the claim what support does the author use to back up his/her claim is the support.
Basic 5-paragraph (argument) essay outline: this outline also serves for other essays such as research papers audience and how you plan to appeal to them. Lesson aimed at mature students returning to education but can be adapted as a revision task for other students the lesson looks at planning an essay, structuring an. Displaying 8 worksheets for essay worksheets are persuasive essay examples, worksheetoutline for analyticalargument essays, essay worksheet, narrative essay.
Prewriting and outlining plan to brainstorm for this is another way to record your thoughts and observations for a paragraph or essay after you have. You are here: home / posts / planning an essay zap, homework help for 8th grade math, essay order worksheet. Term paper warehouse has free essays, term papers, and book reports for students on almost every research topic toile de camion, marchepieds, essay planning worksheet protecteur de tapis. This worksheet will help students to compose an essay according to the given plan they should express their opinion in the essay after watcing a film the link to. This activity is to help students identify which planning method works best for them when they are writing an essay more traditional ways, such as outlines are.
Essay planning worksheet drama paying yourself first with instant access to more than 700 colleges and universities around the world. Our informative writing plan will help students write explanatory essays in all content areas use our informative essay rubric--aligned to state literacy writing. Persuasion map planning sheet goal or thesis a goal or thesis is a statement that describes one side of an arguable viewpoint • what is the thesis or point you are trying to argue. Elements of an argument essay & worksheets by b d’amato part i terminology now that you have a plan, write the opening of your paper. A visual guide to essay writing valli rao kate chanock lakshmi krishnan how to develop & communicate academic argument ‘metamorthesis‘ your main argument or thesis is your position in answer.
|
<urn:uuid:326b6ccf-7c80-4b45-8119-7407db3f86ef>
|
CC-MAIN-2018-22
|
http://qjhomeworkpuel.voteforthegirls.us/planning-an-essay-worksheet.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867311.83/warc/CC-MAIN-20180526053929-20180526073929-00619.warc.gz
|
en
| 0.897907 | 967 | 3.65625 | 4 |
Corn: Pythium Damping-Off (Pythium spp.)
Pub 812: Field Crop Protection Guide > Chapter 1: Corn > Pythium Damping-Off
Field Crop Protection Guide 2011-2012, Order 2011-2012 publication
Table of Contents
It is recommended that all seed corn be treated with a fungicide seed treatment to prevent early-season preemergence and postemergent damping-off problems. This will help reduce seed decay and seedling blights. Corn seedling diseases are prevalent under cool wet conditions that keep the soil temperature below 13°C. Low-lying or poorly drained areas of the field are often the first to show disease problems. Seed rots and seedling blights are more severe in no-till or reduced-tillage fields since heavy residue will keep soil temperatures cooler and wetter longer than conventional fields. Damping-off will occur in conventional fields when the crop is planted early in conditions that favour disease development or when environmental conditions cause slow germination. Other factors that delay germination and emergence, such as compaction, crusting, deep planting, etc., can also result in a poor stand. Plant vigour is often reduced in those plants that do survive.
This disease can occur on all soil types but losses are greatest in cold, wet, clay soils. Minimize soil compaction and remove excess moisture through increased drainage. Plant when soil temperatures are above 13°C (55°F). There is no known resistance but some degree of tolerance is available in some hybrids. Crop rotation has limited effect.
Consult with your seed company and the Ontario Corn Committee Hybrid Performance Trials at www.gocorn.net for hybrid selection.
For more information:
Toll Free: 1-877-424-1300
|
<urn:uuid:1a1d7b0d-5746-46c0-868e-6498c0b2c613>
|
CC-MAIN-2014-15
|
http://www.omafra.gov.on.ca/english/crops/pub812/1pyth.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609538423.10/warc/CC-MAIN-20140416005218-00079-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.900917 | 371 | 2.84375 | 3 |
Early practices of vegetarianism can be found as far back as ancient Greece and India. Back then, vegetarianism was mostly rooted in nonviolence toward animals as part of religious belief. Nowadays, people are choosing to not only eat vegetarian but also immerse themselves in a culture of living in a natural and organic way. Both vegetarians and vegans are considered natural, choosing not to eat meat and fish. However, veganism is a stricter form of vegetarianism that prohibits the consumption or use of any products that come from animals, including dairy, eggs, and honey.
Vegetarianism is even growing in areas that have long been predominantly meat-eating regions driven by the culture and economic value of meat consumption.
Japan is one country where the popularity of vegetarianism is growing. While vegetarianism certainly isn’t a new concept in Japanese cuisine, it is still well within the minority to avoid meat and seafood in an island nation where fish-centric cuisine is so prevalent.
But now that dynamic is shifting, and vegetarianism is gaining traction as a healthy and even stylish dietary trend in contemporary Japan.
Where is the trend of vegetarianism in Japan coming from?
Like most trends coming to a country from external sources, vegetarianism in modern Japan was largely brought on by tourism. Travelers have long brought with them new traditions, styles, and delicacies. But this new trend was also brought on by Japanese establishments offing fare and dietary options specifically to accommodate tourists.
More than tourism and hospitality, the reason behind the surge in vegetarianism in Japan may actually trace back to the intuitive relationship that Japanese people have always had with certain foods.
Japan is at the forefront of a dietary focus called macrobiotics, a diet that emphasizes eating certain foods to aid in warding off disease and optimizing health. The core belief of macrobiotics is to eat whole grains, beans, and vegetables in tune with your body’s needs to strike a balance of health and vitality. Vegetarianism is a practice that would certainly be in line with the Japanese belief that good food and good eating equates to good health and a happy family life.
What are the health benefits of vegetarianism?
While the adoption of vegetarianism in Japan is still an emerging trend, globally, vegetarianism and veganism are now growing at a massive rate.
So, what’s behind the mass global adoption? The overall motivation for moving to a vegetarian or vegan diet is the promised health benefits. While the benefits of eating a diet that is predominantly or entirely plant-based depend on several factors, it is likely that skipping meats will inevitably lead you to rely more heavily on other foods. In the case of a whole food vegan diet, replacements take the form of whole grains, fruits, vegetables, beans, peas, nuts, and seeds. These foods are rich in nutrients and bring several health benefits.
Of course, not all diets are created equal, but generally, plant-based diets have a natural tendency to reduce your calorie intake. This makes them effective at promoting weight loss without the need to actively focus on cutting calories and without a deficiency in key vitamins and minerals.
One common concern among those who may have an interest in trying a plant-based diet is they may not be getting enough protein without meat in their diet. Good news! There are a ton of plants that are rich in protein. Legumes and chickpeas are an especially popular protein boost in vegetarian dishes.
Vegetarian-friendly products from Isagenix
For those thinking of giving a plant-based diet a try, getting started may seem a bit overwhelming. Where to start, building a nutrition plan, and finding your favorite dishes can be difficult for a newbie.
Isagenix offers some awesome products you can add to your healthy diet to get started on your journey toward plant-based wellness. Learn more and get started with your wellness journey today!
|
<urn:uuid:63bb037b-b5b7-45b4-9e41-f8cf5978d510>
|
CC-MAIN-2021-39
|
https://jp.isafyi.com/the-growing-trend-of-vegetarianism-in-japan-2/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057589.14/warc/CC-MAIN-20210925021713-20210925051713-00653.warc.gz
|
en
| 0.968272 | 799 | 2.578125 | 3 |
(Also see Chinese version)
Toccata in E Minor, BWV 914
- “Toccata”: meaning “to touch” (“toccare” in Italian), a highly virtuosic keyboard genre
- Bach’s toccatas: combination of German toccata style (more serious counterpoint and complex structure) and Italian toccata style (more showy and flamboyant), with alternating free-style (prelude) and strict structure (fugue) – “stylus phantasticus”
- Basically two sets of prelude and fugue
- Seven toccatas in total, this being the shortest of all
- This toccata is also the only one that starts with a slow section
- Four sections in this toccata:
- A prelude in a rather improvisatory style resembling the composer’s later organ work such as Toccata and Fugue in D minor
- A little “fugato”, a double fugue for four voices, lively and rhythmic,
- Adagio: recitative style, combination of Italian aria and Northern German fantasia style, highly improvisatory
- A final three-voice fugue with an extended subject, in allegro, idiomatic violin writing, also thought to be originally written for organ, showing tremendous influence from Italian toccata writing (“Naples Manuscript”)
A more “liberal” rendition of the toccata:
A lesser known performer yet with another beautiful version of the same toccata:
More background details and analysis in our membership area post.
Teresa Wong[:zh](更多在 英文版)
- 緊隨着的是一個雙主題賦格曲 (double fugue),節奏明快緊湊,基本是以主音(tonic) E小調和第五音(dominant) B小調在各個聲部 (voice)中重複出現
- 第4段又是一個賦格曲,有三個聲部,主題比較長 ,亦有管風琴樂曲和意大利賦格曲的影子。
[:en]Prior to the “big day” aka diploma exam day, I ask my students to do three steps in terms of viva voce preparation for me (assuming they have already done all other steps I have given them in the course of diploma exam preparation). And I would like to share with you these three important steps that would give any candidates feel much more prepared and confident to perform well in the coming exam.
The three steps to prepare for a successful viva voce session are:
THINK about what and how you are going to answer the questions the examiners pose during the exam. I always give my students a bunch of potential questions the examiners will ask. It is very important to prepare ahead. Don’t just think, “oh, I will know how to answer them during the exam.” No way! Even you have the information at hand/in your head, it is crucial that you think about how to put the information together in a clear, simple presentable speech. And that leads to the second step..
WRITE. THEM. DOWN. Seriously. This is the next step you must do especially when you worry a lot about how to say what you need to say in the real exam. I hear a lot of this or a variation of this, “oh, I will know how to answer them because I have the information in my head.” Really? I don’t think so. If you cannot write them down, you cannot answer them. It doesn’t have to be written in full paragraph/sentences (although it certainly helps), but at least in point form, using clear, simple sentence structure. And for those who are not native speakers: this is NOT an oral English exam, so don’t worry too much about the grammatical mistakes or trying to sound like a native speaker or Shakespeare! – actually they might not even understand you if you speak like the latter anyway. The easiest way is to speak clearly and slowly in simple sentence (just use present tense in all circumstances to make it easier for yourself when in doubt), so that you can present your ideas through effectively and get points for that! I do advise those who worry about their oral English ability to write out everything in full sentences first, not to memorize them, but to…
SAY IT OUT LOUD! It is very important for anyone to not only practice their speaking, but also practice talking about music. I have met so many musicians/candidates who might know a lot about music yet fail to deliver their ideas through speech. It is great you can perform well for the recital part, but you do also need to speak well in your viva voce too! Therefore, I always advise my students to TALK TO ME in our lessons, especially in the last few sessions prior to the exam. I ask them questions, and they give me answers in terms of the general repertoire, background of pieces, form and analysis, composer information, etc etc. I also check their programme notes and pose some questions based on what they wrote (and help with some editing- they do have to write their own notes first!). I encourage students to practice talking out loud at home for the viva voce practice and come back with the answers so I can help correct the content as well as sentence structure. That way students feel much more prepared and confident going to the real exam session.
I welcome any questions on the viva voce/programme notes/piano diploma exams in general.
A guided video to how to revise for your viva voce exam part:
I compile here questions from past candidates of dipABRSM they were asked in their exams’ “viva voce” sections. This reference article is tremendously useful for those who are preparing for their viva voce exams.
This page contains viva-voce questions that have been asked in diploma examinations. Any answers given are those written by the candidate and are not intended to represent good (or bad) answers to the questions: they are simply the answers the candidate gave. All viva-voces end with the question “Is there anything you would like to add?”, it is not necessary to answer this question (with anything other than no) but if you do want to say something then this is the time to do so.
The questions as appearing here have been (lightly) edited for consistency throughout the page and to better reperesent the way that examiners are likely to word questions.
Scriabin Préludes Op. 11 Numbers 9 and 16
Beethoven Sontata in C Minor, Op. 13 ‘Pathetique’
Szymanowski Etude in Bb Minor, Op. 4 No. 3
Bach Prelude and Fuge No. 16 in G Minor, WTC Book 1
Debussy General Lavine Eccentric No. 6 from Préludes Book II (own-choice work)
How did you choose your programme?
What were the technical challenges you faced when playing the Scriabin preludes?
Where do the opus 11 preludes fit into Scriabin’s compositional output?
You say the First Movement of the Pathetique is in Sonata form. What is the structure of Sonata form?
What influence did Beethoven’s contemporaries have on this piece? In particular, Dussek (Dussek’s influence mentioned in programme notes)
You mention that it was written in Beethoven’s early period; what characterises his early period?
How many piano sonatas did Beethoven write?
You said that in his early period, Szymanowski was influenced by Chopin. In what way can Chopin’s influence be seen in this piece?
What did Bach mean by ‘Well Tempered’ when he wrote the Well -Tempered Clavier?
How should one approach playing Bach on a piano?
What are stretti?
What sort of answer does the Fugue have?
I noticed that you played from memory today; what effect does that have on the performance?
What does one have to bear in mind when playing the dynamics in, for example, the Debussy, compared to the Beethoven?
|
<urn:uuid:2e888748-bbd7-424f-9af6-9fed387c2516>
|
CC-MAIN-2019-09
|
http://www.teresawong.hk/tag/dipabrsmpiano/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247518497.90/warc/CC-MAIN-20190222155556-20190222181556-00260.warc.gz
|
en
| 0.941215 | 1,911 | 2.5625 | 3 |
Why we need to celebrate International Women’s Day
International Women’s Day began as a movement for women’s suffrage. The earliest instance was in 1909 in New York as women were demanding the right to vote. In 1910, a woman called Clara Zetkin from Germany came up with the idea of an International Women’s Day. She organised a conference of 100 women from 17 countries so that women could collectively fight for their rights. Thus, IWD was formed. In 1911, it was celebrated in Austria, Denmark, Germany and Switzerland. In 1913, it was decided to transfer IWD to March 8, and it has been celebrated on that day ever since. The day was only recognised by the United Nations in 1975, but ever since it has created a theme each year for the celebration. In 2011, former US President Barack Obama proclaimed March to be known as Women’s History Month.
Although many years have passed by, women are still fighting for equality throughout the world. Whether it is for political rights, positions in government leadership, economic equality, it is still an uphill battle for all women regardless of race, ethnicity, sexual orientation and religion. It is a cause which ignites passion and unites us globally.
Women are still not getting equal pay with some sources reporting it will be at least another 65 years until women can close the gender gap. Women are still being sexually harassed in workplaces. Women are still facing sexual violence in countries throughout the world, and many have been enslaved into human trafficking. Male lawmakers are constantly making laws in regard to women’s health or clothing, without women being given the platform to choose for themselves.
Women are still not getting into positions of power and leadership despite being more qualified than their male counterparts. An alarming example was America voting for the actor/businessman Donald Trump as their President over a woman, Hillary Clinton, who had extensive political experience as First Lady, Secretary of State, and Senator of New York.
By promoting the social, cultural, political, and educational achievements of women and highlighting the struggles endured along their journeys to our children, it will inspire our future generations to be the catalysts for change that we still need in this world today. We need to celebrate people like Oprah Winfrey, Malala Yousufzai, Susan B. Anthony, and Marie Curie, just to name a few of many remarkable women.
In today’s modern world, technology and social media is proving to be a major catalyst for change. With the #MeToo and #TimesUp movements on twitter, women were able to support each other in coming forward to reveal that they were abused or harassed. The women’s marches throughout the world showed how united we all can be when we fight for the same issues globally. According to Facebook, International Women’s Day was its most talked about event in 2017, generating 430 million interactions from 165 million people. Half of these interactions were from the United States, India, Brazil, Mexico and Argentina. Furthermore, the Womens March on January 21, 2017 was the largest Facebook event attended in 2017. This event was very significant as it came the day after the inauguration of Donald Trump as President of the United States of America. There was a sharp contrast into the crowd numbers generated by these events as they both were held in the same exact location. This is of extreme significance as 673 events were organized on all 7 continents for this same cause. Slowly but surely the pioneer women from our past are paving the way for a brighter future for today’s women, our daughters, and our future generations.
For more information, see http://www.internationalwomensday.com
#PressForProgress, #TimesUp, #MeToo
|
<urn:uuid:1f77af84-28ca-431c-9bac-32ce78553671>
|
CC-MAIN-2018-43
|
http://buddywith.org.uk/blog/1021/2018-03-02/why-we-need-to-celebrate-international-women-s-day
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511703.70/warc/CC-MAIN-20181018042951-20181018064451-00228.warc.gz
|
en
| 0.979795 | 769 | 3.171875 | 3 |
Follow-up Study of GSK Biologicals' Human Papilloma Virus (HPV) Vaccine to Prevent Cervical Infection in Young Adults
Human Papilloma virus (HPV) are viruses that cause a common infection of the skin and genitals in men and women. Several types of HPV infection are transmitted by sexual activity and, in women, can infect the cervix (part of the uterus or womb). This infection often goes away by itself, but if it does not go away (this is called persistent infection), it can lead in women over a long period of time to cancer of the cervix. If a woman is not infected by HPV, it is very unlikely that she will get cervical cancer. This is an observer blind follow up study of the study HPV-001, which evaluated the ability of the HPV vaccine to prevent HPV infection. The current study invites all of the 1113 subjects in the HPV-001 study that received all three doses of vaccine/placebo to be enrolled and followed-up for several additional years to see if the HPV vaccine prevents HPV-16 and HPV-18 infections and to evaluate the safety of the vaccine. Subjects will remain in the same study group as in the primary study. No vaccine or placebo will be administered in this study.
The Protocol Posting has been updated in order to comply with the FDA Amendment Act, Sep 2007.
|Study Design:||Allocation: Randomized
Endpoint Classification: Safety/Efficacy Study
Intervention Model: Parallel Assignment
Masking: Double Blind (Subject, Caregiver, Investigator, Outcomes Assessor)
Primary Purpose: Prevention
|Official Title:||Study of the Efficacy of Candidate HPV 16/18 VLP Vaccine in the Prevention of HPV-16 and/or HPV-18 Cervical Infection in Adolescent & Young Adult Women in North America and Brazil Vaccinated in Primary Study 580299/001|
- Incident cervical infection with HPV-16 and/or HPV-18
- Persistent cervical infection (6-month definition) with HPV 16 and/or HPV 18.
- Persistent cervical infection (6-month definition) with oncogenic HPV types.
- Incident cervical infection with oncogenic HPV types.
- Histopathologically-confirmed CIN 1+ or CIN 2+ associated with HPV 16 and/or HPV 18 detected within the lesional component of the cervical tissue specimen.
- Histopathologically-confirmed CIN 1+ or CIN 2+ associated with oncogenic HPV types detected within the lesional component of the cervical tissue specimen.
- Abnormal cytology associated with an HPV-16 and/or HPV-18 cervical infection.
- Abnormal cytology associated with oncogenic HPV type cervical infection.
|Study Start Date:||November 2003|
|Study Completion Date:||July 2007|
|Primary Completion Date:||July 2007 (Final data collection date for primary outcome measure)|
Please refer to this study by its ClinicalTrials.gov identifier: NCT00120848
Show 25 Study Locations
|Study Director:||GSK Clinical Trials||GlaxoSmithKline|
|
<urn:uuid:92583ad2-5f10-47e7-81ba-ad154bfbf7ee>
|
CC-MAIN-2016-18
|
https://www.clinicaltrials.gov/ct2/show/NCT00120848
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461861848830.49/warc/CC-MAIN-20160428164408-00156-ip-10-239-7-51.ec2.internal.warc.gz
|
en
| 0.878928 | 657 | 3 | 3 |
Participants will learn to safely and competently use chemicals to control pests, weeds and diseases in a range of contexts.
The course covers legislation, labelling, personal and environmental safety, pest management, application, record keeping and managing risk.
Participants will learn on a practical level how to improve their integrated pest management programmes, to better choose the right chemical for the job and to apply it more accurately. The course is designed for people who will be spraying chemicals without supervision.
On successful completion of this course, students will receive a statement of attainment for the following nationally accredited units:
- AHCPMG301 – Control weeds
- AHCCHM307 – Prepare and apply chemicals to control pests, weeds and diseases
- AHCCHM304 – Transport and store chemicals
No minimum requirements
Personal Protective Equipment (PPE):
For the practical assessment you need to be in appropriate work wear and bring suggested items as listed below;
- long trousers
- long sleeved shirt
- enclosed shoes
- clothing to suit working in all weather
|
<urn:uuid:6b5b574d-5765-4062-80e8-3f15ad6b5993>
|
CC-MAIN-2022-21
|
https://www.southregionaltafe.wa.edu.au/courses/backpackhandheld-spraying-skill-set
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663011588.83/warc/CC-MAIN-20220528000300-20220528030300-00548.warc.gz
|
en
| 0.92486 | 222 | 2.53125 | 3 |
This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.
The purpose of this paper is to share with the readers the findings of a study to investigate the prospective teaching behaviours with ICT integration at secondary level. This study seeks to investigate the likely attitudes of teachers towards the use of ICT for educational purposes if equal access is given to them. ICTs is expected to boost the classroom but given that human beings generally show resistance to change, it is imperative to focus on teacher's motivation and readiness to use ICT in teaching.
Background and Objectives of the Present study
Technology is claimed to be a universal language and is regarded as one of the influential agents of globalisation. On the global front, ICT is already creating new, open learning environments and in the local context, the present government has announced in the latest budget, that classrooms will be equipped with ICT support and that teachers will be expected to use innovative teaching strategies, more precisely ICT for teaching. Furthermore, during the recent years, the government has embraced the vision of metamorphosing Mauritius from an agricultural island to a cyber island.
In line with this vision, teachers are expected to play a catalysing role in this transformation process. According to Murray, 2007, the use of technology in education is an emerging field of study as it involves the introduction of new instructional possibilities. Consequently, the aim of this study has been to focus on the factors which encourage the uptake of ICT by teachers as well as the barriers which prevent teachers from making full use of ICT in teaching.
Related Literature Review
In developing countries, education is seen as the hope of the future and massive investment is done in this sector as it is expected to bring economic progress while simultaneously ensuring sustainable development.
3.1 The use of ICT in Teaching
According to a UNESCO handbook in 2005, researchers claim that to "be effective, especially in developing countries, ICT should be combined with more traditional technologies such as books and radios and be more extensively applied to the training of teachers." Consequently, the International Education Studies journal, May 2010 highlighted that teachers' attitudes levels towards the use of ICT had a direct relation with the use of ICT for educational purposes and similar findings were reported by Albirini (2004) and Isleem (2003)
Perraton et al. identified two sets of activities or roles which should be considered to integrate ICT in education which are the need for the training of teachers to learn about ICT and its use in teaching and the need to provide teacher education. (2001)
Thus, in many countries, ICT is now at the center of education reforms that involve (i) its use in coordination with changes in curriculum, (ii) teacher training, (iii) assessment and (iv) pedagogy.
In the local context, Mauritius is also following the same trend since ICT is playing role in its education reform efforts. There are expectations that there will be much ICT investment in the education sector but according to a survey by S. Ramessur Seenarain, ICT is perceived as a mere learning tool.
Attitudes towards the use of ICT
Many factors influence the use of ICT in teaching and one of these factors is teachers' attitudes towards the use of ICT in the teaching and learning process. Huang and Liaw
(2005) state that teachers' attitudes are important factors which support the use of computers in teaching. Much literature review focuses on attitudes of teachers as central to the integration or consequent rejection of ICT in teaching. Consequently, a number of studies have been carried out to investigate teachers' attitudes towards computer use. Albirini (2004) investigated the attitudes of teachers in Syrian high schools regarding the use of ICT in teaching and he found out that in general teachers had positive attitudes toward technology use in education. However, given the ambivalent nature of human behaviour, teachers' attitudes can help to determine their reaction in some situations. Fishbein (1967) defined attitude as a learned tendency which makes us react to an object or class of objects in a positive or hostile way. Similar claims were made by Ajzen in 1988.
Cuban (1993) classified teachers as (i) technophile; those who are enthusiastic about new technology, (ii) preservationist; those who hold traditional views regarding the use of ICT and (iii) cautious optimist; namely teachers who exhibit slow, steady movement towards fundamental changes in teaching.
Evans-Andris (1995) used corresponding classifications of teachers as showing (i) technical specialisation; those who embrace computers and view technology as a challenge, (ii) avoidance; teachers who distance themselves from computers and (iii) integration; those who embrace computers in teaching. Teo (2006) put forward the argument that, "the success of student learning with ICT will depend largely on the attitudes of teachers and their willingness to embrace the technology.
Van Braak (2001) also highlighted the strong correlation between computer associated attitudes and the use of ICT in teaching. Van Braak, Tondeur, & Valcke, (2004) mentioned that positive computer attitudes are likely to promote computer incorporation in the classroom. Akbaba & Kurubacak, 1998; Clark, (2001) further mentioned that attitudes toward computers influence teachers' recognition of the effectiveness of technology, and also determine whether teachers integrate ICT into their classroom
|
<urn:uuid:c264170c-93c7-4783-8ad0-4000bbd32d73>
|
CC-MAIN-2017-13
|
https://www.ukessays.com/essays/education/the-use-of-ict-in-teaching-education-essay.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218187113.46/warc/CC-MAIN-20170322212947-00598-ip-10-233-31-227.ec2.internal.warc.gz
|
en
| 0.962196 | 1,119 | 2.75 | 3 |
Imagine hacking into your own brain while you sleep, finding unrelated details or ideas that were never connected and mashing them up to get a solution to whatever problem has been wracking your brain. It can and has been done.
What you do before bed can play a role in how primed your brain is for this kind of creativity. Research has repeatedly found that sleep improves people’s ability to come up with creative solutions to problems. Psychologists from UC San Diego found that REM sleep improves the creative process more than any other state–asleep or awake. And often the solutions to problems come to us when we are sleeping because of a phenomenon cognitive scientists call “pattern recognition.”
This happens when the brain is in a relaxed enough state to create new connections and neural pathways–also known as neuroplasticity. This explains why great ideas often come to you in the shower, on a walk, lying in bed at night, or even sleeping. The brain is relaxed enough to enable those new connections to form.
The brain uses two separate pattern recognition systems – an extrinsic and an intrinsic one, writes Steven Kotler in Psychology Today. The explicit system relies on logic and rules and is tied to our conscious awareness. We can explain it verbally. The intrinsic system, on the other hand, relies on intuition, skill and experience. You can’t really describe it in words. Kotler explains:
When the explicit system is involved, the neurons that are talking to one another are usually found in close proximity. When the implicit system is at work, far flung corners of the brain are chit-chatting. Creativity … depends on those broader implicit networks putting together information in new ways.
But how can you optimize your sleep to help hack into your creative mind? There are things that can be done before bed to help you get there. “The secret, if there is one, is just about being able to relax enough for the intrinsic system to do its stuff,” says Kotler. “This is a pretty simple mind hack used by a lot of creatives.” Here are three ways to get there.
1. Find inspiration in your bedside book.
Research has shown that memory works best when something is learned shortly before sleep. Fill your brain with new ideas and inspiration before bed and you give the mind some work to do while you’re asleep.
Reading before bed–whether it’s fiction, a business book, or something that inspires and informs your work–is an effective way to prime your brain for creative thinking. You may just wake up with a fresh new idea you didn’t have when you went to bed the night before.
2. Ask yourself the question you’re trying to answer
When you’re getting ready for bed or lying with the lights out–literally ask yourself the question you’ve been wrestling with in your creative work. You can do this aloud or to yourself. “It is pretty easy to ask the intrinsic system a question,” writes Kotler. “Out loud or silently, doesn’t seem to matter.”
Triggering your brain to think about a challenging problem just before bed can help your intrinsic system get a boost in the right direction. The key is to then do something to help you forget about asking the question–read or focus on your breathing, perhaps–to help that part of your brain that works quietly in the background rev up.
3. Encourage lucid dreaming
Lucid dreaming is essentially dreaming while being conscious of the fact that you’re having a dream. Why is this useful to hacking into your creative mind? “You could stay in that dream and then use it to explore impossible realities somehow,” according to psychophysiologist and lucid dream expert, Stephen LaBerge.
Getting to that lucid dreaming state takes practice and training your brain to recognize when you’re dreaming. A few ways to do this involve asking yourself throughout the day whether you’re dreaming, so that you’ll subconsciously remember to do the same when you’re in a dream state. Waking up in the middle of the night, remembering the dream you were having and then going back to sleep, conscious that you were having this dream can also help you enter a lucid dream state. LaBerge calls these steps the mnemonic induction of lucid dreaming or MILD technique.
“It would give you a great deal of freedom,” he says of lucid dreaming. “You’re limited not by the usual laws of physics and laws of society and other external constraints on you as we are limited greatly in waking life. You are limited only by what the limits of the mind might be.”
[Image: Flickr user Emily May]
|
<urn:uuid:c7802d58-5ee6-4003-9e23-e6d46e21dd50>
|
CC-MAIN-2020-29
|
https://lphr.wordpress.com/tag/inspiration/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657138752.92/warc/CC-MAIN-20200712144738-20200712174738-00069.warc.gz
|
en
| 0.95415 | 994 | 2.765625 | 3 |
A cook's knife needs to be sharp.
- Sharp means having a point or edge that is good for cutting or a sudden change.
- An example of something sharp is a knife.
- An example of sharp used as an adjective is the phrase a sharp turn which means a turn that suddenly changes direction.
- Sharp is defined as exactly.
An example of sharp used as an adverb is to arrive somewhere at a certain time, like two o'clock sharp.
- The definition of a sharp is something with a pointed end.
An example of a sharp is a needle.
- suitable for use in cutting or piercing; having a very thin edge or fine point; keen
- having a point or edge; not rounded or blunt; peaked: a sharp ridge, sharp features
- not gradual; abrupt; acute: a sharp turn
- clearly defined; distinct; clear: a sharp contrast
- made up of hard, angular particles, as sand
- quick, acute, or penetrating in perception or intellect; specif.,
- acutely sensitive in seeing, hearing, etc.
- clever; shrewd
- showing or having a keen awareness; attentive; vigilant: a sharp lookout
- crafty; designing; underhanded
- harsh, biting, or severe: a sharp temper, sharp criticism
- violent or impetuous; sudden and forceful: a sharp attack
- brisk; active; vigorous: a sharp run
- having a keen effect on the senses or feelings; specif.,
- severe; intense; acute; keen: a sharp pain, grief, appetite, etc.
- strong; biting; pungent, as in taste or smell
- high-pitched; shrill: a sharp sound
- brilliant; intense: a sharp flash of light
- cold and cutting: a sharp wind
- Slang attractively or stylishly dressed or groomed
- higher in pitch by a half step: C sharp (C?)
- out of tune by being above the true or proper pitch
Origin of sharpMiddle English ; from Old English scearp, akin to German scharf, Old Norse skarpr ; from Indo-European an unverified form (s)kerb(h)- ; from base an unverified form (s)ker-, to cut from source shear, harvest, Classical Latin caro, flesh
- in a sharp manner; specif.,
- abruptly or briskly
- attentively or alertly
- so as to have a sharp point or edge
- keenly; piercingly
- Music above the true or proper pitch
- precisely; exactly: used postpositively: one o'clock sharp
- a sewing needle with an extremely fine point
- Informal an expert or adept
- Informal shark, sharper
- Slang any sharp medical device, as a hypodermic needle: usually used in pl.
- a note or tone one half step above another
- the sign (?) indicating such a note
- Having a thin edge or a fine point suitable for or capable of cutting or piercing.
- a. Having clear form and detail: a sharp photographic image.b. Terminating in an edge or a point: sharp angular cliffs; a sharp nose.c. Clearly and distinctly set forth: sharp contrasts in behavior.
- Abrupt or acute: a sharp drop; a sharp turn.
- a. Intellectually penetrating; astute: was sharp in his analysis of the problem.b. Marked by keenness and accuracy of perception: sharp hearing.
- Crafty or deceitful, as in business dealings: sharp selling practices.
- Vigilant; alert: kept a sharp lookout for shoplifters.
- a. Briskly or keenly cold and cutting: a sharp wind.b. Harsh or biting in tone or character: sharp criticism.
- Fierce or impetuous; violent: a sharp temper; a sharp assault.
- Intense; severe: a sharp pain.
- a. Sudden and shrill: a sharp whistle.b. Sudden and brilliant or dazzling: a sharp flash of lightning.
- Strongly affecting the senses of smell and taste: a sharp pungent odor; a sharp cheese.
- Composed of hard angular particles: sharp sand.
- Music a. Raised in pitch by a semitone.b. Being above the proper pitch.c. Having the key signature in sharps.
- Informal Attractive or stylish: a sharp jacket.
- In a sharp manner: hit me sharp on the brow.
- Punctually; exactly: at three o'clock sharp.
- Music Above the true or proper pitch.
- Music a. A sign (♯) used to indicate that a note is to be raised by a semitone.b. A note that is raised a semitone.
- a. A slender sewing needle with a very fine point.b. A hypodermic needle: a canister for disposing of used sharps.
- Informal a. An expert.b. A shrewd cheater; a sharper.
verbsharped, sharp·ing, sharps Music
Origin of sharpMiddle English, from Old English scearp; see sker-1 in Indo-European roots.
- A surname.
|
<urn:uuid:535a7ad3-d4c3-46c5-9794-1d0b9a8b89be>
|
CC-MAIN-2016-50
|
http://www.yourdictionary.com/sharp
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541426.52/warc/CC-MAIN-20161202170901-00287-ip-10-31-129-80.ec2.internal.warc.gz
|
en
| 0.832555 | 1,119 | 3.28125 | 3 |
“Legato” is a musical term, meaning that the notes of a piece are played in a “connected” manner. This idea of connecting separate units to enhance overall expression can be applied to the letters setting a text in exactly the same way. FF Legato determines the extent to which the characters of the alphabet will visually connect and build proper word and line images. When a typeface succeeds in doing this, texts are more legible.
FF Legato is a sans serif typeface designed to build better word images by means of diagonal stress. The contrast between thick and thin parts leads the reader’s eye from one character to the next, and this improves legibility.
Most sans serifs have very basic geometric shapes, like Futura – even those built using classical proportions, like Gill Sans. But this is not the most satisfactory approach for long texts. FF Legato abandons the idea of a sans serif typeface that consists of simple rigid forms.
FF Legato was selected as one of the best typefaces of the first decade of the 21st century by the ATypI in their Letter.2 competition in 2011.
FF Legato supports 101 different languages such as Spanish, English, Portuguese, German and French in Latin scripts. (Please note that not all languages are available for all formats.)
|
<urn:uuid:b47f4ba0-4d03-4f19-8be5-2dd1a1e35d71>
|
CC-MAIN-2015-14
|
https://www.fontshop.com/families/ff-legato
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131296383.42/warc/CC-MAIN-20150323172136-00094-ip-10-168-14-71.ec2.internal.warc.gz
|
en
| 0.936625 | 276 | 3.375 | 3 |
Urban slum dwellers—especially in emerging-economy countries—are often poor, live in squalor, and suffer unnecessarily from disease, disability, premature death, and reduced life expectancy. Yet living in a city can and should be healthy. Slum Health exposes how and why slums can be unhealthy; reveals that not all slums are equal in terms of the hazards and health issues faced by residents; and suggests how slum dwellers, scientists, and social movements can come together to make slum life safer, more just, and healthier. Editors Jason Corburn and Lee Riley argue that valuing both new biologic and “street” science—professional and lay knowledge—is crucial for improving the well-being of the millions of urban poor living in slums.
Jason Corburn is Associate Professor at the University of California, Berkeley, jointly appointed in the Department of City and Regional Planning and the School of Public Health, and Director of the Center for Global Healthy Cities.
Lee Riley is Professor of Epidemiology and Infectious Diseases and Chair of the Division of Infectious Diseases and Vaccinology at the School of Public Health, University of California, Berkeley.
"Ultimately, the editors’ conviction in convening Slum Health: From the Cell to the Street is resoundingly clear: Scholars of all stripes have a responsibility “to recognize the human right of the urban poor to lead a healthy life and to offer some strategies toward this goal”. This volume moves us forward on both counts."—Medical Anthropology Quarterly
brings a breath of hope to equip managers and community in constant struggle to reduce the inequities in health and living conditions.”—Waleska Teixeira Caiaffa, MD, MPH, Professor of Epidemiology and Public Health, Director of Belo Horizonte Observatory for Urban Health, Federal University of Minas Gerais
“Jason Corburn and Lee Riley have excellently refocused our attention on an important but neglected international issue. Using an in-depth case-study approach, their work is global in scope and emphasizes community-based responses and social justice.”—Vinit Mukhija, author of Squatters as Developers? Slum Redevelopment in Mumbai
2017 British Medical Association Book Awards, Highly Commended Public Health Category, British Medical Association
|
<urn:uuid:59d66a26-3a5b-4aba-a65e-0f09323bbf30>
|
CC-MAIN-2018-17
|
https://www.ucpress.edu/book.php?isbn=9780520281073
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945552.45/warc/CC-MAIN-20180422080558-20180422100558-00298.warc.gz
|
en
| 0.922395 | 480 | 2.5625 | 3 |
As we move towards summer, a lot of people talk about heading to the beach, summer-wear and all things outdoors. With the extremely high temperatures during the summer, most people love to go swimming. It is therefore imperative that every child needs to have access to swimming lessons, not only because it’s an excellent form of exercise….. but most importantly for safety purposes. Swimming instructors have reservations when training disabled children and some even turn them away.
To tackle this challenge, we are going to look at some simple and effective tips that one can employ to teach a deaf child how to swim. Firstly, when you are teaching a deaf child to swim you need to speak clearly and avoid mumbling or speaking under your breathe. Most deaf children can read lips, so make sure you are facing them and make eye contact before you begin speaking so that they know you are addressing them. Speaking slowly and clearly will ensure effective communication. When you speak, also make use of sign language and this will make your instructions easily understandable. Learning basic sign language is not as challenging as one might think.
The use of pictures and diagrams to further illustrate your instructions is also crucial. Visual aids attract the child’s attention and they are able to emulate and enact what they see.
Designate special signals for getting the deaf child’s attention. These should be communicated very well so that when you give the signal, the child knows exactly what to do. For example, starting or stopping an activity and a special signal that will be used only in emergency situations. (Try give an example of a sign)
Another tip is to ask the child to repeat instructions and give them an opportunity to ask questions. Everything will run smoothly when everyone understands what action they need to be taking. When the deaf child repeats the given instructions correctly, it gives the instructor the confidence that learning is taking place and this benefits the confidence of the instructor and the child.
Always remember that safety comes first in any situation. Keep an eye on the child and ensure that all safety measures are in place both in and out of the pool to avoid any accidents.
When your child is deaf, teaching them to swim will certainly seem like an overwhelming task. Try to use these tips and see how helpful they are and your child can begin to experience the joy of swimming.
|
<urn:uuid:a3746867-c135-4f63-b86c-e21deafbbf09>
|
CC-MAIN-2020-16
|
http://paarlhearing.co.za/5-tips-teaching-deaf-child-swim/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371830894.88/warc/CC-MAIN-20200409055849-20200409090349-00379.warc.gz
|
en
| 0.958471 | 472 | 3.265625 | 3 |
What is Modernism
Before analysing what influenced modernism, let us see what modernism is. Modernism is an artistic movement that aimed to depart significantly from classical and traditional forms, during the late 19th and early 20th centuries. Modernism had a major impact on a variety of subjects and fields such as art, music, literature, and architecture. It is generally considered a way of thinking or a worldview than a movement or a style. Modernism is a radical approach that aims to give a new lease of life to the Western perspective on life, art, politics, and science.
Characteristics of Modernism
- Departure from the classical and traditional forms of art
- Rejection of all religious and moral principles as the only means of social progress
- Focus on inner self and consciousness
- Rejection of the ideology of realism.
What Influenced Modernism
Technological innovations and the impact of the First World War are two main elements that influenced modernism. By the advent of the twentieth century, the western society has been transformed by all the new discoveries, inventions and technological innovations such as the automobile, radio, incandescent light bulb, aeroplane and X-rays. These innovations also challenged the traditional notions of time and space, which made people question their way of life. The horrors of the First World War was also instrumental in changing people’s perspectives about reality and life. It was argued that if the nature of reality or life itself was in question, the art too would have to make a radical change and break away from the conventional, accepted forms.
Works of some prominent theoreticians and philosophers also influenced this modernist movement. Some of these figures include Sigmund Freud, Carl Jung, Henry Bergson and Friedrich Nietzsche.
One of the main differences between modernism and the movements that preceded is modernism’s rejection of ornamentation. This quality was influenced by the arts and crafts movement, which used simple forms and styles.
Thus, it can be said that the impact of technological innovations, the First World War, psychological and philosophical theories of the time, and styles like arts and crafts movement influenced modernism movement.
“Piet Mondrian, 1909, View from the Dunes with Beach and Piers, Domburg, MoMA” by By Piet Mondrian – www.moma.org (Public Domain) via Commons Wikimedia
|
<urn:uuid:0d7e34a3-3f32-423b-a872-7b16bec06957>
|
CC-MAIN-2023-23
|
https://pediaa.com/what-influenced-modernism/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653183.5/warc/CC-MAIN-20230606214755-20230607004755-00146.warc.gz
|
en
| 0.935036 | 495 | 3.953125 | 4 |
The Scottish Executive, in 2001, defined adult literacy as, “The ability to read and write and use numeracy to handle information, to express ideas and opinions, to make decisions and solve problems, as family members, workers, citizens and lifelong learners.”
Pete Ashton writes on his blog ASH-10:
Digital literacy means being able to take digital stuff [and] make new things with it, just as literacy means taking words and making new sentences with them. Literacy is about understanding the rules of a thing so that they can be worked within or broken as applicable. It’s about making the world our own. This is why we teach reading and writing to children, not so that they can fill out forms or write tedious reports, but that they might question and understand the world in which they live in.
So, what should people know in order to be digitally literate? If we’re going to teach it like a class, what is the curriculum? Most importantly, how can we move away from rote learning of “computer skills” towards understanding the “rules of the thing”.
There are no courses like this in my local community college catalog but here are a few I’d like to see:
Web Browsers – History and Development
For many people, the World Wide Web and the Internet are synonymous. The web browser is the software through which we experience the web. In this course, we will learn the purpose of the web browser and its function in the online experience. We will also explore its history, from the early days of Mosaic (the first Internet-connected software to display images inline with text), through the rise of Internet Explorer and Netscape, to today’s modern Firefox and Chrome browsers.
Cloud Computing and the Rise of Online Applications
- Data portability
- Future trends
And once the programs have moved to the cloud, why not move the computers there too? Cloud computing also encompasses the outsourcing of hardware, eliminating the need for a closet full of servers.
Hyperlinks subvert hierarchies – David Weinberger
The term hyperlink was coined in 1965 by Ted Nelson, the founder of Project Xanadu, at Harvard University. Nelson hoped to facilitate non-sequential writing, in which the reader could choose their own path through a document. Project Xanadu was largely abandoned by 1989, when the English physicist Sir Tim Berners-Lee wrote a proposal for what would become the World Wide Web, a system of interlinked pages, housed on the Internet and navigated using hyperlinks.
The hyperlink is a radically different way of connecting people to information. In this course, we examine the effects of organizing information in a non-hierarchical system.
Evaluating Online Information
True or false?
SECURITY ALERT: $32,000 worth of UPS uniforms have been purchased over the last 30 days by person(s) unknown. Law enforcement is working on the case however no suspect(s) have been indentified (sic). Subjects may try to gain access by wearing one of these uniforms. If anyone has suspicions about a UPS delivery (i.e., no truck but driver, no UPS identification, etc., contact UPS to verify employment).
Assessing the accuracy of information found online is not always easy. This course draws on the journalistic tradition of verifying sources and establishing their trustworthiness. By considering factors such as verifiability, transparency, relevance, bias, clarity and validity, we can evaluate which online sources to believe and which to ignore.
It seems like everyone online suffers from ADOBSO (Attention Deficit Ooh…Bright Shiny Object), so how do we write in a way that captures their interest? This course looks at online comprehension studies to find effective writing styles. We will also practice writing for various online venues including blogs, web pages, Wikipedia, forums, emails and Twitter.
Syndication and Federation
Release your content into the wild using syndication. Share functionality with other online services using federation. This course examines the current state of machine-to-machine communication on the Internet and how users and site operators can leverage these connections. Technologies covered include RSS, oAuth, Facebook Connect, Friend Connect and Google Wave.
|
<urn:uuid:9ac0d21c-9601-4c31-93b4-a27a104f2609>
|
CC-MAIN-2017-17
|
https://www.gregfalken.com/2009/11/teaching-digital-literacy/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120187.95/warc/CC-MAIN-20170423031200-00411-ip-10-145-167-34.ec2.internal.warc.gz
|
en
| 0.938722 | 878 | 3.21875 | 3 |
BPMphysio wearable device helps track limb movement
Physiotherapists have traditionally used fairly rudimentary manual goniometers (medical protractors) to measure the movement of body parts. BPMphysio is a wearable device that uses a variety of sensors to measure movement accurately. It is aimed at helping to improve physio care.
BPMphysio was exhibited at last week's Medtec UK show, having been launched by BPMpro in October last year after two years of development. It uses accelerometer, magnetometer and air pressure sensors to detect movement. The device also features Bluetooth connectivity to relay data to its accompanying computer software.
By using the device to accurately measure patient movement and using its software to record the data, clinicians can both be more certain of a patient's movement capability and better visualize the data collected, including feedback from 20 key joint motion tests. Data can be manipulated on-screen and viewed against historical records.
The BPMphysio is worn strapped to a limb to be examined, much like a fitness tracker. As the limb moves, the sensor transmits the data collected to a PC or tablet running the BPMphysio software. This software records the motion and displays it on-screen in chart and table form, as well as on a moving avatar.
BPMphysio was created to help both the physio and the patient better understand the capability of the patient's limb movement and any change over time. With this is mind, the software has been designed with patients in mind.
"The user interface is designed to be patient-centric," explains Martin Gossling, CEO at 270 Vision, the parent company of BPMpro, to Gizmag. "This means the patient can clearly see how well or not they are recovering without having to understand the physio terminology. They can also see clearly their progress over time."
"Clinicians get access to digital body measurement in a very cost effective package," continues Gossling. "The software also enables them to focus on the patient rather than having to worry about writing down results or even running software, as it is triggered by the sensors."
In addition to tracking the movement of a limb, BPMphysio can automatically average the outcomes of any number of tests in a cycle, store pain-points and take into account a limb's active and passive range of motion. Data can also be fed to the software over the web, allowing for remote patient monitoring.
Upcoming developments will include a free-form measurement module for 3D analysis and visualization of complex joints such as the shoulder., which will be released in June. A gait analysis module is also due to be released in September.
BPMphysio is currently available in Europe, the Middle East and Australia, with a view to moving into the US shortly. The standard version is priced at £700 (about US$1,200).
|
<urn:uuid:d0a56ca9-9fad-4a59-a65e-8dc4f640c79f>
|
CC-MAIN-2019-47
|
https://newatlas.com/bpmpro-bpmphysio-limb-movement-tracker/32186/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670535.9/warc/CC-MAIN-20191120083921-20191120111921-00125.warc.gz
|
en
| 0.959257 | 593 | 2.59375 | 3 |
Why would 19th-century doctors want to ban piano lessons for girls? Did they truly believe that learning to play music could cause sexual and neurotic disorders? Or were there sociological reasons for picking on the piano as a potential danger? Michael Regnier conducts a noteworthy investigation into the relationship between music, medicine and society.
For as long as there has been music, people have tried to control it. In Plato's 'Republic', Socrates deemed the traditional lyre acceptable, but the new-fangled psalteries and harps were purged from the city for having "a wide a range of notes and modes". By the 19th century, science and medicine had been co-opted into arguments that certain forms of music were unsuitable for certain people. Today, new music can still spark concerns - sometimes hyped to hysterical proportions - that are couched in medical terms, even in the absence of any scientific evidence for the supposed effects.
A book published this summer - 'Bad Vibrations: The history of the idea of music as a cause of disease' - examines this trend. It describes several episodes of pseudo-scientific musico-moral panic, including the 'piano plague' of the 19th century, which particularly intrigued me. I spoke to the book's author Dr James Kennaway, neurologist Professor Tim Griffiths and music scholar Dr Briony Cox-Williams to explore further the connections between music and medicine.
Two hundred years ago, the piano was a potent symbol of revolutionary movements in music, science and politics.
As its name was intended to convey, the pianoforte was the first keyboard instrument on which individual notes could easily be played soft ('piano') or loud ('forte'), adding more potential for musically dynamic performance. Its invention coincided with stirrings of a shift in musical aesthetics towards more personal expression and interpretation of the score. Technical innovations forged in the industrial revolution enhanced pianos' range and resonance, brought their prices down and made it possible for them to be built upright so they could fit into spaces less accommodating than aristocratic country piles.
For the burgeoning middle classes across Europe and North America, empowered through the social and cultural consequences of civil wars and rebellions, the piano became the instrument of choice to play and display in their homes.
By the second half of the 19th century, music critic Eduard Hanslick was complaining about amateurs of all social stripes indulging their new passion in Vienna. He called it "die Klavierseuche", the piano plague: an epidemic of ivory-tinkling emanating from townhouse windows. Victims would play scales and exercises for hours on end, getting familiar chords wrong and constantly failing and starting again, jarring the ears and jangling the nerves of more sophisticated music lovers in the neighbourhood.
Hanslick's description of the proliferation of bourgeois piano playing as a 'plague' chimed with some contemporary medical attitudes to music, which had shifted significantly since the previous century.
In the 1700s, a private physician passing through his patron's stately home may well have smiled benignly upon hearing the daughter of the house practising on the piano. Indeed, he may even have prescribed it himself as a therapy for calming and refining the young lady's nerves.
Come the 19th century, however, doctors changed their tune to the extent that some of them wanted an outright ban on piano lessons for girls. As Dr James Kennaway, the author of 'Bad Vibrations' and a medical historian at the University of Durham, has written: "Many of the era's leading psychiatrists and gynaecologists argued that music could not only excite the imagination…but also over-stimulate the nervous system directly, playing havoc with vulnerable female nerves and reproductive organs, and warned of the consequences of music lessons on the developing bodies of teenage girls."
Kennaway stumbled across an account of the unhealthy effects of music while flicking through an old gynaecology textbook in Wellcome Library. He checked other works to see whether this was an isolated case: every gynaecology textbook of the era that he looked in contained a reference to music in the index. However, the various books had very different explanations for how music affected women's health.
"French authors thought that playing music was a sensual, stimulating activity that could lead to early menstruation and sexualisation of young women," he says. "On the other hand, the Americans tended to argue that music was such a dry, academic subject for girls to study that it could delay or even prevent menstruation.
"They all agreed it was something to do with sex."
Modern neuroscience shows there is no foundation to their theories, which might suggest these men worrying about women playing music had political motives. Medicine, especially gynaecology, was often used to shore up traditional social structures, including the unequal roles of men and women. While acknowledging this, Kennaway says the doctors weren't necessarily consciously embellishing their casenotes, but may have been genuinely searching for an explanation of the symptoms they were seeing. As a relatively new phenomenon, piano lessons were worth investigating as a possible factor.
In the absence of reliable neurology, though, all manner of theories could flourish without any actual evidence, depending rather on the prevailing prejudices of the time and place in which the doctor was working.
"From my knowledge of Fanny, I should say that she has neither inclination nor vocation for [musical] authorship. She is too much all that a woman ought to be for this. She regulates her house, and neither thinks of the public nor of the musical world, nor even of music at all, until her first duties are fulfilled." -Felix Mendelssohn, in a letter to his mother, 1837
Fanny Mendelssohn and her younger brother Felix grew up together in Hamburg and then Berlin in the early 19th century. Each was provided with a first-rate musical education and each showed a prodigious talent for playing and writing music. For Felix, this was sufficient to risk pursuing a career as a professional musician; Fanny, whose talent was no less than Felix's, could not dream of taking the same path.
Both continued to compose and perform, but while Felix did so in public to great acclaim, Fanny's works remained for the most part unpublished. She was restricted to trying to find time for her music amid looking for a husband and then looking after her husband and household, which society dictated should be her first and foremost responsibility. To deviate from that role would have been madness.
Creativity in women has always been a fraught subject, says Dr Briony Cox-Williams, a pianist and scholar at the Royal Academy of Music in London: "Women were not supposed to be proud of their accomplishments, regardless of how much talent they had, in music or any other public activity. Creativity was not seen as feminine, and not being feminine was linked to insanity - and still is."
Eccentricity, 'moral weakness', and even perversion could be tolerated in men of sufficient genius (Richard Wagner, for example, was "thoroughly perverted", according to Kennaway), but no amount of talent was enough to save a creative woman from the madhouse. Kennaway has previously described the fate of Parisian pianist Hersilie Rouy, who spent 15 years in Charenton asylum. Her psychiatrist "suggested that her insanity (which she vehemently disputed) had been caused by excessive music. In a letter of 22 May 1869 he wrote that, 'she tired her nervous system by an excess of late nights and by her diligence in study and in her devotion to music'."
19th-century women did have one legitimate outlet for performing music, however: salons. Music was an important part of proceedings at these domestic social gatherings, and there was often a piano in the room for men and women alike to play for the assembled guests. In terms of how the piano developed as an instrument, the salon was just as influential as the concert hall.
Invented around 1700, pianos had quickly taken their place in aristocratic drawing rooms alongside existing domestic keyboard instruments like the clavichord and the dulcimer. They were among the few instruments considered appropriate for women because they had a quiet, contained sound that suited contemplative playing in private rather than public performance. Like reading a poem out loud to fully understand its rhymes and rhythms, playing music was only intended to help upper-class ladies appreciate what made the great composers so good. It was not about putting on a show.
The piano seems to have offered manufacturers greater scope for innovation than the other keyboards. Technological advances in construction and in the action of the keys and hammers soon gave the piano a larger, brighter sound, which helped make it the instrument of choice for the salon. It wasn't long before it found its way in to the concert halls as well, first as an accompaniment (from around the 1780s), then as a solo instrument in its own right (from 1837).
Of course, at public performances, it was usually a man playing music composed by men. Music composed by women was considered an entirely separate genre, rarely heard in public but more common in the salon.
'Salon music' is a rather derogatory term these days, but in the 19th century, salons were hotbeds of artists and ideas. They seem to have escaped the attention of the doctors decrying female music-making - perhaps because those doctors weren't invited.
It was considered appropriate for a woman to be in charge of a salon because it was hosted in the home, the female domain. In fact, well over 90 per cent of salons were run by women. The 'salonnière' would often present herself as a muse for the artists, sculptors, philosophers, scientists, writers and musicians she invited to attend.
But far from being a passive presence, says Cox-Williams, these women could use the salon as a sort of university: "A proficient salonnière could steer the intellectual direction of the group attending her salon to reflect her own tastes and interests. She was in control, she had right of refusal for guests, and she was able to learn what couldn't be learned by a woman elsewhere."
Fanny Mendelssohn established a famous salon in Berlin, though not until she had fulfilled her primary duties as a woman - finding a husband, giving birth to their son and establishing her household. As well as being an outlet for Fanny's compositions, and a socially acceptable place for her to play and conduct her own music, her salon became an essential part of Berlin's music scene. It was no mere drawing room with a piano and a few chairs, though: there was space for an orchestra and an audience of up to 250, and she regularly hosted full operas.
As the scale of Fanny's salon suggests, what took place there was not cut off from the public sphere. Nevertheless, the salon was a safe place for composers to premiere new pieces away from the attentions of the censors, and many preferred its relatively intimate setting to the grandiose public concert hall.
It particularly suited the style of Frédéric Chopin, the Polish composer and piano virtuoso, who often premiered work in salons or composed special arrangements of his orchestral works for them. As a pianist, he made full use of the piano's dynamic range, and where a very soft note might be lost in the concert hall, it would sing in the salon. He worked with a leading Parisian piano manufacturer, Camille Pleyel, to develop pianos particularly well suited to his style and the salon environment.
Chopin once said: "If I'm not feeling strong enough, I'll use an Érard; if I feel alert, I prefer a Pleyel." Sébastian Érard was Pleyel's great rival in piano-making. His pianos were powerful instruments, sacrificing a degree of clarity at the quieter end of the range in favour of the capacity to gloriously fill a concert hall. Just as Pleyel had Chopin on a contract, Érard's 'poster boy' was Hungarian composer and pianist Franz Liszt. More of a showman than Chopin, Liszt preferred the rich, robust Érard: the definitive concert grand.
At home, the piano was still largely seen as an instrument for women and children. However, the same technological developments that helped the piano rise to the demands of the salon and the concert hall meant that it had become less about contemplative education and more about expressive performance.
This was the sociopolitical undercurrent beneath the medical profession's unease with people, and young middle-class women in particular, learning to play the piano. There was less concern about listening to music, which may seem odd given that music clearly has the capacity to transport a listener (or at least to change his or her mood) - which would seem to suggest some degree of neurological effect.
Tim Griffiths, professor of cognitive neurology at Newcastle University, dismisses out of hand the 19th-century ideas that playing music could accelerate or stunt girls' neural or sexual development, but he agrees that listening to music can have a more subtle effect in our brains.
"Music is capable of producing a type of transformation such as a shiver down the spine," he says, recalling a seminal experiment done about ten years ago. "A group of researchers were seeking the brain basis for the shiver down the spine. Participants brought in music that induced a shiver, and music that did not.
"PET scans of participants' brains showed different patterns depending on whether they were listening to their shiver or non-shiver music. The difference was not in the auditory cortex, as might have been expected given that is where sounds are processed, but in the more fundamental limbic system. All the regions implicated in the shiver were those involved in basic emotions and arousal."
Music, then, has a hotline to some of our most deep-seated emotions, but this does not directly support the hypothesis of the 19th-century medics that learning to play music would alter physiological functions like menstruation. Rather, it confirms that music is a powerful stimulus in certain emotional circuits in our brains.
We used to think that music was a purely social phenomenon because it varies from culture to culture. However, the appeal of music is universal: "No culture has been discovered that does not have music," says Griffiths. In the light of findings that the human brain is equipped with neural circuitries that deal exclusively with music, it might be more accurate to think of music as something we have adapted to respond to.
As Professor Isabelle Peretz, another neuroscientist who specialises in music, has said: "It seems that emotional responses to music can be aroused…as reflexes, by being the product of dedicated neural structures. Indeed, musical emotions occur with rapid onset, through automatic appraisal, and with involuntary changes in physiological and behavioural responses."
Music has a fundamental role in our lives, whether we play, listen to or just hear it. Its significance is at its clearest, perhaps, when people lose their ability to process music properly. As well as doing research into auditory cognition, Griffiths specialises in treating people with musical disorders. These can be present from birth or occur later as a result of developmental and degenerative diseases and some rare types of stroke.
Some of the people he sees have amusia: an inability to perceive music normally, often called tone deafness. "People with amusia have a perceptual disorder that is often, but not always, accompanied by a dislike of music," Griffiths explains. "The observation that some amusic people retain their enjoyment of music is interesting because it suggests a difference between the pathways for recognising music and for its emotional effect."
For those who experience music as intensely irritating noise, however, their disorder presents social challenges that the rest of us hardly notice. When a person with amusia has friends round, they may well put some music on in the background - music is an inherent part of many social norms and the pressure to fit in with them is considerable, even if you hate the sound of it.
Being so central to our social lives, it is not surprising that musical expression is often subjected to authoritarian efforts to define, limit or control it. Music is directly censored in many countries even today, but attempts to turn music into a health risk by twisting some scientific theory are driven by similar fears of revolution. Whatever spurious medical discussion surrounds panics such as the piano plague, at their heart is a perceived threat to the established social order.
The piano plague was succeeded by worries about the rise of jazz, then Beatlemania, then back-masking (supposed hidden messages that became audible when the music was played backwards). This type of concern has not been limited to music, of course, and other art forms have sparked their own brands of panic. Novels were considered decidedly dangerous for a while: as soon as 'ordinary' people became sufficiently well off to have separate bedrooms, others made it their business to worry about women (again) spending several hours a day reading in private. This was not much different to later concerns about teenagers having televisions in their bedrooms, watching video nasties, downloading the terrors of the internet or Tweeting on their mobile phones all day.
Kennaway tells me about a recent trend for teenagers - boys in particular - to download audio tracks that claim to induce a drug-like state when listened to through stereo headphones. "It's called i-dosing and it is hardly music at all, just beeps and whistles," he says. "It's marketed as being like heroin for your ears, so of course the 'Daily Mail' was outraged and a school board in Oklahoma issued warnings. But there's no evidence that anyone has ever suffered from it."
Although it is the most recent manifestation of health scares related to music and sound, i-dosing is not the end of the story for Kennaway. His book ends by exploring the modern systematic use of music in 'enhanced interrogation'. "The USA uses both music with sexual or aggressive lyrics to assert their cultural supremacy, and 'futility music' such as playing the theme tune to 'Barney the Purple Dinosaur' to people for months at a time," he explains. "It doesn't leave any bruises, but it is very nasty."
As the medical discourse shifted from 18th-century perceptions of music as a healing, refining influence to, in the 19th century, being a health risk, it was perhaps inevitable that some people would push further in this direction. 'If music can be harmful, is someone going to try and use it against us?' they asked in the Cold War years of the 20th century. And then the question became: 'Can we use music to harm others?'
Our success in making a weapon out of music has wrestled earlier misconceptions that music could be harmful into an ugly truth.
At least the piano is no longer considered a threat to the health of individuals or society. It has settled into a safe, established role, far from its revolutionary roots: it is a mainstay of the concert repertoire, of scales practised by middle-class children and of choirs singing in church and school halls.
Looking back, it is tempting to think that the piano was always this innocuous. In his essay 'Musica Practica', Roland Barthes uses the piano's rise and fall to illustrate the decline in people playing music at home: "Initially the province of the idle (aristocratic) class, it lapsed into an insipid social role with the coming of democracy of the bourgeoisie (the piano, the young lady, the drawing room, the nocturne) and then faded out altogether (who plays the piano today?)."
Hardly any trace remains of the instrument's notoriety during the "piano plague". We should bear in mind how quickly and completely we forget such threats the next time a new phenomenon is labelled a health risk with no supporting evidence.
Explore further: Adolescents involved with music do better in school
Barthes R (1977) Image, Music, Text. Fontana: London.
Kennaway J (2012) Bad Vibrations: The history of the idea of music as a cause of disease. Ashgate: Farnham, Surrey, UK.
Kennaway, J (2011) The Piano Plague: The nineteenth-century medical critique of female musical education. Gesnerus;68(1):26-40.
Mendelssohn Bartholdy P (ed.) (1864) Mendelssohn's Letters from 1833 to 1847. Longman Green, London.
Peretz I. The Nature of Music (accessed 20 July 2012).
Plato (1998) Republic (Waterfield R [tr.]). Oxford University Press Inc.: New York.
|
<urn:uuid:e4e8d548-2a19-4582-b203-07a7f31f9997>
|
CC-MAIN-2016-07
|
http://phys.org/news/2012-09-piano-plague-d-minor.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701162808.51/warc/CC-MAIN-20160205193922-00128-ip-10-236-182-209.ec2.internal.warc.gz
|
en
| 0.97708 | 4,337 | 2.75 | 3 |
The National Gallery of Art in D.C. is having an exhibit featuring photography manipulation before Photoshop. Photographers have been manipulating and editing their images long before we had fancy editing software. We are so used to people making these changes on computers that it’s strange to think about how they could be done without current technology.
How did they do it? Well dodging and burning were terms that stemmed from an actual darkroom, not from computer programs. In simple explanation using a film negative and photo paper, dodging decreases the exposure for areas of the print that the photographer wishes to be lighter, while burning increases the exposure to areas of the print that should be darker.
I don’t know exactly how these images are created but we can guess. Double exposures, layering negatives or going as far to actually cut up and creatively place negatives on the photo paper while using a paper template to direct the light can be inferred. I really want to try this out in a darkroom myself! I feel like it would be a lot more exciting than looking at a screen and doing it.
I think it’s really great how such early photography shows such versatility and creativity. Photoshop is really cool and a great tool but I think it’s even cooler how these photographs can be created using light and paper the old fashioned way.
Any suggestions on how they were created? I’m not as darkroom savvy anymore, so it’s been awhile since I’ve been able to play around in one. If you have any ideas or information, please comment below. I’d like to share with others.
|
<urn:uuid:dc4f7203-8c2b-4426-be2c-810002f39ed9>
|
CC-MAIN-2018-30
|
https://visualindividual.co/2013/03/25/film-photo-manipulation-b-p-before-photoshop/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589237.16/warc/CC-MAIN-20180716080356-20180716100356-00528.warc.gz
|
en
| 0.966337 | 333 | 3.328125 | 3 |
As industrialization brought sweeping and dehumanizing changes to 19th-century England, a small group of artists reasserted the value of the handmade. Calling themselves the Pre-Raphaelites, they turned to the unlikely model of medieval European craftsmen as a way of moving forward. Victorian Radicals presents an unprecedented 150 paintings, drawings, books, sculpture, textiles, and decorative arts—many never before exhibited outside of the United Kingdom—by the major artists associated with this rebellious brotherhood.
Dante Gabriel Rossetti, John Everett Millais, William Holman Hunt, Edward Burne-Jones, and William Morris dubbed themselves the Pre-Raphaelites in reaction to the Royal Academy of Arts, whose methods to artmaking they regarded to be as formulaic as industrial methods of production. This movement had broad implications and inspired a wide range of industries to rebel against sterility and strive to connect art to everyday life.
The Pre-Raphaelites and members of the later Arts & Crafts Movement operated from a moral commitment to honest labor, the handmade object, and the ability of art to heal a society dehumanized by industry and mechanization. The works of the men and women presented in the exhibition illustrate a spectrum of avant-garde practices of the Victorian period and demonstrate Britain’s first modern art response to industrialization. These artists’ attention to detail, use of vibrant colors, and engagement with both literary themes and contemporary life, is evident in the paintings, watercolors, and superb examples of decorative art on view. Drawing on the renowned collection of the Birmingham Museum of Art in Birmingham, England, Victorian Radicals is a comprehensive consideration of the search for beauty in the age of industry.
|
<urn:uuid:c40e1c62-9b12-4237-972e-400ea06b2e23>
|
CC-MAIN-2019-51
|
http://seattleartmuseum.org/Exhibitions/Details?EventId=60751
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00270.warc.gz
|
en
| 0.931528 | 350 | 3.046875 | 3 |
The notion that what you eat causes ulcers has largely been discredited in the last few decades. Bacteria called Helicobacter pylori and/or chronic use of drugs such as aspirin and non-steroidal anti-inflammatories cause most ulcers, not foods. But if you have an ulcer, certain foods can aggravate it and worsen your symptoms, while other foods might improve your symptoms. Talk to your doctor about the types of foods best avoided in your particular situation.
High Soluble-fiber Foods
Eating a diet high in soluble fiber might help prevent gastric ulcers. A Harvard School of Public Health article published in the 1997 "American Journal of Epidemiology" reported that men with the highest soluble fiber intake reduced their risk of developing an ulcer by 60 percent. Foods high in soluble fiber include barley, oats, legumes, such as kidney beans, and fruits, such as apples, pears and prunes.
Foods High in Antioxidants
Fruits and vegetables are high in antioxidants, including flavonoids. Antioxidants have numerous health benefits; foods high in antioxidants help destroy harmful molecules that damage cellular DNA. Flavonoids, plant substances with various health benefits, can inhibit the growth of the bacteria that causes gastric ulcers, according to the University of Maryland Medical Center. Many fruits and vegetables contain high levels of antioxidants, including bell pepper, blueberries, cherries, green tea and squash. Foods high in flavonoids that might help eliminate H. pylori include apples, cranberries, garlic and onions.
Probiotic foods contain live bacteria cultures that can help reduce the number of harmful bacteria in the intestine. As many as 50 percent of Americans over age 50 carry the H. pylori bacteria in their gastrointestinal system, according to the Helicobacter Pylori Foundation, although only 10 to 15 percent develop ulcers. In a Swiss review of studies reported in the March 2007 issue of "The Journal of Nutrition," researchers found that probiotics reduced gastric irritation and improved healing when given along with antibiotics. Foods containing live bacteria include certain types of yogurt, fermented foods such as kimchi, miso soup, kefir and unpasteurized sauerkraut.
Drinks that increase acid production can worsen an existing ulcer and cause more pain by also irritating your stomach lining. Foods that might increase acid production include alcohol, coffee -- including decaffeinated coffee -- carbonated beverages and fruit juices with citric acid. Milk, once the mainstay of ulcer diets, is now considered to increase acid production and worsen ulcers, although it might have a temporary soothing effect, according to the Cleveland Clinic. Try cranberry juice or plain filtered water instead. Green tea might also have benefits in preventing or healing ulcers.
- University of Maryland Medical Center: Gastritis
- National Center for Complementary and Alternative Medicine: Oral Probiotics: An Introduction
- The Journal of Nutrition: Helicobacter Pylori and Probiotics
- Nutrition MD: Gastritis and Peptic Ulcer Disease: Nutritional Considerations
- American Journal of Epidemiology: Prospective Study of Diet and the Risk of Duodenal Ulcer in Men
- MayoClinic.com: Cholesterol: Top 5 Foods to Lower your Numbers
- University of Washington: Could Bacteria Be One of the Causes of Heart Disease? The UW Leads an $11 Million Study to Find Out
- Cleveland Clinic: Peptic Ulcers
- alcohol image by ivan kmit from Fotolia.com
|
<urn:uuid:3c511ecb-2960-4897-8f8d-970ddae247b5>
|
CC-MAIN-2017-09
|
http://healthyeating.sfgate.com/ulcer-friendly-foods-3909.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171620.77/warc/CC-MAIN-20170219104611-00266-ip-10-171-10-108.ec2.internal.warc.gz
|
en
| 0.9223 | 731 | 3.359375 | 3 |
The application of the truck determines the required technology. For vocational trucks the engine and tires will be the main focus.
Vocational trucks should see a 10% increase in fuel economy by model year 2018.
Starting with model year 2014, heavy-duty trucks will be subject to a fuel-economy standard.
Under a recently announced rule, the nation's fleet of medium- and heavy-duty trucks must meet fuel efficiency and greenhouse gas emissions standards for the first time beginning with model year 2014. This impacts vehicles from semi trucks to the largest pickups and vans, and all types and sizes of work trucks and buses in between.
For the purposes of the rule, the Environmental Protection Agency (EPA) and National Highway Traffic Safety Administration (NHTSA) define a heavy-duty fleet as all trucks with a gross vehicle weight (GVW) at or above 8,500 lbs. They estimate that the rules will save about 530 million barrels of oil over the life of vehicles built for the 2014 to 2018 model years. This reduced fuel use will allow vehicle owners to realize $50 billion in fuel savings, or $42 billion in net savings when considering technology costs.
The American Trucking Associations (ATA) support the efforts to increase fuel economy. "ATA and our members unveiled a sustainability plan for our industry in May of 2008," recalls Glen Kedzie, ATA vice president and environmental counsel. "One of the six pillars in the plan was to support fuel economy standards for trucks that were both economically and technologically feasible. Fuel and labor are the top two operating expenses in the trucking industry. The fuel economy for long-haul trucks has been virtually flatlined over the last 25 years at around 6.0 to 6.5 mpg."
But regulating fuel economy for heavy trucks is much different than setting Corporate Average Fuel Economy (CAFE) standards for passenger vehicles. The rule not only addresses trucks that carry freight, but certain vehicles that also transport passengers. Two types of standard metrics were therefore adopted: payload-dependent gram per mile (and gallon per 100 mile) standards for pickups and vans; and gram per ton-mile (and gallon per 1,000 ton-mile) standards for vocational vehicles and combination tractors. These metrics acknowledge that moving heavier loads burns more fuel and emits more CO2 than moving lighter loads.
Complexity addresses different needs
The EPA and NHTSA standards divide heavy trucks into three main categories: combination tractors, heavy-duty pickup trucks and vans and vocational vehicles. Regulation targets will be phased in with model years 2014 through 2018.
Certain combination tractors (also known as semi trucks) will be required to achieve approximately 20% reductions in fuel consumption and greenhouse gas emissions by model year 2018. This would save of up to 4 gal. of fuel for every 100 miles traveled.
For heavy-duty pickup trucks and vans, separate standards are required for gas- and diesel-powered models. These vehicles will be required to achieve up to about a 15% reduction in fuel consumption and greenhouse gas emissions by model year 2018.
Vocational vehicles must reduce fuel consumption and greenhouse gas emissions by approximately 10% by model year 2018. This could save an average of 1 gal. of fuel for every 100 miles traveled.
At first glance, the heavy truck fuel standards seem complex. This was by design. "We are not a one-size-fits-all type of industry," says Kedzie. The EPA and NHTSA worked closely with the entire industry, including engine, truck and tire manufacturers.
The ATA was also intimately involved in every stage. "We tried to make sure regulators understood the difference between regulation of automobiles and light-duty vehicles with CAFE standards and the regulation of trucks," says Kedzie.
The result is there are different targets depending upon the type of truck and its intended application. "A lot of thought went into this," Kedzie explains. "The different bins that you are placed into will have different targets, both on the vehicle side of the equation and the engine side of the equation. It is a very different and very unique approach compared to CAFE standards for cars."
Use of existing technology
One of the biggest fears with any new legislation is driving up costs through extensive R&D. To minimize these fears, there were a lot of meetings between the government agencies and manufacturers.
"The manufacturers sat down over months and talked to the agencies about where they were at with the development of different technologies," says Kedzie. "They also talked about what could be accomplished within the given time frame under the rule."
The plan is to use technologies that have already been developed and accepted by the trucking industry, such as improved aerodynamics, fuel-efficient tires, weight reduction, speed governing and idle reduction. "This is not a technology-forcing rule for the most part," asserts Kedzie.
A technology-forcing rule is when there is not an exact path for you to take today and the technology isn't currently developed. "With technology-forcing standards, you more or less have to figure it out and hit established targets," says Kedzie. The emissions regulation that went into effect in 2007 and was phased in through 2010 is a good example of this type of rule. "EPA started working on that rule in the latter part of the '90s, finalized the rule in 2000, and established targets that took effect in 2007 and 2010."
Unlike those regulations, the fuel economy rules can largely be met with off-the-shelf technologies. "We know what these technologies are, so we are dealing more in the realm of the known vs. the unknown," says Kedzie. For instance, fuel-efficient tires will play a key role in meeting the regulations. "All of the technologies that are being relied upon by manufacturers to meet the 2014 vehicles targets are readily available today."
Take vocational trucks, for example. They account for a large and diverse segment of the heavy truck market. "Under the rule, vocational vehicles include all straight trucks, as well as certain tractors," says John Walsh, Mack Trucks. "EPA requires design and spec changes in vocational vehicles that they estimate will deliver approximately 10% reduction in fuel consumption and greenhouse gases by model year 2018. The expected vocational fuel savings are predicated entirely on engine and tire changes."
The first wave of regulations will not require any ground-breaking technologies. "We're confident that the first round of targets can be met through the strategic deployment of existing technology, including greater utilization of aerodynamic components and other equipment, like low rolling resistance tires," says Walsh. "Achieving the 2017 standards will likely require engine-related technologies that are not part of our current product offering."
Impact on efficiency and purchase price
Regulators took into account the way heavy trucks are used when formulating this regulation.
For instance, the regulations for combination tractors are divided into categories based on cab height and whether it is a sleeper cab or a day cab. The highest efficiency gains are expected from high-roof, Class 8 sleeper cab trucks, which tend to be running at continuous and higher speeds over long stretches of highway. "You can get a lot more bang from improved aerodynamics, idling reduction and fuel-efficient tires," says Kedzie.
The vocational segment is treated much differently. Efficiency gains from vocational trucks will come mainly from engine tweaks and tire improvements. "On the vocational diesel engine side, you are looking at about a 3% to 5% improvement starting in 2014," says Kedzie. Gasoline engines get a little more time. "The target is 5% by 2016."
Of course, such gains come at a cost. The EPA and NHTSA provide estimates on pricing, but the final costs will be determined by how much change is required for a particular vehicle.
"When you try to wade through the different costs and the cost breakdowns, it is somewhat difficult to find where some of these figures are coming from," says Kedzie. "When it comes to long-haul trucks, over half of the cost increase was associated with the purchase of an auxiliary power unit (APU) to reduce idling."
The APUs, along with other fuel-saving technologies used, will run several thousand dollars. "It really rests on how big a package you purchase," Kedzie notes. "You get better fuel economy if you stack different technologies." But the return on investment may also take a bit longer.
"Cost increases on vocational trucks will not be substantial given that manufacturers will need to hit certain efficiency targets from modest engine fixes and increased sales of fuel-efficient tires," Kedzie points out. Estimates from the EPA and NHTSA place the total price increase for vocational trucks at less than $600 per vehicle. Given these estimates, the return on investment could be rather short.
Actual costs may vary, however. "It's too soon to say what the impact on purchase price will be," says Walsh. "Meeting the 2017 (model year 2018) requirements in particular will almost surely require new engine-related technologies, with associated R&D and commercialization costs. Manufacturers will also need to dedicate significant resources to developing and maintaining systems and processes for tracking and reporting performance data."
Customers may have to re-think how they currently spec trucks. "We're committed to doing everything we can do to minimize the rule's effects on our customers, but it seems inevitable that in some instances the way trucks are spec'd is going to have to change," Walsh states. "Such changes could further pressure initial purchase prices. We'll focus on ensuring as rapid a return as possible for our customers on any additional up-front costs. The evolution of the cost of diesel will be a factor in that equation."
In the ultra-competitive truck market, OEMs were already heavily focused on fuel economy improvements. "Certainly economic and competitive forces would have driven us to continue improving fuel economy absent any regulation," says Walsh. "When it became clear that regulations were coming, we engaged in the process, looking to ensure as workable a rule as possible.
"While we're pleased the EPA and NHTSA sought to work with the industry, we do have concerns with aspects of the regulation and how it's likely to affect our customers," he adds. "We're committed to doing everything we can do to minimize the impact. A key challenge will be striking the right balance between truck specs that both meet customer expectations and allow us to deliver on the requirements of the regulation."
Change on the horizon
The rules will impact truck selection sooner than you might imagine. Remember, model year 2014 trucks can appear as early as January 2013. And there are incentives for manufacturers to start introducing these technologies earlier.
Starting with the 2013 model year, which can be produced and made available as early as January 2, 2012, manufacturers can accumulate credits for meeting certain targets earlier than required. These credits can then be banked and used to offset shortfalls in the future, or they may be sold.
"There is every evidence that they are going to introduce technologies as early as possible to accumulate those credits in 2012 and 2013 that they can use to offset shortfalls to be in compliance with any targets they have to meet," says Kedzie. "So change may begin to appear in a mere few months. They have every reason to get these improvements out there sooner rather than later so they have credits to stockpile and store up for a rainy day."
|
<urn:uuid:d8c0d33d-ad0e-4d79-90bb-dc5979698557>
|
CC-MAIN-2014-23
|
http://www.forconstructionpros.com/article/10364973/regulation-cuts-heavy-truck-fuel-consumption?page=3
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997883466.67/warc/CC-MAIN-20140722025803-00176-ip-10-33-131-23.ec2.internal.warc.gz
|
en
| 0.967351 | 2,352 | 2.875 | 3 |
On this page:
Definition of the noun amblygonite
What does amblygonite mean as a name of something?
noun - plural: amblygonites
- a white or grey mineral consisting of lithium aluminum phosphate; a source of lithium
- lexical domain: Substances - nouns denoting substances
- more generic word: mineral = solid homogeneous inorganic substances occurring in nature having a definite chemical composition
- substance: atomic number 3 / lithium / Li = a soft silver-white univalent element of the alkali metal group; the lightest metal known
Alternative definition of the noun amblygonite
- [mineral] A mineral, a mixed fluoride and aluminophosphate of sodium and lithium that is an important ore of lithium.
Printed dictionaries and other books with definitions for Amblygonite
Click on a title to look inside that book (if available):
Amblygonite is the most important of these minerals, both on account of its high lithia content and on account of its ready solubility and consequent easy treatment. It occurs in nodules often as much as 200 to 300 lb. in weight. They are usually ...
The Pharmaceutical Era (1901)
and also with spodumene at Peru, “ Amblygonite is a mineral crystallizing in the triclinic system the crystals being large and coarse. The mineral is more commonly in columnar to compact masses ...
by A. Bishop, A. Woolley, W. Hamilton, Natural History Museum (London, England)
Occurrence Amblygonite is a rare mineral which occurs in granite pegmatites together with other lithium minerals such as spodumene, tourmaline, and lepidolite, and with albite, for which it may be mistaken. Vivianite Apatite 'r*••:*' . Apatite ...
Unfolding Our Light (2013)
Creating Crystal Mandalas to Awaken and Heal by Michael Eastwood
Amblygonite is a perfect balancer for the solar plexus ...
Volume 3: Flotation of Industrial Minerals by Srdjan M. Bulatovic
Amblygonite is a lithium phosphate that contains up to 10% Li2O. However, it has a secondary role in the production of lithium due to high phosphorus content. The color of amblyonite is white to greenish. This minerals contains 54% P2O5, ...
Properties, Identification and Use by Arthur Thomas
Amblygonite is a fluoro- phosphate of lithium and aluminium that usually occurs in a massive form. It shows a faint green or orange fluorescence under long-wave ultraviolet light, has a moderate heat sensitivity and is brittle. The relatively rare ...
by Nancy Honovich
somewhat rounded, like ascallopshell - siREAK white -Lussef glassy, greasy - Amblygonite is a phosphate mineral often foundin pegmatite veins with otherminerals, such aslepidoUSUALLYHAs AGLAssoon LAsh-SHAPED lite, spodumene.
The Encyclopedia of Crystals (2007)
by Judy Hall
Note: Amblygonite is a high-vibration stone. Astrophyllite Crystal system Chemistry Hardness Source Chakra Number Zodiac sign Beneficial for Triclinic ( KNa) 3 (FeMn) 7Ti25i8 (OH) 31 3 USA Higher crown 9 Scorpio Completing projects, ...
Mining Journal Volume C (1915)
Amblygonite is the principal ore mined; it averages about 7% lithium and is worth $38 per ton, f.o.b. the Atlantic Seaboard, which is equivalent to about $28 a ton f.o.b. Keystone. \Volframitc is Being Produced on a large scale at the Wasp No. 2.
Amblygonite is the principal ore mined; it averages about 7% lithium and is worth $38 per ton, f.o.b. the Atlantic Seaboard, which is equivalent to about $28 a ton f.o.b. Keystone. Wolfrumite is Being Produced on a large scale at the Wasp No. 2.
Encyclopaedia Metropolitana; Or, Universal Dictionary of Knowledge on an Original Plan Comprising the Twofold Advantage of a Philosophical and an Alphabetical Arrangement, with Appropriate Engravings Edited by Edward Smedley, Hugh James Rose, Henry John Rose (1845)
Mixed sciences, vol. 4
Amblygonite. Amethyst. Purple Quartz. VOL. VI. INDEX. Amianthinite. Amphibole. Arnianthoide. Amphibule. Arnianthus. Amphibole. Amiatite. Fiorite. Ammonia. Muriate. Sulphate. Ampelite. Amphibole. Amphigene. Amphodelite.
The London encyclopaedia, or, Universal dictionary of science, art, literature, and practical mechanics, by the orig. ed. of the Encyclopaedia metropolitana [T. Curtis]. (1839)
by Thomas Curtis (of Grove house sch, Islington)
Comprising the Definitions and Derivations of the Scientific Terms in General Use, Together with the History and Descriptions of the Scientific Principles of Nearly Every Branch of Human Knowledge by William Thomas Brande, George William Cox
Amblygonite. Wavellite. Lasionite. Turquois. Callais. Fischerite. Peganite. Lazulite. Childrenite. Evansite. YTTRLA. Phosphate of Yttria, or Xenotime. ZIRCONLA. Wöhlerite. 532.
Encyclopaedia Metropolitana (1845)
Or Universal Dictionary of Knowledge ... Comprising the Twofoldadvantage of a Philosophical and an Alphabetical Arrangement, with Appropriate Engravings by Edward Smedley, Hugh James Rose, Henry John Rose
Amblygonite, 501. Childrenite, 502.
A Reference Volume for All Requiring Quick Access to a Large Amount of Essential Data Regarding Chemicals, and Other Substances Used in Manufacturing and Laboratory Work by Francis Mills Turner
Amblygonite. A natural fluophosphate of aluminum and lithium, Li(AlF)P04. California and South Dakota. Ambrette. See Abelmoschus. American Ginseng. See Ginseng. American Hellebore. See Veratrum. American Ipecac.
by Albert Huntington Chester
Abrazite BREITHAUPT, A jEnigmatite Akontite Allogonite Allomorphite Alstonite Alumian Alumocalcite Alurgite Amblygonite Anauxite Anthogrammlte Antholite Antiediite Antimonial copper- glance ...
A Technological Dictionary: explaining the terms of the arts, sciences, literature, professions and trades (1846)
by W. M. BUCHANAN
10 26 Amblygonite .
by Richard Dennis Hoblyn
AMBLYGONITE. A rare mineral — a phosphate of alumina and llthia. AMBLYOPIA («rfAd* dull; ty, the eye). Incomplete or incipient amaurosis ; or weakness of sight.
Materials, Processes and Equipment by David F. Tver
The chief lithium-bearing pegmatite minerals are spodumene, lepidolite, amblygonite, and petalite. Spodumene is a member of the pyroxene group and occurs in prismatic or elongate bladed crystals of a dull gray-white color. Lithium metal is ...
by Robert A. Lewis
amblygonite. Li(AlF) PO4 or AlPO4•LiF. A natural fluorophosphate of aluminum and lithium.
Online dictionaries and encyclopedias with entries for Amblygonite
Click on a label to prioritize search results according to that topic:
Video about Amblygonite
Video shows what amblygonite means. A mineral, a mixed fluoride and aluminophosphate of sodium and lithium that is an important ore of lithium.. Amblygonite ...
Scrabble value of A1M3B3L1Y4G2O1N1I1T1E1
The value of this 11-letter word is 19 points, but it's not an accepted word in the Official Scrabble Players Dictionary.
Share this page
Go to the pronunciation of Amblygonite to learn how to say it correctly!
|
<urn:uuid:f3d0be6b-da58-4987-a48a-5de0e1f47cd1>
|
CC-MAIN-2018-17
|
http://www.omnilexica.com/?q=amblygonite
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948064.80/warc/CC-MAIN-20180426031603-20180426051603-00159.warc.gz
|
en
| 0.7934 | 1,838 | 3.28125 | 3 |
The personal learning network for educators
A group of educators interested in maximizing student potential through the use of brain-based teaching techniques. Teach to the way the brain learns best!
Latest Activity: Aug 10, 2018
Hello fellow educators! If you could spare a few minutes for our Food technology class- we are studying the changes in Food habits over the last 200 yrs of Australian history. If u have a google…Continue
In her book, Wiring the Brain to Read: Higher-Order Thinking for Reading (2010, p. 9), Dr. Donna Wilson says, "While some teachers may see their role as the 'sage on the stage,' teaching students to…Continue
Making predictions utilizes the higher-order thinking skills of our frontal lobes. Teach students the metacognitive power of predictions to ensure interest, motivation, as well as current and future…Continue
I'd love to know more about what the research says on how the brain works when learning is happening. I've been using some simple examples with my students that I know, and I'm finding it really…Continue
|
<urn:uuid:d68c1c74-eab4-4f3d-aff3-5f1a64e84b65>
|
CC-MAIN-2019-35
|
http://www.edupln.com/group/brainbasedteachingtechniques
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027320156.86/warc/CC-MAIN-20190824084149-20190824110149-00293.warc.gz
|
en
| 0.931068 | 222 | 2.671875 | 3 |
“There was nothing left for us to do but to take them all, and to educate the Filipinos, and uplift and civilize and Christianize them, and by God’s grace do the very best we could for them, as our fellow-men for whom Christ also died.”
-- William McKinley (1899)
There exists no general history – at least one that is available in the English language – explaining the origins, sources, language, uses, and variations on the theme of the Civilizing Mission, the central myth that Europe has employed to misrepresent its depredations around the globe, starting with the Spanish conquests in the Americas.
However, even in the absence of such a general history, some general propositions regarding Europe’s Civilizing Mission can be advanced safely. By its nature, the Civilizing Mission demands a protagonist who is superior to his subject, beyond the advantage of brute force. This superiority has been variously located in divine choice, genes, climate, institutions, and attributes of the mind. In the past, most European thinkers have preferred to locate the basis of Europe’s cultural advantage in race, biologically construed, and certainly, by the nineteenth century, this form of racism had became the dominant mode of constructing European superiority.
The construction of European superiority proceeded along two tracks. Along the first track, European thought seeks to endow Europeans with special attributes or they are shown to possess these attributes in greater abundance. The characteristic European attributes are individualism and rationality. The first produces the striving for freedom, courage, heroism, sainthood, ambition, industry, diligence, enterprise and great works of art; the second produces values that support a higher social order, superior governance, bureaucracies, economic growth, cathedrals, harmonies, and rational thought, including philosophy, sciences and mathematics.
On an equal scale, along a second track, European thought has engaged in the task of denigrating, dehumanizing, and even bestializing the Other. The extra-European world is inhabited by humans lacking in individuality and the powers of reasoning. Lacking individuality, the extra-European man is deficient in all those positive virtues that underpin Europe’s social and political order. Generally, this means that the extra-European man must be defined by negatives: he is a shirker, his wants are limited, he is not driven to excel, his work is sloppy, he is not inventive, he cannot be trusted, he has no self-worth, he does not value freedom, he is cowardly, he lacks generosity, and he will not risk his life for his freedom.
Similarly, the weak reasoning faculty of extra-Europeans produces a second set of negatives. A variety of European thinkers have described him as pedantic in his thought processes and unable to produce metaphysical works; his religion rarely rises above the merely superstitious; he works with simple tools, which he never seeks to improve; he lacks forethought and, therefore, cannot undertake great projects or create complex institutions; he lives under despotisms, which fail to protect property rights, and, therefore, trap his economy at primitive levels of productivity; and although he has not developed technology, he is incapable of formulating abstract, mathematical theories. In short, extra-European societies after their initial achievements, have remained dormant, superstitious, primitive and despotic.
Once these opposites types – the European and extra-European man – have been fully delineated, there are three possible relations that can develop between them. The extra-Europeans could be left alone; they could be ethnically cleansed, hunted down and exterminated; or they could be improved by opening them to unrestricted commercial contacts with superior Europeans, and if necessary these contacts could be established by force.
The choice among these options was clear. Clearly, the extra-European societies could not be left alone to vegetate; that would be an unconscionable waste of labor and resources. It would be preferable to push the natives off their land or kill them off; at least, this would free their resources for improvement. The third option was the best. It allowed Europe to improve the labor and resources in the extra-European societies. However, if the natives were to resist improvement, as they did in the Americas, they could be decimated and their lands appropriated for improvement.
By the nineteenth century, nearly all of Europe’s great thinkers had bought into the paradigm of the Civilizing Mission. Even Karl Marx and Friedrich Engels were not exempt from its baleful influence; and they were among the most radical and compassionate of European thinkers in their times. They located the Orient outside the historical process which they had constructed to explain the transition of Europe from one historical stage to another. In the Orient, a despotic state owned all the land because it was forced – by the arid or semi-arid conditions prevailing there – to erect and maintain large-scale hydraulic works upon which all agriculture depended. In the absence of private property, the Asiatic societies lacked the dialectical tension – between opposing classes – which produce social change. The Orient, therefore, had no real history other than the history of successive despotisms imposed upon an unchanging social base. In The Communist Manifesto, Marx and Engels refer to the Asiatics as “barbarians,” “semi-barbarians” or “nations of peasants.” On the other hand, the bourgeois societies of Europe are “civilized.”
The theory of Asiatic Despotism provided the grandest justification yet for the Civilizing Mission. By destroying the despotic Asiatic states, by reconstituting Asian societies on the basis of private property, and by integrating their archaic economies into world markets, the colonial powers were effecting – as Karl Marx put it, when talking of the destruction of India’s self-sufficient villages – “the only social revolution ever heard of in Asia.” Indeed, Karl Marx believed that by constructing a network of railways in India, the British were also laying the foundations of modern industry. It would be impossible to create an extensive network of railways without calling into existence an industrial sector supplying its need for coal, iron ore, steel and heavy machinery.
The orthodox economist’s justification for colonialism is not as grand because his requirements for growth are minimal. Since Adam Smith first formulated them in 1755, economic growth occurs naturally once three conditions are present: “peace,” “easy taxes,” and “a tolerable administration of justice.” Alternatively, governments establish law and order: markets do the rest. Since the despotic governments in the backward societies of Asia and Africa are incapable of protecting persons and property rights, this can only be provided by the intervention of Europeans. In other words, the colonization of extra-European societies is indispensable if they are to join the civilized world.
Few projects for the improvement of the ‘inferior races’ were taken up as eagerly, or implemented with the same degree of enthusiasm, as Europe’s Civilizing Mission. Over the course of the nineteenth century – starting earlier in some places – the Europeans colonized much of Asia and Africa, integrating them into global markets under governments run by the most capable men drawn from the best European stock. Although the Ottoman Empire, China, Iran and Thailand were allowed to retain indigenous rulers, they lost their ability to control their external economic relations. Under ‘Open Door’ treaties, they were forced to set very low tariffs, disband state monopolies, eliminate restrictions on foreign investments, and exempt Europeans – and their local protégés in the Ottoman Empire – from local courts and local taxes. In other words, directly and indirectly, Europe had subjected nearly all the extra-European societies of the world to its Civilizing Mission.
While the classical economists had little luck – outside of Britain, and that too, only after the 1840s – in persuading the sovereign governments in Europe, the Americas and Oceania to unshackle the invisible hand, their vision of free markets was implemented in nearly its entirety by the colonial governments in Asia, Africa and the Caribbean. The colonies practiced free trade, with some preferences granted to the metropolitan country; they opened up the colonies to foreign capital; they established the strongest safeguards for private property; they ran small, ‘efficient’ governments that were always dedicated to balancing the budget; and they strictly kept the government out of productive activities. Barring Japan after 1910, the Asian countries that escaped colonization were forced into signing Open Door Treaties, which integrated their economies into global markets. I will refer to them as quasi-colonies (QCs). Indeed, the World Bank and IMF would have been out of work in the QCs and colonies (together, QCCs); their agenda had been fully implemented by the colonial governments in Asia, Africa and the Caribbean.
The sovereign lagging countries in the period under review – the century preceding 1950 – paid scant regard to the canons of economic orthodoxy; most were heartily mercantilist in their pursuit of economic development. They freely imposed tariffs, operated state-owned development banks, set up industries in the public sector, ran budget deficits, placed restrictions on the entry of foreign capital, regulated their exchange markets during the Great Depression, and when in trouble they repudiated foreign debts. Now that’s sovereignty at work!
There can be little ambiguity about the prognosis – based on the Civilizing Mission and orthodox economics – about the relative economic performance of the QCCs and the sovereign lagging countries during the colonial epoch. The QCCs were devoted acolytes of orthodox economic policies; the sovereign lagging countries stood at the other end of the policy spectrum, invoking all the tools of economic intervention to promote indigenous industry, capital and technology. The colonies could boast of a second advantage. Unlike the sovereign lagging countries in Latin America and Eastern Europe, never reputed for their good governance, the British, French, Dutch and American colonies had the advantage of being governed by the very cream of Europe’s brew of superior races. On the strength of these advantages, we can safely conclude that the QCCs must have outperformed the sovereign lagging countries in the heydays of the Civilizing Mission – the century before 1950.
Average Annual Weighted Growth Rates of Per Capita Income: 1900-1992
The story these numbers tell is both strange and true: the bad boys were winning the growth derby. Over the first half of the twentieth century, the illiberal, protectionist, debt-repudiating sovereign countries resoundingly trumped the free-trading, budget-balancing, law-and-order QCCs, many of them placed under the direct care of the world’s best masters. Over 1900-1913, the sovereign lagging countries outperformed the QCCs by a factor of more than three-to-one. Over the next thirty-seven years, which included two world wars and a depression, the per capita income in the QCCs declined by 10 percent while the sovereign lagging countries notched an increase of 64 percent in their per capita income. For the half-century, 1900-1950, the per capita income of sovereign lagging countries grew at the average annual rate of 1.43 percent, while the QCCs declined at the rate of 0.08 percent.
A comparison of the mean average annual growth rates for the sovereign lagging countries and the QCCs yields similar results. The mean growth rates for the sovereign countries over 1900-1913 and 1913-1950 were 1.67 and 1.34 percent; the corresponding growth rates for the QCCs were 0.81 and -0.02 percent. In addition, over the first period, only three of the 18 sovereign countries grew at rates below the mean growth rate for the QCCs; over the second period, there was no sovereign country which grew at a rate below the mean for the QCCs. The differences in the growth rates for the two sets of countries are large and systematic.
At this stage, the orthodox economists are likely to blame the QCCs for their poor growth record. There was nothing wrong with the Civilizing Mission or orthodox policies; together, they could not turn these countries around because of the intractable barriers to growth presented by their culture, religion and race. The negative impact of these barriers had to be very strong indeed, much stronger than the dual advantage of their orthodox policies and superior governance. Is there a way to disprove this bunkum?
Thankfully, we have the numbers that will do this – the numbers in the fourth column of our table. In the forty-two years after 1950, the terminal point for the colonial period, the former QCCs begin to turn a new leaf. Suddenly, out of the bog of economic decline they sprint into the territory of rapid growth. From a weighted average annual growth rate of -0.27 percent over the previous thirty-seven years, they are now bounding at nearly three percent per annum, even outpacing the old sovereign lagging countries who grew at 2.58 percent per annum. What happened to all the ‘tenacious’ barriers to growth that had held them back for centuries? Did they suddenly vanish in 1950?
The apologists of orthodoxy are unlikely to pass up a third argument. The accelerated growth in the former QCCs, they might argue, had nothing to do with their new sovereignty; this was a period of rapid growth for all countries. Yes, but this can not save the day for them. With their ‘tenacious’ barriers to growth still in place, the growth record of the QCCs would still lag behind that of the old sovereign lagging countries; but now the reverse was true. There is an additional problem. Since the former QCCs had decisively abandoned their orthodox policies, this should have worked to nullify the improved growth conditions, leaving them with little or no growth as before.
That leaves us still looking for answers. Is it possible, just possible, that the long-stagnant QCCs turned into growth sprinters in the 1950s because they had repatriated Europe’s Civilizing Mission and they were now free to choose the ‘wrong’ economic policies? Over much of 1950-1992, the former QCCs in our sample engaged in economic planning, undertook public investments in infrastructure and industrial activities, operated overvalued domestic currencies, rationed foreign exchange, imposed protectionist tariffs, established development banks in the industrial and agricultural sectors, sold under-priced utilities to their new industries, sought to keep out foreign investments, etc. Indeed, some of them were assisted in their planning exercises by economic experts from the US Agency for International Development. Is it possible that these ‘wrong’ policies were right for economies that had been underdeveloped by the Civilizing Mission and its orthodox policies?
Are these numbers going to bring some humility to the unctuous purveyors of European Civilization? Will they now admit that the Civilizing Mission failed the peoples of the QCCs, humiliating them and holding them back for centuries? Will they admit that all this was just a cover for Europe’s true business in the colonies, which was to open them up to manipulation for the benefit of its privileged classes? Will this admission then be followed by contrition, by calls for compensatory adjustments in the global system so that the transfers can now flow in the opposite direction – from the rich to the poor countries?
The purveyors of ideologies are not defeated by contrary facts. In the surrealist world of economic orthodoxy, if the facts fail to support established theory that is too bad for the facts. The theory reigns supreme. The ideologues stop peddling their merchandise only when their paymasters are defeated. For a few decades after the Second World War, their capitalist paymasters had been checked, put on notice. This was the result of two self-mutilating wars amongst the colonial powers, the offspring of rivalries between the old and aspiring industrial powers. In turn, this produced anti-capitalist regimes in two major countries – Russia and China – and national liberation movements in all the colonies and quasi-colonies. Together, these developments seriously weakened the centralizing powers of the capitalist system, its ability to concentrate power in a few European centers.
This retreat of global capital opened up a window of opportunity for countries at the Periphery. Quickly, the former colonies took matters into their own hands – protecting manufactures, creating development banks, restricting foreign ownership, offering better technology to farmers, investing in utilities and infrastructure, and opening schools. In other words, the QCCs – together with Latin America – sought to create economic and political arrangements that would allow them to resist the centralizing power of Core capital. Thus was created the Third World, an intermediate economic zone between the capitalist Core and the Communist sphere, often seeking advantages from one or both by playing them off against each other. The creation of the Third World produced some striking results: many of the long-stagnant former QCCs began to advance, industrialize and develop an indigenous capitalist base. Understandably, Core capital did not look too kindly upon the nascent centers of capital developing Third World.
Although checked, the capitalist Cores – now led by the United States – were constantly seeking to restore the centralizing tendencies of the capitalist system through the covert activities of their intelligence agencies, foreign aid, military assistance and training programs, economic advisers, and the steady penetration of Third World economies by Core capital. Success came sooner than any one had expected, in the early 1980s. It came at a time when the Third World, seemingly at the height of its power, was pressing its demands for a New International Economic Order.
The oil crisis of 1973 provided the trigger that shifted the dismantling of the Third World into high gear. The Arab members of the OPEC, awash in dollars, recycled them to Western banks, who started the first wave of commercial lending to the Periphery since the Great Depression. In time, as Third World debts accumulated, the capitalist Core could act swiftly – and collectively – through the World Bank and IMF – to restore its old power over the Periphery. This had happened before, during the nineteenth century, when Britain and France created and manipulated debt-crises in the Open Door countries to take over their finances. It was now repeated, starting with several Latin American countries during the 1980s, when they were unable to service their foreign debts. In short order, the success in Latin America would be extended to all the countries in the Periphery.
After a short interregnum, lasting roughly from the 1950s to the 1970s, the Civilizing Mission is back in force. Its mission is the same as before – to ensure that the economic and political evolution of the Periphery is owned and directed from the Center. The economic modus operandi too is the same as before – take down the nationalist barriers that countries at the Periphery erect to nurture indigenous capital and technology. The dismantling of the Third World was formalized by the launching of the World Trade Organization – the new and more comprehensive Open Door treaty – imposed collectively by Core capital on all the Periphery.
In its latest phase, the Civilizing Mission has a different political modus operandi. The Core capitalist powers are not fighting each other to acquire monopoly control over segments of the Periphery. This is not desirable anymore. In the past, their rivalries had proved very costly to Core capital. Moreover, as major corporations from Core countries collaborate, the old rivalries are being replaced by cooperative relationships. Equally, colonization is not necessary for exercising control. The cumulative penetration of the Periphery by Core capital has produced an indigenous privileged class whose interests are closely interwoven with that of Core capital – and, more narrowly, with that of the United States. Core capital can now safely rely on this partnership to manage the affairs of the Periphery. It is quite safe now to allow the elites in the Periphery – barring segments of the Islamicate world – to compete for the favors of Core capital. The global system now has the power to neutralize populist governments in the Periphery, should they manage to get elected. Of course, it can always use the solution of the last resort – a CIA-instigated right-wing military coup. If that fails, there are sanctions, missile strikes and, finally, invasion, all of them illegal but duly sanctified by the Security Council.
In closing, it is worth pointing out that while Civilizing Mission II has produced the predictable rollback of previous gains across much of the Periphery, this latest phase of global capitalism is likely to produce some new results. In its previous phase, stretching from 1800 to 1950, global capitalism was characterized by centralization of power, capital and manufactures in a few capitalist Cores. All three tendencies were temporarily reversed or weakened in the three decades that followed – the three decades of decentralization. Although the power to define the global system has once again been recentralized since the 1970s, leading progressively to the erosion of indigenous capitalist bases in most countries in the Periphery, it appears that the indigenous capitalist centers in some of these countries were sufficiently developed to compete with Core capital even on the latter’s term. This means that several new centers of capital and technology have now been established outside of the old Cores. Some of these centers have a very large economic base – as in China and possibly India. If these centers can sustain their growth momentum and autonomy, they are likely to produce forces that will both disrupt and stabilize global capitalism. I will attempt to offer the briefest sketch of these new forces.
The growth of the new capitalist centers – especially in China and India – has produced an altogether new situation in the global economy. There now exist two pools of comparable labor skills in the new centers and the old Cores, divided by large gaps in the relevant wages, and still separated by strong barriers to their mobility. In itself, this represents a serious disequilibrium in the global economy, the first time such a disequilibrium has emerged on this scale in the markets for medium and high-end labor skills. This disequilibrium contains vast ramifications for the political economy of global capitalism. I can only itemize these ramifications here; their elaboration would require another essay.
First, the disequilibrium in global markets for labor skills will continue to fuel growth in the new centers, directing their capital increasingly to high value-added activities; in the big new centers, such as China and India, this growth can continue for a long time because of their nearly inexhaustible reserves of labor.
Second, the growth of the new centers has been squeezing profits in high value-added industries in the old Cores, forcing them to relocate to the new centers. A direct result of this is a downward pressure on wages of skilled labor in the old Cores.
Third, as the new centers continue to grow and as they continue to upgrade their skills, the competition between the two pools of labor will escalate to affect ever higher skills. This means that the downward pressure on skilled wages in the old Cores is unlikely to be compensated by the upgrading of labor skills. We may be looking at a full spectrum decline in wages in the old Cores.
Fourth, since the new communications technology is rapidly extending the range of services that are become internationally tradable, the forces of wage-convergence just described will be felt over a growing range of activities, and this will tend to accelerate the speed at which wage-convergence takes place.
Fifth, taken together, these new dynamics are producing an altogether new phenomenon in the history of global capitalism: a decline in the real wages of labor in the capitalist Cores, and this is sure to be accompanied by erosion of many of the gains in working conditions that labor in the Cores had won in the past century.
Sixth, these developments are producing a growing trade imbalance between the new centers and old Cores because the availability of low-wage but efficient skills in the new centers gives them a long-term competitive advantage in a wide and growing range of activities. The imbalance is likely to be largest between the US and the new centers as long as the US dollar remains the world’s leading reserve currency.
Seventh, the downward pressure on wages and working conditions may produce a variety of political consequences in the old Cores: protectionism, growing class consciousness, erosion of democracy, and even class warfare. At the international level, the old Cores – in particular, the US – may respond to the crisis by starting wars to convert India and China into the equivalents of Brazil and Mexico.
Eighth, in this new phase of capitalist development, the workers in the old Cores may be offered a second chance to launch a revolution against capitalist control of the economy.
Ralph Raico,
Foreign Policy: The Turning Point, 1898-1919, part 3 (Fairfax, VI: The
Future of Freedom Foundation, April 1995).
Other Articles by M. Shahid Alam
|
<urn:uuid:258e5a92-adac-44d6-a132-4edfd9a788e3>
|
CC-MAIN-2015-11
|
http://www.dissidentvoice.org/Aug04/Alam0814.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936466999.23/warc/CC-MAIN-20150226074106-00171-ip-10-28-5-156.ec2.internal.warc.gz
|
en
| 0.960194 | 5,189 | 2.984375 | 3 |
The darkness surrounds me as I lie in bed. I find it impossible to get up and start my day. Existence is painful and meaningless. I am obsessed with the idea of ending this misery and am unable to find purpose, or to find pleasure, or to find anything to make life worth living. I am only 15 years old.
As a youth, I had the false idea that mental illness was a choice. When I began developing symptoms, I had no knowledge or education regarding mental illness. It was never discussed in school or at home. This greatly contributed to my feelings of guilt, confusion, depression, and anxiety.
In high school, when my symptoms became apparent to my peers, I was ostracized and alienated. I was not able to talk to anyone about what I was going through. None of us knew how to discuss mental illness. I was afraid, alone, and in anguish.
As I look back, early education about mental illnesses and mental health would have prevented a significant amount of suffering and made it easier for me to seek help.
This not just my story. About 1 in 5 adults in our country experience mental illness every year. Over 11 million Americans experience a serious mental illness that substantially interferes with one or more major life activities. Approximately 1 in 6 American youth, ages 6-17, experience mental illness each year; and 50 percent of all mental illness begins by age 14. Over 350 million people in the world suffer from depression alone.
Even though mental illness is prevalent, I have experienced a lot of damaging stigma. In college in the state of Washington, I openly shared that I had mental illnesses. When I did so, I was ostracized. Most of my peers avoided me and would have no contact with me.
Stigma is widespread. A RAND study found that 30 percent of Californians said that they were “unwilling to move next door to someone with a serious mental illness,” while 28 percent said that they were “unwilling to work closely on a job with someone with serious mental illness.” Because of stigma, I felt ashamed, concluding that I needed to keep my mental illnesses a secret, and I suffered the consequences.
Experts like Alexis Malatesta, the Youth Education Coordinator at the Mental Wellness Center in Santa Barbara, believe that stigma is a negative and unfair belief about someone who is experiencing a mental health disorder and is a result of false information, lack of education, and ignorance. Ms. Malatesta helps oversee a program called Mental Health Matters, where 6th graders and others are educated about mental health, mental illness disorders (including anxiety, depression, ADHD, bipolar, schizophrenia, eating disorders, and stress-related disorders), and how to talk about these issues compassionately and empathetically.
Because most mental-health disorders begin around age 14, educating youth before or at this age helps to prevent misconceptions, reduces stigma, and improves empathetic and compassionate treatment for those who begin to develop symptoms. Mental Health Matters is an outstanding program, but currently it is optional in the Santa Barbara Unified School District. Some 6th grade English teachers use the curriculum, but not all. This information is so vital and important, with the potential to prevent stigmatization, suffering, and even suicide, I believe it should be a part of the Core Curriculum in 6th grade elementary education throughout our community, so that all students should have the opportunity to learn about mental health.
All humans deserve to be treated fairly and equitably and should not be stigmatized for their personal struggles. Early education may not remove all stigma from mental illness, but it would make a big difference. The cost of making Mental Health Matters a required curriculum in our schools is minimal, while the benefits would be substantial. Mental health no longer needs to be a closeted issue. People who have mental illness can seek effective treatments, live full and meaningful lives, and are no longer locked in the basement or in institutions.
Education made a huge difference in my experience with mental illness. I was fortunate to have supportive parents who also received education to help me through my difficult times and get treatment. I found professionals I could speak to and develop coping skills. However, this was in my mid- to late twenties. If I were educated earlier, I could have avoided years of intense personal struggle and pain.
I know many other youth who are going through similar struggles. My wish for them is that they can receive earlier education and do not have to deal with the same stigma and alienation that I experienced. I strongly urge the Santa Barbara Unified School District to seriously consider making Mental Health Matters a required part of the 6th grade curriculum.
|
<urn:uuid:877328c4-fd18-472f-b91d-643308482f0c>
|
CC-MAIN-2021-43
|
https://www.independent.com/2020/11/21/education-on-mental-illness-alleviates-stigma/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588153.7/warc/CC-MAIN-20211027115745-20211027145745-00330.warc.gz
|
en
| 0.974254 | 956 | 2.84375 | 3 |
The Singularity is the hypothetical future creation of superintelligent machines. Superintelligence is defined as a technologically-created cognitive capacity far beyond that possible for humans. Should the Singularity occur, technology will advance beyond our ability to foresee or control its outcomes and the world will be transformed beyond recognition by the application of superintelligence to humans and/or human problems, including poverty, disease and mortality.
Revolutions in genetics, nanotechnology and robotics (GNR) in the first half of the 21st century are expected to lay the foundation for the Singularity. According to Singularity theory, superintelligence will be developed by self-directed computers and will increase exponentially rather than incrementally.
Lev Grossman explains the prospective exponential gains in capacity enabled by superintelligent machines in an article in Time:
“Their rate of development would also continue to increase, because they would take over their own development from their slower-thinking human creators. Imagine a computer scientist that was itself a super-intelligent computer. It would work incredibly quickly. It could draw on huge amounts of data effortlessly. It wouldn't even take breaks to play Farmville.”
Proposed mechanisms for adding superintelligence to humans include brain-computer interfaces, biological alteration of the brain, artificial intelligence (AI) brain implants and genetic engineering. Post-singularity, humanity and the world would be quite different. A human could potentially scan his consciousness into a computer and live eternally in virtual reality or as a sentient robot. Futurists such as Ray Kurzweil (author of The Singularity is Near) have predicted that in a post-Singularity world, humans would typically live much of the time in virtual reality -- which would be virtually indistinguishable from normal reality. Kurzweil predicts, based on mathematical calculations of exponential technological development, that the Singularity will come to pass by 2045.
Most arguments against the possibility of the Singularity involve doubts that computers can ever become intelligent in the human sense. The human brain and cognitive processes may simply be more complex than a computer could be. Furthermore, because the human brain is analog, with theoretically infinite values for any process, some believe that it cannot ever be replicated in a digital format. Some theorists also point out that the Singularity may not even be desirable from a human perspective because there is no reason to assume that a superintelligence would see value in, for example, the continued existence or well-being of humans.
Science-fiction writer Vernor Vinge first used the term the Singularity in this context in the 1980s, when he used it in reference to the British mathematician I.J. Good’s concept of an “intelligence explosion” brought about by the advent of superintelligent machines. The term is borrowed from physics; in that context a singularity is a point where the known physical laws cease to apply.
Continue reading about the Singularity:
|
<urn:uuid:8b9d1e85-efbf-492c-862d-4328212be6ec>
|
CC-MAIN-2014-42
|
http://whatis.techtarget.com/definition/Singularity-the
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119646008.13/warc/CC-MAIN-20141024030046-00243-ip-10-16-133-185.ec2.internal.warc.gz
|
en
| 0.941297 | 593 | 3.4375 | 3 |
The course will look at the spiritual journey as it is depicted from scripture to the present day. It will examine texts from different religious traditions and cultures to explore the basic human understanding of a person as pilgrim.
Learning objectives: 1. An exploration through spirituality of what it means to be human; 2. An examination of a history of spirituality; 3. An examination of some guides, compasses, maps and techniques of exploration of the territory called ?the spiritual life.? The course is of note: to those interested in 1. spirituality both theoretical and practical; 2. discernment; 3. cultural history; 4. Narrative theology; 5. Interdisciplinary studies. For Basic Degree students: papers and intelligent class participation. For Advanced Degree students: papers, a major paper, and intelligent class participation.
|Pre-Requisites||Currently Offered||Next Scheduled||Previously Offered||Scheduling Information|
|
<urn:uuid:bd958d33-2abf-4d13-ae34-45be21721407>
|
CC-MAIN-2016-30
|
http://www.tst.edu/academic/course/spiritual-journey-0
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257831770.41/warc/CC-MAIN-20160723071031-00213-ip-10-185-27-174.ec2.internal.warc.gz
|
en
| 0.882048 | 186 | 3.140625 | 3 |
What does the ruling mean to me?
The Supreme Court decision upholding President Barack Obama's health-care law affects nearly every American.
The law tells almost everyone they must have health coverage and guarantees it will be available to them even if they are already ill or need hugely expensive care. It helps the poor and many middle-class people afford coverage.
The 2010 health-care law will keep taking effect. It's expected to bring coverage to about 30 million uninsured people. Overall, more than 9 in every 10 eligible Americans will be covered.
Some parts are already in effect: Young adults can stay on their parents' insurance up to age 26. Insurers can't deny coverage to children with health problems. Limits on how much policies will pay out to each person over a lifetime are eliminated. Hundreds of older people already are saving money through improved Medicare prescription benefits. And co-payments for preventive care for all ages have been eliminated.
Starting in 2014, almost everyone will be required to be insured or pay a fine. There are subsidies to help people who can't afford coverage. Most employers will face fines if they don't offer coverage for their workers. Newly created insurance markets will make it easier for individuals and small businesses to buy affordable coverage. And Medicaid will be expanded to cover more low-income people.
Insurers will be prohibited from denying coverage to people with medical problems or charging those people more. They won't be able to charge women more either. During the transition to 2014, a special program for people with pre-existing health problems helps these people get coverage.
An assortment of tax increases, health-industry fees and Medicare cuts will help pay for the changes.
Still, not everyone will be covered.
An estimated 26 million people will remain without coverage once the law is fully implemented, including illegal immigrants, people who don't sign up and choose to face the fines instead, and those who can't afford it even with the subsidies. That number could be higher, depending on whether any states refuse the Medicaid expansion.
The taxing truth
When the law was before Congress, Obama and Democrats avoided calling its penalty for going uninsured a "tax." But the administration argued before the Supreme Court that the law was constitutional as a federal tax.
The court rejected two other Obama administration arguments for the law but accepted the tax one.
In 2016, after the law is fully in place, about 4 million people will pay the penalty to the Internal Revenue Service for being uninsured, the Congressional Budget Office has estimated. They would pay $695 per uninsured adult or 2.5 percent of family income, up to $12,500 per year.
The IRS can't prosecute violators or place liens against them, however. Its only enforcement option might be withholding money from refunds.
About that mandate
Many parts of the law have proved popular. But the insurance mandate is widely disliked. Each time AP has asked in polls, more than 8 in every 10 Americans have said the government should not have the right to require everyone to buy health insurance.
The public also has tilted against the law as a whole over the two years since it was passed. About half opposed it and a third were in favor in an AP-GfK poll shortly before the Supreme Court ruled.
|
<urn:uuid:338c7426-e890-4d40-b496-b50ddc823a01>
|
CC-MAIN-2015-14
|
http://www.denverpost.com/nationworld/ci_20967175/health-care-ruling-what-it-means-and-how?source=pkg
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131299121.41/warc/CC-MAIN-20150323172139-00291-ip-10-168-14-71.ec2.internal.warc.gz
|
en
| 0.973378 | 666 | 2.640625 | 3 |
What is a good objective for a resume?
The most effective objective is one that is tailored to the job you are applying for. It states what kind of career you are seeking, and what skills and experiences you have that make you ideal for that career. A resume objective might also include where you have been and where you want to go in your career.
What is an employment objective?
A resume objective (also called a career objective) is a one or two sentence overview of your short-term professional goals and explanation of why you’re seeking employment.
What is objective and example?
Objective is defined as someone or something that is real or not imagined. An example of objective is an actual tree, rather than a painting of a tree. The definition of an objective is a goal or something to aim for. An example of objective is a list of things to accomplish during a meeting.
What objectives can I set myself at work?
Examples of personal development goals for workImprove your time management.Develop emotional intelligence.Cultivate resilience.Listen actively.Develop a growth mindset.Develop a reading habit.Learn new things.Improve your public speaking skills.
How do you write goals and objectives at work?
10 Steps to Setting and Achieving Goals at WorkGet clarity on your team’s structure. Talk to your boss. Focus on what you can control and have a plan for the rest. Think about your career path in the long run. Go beyond immediate tasks and think of the big picture. Get clarity on what goal achievement would look like. Schedule periodic check-ins.
How do I write my goals at work?
Let’s take a look behind the acronym.Specific. You need to be specific. Measurable. Imagine you are playing a game and it doesn’t show a score or progress indication as you go along. Attainable. Stretch goals can be motivating, but if they are too much of a stretch they won’t be achieved. Relevant. Time-bound.
What is a personal goal example?
Below are some examples of personal goals: Learn something new every week. Work out every morning. Keep a daily journal.
|
<urn:uuid:df00ecaa-db82-41ab-b2ff-79d600270a8f>
|
CC-MAIN-2021-31
|
https://riunitedformarriage.org/what-is-a-good-objective-for-a-resume/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154042.23/warc/CC-MAIN-20210731011529-20210731041529-00548.warc.gz
|
en
| 0.949713 | 453 | 2.53125 | 3 |
Carpentry is an ancient trade that still remains relevant today. Some carpenters build roofs and others build cabinets, but many of the principles of using wood as a construction material are the same. In the United States, the title of master carpenter is used by those who demonstrate superior skill in the field. This level of skill is developed through a combination of education, apprenticeship and experience. There is no single path to becoming a master carpenter and no certification requirement in the United States.
While on-the-job experience is often more valuable than education in carpentry, it is easier to land your first carpentry job with some training under your tool belt. Many community and trade colleges have introductory classes in carpentry that will help you build the essential skills of the trade and earn a certification or diploma that will open doors to employment. These training courses often cover basic math used in carpentry and how to read blueprints, along with more specific instruction in installing windows, doors and stairs. Following an intensive carpentry course, you might go on to employment as a carpenter's assistant were you would gain more skills on your way to becoming a carpenter or lead carpenter.
Because experience is so essential to becoming a master carpenter, many carpenters enter the field through an apprenticeship. An apprenticeship is a combination of education and work that prepares the apprentice for a career in the field. An apprenticeship can often be arranged through a community college. In Baltimore, for example, a four year apprenticeship through the Community College of Baltimore County places students in a four-year apprenticeship program that includes full-time employment and evening classes. Graduates of the program are journeyman carpenters and are employed in a variety of capacities in the construction industry.
Whether you enter the carpentry trade through a training program or apprenticeship, the path to becoming a master carpenter will be through experience. There is no diploma to earn or test to take to become a master carpenter, only the skills you develop over the years that form your expertise in carpentry and lead you to be considered a master carpenter.
Because carpentry is such a diverse field, education and training in specialties will help you develop your expertise. This training may be provided by employers, or if you are a member of a carpentry union, by the union itself. The Chicago Regional Council of Carpenters, for example, provides continuing education in flooring installation, drywalling, and scaffold building, among many other trades. Many carpenters become proficient in several of these trades.
- Ryan McVay/Photodisc/Getty Images
|
<urn:uuid:edb25701-01d5-42e3-9681-e10d17ac58b4>
|
CC-MAIN-2017-30
|
http://oureverydaylife.com/education-master-carpenter-18869.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549436321.71/warc/CC-MAIN-20170728022449-20170728042449-00120.warc.gz
|
en
| 0.953521 | 539 | 2.84375 | 3 |
Synchronous languages provide a solution to the following problem:
"What is the highest level of specification possible for real-time embedded systems?"
Previous studies had demonstrated that, at such a high level, the notion of time should not be quantitative, e.g., no mention should be made that an action lasted 1.5 μ sec. This is because real-time embedded systems are, in general, too complicated to also specify the time needed by their components; mentioning quantitative time would lead to loss of the overall picture.
Independently, 4 teams (3 French ones and 1 Israeli one) found solutions to this problem in 1980-1985, leading to the synchronous languages Lustre, Esterel, Signal, and the semi-synchronous visual language StateCharts, supported by the tool StateMate.
Their underlying design assumption is that internal (re)actions take no time to execute, in comparison with the external stimuli requesting them ("Berry's synchrony hypothesis"). Although this is in its pure form unimplementable, it may very well be the case that internal (re)actions always take less time to execute than passes between two successive external stimuli; this must be proved for each particular application.
Also, these languages execute concurrent actions synchronously in multi-steps, and have the possibility to test for the absence of an internal action. Simple as these design decisions may seem, they have led to languages with enough expressive power to specify the control of jet engines, nuclear reactors and on-board software. Also, due to their simplicity, their compilers could be proved correct. As a result, the compiled code only contains errors due to wrongly expressed specifications at the source level.
In case of embedded software for the line of aircraft produced by AIRBUS, and control software for nuclear power stations (produced by Schneider Inc.), the utilization of synchronous languages led to a decrease of more than 95 % of errors per 10.000 lines of code.
With their design criteria and implementation techniques now firmly grounded in theory, two main problems remain:
- How to combine asynchronous (re)actions with the synchronous approach into a unified framework? For, obviously, e.g., in software for airplanes, asynchronous delay is only natural.
- How can synchronous languages be adapted to the description of hardware, i.e., synchronous circuits. For, due to the fact that the amount of tested runs in modern VSLI chips approaches rapidly zero, when compared with their overall capabilities, new languages and tools, with much faster execution speeds, are needed to raise the possibility of testing Pentium-class VLSI chips to acceptable levels. As the use of Esterel as hardware-description language has demonstrated, it is feasable to do this using the synchronous-languages approach.
Apart from presenting results on these two main issues, the seminar focussed as third issue on visual methods for specifying synchronous languages, an approach pioneered by the StateMate system designed by David Harel, and now incorporated also in the two mainstream French visual specification tools, based on synchronous languages: Scade (combining Lustre with elements of State-Charts), and Esterel-Studio (based on a visual representation of Esterel, called Synch-Charts).
This series of seminars constitutes the only yearly meeting place for the researchers in this exciting field. The workshops on Synchronous Languages started in 1993 at Schloss Dagstuhl. Since then seven such workshops have been organized, in total: 2 in Germany, 1 in Spain, and 4 in France, with an attendance varying between 40 and 60 persons.
- Raul Acosta-Bermejo (ENS des Mines de Paris, FR)
- Gérard Berry (Esterel Technologies - Villeneuve, FR) [dblp]
- Christian Brunette (ENS des Mines de Paris, FR)
- Reinhard Budde (Fraunhofer IAIS - St. Augustin, DE)
- Willem-Paul de Roever (Universität Kiel, DE) [dblp]
- Robert de Simone (INRIA Sophia Antipolis - Méditerranée, FR) [dblp]
- Stephen A. Edwards (Columbia University - New York, US) [dblp]
- David Garriou (Ecole Centrale de Nantes, FR)
- Fabien Gaucher (VERIMAG - Grenoble, FR)
- Nicolas Halbwachs (VERIMAG - Grenoble, FR) [dblp]
- Leszek Holenderski (Philips Research Europe - Eindhoven, NL)
- Klaus Höppner (Universität Kiel, DE)
- Frank Huch (Universität Kiel, DE)
- Ralf Huuck (NICTA - Sydney, AU) [dblp]
- Bertrand Jeannet (INRIA - Rennes, FR)
- Bengt Jonsson (Uppsala University, SE) [dblp]
- Mike Kishinevsky (Intel - Hillsboro, US)
- Marcel Kyas (Universität Kiel, DE)
- Ben Lukoschus (Universität Kiel, DE)
- Florence Maraninchi (VERIMAG - Grenoble, FR) [dblp]
- Christophe Mauras (University of Nantes, FR)
- Sabine Moisan (INRIA Sophia Antipolis - Méditerranée, FR)
- Lionel Morel (VERIMAG - Grenoble, FR)
- Simin Nadjm-Tehrani (Linköping University, SE) [dblp]
- Mirabelle Nebut (INRIA - Rennes, FR)
- Gordon Pace (University of Malta, MT) [dblp]
- Fabrice Peix (INRIA Sophia Antipolis - Méditerranée, FR)
- Marc Perrault (Esterel Technologies - Villeneuve, FR)
- Dimitri Petoukhov (ENS des Mines de Paris, FR)
- John Plaice (UNSW - Sydney, AU) [dblp]
- Axel Poigné (Fraunhofer IAIS - St. Augustin, DE)
- Dumitru Potop-Butucaru (University of Rennes, FR) [dblp]
- Pascal Raymond (VERIMAG - Grenoble, FR) [dblp]
- Annie Ressouche (INRIA Sophia Antipolis - Méditerranée, FR)
- Martin Richard (Ecole des Mines de Nantes, FR)
- Jan-Willem Roorda (Chalmers UT - Göteborg, SE)
- Yvan Roux (VERIMAG - Grenoble, FR)
- Klaus Schneider (KIT - Karlsruher Institut für Technologie, DE) [dblp]
- Marc Segelken (OFFIS - Oldenburg, DE)
- Ellen M. Sentovich (Cadence Labs - Berkeley, US)
- Ramesh Sethu (Indian Institute of Technology - Mumbai, IN) [dblp]
- Mary Sheeran (Chalmers UT - Göteborg, SE) [dblp]
- Rudrapatna K. Shyamasundar (TIFR Mumbai, IN)
- Jean-Ferdinand Susini (ENS des Mines de Paris, FR)
- Jean-Pierre Talpin (CAPS entreprise - Rennes, FR)
- Olivier Tardieu (INRIA Sophia Antipolis - Méditerranée, FR)
- Shmuel Tyszberowicz (Tel Aviv University, IL) [dblp]
- Klaus Winkelmann (Infineon Technologies - München, DE)
- Dagstuhl Seminar 9448: Synchronous Languages (1994-11-28 - 1994-12-02) (Details)
- Dagstuhl Seminar 9650: Synchronous Languages (1996-12-09 - 1996-12-13) (Details)
- Dagstuhl Seminar 04491: Synchronous Programming - SYNCHRON'04 (2004-11-28 - 2004-12-03) (Details)
- Dagstuhl Seminar 09481: SYNCHRON 2009 (2009-11-22 - 2009-11-27) (Details)
- Dagstuhl Seminar 13471: Synchronous Programming (2013-11-17 - 2013-11-22) (Details)
|
<urn:uuid:0063222e-2b34-40c7-800d-ac8db905667a>
|
CC-MAIN-2023-50
|
https://www.dagstuhl.de/en/seminars/seminar-calendar/seminar-details/01491
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100550.40/warc/CC-MAIN-20231205073336-20231205103336-00273.warc.gz
|
en
| 0.790342 | 1,855 | 3.140625 | 3 |
Discuss and analyse some examples of language used in the story "Her First Ball," by Katherine Mansfield, to create a mood of excitement.
In Katherine Mansfield's poem entitled, "Her First Ball," the author uses the language of the story in several way. In particular, the words she chooses add a sense of excitement to the story.
The first example describes Leila's trip in the carriage. The bolster (or cushion) feels like the sleeve of an unknown escort; that sense, along with the way the carriage "bowls" its occupants along, excite Leila as she approaches her first ball.
She sat back in her own little corner of it, and the bolster on which her hand rested felt like the sleeve of an unknown young man's dress suit; and away they bowled...
It is easy to sense Leila's excitement as she tries to contain her eagerness, but notices the smallest details of the evening (the roses, the white fur...), sure she will never forget them. The reader may also be swept into a place in the memory where an evening was eagerly anticipated and equally memorable:
...she tried not to care. But every single thing was so new and exciting ...Meg's tuberoses, Jose's long loop of amber, Laura's little dark head, pushing above her white fur like a flower through snow. She would remember for ever.
Besides the excitement portrayed in Leila's character, inanimate objects (the gaslight, the tuning of the instruments) become harbingers of a joyful night, personified to react as a person might to this evening of possibilities—the gas light is already "dancing," and with the sound of the instruments, it jumps almost to the ceiling:
A great quivering jet of gas lighted the ladies' room. It couldn't wait; it was dancing already. When the door opened again and there came a burst of tuning from the drill hall, it leaped almost to the ceiling.
In the dancing hall, personification is used to convey excitement in the flags that hang across the room's ceiling:
Leila...looking over Meg's shoulder, felt that even the little quivering coloured flags strung across the ceiling were talking.
Once last example is found in the following passage—Leila realizes that something has changed in her: the experience is thrilling. Leila feels as if her life has just started. And where the evening had once seemed "mournful" and "solemn," it is now a beautiful thing, and shall never dampen her spirits again:
For it was thrilling. Her first ball! She was only at the beginning of everything. It seemed to her that she had never known what the night was like before. Up till now it had been dark, silent, beautiful very often--oh yes--but mournful somehow. Solemn. And now it would never be like that again--it had opened dazzling bright.
|
<urn:uuid:dbe52e09-6e14-449c-bf07-a02826d159df>
|
CC-MAIN-2017-51
|
https://www.enotes.com/homework-help/discuss-analyse-some-examples-language-used-story-252093
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948597485.94/warc/CC-MAIN-20171217191117-20171217213117-00682.warc.gz
|
en
| 0.973278 | 602 | 3.421875 | 3 |
My intervention is in the context of the discussion around growing more out of less, or in other words, a green economy whose primary focus is on resource efficiency improvement.
Such a perspective can work very well in certain contexts, where social concerns are irrelevant, where inter-relationships are absent, where it is a single sector that we are concerned with. Improving the design of showerhead to reduce water use, and reducing the carbon footprint by switching to fluorescent lamps are good examples of this approach that even allows us to continue with our lifestyle without really affecting us.
In other contexts, this single sector approach allows us to sidestep the question of over-consumption, and allow us to continue our current patterns of consumption through adoption of a new technology. The pursuit of Biofuels or hydrological fracking as a clean energy options are case in points.
For food sector, resource efficiency improvement implies that certain kinds of agriculture that are currently energy intensive and water intensive must change to the kind of agriculture that uses resources more efficiently. A similar change must happen in food processing and retailing sectors as well.
This focus on resource use efficiency improvement in agriculture is very relevant in some contexts, but may be not in others, where resource use efficiency is already there. In fact many Indian languages have words that imply resource use efficiency in the context of water management. Where there is little irrigation or very little land, resource use efficiency is already key to food security.
This difference in two types of agriculture has implications for implementation and I will come to that in a second.
Why is this difference? For many communities agriculture is not only a sector that provides multiple benefits with food at the center– but also a way of life. When we talk of green economy in agricultural sector we have to assess the implications of adopting a resource use efficiency oriented solution not only for food production, but also on each of these benefits— social, environmental, cultural, economic benefits. This would be a double nexus approach that is rather unique to agricultural sector. 70 percent of the worlds’ poor live in rural areas and are dependent on agriculture for their livelihoods at least for part of the year. Resource use efficiency has to take account also of what was called as water cascade.
At implementation level, what are the technologies that we have at our disposal to achieve this resource use efficiency in food and agriculture systems? Does it open the doors for use of nanotechnology, and synthetic biology whose long term implications are hardly understood even by scientists working on it? Or are their other options? It is at this implementation level that differing perspectives green economy emerges and it has differing implications for small holder farmers and larger farmers.
|
<urn:uuid:8bff1738-ed04-4700-8a15-5e9556dd1a83>
|
CC-MAIN-2014-15
|
http://www.iatp.org/documents/civil-society-intervention-in-the-strategy-panel-2-creating-more-with-less-17-november-201
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537754.12/warc/CC-MAIN-20140416005217-00081-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.954626 | 541 | 2.578125 | 3 |
Cowie, H. and Berdondini, L. (2002) The expression of emotion in response to bullying Emotional & Behavioural Difficulties, 7 (4). pp. 204-214. ISSN 1363-2752Full text not available from this repository.
Recent literature on bullying suggests that victims of bullying are likely to have certain emotional reactions that contribute to the problem. That does not mean that victims in any way deserve the treatment that they get from more aggressive peers, but rather proposes that they themselves can be empowered to change the situation. The purpose of this review is to examine the proposal that the ways in which victims express their emotions during a bullying episode can play a crucial role in the responses of peers. There are implications for both researchers and practitioners to develop new insights that may help vulnerable children and adolescents.
|Item Type:||Journal article|
|Uncontrolled Keywords:||anti-bullying intervention, bullying, bystanders, emotional expression|
|Subjects:||X000 Education > X200 Education Research|
|DOI (a stable link to the resource):||10.1177/1363275202007004003|
|Faculties:||Faculty of Education and Sport > School of Education > Education Research Centre|
|Depositing User:||erc editor|
|Date Deposited:||13 Nov 2007|
|Last Modified:||27 Jun 2012 13:22|
Actions (login required)
Downloads per month over past year
|
<urn:uuid:288e576c-db2d-4c81-a807-3b87bef2b021>
|
CC-MAIN-2016-36
|
http://eprints.brighton.ac.uk/711/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982291592.14/warc/CC-MAIN-20160823195811-00002-ip-10-153-172-175.ec2.internal.warc.gz
|
en
| 0.871163 | 315 | 2.921875 | 3 |
Seeing NYC from Above11/03/2022
The 6th Grade visited One World Observatory at the top of the tallest building in the Western Hemisphere, One World Trade Center. The Observatory is located on the 100th, 101st, and 102nd floors and encompasses over 125,000 square feet. Students explored three levels of the Observatory filled with innovation and inspiration.
One World Observatory offers views of New York City’s iconic sights, surrounding waters, and iconic skyline – amazing 360˚ views for up to 45 miles in every direction. There are interactive presentations which connected the students with famous landmarks and bring you deeper into the city’s neighborhoods, history, and culture.
Students had fun finding local landmarks from 100 stories and seeing their city from a new perspective.
See More News
|
<urn:uuid:340d7237-7ba5-461c-b62e-e096cf4bf4e2>
|
CC-MAIN-2023-23
|
https://www.theepiphanyschool.org/2022/11/03/6th-grade-sees-nyc-from-above/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653501.53/warc/CC-MAIN-20230607010703-20230607040703-00725.warc.gz
|
en
| 0.931782 | 162 | 2.84375 | 3 |
Yes, you do get an extra hour of sleep on that one morning in November, but does that really make up for the dreaded morning in March when you lose an hour? Or the biannual ritual of having to adjust every clock in your house? Daylight savings time is simply an inconvenient policy, so we all assume that it must, in some way, be benefitting our society. But have you ever really asked yourself how?
Daylight saving time (DST) was first implemented during WWI as a strategy to conserve fuel. By advancing the clocks by one hour during the summer months, it was thought that people would take advantage of the natural sunlight and delay turning on their lights for an additional hour at night. It did not gain widespread attention until the 1970s when it was adopted across North America and Europe in response to the energy crisis. For the most part, energy conservation remains the primary justification for its continued observance today.
Yet, the evidence that DST contributes to energy conservation appears tenuous at best. A 2011 review of the effects of DST on energy consumption finds that DST may, in fact, have the unintended effect of encouraging energy consumption. As people wake up to darker, cooler conditions following the switch to DST in the spring, they may be more inclined to turn on their heating in the morning. Similarly, during the peak of summer they may run their air conditioning systems for an hour longer than they would have without the time change. Researchers at Yale and UC Santa Barbara found results consistent with this trade-off and estimated the costs of DST to Indiana households exceeded $9 million annually.
The irony that DST exacerbates the problem it was designed to address is concerning enough. However, there is also mounting evidence that it has numerous other deleterious effects on our health and productivity. For example, a pair of researchers at Michigan State University studying the mining industry found that the transition to DST in the spring was associated with a 6% increase in the number of workplace injuries, caused by workers’ fatigue following the time change. Other studies have even implicated DST time changes with increases in car accidents and heart attacks. The negative effects don’t stop at health, though, as researchers have also found that the DST transition may negatively impact our work performance: judges have been found to hand down harsher sentences and office workers to spend more time browsing the Internet.
Concerns about the efficacy and potentially harmful effects of this policy have resulted in growing support to either eliminate DST altogether, or to observe it year-round. Attempts to do so, however, have proven challenging in many jurisdictions. In Canada, where the decision to observe DST is under provincial jurisdiction, Alberta recently failed to pass legislation that would have eliminated the biannual time change altogether. Apparently, the provincial legislature’s Standing Committee on Alberta’s Economic Future found that there was the potential for significant and negative unintended economic consequences and advised against passing the bill.
According to the Committee, by eliminating the biannual time changes, Alberta risked being misaligned with its neighbouring jurisdictions in ways that would complicate business, trade and tourism in the province. It’s simply much more convenient for businesses and tourists in B.C., for example, to know that Alberta is always one hour ahead. Had the legislation been passed, Alberta would have been two hours ahead of B.C. from November through March, and one hour ahead from April through October.
In particular, WestJet and Alberta’s two NHL franchises objected to the legislation. The airline’s representatives warned that Calgary’s status as a hub for flight connections would be endangered, as passengers leaving B.C. would be required to leave an hour earlier in the winter to catch their morning connections in Calgary. The ownership of the Edmonton Oilers and Calgary Flames also expressed concerns that, under year-round DST, their teams would be forced to play a number of games starting at 9:30 PM local time during the winter. This may be unacceptable to fans and cause viewership and home-game attendance to drop. Legislators ultimately followed the Committee’s advice and voted overwhelming to defeat the bill.
This story is certainly disheartening for anyone wishing to put an end to our time-changing traditions. So how can policy-makers in Alberta and other jurisdictions move forward? The solution appears to be by engaging with other regions to implement a more coordinated end to time changes. This was the motivation for a 2013 bill in Missouri which would have left the state permanently in DST, but only if at least 19 other states agreed to do the same. It was also the ultimate advice of Alberta’s legislative committee, which advised that the government of Alberta “engage other jurisdictions in Canada and the United States to develop a coordinated approach to eliminating the practice of observing daylight savings time.”
The law of unintended consequences states that any deliberate intervention in a complex system is likely to lead to unintended and often undesirable results. While this principle may already be familiar to most policy-makers, its implications in the case of DST are particularly striking. Unintended consequences have left this well-intentioned policy ineffective and potentially harmful. Now, amid increasing criticism of DST, they’re making it impossible to get rid of.
|
<urn:uuid:4784cad4-a71e-4ccd-ac2c-ee5250a97dbe>
|
CC-MAIN-2020-40
|
https://ppgreview.ca/2017/12/06/daylight-savings-time-a-tale-of-unintended-consequences/?shared=email&msg=fail
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400234232.50/warc/CC-MAIN-20200926040104-20200926070104-00507.warc.gz
|
en
| 0.968252 | 1,084 | 3.53125 | 4 |
Home > Diet and nutrition > Nutrition Basics Updated 09 June 2014 Why South Africans are the fattest in Africa DietDoc takes a look at why South Africans - especially women - are regarded as of the fattest in sub-Saharan Africa, and what we can do about it. 0 Related 40 percent of SA women are overweight The obese personality Metabolic Syndrome, a weighty issue worldwide Vit & Min doses per day » Count calories in food » Is my vegetarian diet balanced? » Ask The Dietitians » 10 foods to boost your immune system Your quick guide to Banting I think most people saw the rather startling photograph of an obese woman squeezed into a skimpy top that allowed fat bulges to balloon over the straining material, which was published in a number of newspapers at the end of May (see right). Luckily it was a rear view and the feelings of the person who posed for this photo will hopefully have been spared. The accompanying headline was just as harrowing: “SA’s the fattest sub-Saharan African nation - study” (Malan, 2014).Malan (2014) goes on to report that a study published in The Lancet, one of the leading UK medical journals, has found that we as a nation have the highest overweight and obesity rates in sub-Saharan Africa, which equates to 7 out of 10 women and 4 out of 10 men being overweight or obese. Read: The report on obesity in South AfricaEndless bad pressIt is sometimes downright disheartening to read anything that refers to South Africa’s expanding waistlines. In the present study, other countries in sub-Saharan Africa were found to have much lower rates of female obesity, for example: our neighbours Namibia, Lesotho and Zimbabwe have female overweight/obesity rates of 19,8%, 24,1% and 33,5%, respectively. These are all less than half of the South African figure of 70% of women who are overweight, of which 40% are classified as obese. The comparison is even less flattering if we compare our female population to the women of African countries such as Eritrea where only 4,7% of adult females are obese and Ethiopia where the percentage drops to 1,8%. Malan (2014) points out these figures are respectively 10 and 20 times less than in South Africa.Endless theoriesThere are of course endless theories that have been propounded to try and explain these statistics, ranging from poor eating habits in a rapidly westernised and urbanised population (Stassen, 2014), to experiences of racism that may trigger overeating (Mapumulo, 2014). One of these theories that seems to make sense to me, is the finding that as a nation, South Africans of all races do very little exercise. We have taken to the comforts afforded by transport and modern gadgets with a vengeance and the finding that overweight or obese South Africans would rather use fad diets or swallow dodgy over-the-counter slimming pills that promise much and do little (like us?), than to do healthy exercise (Pillay, 2014), sounds like a logical reason for at least some of the weight gain in this country. Read: Why are South Africans so fat?I have proof of this tendency on the DietDoc Message Board every week when the majority of postings more often than not are all about fad diets and ‘lose 10 kg a week with Dr X’s magic injections’. Pillay (2014) states that people in the UK have started to ditch their ‘fad diets, diet foods and drinks, diet pills and potions’ and are starting to use common-sense solutions such as eating smaller portions and doing more physical activity to lose weight. A marketing survey conducted in 2013 found that sales of diet products had fallen in the period 2008 to 2013, which indicates that Britons are starting to be more sensible about weightloss. Read: Why the world is getting fatter and fatterConclusionsThere can be no doubt that we have a massive problem in South Africa when it comes to overweight and obesity and that this is going to have a dramatic knock-on effect on future epidemics of all the diseases of lifestyle such as diabetes, heart disease, certain types of cancer and metabolic syndrome which are associated with overweight (Stassen, 2014). Read: 8 Scary facts about obesityThe most sensible thing we can possibly do to avert these looming health problems is to also ditch all the fads and quick fixes. We need to teach our population to reduce portion sizes, to moderately reduce their energy intake while still eating a balanced diet that includes all the food groups and to increase their activity levels by doing about of 30 minutes of walking or skipping or stair climbing or jogging every day. Test yourself: Are you obese or just a little overweight?Making small changes like this may sound like a feeble solution, but over time, each little improvement in your eating habits and exercise output will translate into weightloss and that is what our population needs desperately. So let’s tackle this seemingly insurmountable problem one step and one teaspoon and 50 kJ at a time. DIETDOC© Text copyright: Dr I V van Heerden References: (Malan M (2014). SA’s the fattest sub-Saharan African nation - study. Mail & Guardian; Mapumulo Z (2014). Racism linked to obesity -study. News24. Published on 20 April 2014: Pillay T (2014). Dieting ourselves fatter, we shun ‘exercise more, eat less’. Sunday Times, Published on 20 April 2014; Stassen W (2014). Bad eating habits behind growing rate of heart disease in SA. Pretoria News, Published on 7 April 2014)Read more:How dangerous is it to be overweight or obese?The Kardashians and diet pill empiresHow to sneak in a workout Image: Finnbar O'Reilly, Reuters NEXT ON HEALTH24X 5 reasons to love avocados 2018-10-14 07:00 More: Diet and nutritionNutrition Basics advertisement Read Health24’s Comments Policy Comment on this story 0 comments Comments have been closed for this article. Logout Comment 0 characters remaining Share on Facebook Loading comments... Live healthier Lifestyle » E-cigarettes: Here are five things to know E-cigarettes have become hugely popular in the past decade, but a rash of vaping-linked deaths and illnesses in the US is feeding caution about a product that's already banned in some places. Allergy » Ditch the itch: Researchers find new drug to fight hives A new drug works by targeting an immune system antibody called immunoglobulin E, which is responsible for the allergic reaction that causes hives.
|
<urn:uuid:4b34f476-c944-452d-8b7f-28442277f34d>
|
CC-MAIN-2019-43
|
https://www.health24.com/Diet-and-nutrition/Nutrition-basics/Why-South-Africans-are-the-fattest-in-Africa-20140609
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986675598.53/warc/CC-MAIN-20191017172920-20191017200420-00085.warc.gz
|
en
| 0.947753 | 1,370 | 2.75 | 3 |
"Bioengineering for vaccine development" is the focus of an innovative research project by the Sattentau group launched in April 2016 and funded by the BBSRC.
Protein oxidation is a double-edged sword that may trigger immune-mediated disorders such as allergy and cardiovascular disease, but may potentially be harnessed for human benefit, such as in vaccine design. Quentin and co-investigator Amin Moghaddam who carried out the work leading up to the award, hope to understand the mechanisms underlying the immune enhancing effects of protein oxidation, and use this knowledge to develop new vaccine approaches against infectious diseases such as influenza.
Quentin said: “Although the immune enhancing effects of protein oxidation are well described, the mechanisms behind this remain largely unknown and their potential utility has not been exploited. Our group intends to use new knowledge in this area to help develop novel vaccines.”
BBSRC responsive mode research grants fund curiosity led research across the spectrum of biosciences.
|
<urn:uuid:8d05ef96-5485-4fb7-a2cd-5b606dc415a6>
|
CC-MAIN-2017-26
|
http://www.ox.ac.uk/research/bioengineering-vaccine-development-project-gets-bbsrc-funding
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320685.63/warc/CC-MAIN-20170626064746-20170626084746-00394.warc.gz
|
en
| 0.957439 | 199 | 2.625 | 3 |
Author:Rolando L. deGoma, MDCapital Cardiology Associates
Citation:deGoma RL. Coronary calcium scan: the role of calcium scoring in preventing a first myocardial infarction [published online September 25, 2019]. Cardiology Consultant.
About 720,000 new coronary events and 335,000 recurrent coronary events occur each year, according to data from the American Heart Association.1 How many of the 720,000 first coronary events can be prevented? Most of them. First, we need to identify high-risk patients, and then quickly treat the patients to prevent plaque rupture, stop plaque progression, and induce plaque regression.
IDENTIFYING HIGH-RISK PATIENTS
The Framingham Risk Score2 is the most common method for calculating patients 10-year risk for coronary heart disease (CHD). It is very inaccurate, though, resulting in undertreatment, overtreatment, and even nontreatment if the patient or care provider is nonadherent. Patients with a Framingham Risk Score of more than 20% are at high risk for cardiovascular disease (CVD) events, but the approach does not answer two fundamental questions: (1) does the patient have or not have plaque, and (2) how much plaque is present?
This approach is like reading the patients palm to determine the likelihood of having a myocardial infarction, stroke, or sudden vascular death based on ones age, sex, blood pressure, high-density lipoprotein cholesterol (HDL-C), smoking status, and other risk factors. In the last 10 years, coronary calcium scoring has become more accessible and affordable, at $39 to $400 for the test, and most patients are willing to pay out-of-pocket if they understand what the test is for.
Calcium scoring is like mammography for the heart but only needs to be performed once for most patients. It is not an annual test and requires no special preparation, no fasting, no intravenous line, no injection, no exercise, and very low radiation exposure. Moreover, the test is usually completed in less than 30 seconds. The results show the presence or absence of calcified plaquesan accurate reflection of total plaque burden. The score can range from 0 to more than 4000. Someone with a score between 100 and 300 has moderate plaque deposits and a high risk for myocardial infarction in the next 3 to 5 years.3 The need for and the intensity of medical therapy are determined accordingly.
Some patients may ask about undergoing a nuclear stress test instead. Hospital charges for a nuclear stress test are around $30,000! About 68% of plaques that rupture only obstruct the artery by 50% or less and therefore do not cause an abnormal stress test. Stress testing plays no role in the risk assessment of asymptomatic patients. Normal results from a nuclear stress test do not mean that the patient is not at high risk or that the patient is at low risk. A patient can have a calcium score of more than 2000 and still have normal stress test results.
PREVENTING CVD EVENTS
My journey to myocardial infarction (and stroke) prevention started in 2001 when I realized that the future of CVD management will not require implanting more stents and performing more heart bypass procedures. A nationwide physician survey4 had revealed that only 18% of patients with CHD were successful in achieving a low-density lipoprotein cholesterol (LDL-C) level of less than 100 mg/dL; 82% were either not being treated with a statin or were not treated adequately.4
I decided to find a way to incorporate aggressive prevention as part of every patient visit. This led to my creation and development of a numerically goal-oriented clinical management system that includes CVD risk assessment for every patient and setting treatment goals based on the magnitude of risk. The higher the risk, the lower the LDL-C treatment goal. I called this approach the PaKS-ACCEPT system.5
We published our first analysis of LDL-C treatment performance data6 in 2006 and the second analysis5 in 2017. In 2006, 85% of high-risk patients (CHD and CHD risk-equivalent patients) were successfully treated to an LDL-C level of less than 100 mg/dL using our PaKS-ACCEPT system, and 32% had an LDL-C level below 70 mg/dL.6
In 2017, 89% of patients had reached LDL-C levels of less than 100 mg/dL, and 52% were below 70 mg/dL.5 CVD events declined progressively every year to the point that they had become uncommon. The duration of treatment is directly proportional to the magnitude of event reduction. Therefore, if we are able to identify the patients who may experience a first myocardial infarction before it happens, we can accurately prevent these debilitating events.
There are many practical implications of knowing the coronary calcium score for the primary prevention of CHD and CVD events. For one, patients are more likely to accept and take appropriate medical therapy. For example, a 50-year-old man and a 60-year-old woman had calcium scores of 850 and 450, respectively. They were both started on statin therapy, and their on-treatment LDL-C levels were both less than 70 mg/dL. They would not have been prescribed a statin if they did not have their calcium score.
Another of my patients needed to be on statin therapy but had refused for years. Once he found out that his calcium score was 500, he started taking a statin.
Conversely, another of my patients had been on several different statins but continued to experience intermittent muscle aches. We conducted a calcium score scan and found that her calcium score was 0. The statins were discontinued, and her myalgia resolved after several weeks.
Another of my patients was taking low-dose statin but was not achieving her LDL-C goal. She refused to take a higher-dose statin in combination with ezetimibe. However, after finding her calcium score was 1200, the patient agreed to take statin-ezetimibe combination therapy. Her on-treatment LDL-C level dropped to 45 mg/dL.
ENDING THE WAR ON HEART DISEASE
For decades, the American Heart Association and the American College of Cardiology have been actively waging a war to end heart disease. In 2016, the American College of Cardiologys president, Kim Allan Williams, MD, said, We must turn off the faucet instead of just mopping the floor.7 He meant that we, as cardiologists, need to prevent cardiac events before they start, effectively ending the war on heart disease. Coronary calcium scoring provides the new tool that we need to continue our fight and stop myocardial infarctions before they happen.
Rolando L. deGoma, MD, FACC, FNLA, is a cardiologist at Capital Cardiology Associates in Trenton, New Jersey.
See the original post:
- High-Sensitivity Cardiac Troponin and the Universal Definition of Myocardial Infarction - DocWire News - October 9th, 2019
- Sen. Bernie Sanders had heart attack; chest pains diagnosed as myocardial infarction - KIRO Seattle - October 9th, 2019
- E-Cigarette Use and Myocardial Infarction - Physician's Weekly - October 9th, 2019
- Sudden Cardiac Arrest and Ventricular Arrhythmias following first type I Myocardial Infarction in the Contemporary Era - DocWire News - October 9th, 2019
- Early MI Linked to High Recurrent Events, Mortality - Medscape - October 9th, 2019
- Sanders plans to 'change the nature' of campaign after heart attack - New York Post - October 9th, 2019
- BioVentrix Enrolls and Treats First Patient in REVIVE-HF European RCT for Ischemic Heart Failure Patients - P&T Community - October 9th, 2019
- Quantitative Flow Ratio guided Residual Functional SYNTAX Score for Risk Assessment in Patients with ST-Segment Elevation Myocardial Infarction... - October 9th, 2019
- E-Selectin Gene Haplotypes are Associated with the Risk of Myocardial Infarction - DocWire News - October 9th, 2019
- Sen. Sanders released from the hospital after heart attack - WXYZ - October 9th, 2019
- Left Main Treated With PCI or CABG Have Similar Outcomes at Five Years - Diagnostic and Interventional Cardiology - October 9th, 2019
- The Lowdown on Lipoprotein(a) - Medscape - October 9th, 2019
- Protamine use found to significantly reduce reoperations for patients who undergo carotid endarterectomy - Vascular News - October 9th, 2019
- Reconsidering the Safety of Intravenous Thrombolysis for Ischemic Stroke After Recent Myocardial Infarction - Neurology Advisor - September 19th, 2019
- Geomagnetic Disturbances and Cardiovascular Mortality Risk - On Health - BMC Blogs Network - September 19th, 2019
- Cardiorenal Disease Is the Most Common CVD Manifestation in Patients With T2D - Endocrinology Advisor - September 19th, 2019
- DAPA-HF Published: 'Stunning Consistent Benefit With Dapagliflozin' - Medscape - September 19th, 2019
- Effect of Delayed vs Immediate Interventions in Transient STEMI - The Cardiology Advisor - September 19th, 2019
- CV, General Safety of Long-Term PPI Use Examined - The Cardiology Advisor - September 19th, 2019
- Preoperative opioid use leads to perioperative consequences in foot and ankle surgery - Healio - September 19th, 2019
- ENTRUST-AF PCI Supports Safety of Dual Therapy With Edoxaban - Medscape - September 19th, 2019
- Abiomed to Highlight Importance of Optimal PCI Treatment to Improve Outcomes for High-Risk Patients at TCT 2019 - Yahoo Finance - September 19th, 2019
- Global Myocardial Infarction Drug Market 2019 BioCardia, Inc., Biscayne Pharmaceuticals, Inc., Capricor Therapeutics, Inc., Cell - Market News Times - September 19th, 2019
- Diagnosis of Myocardial Infarction At Autopsy: AECVP Reappraisal in the Light of the Current Clinical Classification - DocWire News - September 19th, 2019
- Rapid Diagnosis Protocol for Chest Pain Does Not Improve Outcomes - Diagnostic and Interventional Cardiology - September 19th, 2019
- Health Recovery After Acute MI Similar in Young Adults With and Without Diabetes - The Cardiology Advisor - September 19th, 2019
- Incidence, Characteristics and Outcomes in Very Young Patients with ST Segment Elevation Myocardial Infarction - DocWire News - September 19th, 2019
- TherOx Announces Key SuperSaturated Oxygen Therapy Presentations at TCT 2019 - Yahoo Finance - September 19th, 2019
- SRH part of regional system award recognizing care for heart attacks - Index-Journal - September 19th, 2019
- University of Colorado study suggests Cannabis aids in surviving heart... - Communities Digital News - September 19th, 2019
- Research Offers 10-Year Forecast on Myocardial Infarction Treatment Market - Rapid News Network - September 19th, 2019
- Frequency and Factors Related to Not Receiving Acute Reperfusion Therapy in Patients with ST Elevation Myocardial Infarction; A Single Specialty... - September 19th, 2019
- Global Myocardial Infarction Treatment Market Will Reach USD 1726.3 million by end of 2022 - Market News Store - September 19th, 2019
- Shock and Awe: ARNI for Acute HF May Be Safely Started in ICU - Medscape - September 19th, 2019
- A Novel Algorithm for Improving the Diagnostic Accuracy of Prehospital ST-Elevation Myocardial Infarction - DocWire News - September 19th, 2019
- Bariatric Surgery Tied to Less MACE in Obesity, Diabetes - Medscape - September 19th, 2019
- Population Health vs. Personalized Medicine: Lost in Translation? - American Council on Science and Health - September 19th, 2019
- Marijuana Use Linked to Improved Acute-HF Hospital Survival - Medscape - September 19th, 2019
- Resverlogix Provides Update on BETonMACE Phase 3 Trial Toronto Stock Exchange:RVX - GlobeNewswire - September 19th, 2019
- FDA Action Alert: Merck and Amarin - BioSpace - September 19th, 2019
- Ventricular Tachycardia Treatment Market Growth in Technological Innovation, Competitive Landscape Mapping the Trends and Outlook - NewsVarsity - September 19th, 2019
- Creatinine Rises After RAS Inhibitor Initiation Tied to Worse Outcomes - Renal and Urology News - September 19th, 2019
- Myocardial Infarction - September 17th, 2019
- Myocardial infarction - Osmosis Video Library - May 1st, 2019
- Cardiovascular models including myocardial infarction ... - April 27th, 2019
- Heart attack - Symptoms and causes - Mayo Clinic - April 20th, 2019
- STEMI (ST Elevation Myocardial Infarction): diagnosis ... - April 20th, 2019
- Heart Attack (Myocardial Infarction) - Drugs.com - April 20th, 2019
- Myocardial Infarction Therapeutics Market, Share, Growth ... - March 13th, 2019
- Electrocardiography in myocardial infarction - Wikipedia - January 11th, 2019
- Anterior Myocardial Infarction LITFL ECG Library Diagnosis - January 11th, 2019
- Top 5 MI ECG Patterns You Must Know | LearntheHeart.com - January 11th, 2019
- Heart Attack (Myocardial Infarction) - Cedars-Sinai - January 11th, 2019
- Cardiovascular disease - Myocardial infarction | Britannica.com - January 11th, 2019
- Nursing Care Plan for Myocardial Infarction | NRSNG - December 29th, 2018
- Myocardial infarction - Wikipedia - December 27th, 2018
- Myocardial Infarction: Practice Essentials, Background ... - December 27th, 2018
- Myocardial Infarction - Eccles Health Sciences Library - December 27th, 2018
- Myocardial infarction: signs symptoms and treatment ... - December 25th, 2018
- ECGs in Acute Myocardial Infarction - ACLS Medical Training - December 25th, 2018
- Myocardial Infarction - Heart Home Page - December 25th, 2018
- Conditions We Treat: Myocardial Infarction | Johns Hopkins ... - December 23rd, 2018
- Myocardial infarction (acute): Early rule out using high ... - December 20th, 2018
- Heart Attack (Myocardial Infarction) - medicinenet.com - December 17th, 2018
- Heart Attack | Myocardial Infarction | MedlinePlus - December 16th, 2018
- Acute Myocardial Infarction, Myocardial infection. Patient - December 4th, 2018
- Myocardial Infarction NCLEX Review (Part 1) - December 3rd, 2018
- Myocardial Infarction (MI) NCLEX Questions - November 30th, 2018
- Heart Attack (Myocardial Infarction) Symptoms | Cleveland Clinic - November 15th, 2018
- Myocardial Infarction (Heart Attack) Ischemia Pathophysiology, ECG, Nursing, Signs, Symptoms Part 1 - November 15th, 2018
- ST-Segment Elevation Myocardial Infarction - October 18th, 2018
- ECG localization of myocardial infarction / ischemia and ... - October 18th, 2018
- Myocardial infarction - Simple English Wikipedia, the free ... - October 18th, 2018
- Myocardial Infarction Treatment & Management: Approach ... - October 9th, 2018
- Myocardial infarction diagnosis - Wikipedia - September 25th, 2018
- Myocardial Infarction Clinical Presentation: History ... - September 25th, 2018
- Myocardial Infarction - ECGpedia - September 21st, 2018
- Heart Attack and Acute Coronary Syndrome - Lab Tests Online - June 21st, 2018
- Myocardial infarction (Heart Attack) - Health Facts - June 21st, 2018
- ST-Segment Elevation Myocardial Infarction - verywell.com - May 12th, 2018
|
<urn:uuid:b950ee65-fe35-4cf4-a00c-013bceacb761>
|
CC-MAIN-2019-43
|
https://www.femtomedicine.com/coronary-calcium-scan-the-role-of-calcium-scoring-in-preventing-a-first-myocardial-infarction-consultant360/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986649035.4/warc/CC-MAIN-20191014025508-20191014052508-00252.warc.gz
|
en
| 0.898843 | 3,571 | 2.734375 | 3 |
Syringae Leaf Spot
"Brown-black leaf spots sometimes surrounded by chlorotic margin; dark superficial specks on green fruit; specks on ripe fruit may become sunken, and are surrounded by a zone of delayed ripening. Stunting and yield loss, particularly if young plants are infected. Reduced market value of speckled fruit. A. thaliana: Water-soaked, spreading lesions, sometimes surrounded by chlorotic margin"
Presence among species
|Pseudomonas syringae||Solanum lycopersicum|
|
<urn:uuid:9466da56-066b-444b-aa8e-e1c108a7fe11>
|
CC-MAIN-2021-25
|
http://prgdb.crg.eu/w/index.php?title=Disease:Syringae_Leaf_Spot&oldid=117501
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487608702.10/warc/CC-MAIN-20210613100830-20210613130830-00471.warc.gz
|
en
| 0.879978 | 115 | 3.125 | 3 |
It seems that there is no end to ingenious woodworking tools, such as this 3-D Router Pantograph from [Woodgears.ca]. The pantograph, a design using linkages to trace and scale drawings, may have been invented in the 1600s, but if we were honest, most of us haven’t heard of this device. This particular pantograph is able to trace letters or other stencils in three dimensions by pivoting about an additional axis.
If you’re wondering where to get these stencils, they’ve got you covered with an online stencil generation tool. However, if you want to make even more detailed stencils, we might recommend using a free drafting tool such as Draftsight (here’s a review), or Sketchup.
[Woodgears] gives a good explanation of how it’s made in the video after the break. You can also buy plans for it if you want templates to use to cut everything.
On the other hand, if you’re feeling a bit more (or less depending on your skill set) adventurous, you could always try building a CNC router!
|
<urn:uuid:2648b4a8-a5e3-48a8-bfc7-843fd553cd0a>
|
CC-MAIN-2015-18
|
http://hackaday.com/2012/04/19/a-3d-pantograph/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246645538.5/warc/CC-MAIN-20150417045725-00168-ip-10-235-10-82.ec2.internal.warc.gz
|
en
| 0.943483 | 242 | 2.953125 | 3 |
As if 2020 wasn’t crazy enough, now in 2021 we have an international organization using AI to monitor what we say for COVID-related thoughtcrime.
What am I talking about?
The World Health Organization’s EARS program.
EARS stands for Early AI-supported Response with Social Listening. In short, it’s an artificial intelligence that combs the internet for any mention of COVID-19, analyzes discussions, and collects data on such for researchers to use. It’s everything Edward Snowden warned us about and more.
The stated intent of such a program, according to the WHO, is to monitor the “fake news” (ol’ Trump seems to have created quite the sticky phrase here) that surrounds anything related to COVID. The World Health Organization publicly refers to any information out there that stands in contrast to WHO advice as “the infodemic.”
An infodemic is a new concept, but it’s one which the WHO has decided exists. WHO defines an infodemic as such:
An infodemic is too much information, including false or misleading information in digital and physical environments during a disease outbreak. [source]
I’m not sure why too much good information would be considered a problem. However, the WHO believes that even that is an issue according to the above statement.
The problems with this infodemic are two-fold, according to the WHO. For starters, people engage in non-WHO-approved actions. Secondly, “it leads to mistrust in health authorities and undermines the public health response.” Also, according to the WHO, social media and internet use are sources of much of the infodemic, and they “can…amplify harmful messages”. [source]
To combat this, the WHO believes they can take four broad steps.
For starters, Step 1: one must listen to hear what information the community is discussing. Next, Step 2: promote understanding.
These first two steps are rather lame. It’s the next two that are liable to pique your interest.
Step 3: Build Resilience to Misinformation. Just what exactly does that step entail, may I ask?
Step 4: Engage and Empower Communities to Take Positive Action. [source] This step is the one that should scare you. What on earth are communities being told to do here? Is this to encourage government officials to curb free speech? Are communities to take away the medical licenses of doctors who don’t march in line? What do they mean by ‘positive action’?
Let AI monitor everything.
One of the best ways to analyze mass amounts of data is through the use of artificial intelligence. It was with this understanding that the who launched EARS in January 2021. EARS has since tracked 41 different narratives online that pertain to COVID. EARS is monitoring 30 different countries at the moment, searching Facebook, Instagram, Twitter, blogs, forums, news articles, and comments sections of websites as it attempts to harvest as much real-time data as possible.
This WHO AI supported program monitors very specific keywords and hashtags to keep accurate tabs on what conversations are trending throughout cyberspace, and therefore, the public.
“When people face delays getting the information they need, it can lead to a rise in speculation and conspiracy theories, and that too is an infodemic challenge that can result in harm to peoples’ health,” the WHO states in one recent article.
One strategy to fight back against the infodemic is to “saturate online conversations with high-quality health information that responds to the questions and concerns of the public.” [source]
So, are bots used to auto-generate posts across cyberspace, making it seem as if the more significant majority of people believe X, when in fact, Y is what people believe?
Now, let’s think about the article I wrote about the Australian government being able to legally change people’s social media posts. EARS would be a significant benefit for those searching for posts to “correct.”
Should you be concerned?
Well, for starters, do you like the idea of an AI monitoring what you’re saying online? Do you like the idea of anyone monitoring what you’re saying online? And keep in mind that there’s a significant difference between having other people read what you say online compared to having somebody monitor what you say online.
In my mind, I associate monitoring with creating databases – databases used for future decision-making and policy creation.
In many ways, 2020 was the pouring of gasoline on a fire. 2021 is throwing some dynamite into the fire for good measure. Will programs such as EARS only continue the current trend of rightspeak well into the future? What do you think about an international organization determining whether what you have to say is deemed trustworthy or not? Are you okay with your local community taking “positive action” against what you enjoy listening to or saying? Sound off in the comments.
Source: The Organic Prepper
Jeff Thompson is an avid fisherman who likes to spend time sailing on his boat and reading while at sea.
|
<urn:uuid:f506ddde-b20a-4b1a-b5c7-8f3ac91eeb16>
|
CC-MAIN-2023-40
|
http://www.opensourcetruth.com/the-world-health-organization-has-ears/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511170.92/warc/CC-MAIN-20231003160453-20231003190453-00685.warc.gz
|
en
| 0.945169 | 1,163 | 2.671875 | 3 |
The Standard Template Library: Generic Programming
The Standard Template Library (STL) consists of two primary components: a set of container classes (including the vector, list, set, and map classes) and a set of generic algorithms to operate over these containers, including find(), sort(), replace(), and merge().
The vector and list container classes represent sequential containers. A sequential container maintains a first element, a second element, and so on through a last element. We primarily iterate over a sequential container. The map and set classes represent associative containers. An associative container supports fast lookup of a value.
A map is a key/value pair: The key is used for lookup, and the value represents the data we store and retrieve. A telephone directory, for example, is easily represented by a map. The key is the individual's name. The value is the associated phone number.
A set contains only key values. We query it as to whether a value is present. For example, if we were to build an index of words that occur in news stories, we would want to exclude neutral words such as the, an, but, and so on. Before a word is entered into the index, we query an excluded_word set. If the word is present, we discard it; otherwise, we include the word in our index.
The generic algorithms provide a large number of operations that can be applied both to the container classes and to the built-in array. The algorithms are called generic because they are independent of both the type of element that they are operating on (for example, whether it is an int, double, or string) and the type of container within which the elements are held (whether it is a vector, list, or built-in array).
The generic algorithms achieve type independence by being implemented as function templates. They achieve container independence by not operating directly on the container. Instead, they are passed an iterator pair (first,last), marking the range of elements over which to iterate. While first is unequal to last, the algorithm operates on the element addressed by first, increments first to address the next element, and then recompares first and last for equality. A good first question is, what is an iterator? The next two sections try to answer that.
|
<urn:uuid:602452a2-918f-4169-943b-af67d259d4ee>
|
CC-MAIN-2021-43
|
https://www.informit.com/articles/article.aspx?p=25088&seqNum=11
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585120.89/warc/CC-MAIN-20211017021554-20211017051554-00637.warc.gz
|
en
| 0.920016 | 467 | 3.890625 | 4 |
Copyright © 2007-2017 Russ Dewey
Industrial/Organizational psychology deals with psychology and the workplace. It contains many subdivisions that are like independent disciplines, although all related to business, manufacturing, and industry.
By itself, organizational psychology specializes in the analysis of leadership, decision-making, and control of organizations. Consumer psychology is devoted to analyzing the needs and desires of consumers, with an eye toward increasing sales.
Human resources involves management of employee relations, including insurance and retirement plans, sick leave, and other benefits. Studies of management form another specialty.
Human factors and engineering psychology examine the interface between humans and technology, to make machines more convenient to use. This can be applied to everything from toothbrushes to complex control interfaces such as airplane cockpits.
Up to about the 1970s, organizational psychology concerned itself with the structure of organizations. This put the emphasis on durable relationships that could be displayed in charts, such as chains of command or flows of information and material.
However, in the later decades of the 20th Century, organizational psychology started to change. As Rousseau (1997) put it, psychologists started to pay more attention to organization as a verb rather than as a noun. As a verb, organization is the act or process of organizing.
What was a change in organizational psychology toward the end of the 20th C?
To Rousseau, the second approach was richer in meaning. Organization "as a verb" raises the question of how to adapt to rapidly changing times. Topics include optimizing work groups, networking, communicating, goal setting, and adjusting production techniques to meet changing demands of a dynamic and competitive marketplace.
The emphasis on nimble adaptation is a fairly radical change in the field. From the beginnings of the industrial revolution in the early 1800s to about the 1980s, nearly two centuries, people who studied companies and organizations studied mostly how to control workers, to wring more productivity out of them.
Karl Marx saw the opposition between management and labor as an inevitable feature of capitalism. To him, capitalists and workers formed two separate classes, forever opposed.
Marx believed that as populations grew exponentially (in the manner described by Malthus in 1798) workers would compete against each other for jobs, lowering the value of their labor until they all lived in conditions of misery. This would lead inevitably to a worker's revolution.
In the U.S., management/labor relations reached their nadir in the 1930s, and it is probably no coincidence that socialism was most popular in the U.S. during that time. Coal miners, steelworkers, and auto assembly workers fought the captains of industry like mortal enemies (which they were from the Marxist perspective).
Conditions improved for average workers after World War II. Ex-soldiers receiving free college educations due to the GI Bill. Jobs were abundant, even for people with a high school education, and (for a while) it seemed like anybody willing to work hard could buy a house and a car and support a family. The middle class grew, something Marx never predicted.
Nevertheless, in major unionized industries, a spirit of animosity persisted between workers and bosses. For example, sabotage was a well-documented problem on automobile assembly lines through the 1970s (Watson, 2005).
Autos were rolling off the assembly line with "slit upholstery, scratched paint, dented bodies, bent gear-shift levers, cut ignition wires, and loose or missing bolts. In some cars, the trunk key is broken off right in the lock, thereby jamming it." ("Labor: Sabotage at Lordstown", 1972).
What were signs of animosity between labor and management, in the U.S. auto industry?
The Lordstown, Ohio, assembly plant produced Chevrolet Vegas. It was notorious for terrible employee/
Salaries were high, because of contracts negotiated by the union, but hatred for the company was also high. The attitude was "us vs. them." The workforce organized a slowdown (the first time that tactic had been seen) and went on strike in the spring of 1972.
Workers felt joy in striking, although it meant a period of time with a fraction of the usual pay (from union strike funds). Nobody talked about cooperation, win-win solutions, or workers helping to improve the manufacturing process.
In the 1980s the U.S. automakers found themselves losing market share to the Japanese. After World War II, the Japanese adopted a radically different approach to industrial manufacturing: the Total Quality Management approach of W. Edwards Deming.
Deming was inspired by Ludwig von Bertalanffy's General System Theory, which he heard about in seminars during the late 1930s and 1940s. Bertalanffy talked about systems and how they were regulated, and he emphasized that these principles applied to all dynamic or intelligent systems.
Deming related this to business and industry. He developed the idea of using a systematic approach to improve the manufacturing process at every point from receipt of raw materials to production and delivery of finished goods.
Deming called his approach Total Quality Management. Deming was unknown in the U.S. at the time, but he brought his theories to Japan in a series of lectures in 1950, and his ideas were embraced enthusiastically.
Japan was just recovering from WW II, hungry for new ideas. Deming's ideas had a profound effect on Japan's post-
What ideas did Deming bring to Japan?
Total Quality Management sees manufacturing as a total system to be optimized from top to bottom. The realm of employer/
Kaizen was re-introduced to the West by Masaaki Imai in his 1986 book, Kaizen: The Key to Japan's Competitive Success. This time it was the Americans who took a keen interest. They realized Japanese products excelled in quality while often being lower in price than their American counterparts.
Part of the Toyota production system was lean thinking. This was popularized in a book, The Machine that Changed the World (Womack, Jones, and Roos, 1990) that exposed a significant performance gap between American and Japanese manufacturers.
Lean thinking removes inefficiency and waste from production process by carefully analyzing all actions that contribute to the value of a product, such as the steps of manufacturing, and removing any that do not contribute. For example, products are manufactured for a customer "just-in-time" rather than being overproduced and warehoused (which does not contribute to the value of a product).
Lean thinking requires striving for perfection and nimbleness in arranging storage and production resources. This requires intense participation and cooperation by employees involved in every step of the process.
What is lean thinking?
Kaizen has many bottom-up processes. Workers are consulted about the manufacturing process on an ongoing basis. A single worker can stop an assembly line to fix a defective product if needed. Everybody from the top to the bottom of the organization is expected to work together and suggest improvements.
This requires relationships unlike the adversarial labor-management relationships in the U.S. up until the 1980s. Major manufacturers in the U.S. were skeptical about the "new" ideas coming over from Japan.
General Motors decided to experiment with Toyota's production techniques by partnering with Toyota in a unique joint operation in Fremont, California, called NUMMI: New United Motor Manufacturing Inc. Retiring workers shared their recollections of those events in the 1980s with Frank Langfitt of National Public Radio in 2010, when the plant finally closed. Following are excerpts from his report.
In the mid-1980s, Toyota took over the Fremont plant, one of GM's worst, a factory known for sex, drugs and defective vehicles. And as part of an historic joint venture, Toyota turned the plant into one of GM's best, practically overnight.
"It was considered the worst workforce in the automobile industry in the United States," said Bruce Lee, who ran the western region for the United Auto Workers and oversaw the Fremont plant. "And it was a reputation that was well earned. Everything was a fight. They had strikes all the time. It was just chaos constantly."
By 1982, GM had had enough and put the Fremont factory out of its misery. Two years later, GM and Toyota reopened the factory with–
The United Auto Workers' Bruce Lee helped oversee the transformation of the plant from one of the worst under General Motors to one of the best in America. But first, they sent some of them to Japan to learn the Toyota way.
The key to the Toyota Production System was a principle so basic, it sounds like an empty management slogan: Teamwork. At Toyota, people were divided into teams of just four or five and they switched jobs every few hours to relieve the monotony. A team leader would step in to help when anything went wrong.
At the old GM plant in Fremont, Calif., the system had been totally different and there was one cardinal rule that everyone knew: the assembly line could never stop. "You just didn't see the line stop," assembly line worker Rick Madrid said.
"I saw a guy fall in the pit and they didn't stop the line." Lee, the supervisor who oversaw the plant summed it up this way: "You saw a problem, you stopped that line: you were fired."
As a result, vehicles at the plant had lots of defects. ...At the NUMMI plant you can see Toyota's solution to this—a thin nylon rope that hangs on hooks along the assembly line. It's called the andon cord and when pulled, it will stop the line.
What was the andon cord, and why did it strike a visiting American autoworker as significant?
When Rick Madrid trained in Japan, he saw workers stop the line to fix a bolt. "That impressed me," he said. "I said, 'Gee that makes sense.' Fix it now so you don't have to go through all this stuff. That's when it dawned on me. We can do it. One bolt. One bolt changed my attitude." (Lanfitt, 2010)
The new methods cut down on defects drastically, which made the Fremont plan very efficient. The next year GM tried to implement the same system at a plant in Van Nuys, 400 miles south of Fremont. Employees were skeptical. "Unlike workers at NUMMI, they'd never lost their jobs and didn't think they would."
With employees resisting new procedures, the Toyota production system could not be implemented. "Quality at Van Nuys never did improve. And in 1992, GM closed the plant." (Lanfitt, 2010)
Why did Kaizen fail at the Van Nuys plant?
GM did implement Japanese style production systems at all its plants in the early 2000s. By then, companies all over the world were imitating the Japanese model.
Kaizen evolved into a philosophy known as Continuous Improvement (CI). This called for ongoing feedback processes between workers and management and alteration of manufacturing processes on the go, to improve them. (Some industry groups note that continual is the grammatically correct term, referring to step-
What is CI, and what might it be called in the future?
Rapp and Eklund (2010) traced a typical introduction of Continuous Improvement to a Swedish industry in the 1990s. First, a "champion" (one of the executives) initiated the system in 1993. After an initial flurry of interest came a period of decline, when the suggestion system was neglected.
It was revived by new interest from employees. The suggestion system was revised to make it simple and easy to adjust. This suited the interests of all stakeholders in the organization: workers, management, and owners.
By the time research (consisting of structured interviews) concluded, the Continuous Improvement system had been in effect for nine years. The industry was thriving, and employee satisfaction was high.
Continuous Improvement (CI) epitomizes "win-win" solutions or cooperation in corporate culture. Everybody benefits. The Swedish researchers found "quick feedback to employees submitting suggestions" was key, so that people could see the system working.
How does CI represent a win-win solution?
The goal of CI is to optimize production as well as working conditions, much like Deming's original conception of Total Quality Management. The idea is now widespread. The Tesla giga-factory in Nevada, for example, embraces the philosophy of continual improvement (CI).
In the 1990s and 2000s, a new breed of manager emerged in response to Kaizen-like systems. Unlike the old stereotype of a hostile, distant boss, new managers were less dependent on trappings of authority. They might dress informally and mingle with workers.
"Management by walking around" became a popular phrase in management psychology. Like a gardener with a green thumb, managers found that consistent attention to the details of production helped things thrive.
How did new management slogans reveal new attitudes?
A popular book suggested "Management by Saying Yes," a philosophy of giving new ideas a try when they were suggested. Supervisors made more effort to learn from workers, seeking to actualize the promise of continual improvement.
By the 1990s, many companies were experimenting with management styles in which employees set their own goals. Self-management became more popular (Rousseau, 1997).
A typical implementation of this idea involves splitting the work force into teams, each oriented toward a problem. The teams meet once a week to examine results and adjust their goals.
Variations of self-management have been used for years in American colleges and universities. An example at our school was the self-study carried out every ten years by each academic department.
The self-study was an exercise in bottom-up self-management. It included the following steps:
–We met and reviewed larger institutional goals. Ours was a medium-sized, regional university, so we sought to detect and define needs in our region of the state, strong in agriculture, home to several military bases, and close to a major ocean port.
–We defined our departmental objectives. We attempted to spell out what skills and abilities could be delivered in each course in our curriculum.
–We gathered data about how well we were meeting departmental objectives defined by our last self-study. We designed questionnaires for students, faculty, and recent graduates, asking them for feedback and suggestions for improvements.
–We defined goals for the next ten years, specifying changes and improvements we would like to see and how we could measure them to see if they were accomplished.
How was self-management used in a departmental self-study project at a university?
During this entire process, we were never once told by an administrator above the department level how to do the job. We had previous self-studies as a model, but we were free to make creative changes.
We knew the resulting document would be reviewed at higher levels of the administration, and then it would have to be approved or revised, but it was accepted the way we submitted it.
Every company has its own culture, and corporate culture can determine whether employees are satisfied or disgruntled. Executive Mort Meyerson told how he returned to Ross Perot Systems in 1992, after five years away from the company, and found a poisonously negative corporate culture:
For example, I listened to some of our senior leaders talk about how they handled people on teams who didn't perform. I heard talk of "drive-by-shootings" to "take out" nonperformers; then they'd "drag the body around" to make an example out of them.
They may have meant it only as a way of talking, but I saw it as more: abusive language that would influence behavior. Left unchallenged, these expressions would pollute the company culture. (Meyerson, 1997)
How did Meyerson attempt to improve the corporate culture at Ross Perot Systems?
In response, Meyerson started programs to make workers feel respected and valued.
We initiated a company-wide program to teach us how to disagree with each other without tearing each other down... During these seminars, we identified people who were abusive. We coached them and took them through a person reinvention process to show them new ways of leading...
We started to behave like a company whose people not only focused on day-to-day business and economic performance, but also concerned themselves with the well being of the people on their teams and the concerns of their customers. We were becoming a company where the larger issues of life were as important as the demands of profit-and-loss performance. (p.6)
What are some benefits of a people-centered management approach?
A compassionate or people-centered management approach turns out to be beneficial for all concerned. Naturally the workers like it, but there are many benefits for the company as well.
When morale is higher, employees are less likely to sabotage the company with unproductive practices (or bolts dropped into the door frames of cars). Customers feel better treated, and turnover rates are lower because fewer employees quit, so expertise is conserved and training costs are reduced.
A big change in job organization at some companies, during the 1990s, was the emergence of work teams. Sometimes each member of a team was expected to learn all the skills used by the team, so workers could be rotated periodically from one activity to another, relieving the tedium of repetitive jobs.
How were work teams used to relieve the tedium of repetitive jobs?
The Saturn auto company made this concept of work teams famous in the United States, although they were not the first to use the idea. Volvo, for example, has been doing it for decades. Saturn, as it turned out, did not succeed; it folded after the economic crisis of 2008.
The concept of work teams remains viable and widely employed in various industries. Work teams are a good example of modern workplace practices that require a flexible, educated workforce. Members of a team must interact and get along, so interpersonal skills are more important than before.
Stevens and Campion (1994) found that the most important social skills for work teams were ability to work with others in solving problems, ability to communicate, and ability to manage and resolve conflicts. Work group members are also required to have good cognitive skills. They must be flexible and able to learn many different jobs, because frequently they take turns doing each other's jobs.
How are companies changing what they look for in employees?
Landy, Shankster, and Kohler (1994) suggested that, because of the emergence of work teams and similar arrangements, companies should look upon organizational citizenship as a highly desirable characteristic in employees.
The Organization Man of the 1950s was a conformist who followed orders and did not rock the boat. The good organizational citizen of the 2010s is a flexible thinker and learner who knows how to cooperate with co-workers and communicate with leaders about suggested workplace, process, and product improvements.
Human Factors psychology is a branch of experimental psychology associated with industrial/organizational psychology. It concentrates on the interaction of people and machines so that products can be made user-friendly.
What is Human Factors psychology?
The discipline of Human Factors came into existence partly as the result of pilot errors during World War II. Human error cost many lives. Analysis of flying accidents revealed that many crashes were due to confusing layouts of instrument panels in aircraft.
Pilots were faced with a bewildering array of dials and gauges in the cockpit. They were expected to keep track of all pertinent information and respond appropriately during emergencies.
Human Factors psychologists helped to identify problems in cockpit design. They attempted to re-design instrument panels so the most important gauges were clear and easy to read, and other instruments responded in ways that were intuitive and natural for humans.
In the post-war economy, Human Factors researchers turned their attention to consumer products. Today, the design of electronic devices such as smartphones require that human factors be taken into account. Thoughtful design can also benefit kitchen appliances, office furniture, and many other products.
Good design can help the sales of any manufactured product. Poor design results in poor word-of-mouth reputation, or poor reviews on consumer sites, and this can drastically reduce the sales of a product.
Many amusing examples of bad design are found at Michael J. Darnell's web site, www.baddesigns.com. Visitors to the site are invited to submit examples of bad product design.
In each case, a product would be more convenient if the designer spent more time considering how humans interact with the product. For example, consider the "ergonomic toothbrush." A correspondent wrote to the web site about it:
"Ergonomic" toothbrushes described on http://www.baddesigns.com
This toothbrush comes in both right-handed and left-handed versions. It is contoured to fit the hand and has a depression for the thumb. The idea is that since you probably hold your toothbrush with the preferred hand, why not contour it to make it comfortable to hold?
The problem with using this toothbrush is that it was based on holding a toothbrush in a stationary position. If you observe a real person (such as yourself) brushing teeth, people re-position a toothbrush continuously as they brush, switching it around as they move from one side of the mouth to the other, or from upper to lower teeth, or from front to back.
The user of this toothbrush faces a dilemma: do I rotate my grip on the handle and go against how the handle is shaped? A user complained, "The wrist must be held at an awkward angle. If the handle is rotated in the hand, it no longer conforms to the contour of hand." ("Ergonomic toothbrush?", May 10, 1999)
What was wrong with the "ergonomic toothbrush"? What is ergonomics?
The label "ergonomic toothbrush" is ironic, because ergonomics is the study of the efficiency and safety of human-machine systems. If the company producing this toothbrush had actually hired a human factors expert to test the ergonomics of their product, they would have discovered its deficiencies and either changed it or decided against bringing it to market.
Ilgen, D. R. (1999). Teams embedded in organizations: Some implications. American Psychologist, 54, 129-139. http://dx.doi.org/
Labor: Sabotage at Lordstown. Time Magazine. Retrieved from: http://content.time.com/
Landy, F. J., Shankster, L. J. & Kohler, S. S. (1994). Personnel selection and placement. Annual Review of Psychology, 45, 261-296.
Langfitt, F. (2010, March 26) The end of the line for GM-Toyota joint venture. NPR.org. Retrieved from: http://www.npr.org/
Meyerson, M. (1996, April 30) Everything I thought I knew about leadership was wrong. Fast Company. Retrieved from: https://www.fastcompany.com/
Rapp, C. & Eklund, J. (2010) Sustainable development of improvement activities—the long-term operation of a suggestion scheme in a Swedish company. Total Quality Management, 13, 945-969. http://dx.doi.org/
Rousseau, D. M. (1997) Organizational behavior in the new organizational era. Annual Review of Psychology, 48, 515-546. doi:10.1146/
Stevens, M. J. & Campion, M. A. (1994) The knowledge, skill, and ability requirements for teamwork: Implications for Human Resource Management. Journal of Management, 20, 503-530.
Watson, B. (2005, October 28) Libcom.org. Retrieved from: https://libcom.org/
Write to Dr. Dewey at firstname.lastname@example.org.
Copyright © 2007-2017 Russ Dewey
|
<urn:uuid:5d7c208b-fc79-47da-8ff7-e9605d0a4024>
|
CC-MAIN-2017-43
|
http://psywww.com/intropsych/ch15-social/industrial-organizational-psychology.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824618.72/warc/CC-MAIN-20171021062002-20171021082002-00257.warc.gz
|
en
| 0.971404 | 4,976 | 2.671875 | 3 |
How did Acne Wipeout work for you? We’d like to know.
The coronavirus pandemic has altered many areas of our everyday lives. Non-stop virtual meetings, 100 percent remote classroom learning, drive-by birthday parties and perhaps most of all the introduction of wearing masks — everywhere. Some of the new realities that the pandemic has introduced are harmless and may actually be better for us in the long run. I mean, is it really a bad thing that you have walked around your block so many times that you now have nicknames for all the neighborhood trees? Probably not. However, there is one thing that has been introduced as a result of wearing masks so frequently that is not to be taken lightly. It’s called “Maskne”.
Maskne or mask acne is the formation of pimples or acne that results as a result from frequent or prolonged mask wearing. As a result of the duration of mask wearing during the coronavirus pandemic, many people who are either required, or who choose to wear masks for long periods of time are experiencing mask induced breakouts under the face and mouth area where masks are worn.
There are actually a few reasons why mask acne develops.
|
<urn:uuid:4d7e5a4b-6378-4d08-8044-387e919f4428>
|
CC-MAIN-2023-40
|
https://acnewipeout.com/blogs/skin-deep/mask-acne-what-causes-mask-pimples-how-to-get-rid-of-maskne
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511220.71/warc/CC-MAIN-20231003192425-20231003222425-00173.warc.gz
|
en
| 0.979041 | 252 | 2.578125 | 3 |
Part of speech:
Very active and unpredictable; volatile:
The definition of tumultuous is having great disturbance, uproar, chaos or noise.
Very great; intense
Characterized by violent emotions, passions, speech, or actions:
The definition of agitated is someone who is very distressed or troubled.
Readily affected with or stirred by emotion:
The definition of fiery is to a strong personality, something related to heat, or to an impassioned action or speech.
The definition of intense is to a high degree, or a strong emotion.
Lacking polish or finesse:
Intense or extreme, especially in emotion:
The definition of calm is someone or something who is peaceful and free from stress or worries.
(Of a rule or punishment) Of only moderate severity.
Not raised or leavened.
Violently disturbed or agitated, as by storms
(--- Chiefly Southern US) Rude:
Indicative of or resulting from anger:
Find another word for tempestuous. In this page you can discover 28 synonyms, antonyms, idiomatic expressions, and related words for tempestuous, like: raging, tumultuous, furious, stormy, turbulent, agitated, blustering, emotional, fiery, heated and intense.
|
<urn:uuid:9f4f5cbd-6d17-405c-a8e3-ccca15ebec8a>
|
CC-MAIN-2020-50
|
https://thesaurus.yourdictionary.com/tempestuous
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141176049.8/warc/CC-MAIN-20201124082900-20201124112900-00459.warc.gz
|
en
| 0.891721 | 264 | 3.0625 | 3 |
The Right Foods to Eat for Better Sleep
Food and sleep are intimately connected. What you put in your body strongly affects how you sleep—and how well you sleep (or don't) profoundly influences your metabolism, appetite, eating behaviors, and weight management.
Here's why: When you don't sleep enough, your metabolism slows down. As a result, you feel compelled to eat more and start to crave foods, like fat and sugar, that don't give you the best bang for your caloric and nutritional buck. That can lead to weight gain. Additionally, suboptimal diets, such as those high in fat and sugar and low in fiber, are associated with sleep arousals and less restorative sleep.
No single vitamin, mineral, or macronutrient plays the definitive role in optimizing sleep; rather, many work together to contribute to your sleep quality and ultimately to your overall health. And research suggests that people who eat a large variety of foods, as an indicator of a well-balanced diet, have the healthiest sleep patterns.
So if you want to give your general health a boost, start by choosing foods that support a good night's sleep.
Foods that help you sleep
Much has been written about melatonin, a hormone produced in the pineal gland that helps regulate your body clock. Melatonin production naturally increases at night, one reason it is often referred to as the “hormone of darkness."
Melatonin is available as a supplement, but it's also found in food. A diet that includes foods rich in melatonin can help you get a better night's sleep without worrying about the safety or efficacy of supplements. Melatonin-containing foods provide a host of other health benefits, such as increased antioxidant and anti-inflammatory activity, cardiovascular protection, and enhanced immune function.
Sources of dietary melatonin include nuts (almonds, pistachios, walnuts); fruits and berries (cherries, grapes, raspberries, strawberries); tomatoes; peppers; and wine. (Learn more about the relationship between nutrition and sleep.)
Calcium helps the brain produce and use the amino acid tryptophan to manufacture melatonin. Several studies have linked calcium deficiency to difficulty falling asleep. Calcium works with magnesium to relax muscles. Good natural sources of calcium are dairy (milk, cheese, yogurt); citrus fruits; dark leafy greens (collards, kale, and others); nuts; soy; and fish like sardines and salmon. (Some people report dairy gives them vivid dreams. Here are other top causes of strange dreams.)
Magnesium is a natural relaxant and an essential mineral for sleep function. It helps maintain healthy levels of GABA (gamma-aminobutyric acid), a neurotransmitter that promotes relaxation. Magnesium deficiency is common and linked to insomnia and restless legs syndrome.
Magnesium-rich foods include nuts and seeds (almonds, cashews, sunflower seeds, pumpkin seeds), bananas, avocados, spinach, broccoli, peas, beets, beans, and soybeans.
Potassium increases sleep efficiency, improves overall sleep quality, and reduces episodes of waking after sleep onset. A lack of potassium can lead to difficulty staying asleep. Potassium-rich foods include bananas, carrot juice, prune juice, lima beans, white beans, potatoes, salmon, tuna, and spinach.
Tryptophan is an amino acid that helps your body make serotonin, a hormone associated with relaxation that is required to make melatonin. Tryptophan has been shown to be effective in reducing sleep onset time—perhaps the reason why it's most commonly associated with post-Thanksgiving dinner food coma. A study in the American Journal of Clinical Nutrition indicated that participants who ate tryptophan-rich foods suffered less daytime sleepiness and enjoyed sustained alertness early in the morning, most likely due to improved nighttime sleep.
Foods rich in tryptophan include lean beef, poultry, shellfish, and other fish like tuna and halibut; eggs; pumpkin seeds and sesame seeds; soybeans, white beans, and chickpeas; cheddar cheese; chocolate; and dates.
Vitamin B6, vitamin D, and zinc
Vitamin B6, contained in many of the above foods, also helps convert tryptophan into melatonin. A B6 deficiency is linked to lowered serotonin levels and poor sleep, as well as mood disorders and depression—all of which can lead to insomnia. Additionally, Vitamin B6 supports dream recall.
Vitamin D, too, may also play a role in sleep, as might the mineral zinc. In one study it was found that zinc, along with melatonin and magnesium, improves sleep quality for those who suffer from insomnia.
The importance of a balanced diet for sleep
Although sticking to a diet low in carbohydrates, fat, or protein is largely a matter of personal preference, how we balance the basic building blocks of sustenance does make a difference in how well we sleep.
Carbohydrates, for example, increase tryptophan and serotonin production, which can contribute to daytime sleepiness. Additionally, they cause spikes of insulin, which has the same effect.
Eating a diet rich in fiber, on the other hand, can help you achieve deeper, more restful slumber and better daytime alertness. A 2016 study published in the Journal of Clinical Sleep Medicine found that consuming foods low in fiber and high in saturated fat and sugar is associated with lighter, less restorative sleep. Consider adding artichokes, beans, chickpeas, hummus, or quinoa to your diet to improve your fiber intake.
Omega-3 fatty acids are linked to sleep quality because they boost the sleep-promoting effects of melatonin. Additionally, a Journal of Sleep Research study linked omega-3 fatty acids to improved sleep in children.
Increased protein intake has been linked with less difficulty falling asleep, less difficulty maintaining sleep, and more restorative sleep. Overweight and obese adults who are losing weight with a high-protein diet are more likely to sleep better, according to research from Purdue University.
Just as there are foods that can help you sleep, there are also foods that can make getting a good night's sleep more difficult. Here are the 10 worst foods to eat before bed.
|
<urn:uuid:676a18d3-e9ba-4b0c-bcad-68961a4c47f9>
|
CC-MAIN-2023-06
|
https://www.saatva.com/blog/foods-that-help-you-sleep/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500837.65/warc/CC-MAIN-20230208155417-20230208185417-00664.warc.gz
|
en
| 0.937265 | 1,328 | 2.8125 | 3 |
Global models such as the ECHAM5 general circulation model (GCM) are limited to a rather coarse resolution (~100 - 300 km horizontal grid size) so that a process such as precipitation formation can not be resolved. As precipitation is an important process in the hydrological cycle it is important to parameterize the formation process as realistic as possible.
In the standard model version of ECHAM5 the initialization of precipitation is calculated from grid mean quantities, i.e. mass and number of cloud droplets and ice crystals, but even in well mixed clouds it is known that there are regions with more (or less) droplets or ice crystals than represented by the mean, consequently decreasing (or increasing) the local precipitation rate. Furthermore, the liquid water is only categorized into two classes, i.e. cloud water and rain, where the latter is removed from the atmosphere within one time step. Marine stratiform clouds often drizzle. The drizzle may not reach the surface within one time step. Drizzle can also change the stability of the boundary layer. Two PhD projects address these issues and the content of their topics are described below.
The goal is to introduce drizzle (25 - 100 μm) in addition to cloud droplets and rain drops to improve the possible influence of giant CCN (GCCN; e.g. sea salt ≥ 3 μm) on initiating the drizzle process and to study the impact of drizzle on the radiation budget and boundary layer dynamics on a global scale in the ECHAM5 GCM.
Marine stratus (St) and stratocumulus (Sc) cover vast parts of the global oceans and have a substantial role in the Earth's radiative budget, inducing a net cooling. Although they only produce small amounts of precipitation, drizzle has been recognized to have an important impact on both cloud dynamics and microphysics (Feingold et al., JAS 1996).
The formation of drizzle is highly dependent on the onset of the collision-coalescence process, which requires that drops above some critical size are formed. One of the mechanisms leading to these sufficiently large droplets has been perceived to be related to the concentration of GCCN (Posselt & Lohmann, ACP 2008), especially for polluted clouds. Introducing an additional drizzle class in the ECHAM5 will produce a more physical representation of the droplet spectrum (for marine St & Sc) and may improve the representation of drizzle in general.
Figure 3 shows a schematic of the impact of GCCN on non-precipitating clouds
(Courtesy of R. Posselt) and Figure 4 shows a schematic of the introduction of drizzle and the additional microphysical processes, which need
to be accounted for.
Diese Website wird in älteren Versionen von Netscape ohne graphische Elemente dargestellt. Die Funktionalität der Website ist aber trotzdem gewährleistet. Wenn Sie diese Website regelmässig benutzen, empfehlen wir Ihnen, auf Ihrem Computer einen aktuellen Browser zu installieren. Weitere Informationen finden Sie auf
The content in this site is accessible to any browser or Internet device, however, some graphics will display correctly only in the newer versions of Netscape. To get the most out of our site we suggest you upgrade to a newer browser.
|
<urn:uuid:6feef637-3ecb-4b26-977a-ac33d406209f>
|
CC-MAIN-2015-18
|
http://www.iac.ethz.ch/groups/lohmann/research/modeling/precip
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246654114.44/warc/CC-MAIN-20150417045734-00070-ip-10-235-10-82.ec2.internal.warc.gz
|
en
| 0.822429 | 724 | 2.859375 | 3 |
Written by Gabriel Dillard
Baseball players who make it to the big leagues can expect to be well paid. Recent data shows that the average salary for a Major League Baseball player in 2021 was $4.17 million. While that is only half of the average salary in the National Basketball Association, it is ten times the average salary in Major League Soccer.
However, not everyone makes it to the major leagues. An MLB career almost always starts in Minor League Baseball and can involve years of playing for salaries that baseball insiders describe as “poverty-level pay.”
Advocates For Minor Leaguers, a non-profit organization founded by former baseball players to improve working conditions in the minor leagues, reports that the median annual salary for a MiLB player is $12,000, which is below the US Federal Poverty Level for an individual.
Advocates For Minor Leaguers is pushing for a raft of changes throughout Minor League Baseball. Chief among them is the establishment of minor league unions that would give players a voice in the decisions that affect their financial situation and their career opportunities.
Why does Minor League Baseball need a union?
The power of unions lies in collective bargaining. Regardless of the industry, the voice of one employee rarely will be enough to bring about change. However, union representatives usually speak on behalf of the majority, wielding an influence that those in management must respect.
As an example, the Major League Baseball Players Association (MLBPA) is made up of 1,200 members that include players, managers, coaches, and trainers. The number of MLB players total just over 1,000. Membership in the MLBPA is not open to minor league players.
If players’ stories are to be believed, the problems that exist in the MiLB go beyond the meager salaries players receive. Players also complain about poor living conditions, challenging travel schedules, and unfair contracts. As a result, many players suffer from anxiety and depression. A MiLB union would provide minor leaguers with a voice that could bring positive change.
What changes are underway in Minor League Baseball?
One of the key problems reported by minor league players relates to housing. Because salaries often are insufficient to cover the cost of rent, players report sharing apartments with multiple players, some of whom have families with children, living in cars, or sleeping in team clubhouses. Even when they can afford rent, players often are reluctant to commit to rental agreements because of the high probability that they could be moved to a club in another city at any time.
In late 2021, the MLB announced the approval of a new policy that will require teams to provide housing for the majority of minor league players. The policy, which will take effect when the 2022 season begins, stipulates that the housing provided be furnished and that the league pay for utilities. Reports cited that the new policy came in response to complaints issued by players and advocacy groups.
Advocates For Minor Leaguers credited the victory to “collective action” by minor league players, but also pointed out that the plan for providing housing was made without player involvement, a situation that unionization for Minor League Baseball players could fix.
What changes are most important in Minor League Baseball?
With housing for MiLB players turning in a positive direction, the next issue that advocates are looking to address is the Uniform Player Contract. Every Minor League Baseball player is required to sign the contract, which keeps players from being able to pursue better pay or benefits on other teams for seven seasons.
The Uniform Player Contract also commits minor leaguers to train and “to perform professional services” year round, regardless of the fact that they are only paid during the season. Many players report that training and other team duties, like representing teams at public events, compete with the jobs they must work during the months when they do not receive a paycheck from MiLB.
While unionization for Minor League Baseball players would clearly provide a mechanism for improving working conditions for players, past efforts have stalled out. Some experts cite fear and immaturity among minor leaguers as a barrier that would be very difficult to overcome. However, the recent victories and expanding influence of groups like Advocates For Minor Leaguers signal that more positive changes may be forthcoming.
Scott Heric is the Co-Founder of Unionly, a digital payment platform built on the mission of giving organized labor control of their financial destiny. Recognizing that the majority of unions accept only cash or checks, with little or no visibility into or control of digital revenue generation, Scott launched Unionly in April 2020 to bring much needed modernization to the processes employed by unions to drive financial projects.
|
<urn:uuid:2315fce5-ae91-4b4f-8281-417cf8423e43>
|
CC-MAIN-2022-33
|
https://thebusinessjournal.com/blog-how-baseballs-minor-league-system-is-affecting-future-stars/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00569.warc.gz
|
en
| 0.974506 | 955 | 2.640625 | 3 |
rights & permissions
The word πρηστήρ creates confusion and controversy almost wherever it occurs. Its lexicon entry in LSJ has been revised several times but it is still not very helpful. Lack of clarity of the expression also lies in the fact that it describes tornadic, fiery, and luminous meteorological phenomena. A recent discussion about the term πρηστῆρος αὐλός in Anaximander raised this issue again. This study clarifies the meaning of πρηστῆρος αὐλός, as well as the word πρηστήρ, on the basis of examination of all known occurrences of this word. The study excludes the meaning “bellows”, the meaning “lightning” is confirmed rather for the late texts, the basic meaning “tornado” is typical especially for authors dealing with marine navigation and meteorology. Πρηστῆρος αὐλός is the funnel of a tornado. Based on current knowledge of meteorology (with regard to the Greek region), it is also explained why a tornado was often seen as fiery.
|
<urn:uuid:4569e292-7966-489c-941e-029ff6605f7a>
|
CC-MAIN-2019-35
|
https://www.pdcnet.org/collection-anonymous/search?fq=publication%3A%22Studia+Philosophica%22&show=mine&rl=standard&f1=&q2=&f2=&q3=&f3=&q=*%3A*&fq=category%3A%22Continental+Philosophy%22&fq=subdoctype%3A%22Article%22&fq=language%3A%22English%22
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027316021.66/warc/CC-MAIN-20190821131745-20190821153745-00107.warc.gz
|
en
| 0.948516 | 269 | 3.09375 | 3 |
ERIC Number: ED036578
Record Type: RIE
Publication Date: 1969-Sep
Reference Count: 0
A Comparative Study of the Self-Perceptions of Disadvantaged Children in Elementary and Secondary Schools.
Soares, Anthony T.; Soares, Louise M.
The study tested hypotheses predicting significant differences between the self-perception scores of: (1) disadvantaged children in an urban neighborhood elementary school and disadvantaged high school students; (2) disadvantaged girls and boys; and, (3), within each sex, disadvantaged elementary school and high school students. All the students in grades four, five, and six of an urban elementary school situated in a disadvantaged urban area were included--a total of 122 (70 boys and 52 girls). A sample of 100 disadvantaged high school students, 60 boys and 40 girls, was randomly selected from one of the city's three high schools. To obtain their self perception scores, 40 bi-polar traits, expressed in sentence form, were given to all of the 222 subjects. An index score was obtained for their self concept. An analysis of variance revealed a significant difference between the scores of the elementary school children and the high school students--whether with the school taken as a whole, in interaction of school and sex, or in the interaction of school, sex, and grade. The interpretation of these results centers upon expectation level and social reinforcement theory. [Not available in hard copy due to marginal legibility of original document.] (JM)
Publication Type: N/A
Education Level: N/A
Authoring Institution: N/A
Note: Paper presented at the Annual Convention of American Psychological Association, Washington, D.C., September 1969
|
<urn:uuid:87c01b8f-c593-4d43-9323-e5f99ea65d9b>
|
CC-MAIN-2016-50
|
http://eric.ed.gov/?id=ED036578
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698540915.89/warc/CC-MAIN-20161202170900-00511-ip-10-31-129-80.ec2.internal.warc.gz
|
en
| 0.938958 | 349 | 2.796875 | 3 |
With athletes now gearing up for the 2008 Olympics in Hong Kong, I think it’s fascinating that the ancient hippodrome, where equestrian events were held in ancient Greece, has been excavated by sports historian Professor Norbert Müller, of the Johannes Gutenberg University Mainz, and fellow researchers Dr. Christian Wacker, who is a sports archaeologist from Cologne, and and Dr. Reinhard Senff, chief excavator of the German Archaeological Institute.
For more than 100 years archeologists have probed the site where the ancient Olympiad was held, but most people believed that nothing of the hippodrome had survived. The area described in old texts had been flooded by the Alfeios River and covered with silt.
However, using geomagnetic and georadar techniques, which explored to depths up to eight meters, the team was able to identify water courses, ditches, walls and rectilinear structurer that extended along a stretch of almost 1200 meters, which was most likely the race course, which ran parallel to the stadium. Structural remains of the temple of Demeter — known to be near the hippodrome — were discovered in the spring of 2007.
The complex had a length of 1052 meters and a width of 64 meters, not including the earth walls built for the spectators. The starting-gates stretched the full width of the racecourse.
Two of the biggest equestrian events in the ancient Olympic Games were chariot races and horse races. All equestrian events took place in the Hippodrome. A full circuit around the Hippodrome was four stades, or 769 meters, although distances varied at different sites. At Olympia, a full circuit was eight stades, or 1,539 meters. Two turning posts marked the beginning and end of a race at either end of the level arena. The chariot races included the tethrippon for a four-horsed chariot for twelve laps; the apene for two mules pulling a chariot; the synoris for a two-horse chariot for eight laps; the synoris for two foals pulling a chariot for three laps; and the tethrippon for four foals pulling a chariot for eight laps.
Each race consisted of four to 60 chariots that were required to complete seven to twelve laps around the circus. Charioteers placed the fastest horse on the right side so that they could make turns around the turning post as fast as possible
The chariot itself was nothing more than a type of cart that consisted of a set of wheels which had a floor and a waist high guard in front to prevent the driver from falling out. Since the chariots were very light and fragile, collisions almost certainly meant that the chariot would be smashed and the driver seriously injured or killed. During the race violent collisions were expected, although deliberately crashing into an opponent was illegal. Even if a racer didn’t crash, the posts at the ends of the center dividing wall of the arena that marked the bounds of the track posed a dire threat. The driver had to make a turn on the outside of the post and because these turns were extremely sharp, they often lost control or were ejected from their chariots.
A race began by a procession into the hippodrome where the names of drivers and the chariot owners were announced. After the procession, the participants were loaded into mechanical starting gates that were staggered to allow racers on the outside to leave before those on the inside. The race didn’t officially begin until the final gate was opened. Another set of devices called an eagle and a dolphin were used to signify the start of the race and to indicate the number of remaining laps.
Of all the events, chariot racing was one of the few that were performed by clothed participants due to safety reasons and the eminent threat of bloody crashes. Although women were officially prohibited from participating or even watching, a few accounts of them doing so were documented. A few women were allowed to drive the chariots because they were slaves, commanded to drive by their masters. Only one was a noble woma: Cynisca, the daughter of Spartan Agesiaus II, who won two races.
The horseback competitions included the keles for full-grown horses, the kalpe for mares, and the race for foals. The course was six laps around the Hippodrome (4.5 miles). Jockeys rode without stirrups and sometimes without saddles, although they often had whips.
One thing that hasn’t changed since ancient times: horse sports were reserved for the wealthy as only they could afford the upkeep!
|
<urn:uuid:86282a8e-c76a-4ed5-861c-ededa34be968>
|
CC-MAIN-2021-31
|
https://equineink.com/2008/07/24/equestrian-hippodrome-of-ancient-olympics-uncovered/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153899.14/warc/CC-MAIN-20210729234313-20210730024313-00337.warc.gz
|
en
| 0.982688 | 964 | 3.203125 | 3 |
Strategies from K-12 schools, districts, and programs that are dramatically improving the learning process.
We share evidence- and practitioner-based learning strategies that empower you to improve K-12 education.
Explore and share tips, strategies, and resources for helping students develop in elementary school grades 3-5.
Becky Morales, creator of Kid World Citizen, offers five ideas for using literature about children and families in other parts of the world to broaden the minds of U.S. elementary students.
Neurologist, teacher, and author Judy Willis discusses the benefits of teaching elementary students how their brains work.
Mary Beth Hertz suggests some student-centered learning methods to meet the Common Core requirement of teaching multiplication and division to third graders.
Principal, educator and blogger Joe Mazza looks at data regarding parent engagement with the suggestion that schools tailor their outreach specifically to the families in their community.
Teacher, one-to-one advocate and blogger Monica Burns shares some of her favorite free apps for supporting English-Language Learners' vocabulary acquisition.
In Part 8 of her elementary student SEL series, filmmaker Randy Taran explores ways to help children recognize what we have in common.
A Year at Mission Hill is a video documentary series that covers the transformation of one inner city elementary school in Boston. In Chapters Six and Seven, we learn how teachers create community with the students, the parents, and each other.
Dr. Maurice Elias highlights SecondStep.org, online support for the program that offers a pre-K to grade 8 program used to teach social, emotional skills.
In Part 7 of her elementary student SEL series, filmmaker Randy Taran offers suggestions and examples for cultivating empathy in schools.
Author and global ed adviser Homa Tavangar reflects on 4th grade teacher John Hunter's new book about his 30 years of teaching the World Peace Game.
Educators from Visitacion Valley Middle School, in San Francisco, have provided these samples and resources for you to use in your school.
An elementary library media specialist reviews apps along the revised Bloom's taxonomy. Apps for Applying are reviewed in this third post of a six-part series.
Classroom-tested song recommendations for a wide variety of activities -- from clean-up time, to art or free activities, to cursive writing.
How a resource-strapped elementary school became a top-performing school with a homegrown, easy-to-implement program of differentiated instruction.
Edutopia blogger Monica Burns shares a generous list of winter reading apps and ebooks for elementary students in class and with their families.
Educators from Mount Desert Elementary School in Northeast Harbor, Maine, have shared a some social and emotional learning tools, and we've gathered some of our favorite resources as well.
Author Kevin Washburn looks at curiosity and how to inspire it in students through the questions we ask them.
|
<urn:uuid:6555abfe-f66e-428f-9afa-6703f9c1e429>
|
CC-MAIN-2014-41
|
http://www.edutopia.org/grade-level-3-5?page=14&gclid=CIWOwtDL_7YCFcud4AoddiIAnw
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657132646.40/warc/CC-MAIN-20140914011212-00046-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
|
en
| 0.93718 | 595 | 3.34375 | 3 |
The water over the banks is mainly supplied by the southward-flowing cold LABRADOR CURRENT. This current splits as it approaches the Grand Banks, with one branch moving south along the coast of Newfoundland through Avalon Channel to St Pierre Bank.
Grand BanksThe Grand Banks, part of Canada's continental shelf, lying southeast of the Island of Newfoundland, consist of several separate banks, foremost of which are Grand, Green and St Pierre; their area (for water depths shallower than 200 m) is 282 500 km2. Water depths over the banks are generally less than 100 m.
The water over the banks is mainly supplied by the southward-flowing cold LABRADOR CURRENT. This current splits as it approaches the Grand Banks, with one branch moving south along the coast of Newfoundland through Avalon Channel to St Pierre Bank. The major branch circulates clockwise around the Grand Bank, concentrated at its outer edge. Warm Gulf Stream waters are generally located south of the Grand Banks, but do on occasion move north onto the southern edge of the banks.
Warm air masses moving from the Gulf Stream over the colder Labrador current water produce heavy FOG, especially in spring, when the air-sea temperature differences are greatest. ICEBERGS, carried along the edge of the banks by the Labrador current, are also most numerous in spring.
The banks are an internationally known fishing ground most noted for cod, but haddock, redfish, flatfish (including halibut), mackerel and herring are also caught. European explorers first noted the abundant fish resource in the late 15th century, and shortly thereafter the Grand Banks began to attract numerous European fishermen.
The first settlements on Newfoundland were established as bases for drying and salting fish for transport back to Europe. In the 20th century, European, American and Canadian boats continued to fish on the banks, being joined in the mid-1950s by large Soviet and Japanese vessels. In 1977 Canada extended its offshore jurisdiction to include most of the Grand Banks, and foreign fishing was reduced. In 1992 the collapse of COD stocks led to the imposition of a moratorium on fishing cod over most of the Newfoundland and Labrador banks, including the Grand Banks. Some limited fishing was resumed in 1998 but the cod stocks are still at very low levels and have not yet recovered.
Oil drilling, which began on the banks in the late 1970s, gained public attention with the disastrous loss of the OCEAN RANGER rig and its crew of 84 persons on 15 February 1982. Oil production from the Hibernia oil field began in November 1997, followed by the Terra Nova field in January 2002.
|
<urn:uuid:45c213b9-464e-433f-ba61-1c21e380ced2>
|
CC-MAIN-2016-36
|
http://thecanadianencyclopedia.com/en/article/grand-banks/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982932747.45/warc/CC-MAIN-20160823200852-00199-ip-10-153-172-175.ec2.internal.warc.gz
|
en
| 0.965995 | 543 | 3.390625 | 3 |
The chapter was revealed in the city of Mecca and opens with a reference to the defeat of the Byzantines (also known as the Roman Empire) at the hands of the Persians (613–14 CE) in Syria, and the subsequent victory of the Byzantines in 624 CE. The chapter urges people to reflect on their own creation and the heavens and earth. God’s power to give life to a barren land is an indication both of His ability to raise the dead and of His mercy to mankind. The disbelievers are warned to accept faith before it is too late, and Prophet Muhammad, may the mercy and blessings of God be upon him, is urged to persevere and to ignore the bullying of the disbelievers.
The first few verses of this chapter were revealed when Persia overpowered the Byzantine Empire in the Arab areas that were under its rule. This was also a time when arguments in Mecca raged between the early Muslims and Arab idolaters.
Since the Byzantines at that time were Christians, and the Persians were Magians, the unbelievers in Mecca exploited the event, drumming up the victory of polytheism over monotheism, and seeing in this Persian victory an omen for their own victory over the believers.
Therefore, the opening of this chapter heralds a victory for the people of the Scriptures, the Byzantines, within a few years. It says that this victory will bring much joy to the Muslims because they love the believers of any divine religion to gain the upper hand.
The Quran does not, however, stop at making this promise, nor does it confine itself to the event mentioned. In fact, it uses the event to show the believers and their opponents wider horizons. It establishes a link between them and the universe.
It also relates God’s rule to support divine faith to the great truth that regulates the heavens, the earth and all that is between them, as well as to the past, present and future of humanity. It then moves on to the life to come and the world beyond this earth. Indeed, the Quran takes us on a great round in which we see the marvels of the universe, the human soul, people’s situations and the wonders of nature. We are, thus, able to look at the wider horizons of knowledge, for our lives have been elevated and broadened. Furthermore, we are released from the strict confines of time, place and event, and can look at the universe, its operative rules, history, present and future.
People’s concept of the true nature of the bonds and relations in this great universe is set on a higher platform. They begin to feel the real greatness of the laws that govern the universe and human nature, and appreciate those that regulate human life and its events. In this way, positions of victory and defeat are defined, and fair measures to judge people’s actions and activities in this life are set, so as to give them just reward both in the present life and in the life to come.
In the light of this broad concept, the universality of the Islamic message is clearly shown. Its interaction with events and world situations, even when it is still in its infancy and confined to Mecca and the surrounding valley, appears to be very positive. Its scope is broadened beyond this earth to link it to the nature of the universe and its major rules, human nature and its profound depths, as well as to the past and present of human life both in this world and in the world beyond.
Thus, a Muslim’s heart and mind are linked to these horizons to influence his feelings and the way he looks at life. He looks up to heaven and the life to come and contemplates the wonders and marvels of the universe. He appreciates his own position, and that of his community, in this great expanse. He realizes his own value and the value of his faith both in people’s and God’s measures. He thus fulfils his role and does his duties with a clear mind and with confidence and reassurance.
The chapter depicts the fickleness of people’s cares and interests and how these are unsuitable as a basis for building human life. What people should look to instead is a constant measure that does not bend to suit self-interests. It describes such people when they enjoy God’s mercy and when they are afflicted by hardship, as well as in situations of affluence and poverty. It moves on to speak of how provisions should be used and increased. It then discusses the question of God’s alleged partners from this angle, showing how such alleged deities can never provide sustenance, initiate or terminate life. It links the spread of corruption on land and sea with what people do, and directs them to go about the earth reflecting on the ends met by past communities of unbelievers who associated partners with God. It then directs the Prophet to follow the religion of pure human nature before a day comes when everyone will be rewarded for what they do.
The chapter then provides some scenes of the universe, commenting that true guidance is that given by God, while the Prophet’s task is only to deliver his message. It is not in his power to make the blind see or the deaf hear. The chapter then takes us on a new round within the human constitution, reminding us of the stages of man’s development from beginning to end, starting with utter weakness in childhood, before it mentions death, resurrection and judgement, giving us a new scene of that day.
The chapter concludes with a directive to the Prophet to remain patient in adversity and to bear whatever difficulties he meets. He should always remain confident that God’s promise will be fulfilled. Hence, he must not let himself be disturbed by those who lack faith.
Your favorites list is empty. You may add articles to this list using the article tools.
Your history list is empty.
Why register? This web site has several customizations made specifically for you, such as: your favorites, your history, marking articles you have previously viewed, listing articles published since your last visit, changing font size, and more. These features are based on cookies and will work correctly only when you use the same computer. To enable these features from any computer, you should login while browsing this site.
Please enter your Username and e-mail address then click on the Send Password button. You will receive a new password shortly. Use this new password to access the site.
|
<urn:uuid:52b7a542-3016-4013-b0c9-75bc8d4399e4>
|
CC-MAIN-2021-49
|
https://www.islamreligion.com/articles/11187/chapter-30-ar-room-romans/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363791.16/warc/CC-MAIN-20211209091917-20211209121917-00320.warc.gz
|
en
| 0.967783 | 1,335 | 2.828125 | 3 |
Physician Assistance Medicine
Physician Assistance Medicine is the practice of medicine by a qualified physician assistant or PA who provides health care under the supervision of an orthopedic surgeon. The chief activities of a physician assistant include performing services related to diagnosis, therapy, prevention, and health maintenance.
Physician assistants are educated and trained health care professionals,who do the traditional tasks of a physician, but work under the assistance of a physician as part of a health care team. In the physician-physician assistant relationship, physician assistants exercise autonomy in decision making and provide a broad range of diagnostic and therapeutic management services. A physician assistant’s practice may also include education, research, and administrative services.
Physician assistants work in all areas of medicine, including primary care and specialized areas such as orthopedics, gynecology, and psychiatry etc. A physician assistant may close incisions and provide care during, before and after a surgical procedure.
A Physician Assistant’s Duties include the following:
- Working under the supervision of a physician or surgeon
- Reviewing patients’ medical histories
- Doing physical exams to check patients’ health
- Ordering and interpreting diagnostic tests, such as X-rays or blood tests
- Making preliminary diagnosis about a patient’s injury or illness
- Providing treatment, such as setting broken bones and giving immunizations
- Providing preventive health care to patients
- Counseling patients and their families about disease, medication and lifestyle changes
- Assisting the physician during surgery
- Recording and assessing patient progressAssisting with insurance paperwork
- Assisting with insurance paperwork
|
<urn:uuid:43dae958-d2f0-40cf-8273-d7e2027e8105>
|
CC-MAIN-2019-18
|
http://www.bayareaorthopaedics.com/services/physician-assistance-medicine
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578583000.29/warc/CC-MAIN-20190422235159-20190423021159-00087.warc.gz
|
en
| 0.957649 | 332 | 2.84375 | 3 |
Numbers to 10 | Math Games for Kindergarten
Total Pages: 13
File Size: 14 MB
These math games are a great way for Kindergarten students to practice numbers to 10. They are easy to prep for teachers, just print and laminate – no cutting required! Students will find them interactive and hands-on. Plus, they are meant to be played with a partner or small group which makes them extra fun!
These math games for kindergarten are quick to play and are great for time fillers. They are also ideal for morning tubs or early finishers. Of course you can also use them for math centers too!
This resource includes 12 addition and subtraction games with year-round themes.
⭐️ 3 Number Matching Games
⭐️ 3 Ten Frames Games
⭐️ 3 Number Words Games
⭐️ 3 Tally Marks Games
The directions for each game stay the same, so you can explain once and just switch out the games.
Students will each need a game piece such as a mini eraser or plastic cube for this activity. They will also need a plastic spinner or a paperclip and pencil to make a spinner.
Students will start on the first space in the upper left corner of the game board. They will spin the spinner and identify the number they spun. They will identify the numbers represented on the trail and move their game piece to the nearest space that shows the number that they spun. The gray shaded themed spaces are free spaces.
The first player to make it all the way around to the last space on the game board is the winner. To win the game, the player must spin the exact number that is shown in the last space on the game board.
Only logged in customers who have purchased this product may leave a review.
|
<urn:uuid:1b3ffaa4-ed8c-4052-9ae5-f02b52dbc48e>
|
CC-MAIN-2021-39
|
https://www.theprintableprincess.com/product/numbers-to-10-math-games-for-kindergarten/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780055632.65/warc/CC-MAIN-20210917090202-20210917120202-00361.warc.gz
|
en
| 0.936546 | 377 | 3.765625 | 4 |
Guide to ADA and ANSI A117.1 Design Standards for Platform Lifts and LULA Elevators
The Americans with Disabilities Act (ADA) is equal opportunity law that includes standard for accessible design. This presentation provides an overview of ADA and ANSI A117.1 design standards for platform lifts and LULA (limited use/limited application) elevators.
The learning objectives for the course are as follows:
- Understand basic information on vertical and inclined platform lifts and their code limitations
- Understand accessibility code requirements for platform lifts (ANSI A117.1 and ADAAG)
- Understand basic information on commercial LULA elevators and their code limitations
- Understand accessibility code requirements for LULA Elevators
By the end of this session, participants should have a broad understanding of ADA design standards for accessibility lifts and LULA elevators, their technology, application and advantages.
This presentation is an intermediate level AIA CES course and provides 2 HSW learning units.
CONTACT US today to sign up.
|
<urn:uuid:bdba82e0-c350-4577-b2b7-09cc433867f0>
|
CC-MAIN-2021-17
|
https://www.apluselevators.com/architects-builders/aia-continuing-education/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038917413.71/warc/CC-MAIN-20210419204416-20210419234416-00041.warc.gz
|
en
| 0.882272 | 214 | 2.640625 | 3 |
The district courts shall have original jurisdiction of any civil action by an alien for a tort only, committed in violation of the law of nations or a treaty of the United States.
Terms Used In 28 USC 1350
- Jurisdiction: (1) The legal authority of a court to hear and decide a case. Concurrent jurisdiction exists when two courts have simultaneous responsibility for the same case. (2) The geographic area over which the court has authority to decide cases.
- Tort: A civil wrong or breach of a duty to another person, as outlined by law. A very common tort is negligent operation of a motor vehicle that results in property damage and personal injury in an automobile accident.
|
<urn:uuid:76cdd7f0-824f-43d4-9e57-dc33688caa0d>
|
CC-MAIN-2021-31
|
https://www.lawserver.com/law/country/us/code/28_usc_1350
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154486.47/warc/CC-MAIN-20210803222541-20210804012541-00603.warc.gz
|
en
| 0.923664 | 142 | 2.546875 | 3 |
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Aquaflame machines are often used in medical labs and in the construction of dental appliances. In the medical industry, soldering is used for joining wires in a multitude of ways. The soldering process involves the substrate or the parent metals to be joined, soldering filler metal (usually called solder), a flux, and a heat source – in this case, the Aquaflame machine. All are equally important and the role of each must be taken into consideration to solder metal components successfully.Companies
More info to come soon.
Aquaflame is ideal for soldering medical instruments due to its precision and clean flame.
Due to the small and direct flame, AQF can be used for any micro soldering.
20 - 24
0.60 - 0.31
18 - 24
0.90 - 0.31
17 - 24
1.00 - 0.31
15 - 25
1.00 - 0.31
Aquaflame is also referred to as:
A water torch, micro weld, mini Solder/Welder, micro flame, aqua torch, hydro flame, oxy hho.
Aquaflame machines are high performance oxyhydrogen gas-generating units producing a high temperature precision flame – in the range of 1200-3300°C * (2192-5972°F) used for soldering and welding items.
Using a standard electrical supply, hydrogen and oxygen are produced by the electrolysis of distilled water so that the hydrogen can be burnt in the oxygen. The oxyhydrogen gas is passed through an MEK (Methyl Ethyl Ketone) solution which reduces the temperature to about 1850°C and transforms the flame to a blueish yellow colour. The flame is a highly controllable and efficient high energy heat source. The only product of this process, other than energy, is water. The Aquaflame is safe as it only produces gas as required; it is also efficient, clean and environmentally friendly.Compare Models
All you the information you need…Support
|
<urn:uuid:bfece000-f85b-4700-a2b8-861d8f8022d1>
|
CC-MAIN-2023-14
|
https://www.aquaflamesystems.com/industries/medical
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945183.40/warc/CC-MAIN-20230323194025-20230323224025-00006.warc.gz
|
en
| 0.896448 | 569 | 2.875 | 3 |
The Avery Research Center
The Avery Research Center
The Avery Research Center was established to collect, preserve, and make public the unique historical and cultural heritage of African Americans in Charleston and the South Carolina Lowcountry. Avery’s archival collections, museum exhibitions, and public programming reflect these diverse populations as well as the wider African Diaspora. Avery is home to approximately two hundred manuscript collections, varying in size from a few items to over fifty linear feet; over five thousand printed items, ranging from standard texts, rare books and pamphlets to dissertations and journals; over four thousand photographs; hundreds of reels of microfilm, VHS tapes, clipping files, and digital formats. There are also dozens of collections of artifacts ranging from those that document slavery to material culture from West Africa and a sweet grass basket collection.
Plan Your Visit
Notable Collections: Family Histories
Bell Family Papers, c. 1926-c. 1972 – Click to Expand
The African American Bell family of Charleston, SC were descended from Sally (Sarah) Johnson, the matriarch of a free family of color. These papers document properties owned by the family, especially the historic home at 2 Green Street, Charleston, sold to the College of Charleston in 1971. Includes materials on the history of the Bell, DeReef, and Purvis families; health of Hiram Bell, Sr. and references to Friendly Union Cemetery. Printed materials and certificates from Morris Brown A.M.E. church (1926), Avery Normal Institute, Shaw School and Hampton College; with various printed materials documenting the Bricklayers, Masons and Plasterer’s Union, of Charleston and elsewhere.
Richardson and McNeil Family Papers, c. 1900-1993 - Click to Expand
1 Box 0.25 lf
Toby Richardson arrived in South Carolina in 1810 as an enslaved person belonging to a John Richardson of Port Royal. By the late nineteenth century he was farming twenty-four acres on James’ Island and working as a fisherman and carpenter. He was interested in literacy of the local black children and a member of Brown Church. A widower with nine children, Mr. Richardson married Jane McNeil in 1897. The daughter of Daniel and Maria McNeil, Mrs. Richardson had already been widowed three times and brought six children to the marriage. They had two children together. Contains genealogy and family history compiled by Richardson descendants for family reunions in the 1990s. Also contains some legal documents, copies of family photographs, and information on the First Baptist Church of James Island. Also listed as McNeil and Richardson Family.
Holloway Family Scrapbook, 1776-1977 - Click to Expand
10 Boxes 5.25 lf
James Harrison Holloway (1849-1913) was born a free person of color in Charleston where he attended a private school for free Negro children and grew up attending in the gallery of Trinity Methodist Church on Meeting Street. Dedicated to preserving his family history for future generations, he began this scrapbook. He also took interest in the achievements of all African Americans, collecting newspaper articles and postcards to document their notoriety. Contains documents, correspondence, and clippings that pertain to business, family history, social activities, and organizations, including the Brown Fellowship Society, Trinity Trustees, Centenary United Methodist Episcopal Church, and the Christian Benevolent Society, among others.
Janet Hicks Papers, c. 1882-1915 - Click to Expand
1 Box 0.25 lf
Contains genealogical documents of Ms. Hicks’ family, including several photos, c. 1900-1915, an 1882 marriage certificate, and family tree for John R. Steele, c. 1904.
Lecque Family Papers, c. 1880-1990 – Click to Expand
1 Box 1.25 lf
The Lecque Family was one of the founding families of Liberty Hill Community in North Charleston, South Carolina. The family has remained active in that community to the present. Contains information about the Lecque Family and Liberty Hill area as researched by Mrs. Carolyn Lecque Collins. Includes correspondence, legal documents, articles, and a few photographs.
Various Collections I and II, c. 1900-1990 – Click to Expand
2 Boxes l.0 lf
These collections are an amalgamation of various family and individual collections that Eugene Hunt acquired during his tenure as president of the Avery Institute for Afro-American History and Culture. Contains various memorabilia, family history, scrapbooks, and programs from Avery events and students. Includes information from the following collections:
- Boags Family
- Chisolm, Nell Houston
- Douglas, Rosslee
- Harleston Family
- Hassell, Oliver
- Hutchinson, Felder
- Jefferson, Louis D.
- Jenkins, Maude T.
- Kelly, Anna
- Logan Family
- Moses, Louis
- Mouzon, H. Louise
- Poinsette, Septima
- Pope Family
- Seabrook, Miriam DeCosta
- Tracy, Charlotte DeBerry
- Williams, Lucille
Notable Collections: Organizations
International Union of Bricklayers and Allied Craftsmen Local #1, South Carolina, c. 1899-1990 - Click to Expand
16 Boxes 11.5 lf
The International Union of Bricklayers and Allied Craftsmen, Local No. 1 of South Carolina was organized as an association of bricklayers in 1885. This African American labor union is the oldest in continual operation in the state. Its first members were both free and enslaved people prior to the Civil War. Contains membership cards, financial records, minutes and correspondence-some concerning the A. Philip Randolph Institute of South Carolina. Also contains some photographs and memorabilia, including the program and award information from the brickwork competition won by this group as part of the South Carolina Interstate and West Indian Exposition held in Charleston in 1901.
Mickey Funeral Home Papers, c. 1907-1935 – Click to Expand
5 Boxes, 2.25 lf
Edward Mickey helped found Charleston’s Humane Brotherhood Society in 1843. This benevolent society of “free dark men” provided insurance for burial and care for the families of its deceased members. Edward C. Mickey was a tailor in the antebellum period and a legislator during Reconstruction. Samuel G. Mickey, a physician, graduated from the Avery Normal Institute in 1884. Edward Crum Mickey, who became an undertaker, graduated from Avery in 1901 and was active in African American community affairs, sitting on the Avery Board. Edward Crum, his brother Richard H. Mickey, and cousin Edwin Harleston were actively involved in establishing the Charleston chapter of the NAACP. The Mickey family was active in Centenary Methodist Church. The Mickey Funeral Home, operated by descendants of the Mickey family, is still prominent in Charleston doing business as The Harleston – Boags Funeral Home. Contains general correspondence, account books, business journals, ledgers, and other documents pertaining to the operation of the business.
See also Centenary Methodist; Harleston Funeral Home.
Harleston Funeral Home Papers, c. 1900-1960 – Click to Expand
5 Boxes 7.5 lf
The Harleston Funeral Home, now the Harleston – Boags Funeral Home, was owned and operated by descendants of the Mickey family who had established Charleston’s Mickey Funeral Home in the nineteenth century. Edwin Harleston, an Avery graduate who was actively involved in establishing the Charleston chapter of the NAACP, was an undertaker as well as respected painter. Contains ledgers and receipt books, including information on individual funerals, insurance records, inventories, and receipts.
See also the Mickey Funeral Home Collection.
Friendly Union Society: Charleston African American Burial Society and Social Organization Papers, c. 1912-1991 – Click to Expand
1 Box 1.25 lf
The Friendly Union Society was formed in Charleston in 1813 for the relief of orphans and widows and to provide for the general welfare of the community. Contains original and photocopied documents of the organization, including the constitution and bylaws, minutes, ledger books, treasurer’s materials, and plat map of burial ground by Magnolia Cemetery.
Notable Collections: Church Records
Central Baptist Church Papers, c. 1891-1916 – Click to Expand
1 Box 0.25 lf
The Central Baptist Church, established in 1891, and is located in downtown Charleston on Radcliffe Street. Contains copies of pages from the Church Record Books: Book 1, 1891-1899, and Book 2, 1891-1916.
Morris Brown A.M.E. Church Papers, c. 1980-1995 – Click to Expand
1 Box 0.25 lf
Morris Brown A.M.E. Church, named for Morris Brown, was established in 1867 upon the purchase of the old Lutheran Church Building on Morris Street. The congregation was named in honor of Morris Brown, the free black lay preacher from Philadelphia who was instrumental in establishing the African Methodist Church in Charleston in 1818, and was later expelled from the city in the wake of the threat of the Denmark Vesey revolt. Contains several programs from anniversaries of the congregation and conferences.
Mt. Zion A.M.E. Church Records, 1884-1949 – Click to Expand
1 Box 0.25 lf
Mt. Zion African Methodist Episcopal Church, Charleston, S.C., was formed in 1882, splitting from Emmanuel AME Church, Charleston, which was unable to accommodate all its members. Contains bound volumes in two separate series, each in chronological order.
Zion-Olivet Presbyterian Church Papers, c. 1854-1992 – Click to Expand
15 Boxes 8.5 lf
Zion-Olivet Presbyterian Church formed in 1959 with the merger of Zion and Olivet Presbyterian Churches in Charleston. Both began as missions in the mid-1800s. In 1859, an independent structure was built on Calhoun Street that was reputedly the largest building for blacks in Charleston. Olivet began as the Charleston Presbyterian Mission on George Street and moved to 93 Beaufain in 1879 where Olivet Presbyterian Church worshipped for eighty years. Today’s congregation is located at 134 Cannon Street. Contains church documents and records, including financial reports, Sunday school records, minutes, programs, newsletters, church directories, and other items illuminating the activities of the church and congregation.
|
<urn:uuid:d80ea08e-39db-44c3-92f4-c2b0968460b8>
|
CC-MAIN-2017-17
|
http://www.lowcountryafricana.com/avery-research-center-african-american-history-culture/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125532.90/warc/CC-MAIN-20170423031205-00353-ip-10-145-167-34.ec2.internal.warc.gz
|
en
| 0.938196 | 2,188 | 2.59375 | 3 |
The proposal to reclassify and expand the Twin River Heritage Rangeland Natural Area (Twin River HRNA) (see map) from a “Natural Area” to a “Heritage Rangeland” is in direct response to commitments made within the South Saskatchewan Regional Plan (SSRP), approved in 2014. The SSRP provides high-level direction for the management of provincial land and natural resources within the region. Within this plan, policy 3.14 provides direction to explore the potential for additional conservation areas, with a specific reference to the Twin River HRNA, and some adjacent lands. The plan also provides direction for a collaborative process to be used for reviewing the management intent for the area and determine suitable designations. The opportunity for expanding the Twin River HRNA was included in the SSRP as a result of the expressed interest of grazing leaseholders who would like to have their leasehold lands included as part of an expanded conservation area. This expansion would also increase the representation of grasslands within Alberta’s protected area system; one of the most endangered terrestrial ecosystems on the planet. Currently, only 0.5% of Alberta’s Mixedgrass Natural Subregion is protected.
In addition to the land management planning direction provided by the SSRP, there is also an historical context that further informs the SSRP commitment to the reclassification of the natural area. The Twin River HRNA was originally designated as a Natural Area in 1999 as part of the Special Places 2000 Program (a provincial program in the late 1990’s that was intended to fill gaps in Alberta’s system of protected areas). The original intent was to classify the site as a Heritage Rangeland and a name change occurred to reflect this intent. However, legislation for the Heritage Rangeland classification was not in place at the time and the designation of the site as a Natural Area was seen as an interim step until the required legislation was created. Although the legislation was established in 2003, re-classification of the site had not been a priority until the recent direction provided through the SSRP.
The area known locally as Twin River is located within the Milk River Ridge, approximately 10 kilometres west of the Town of Milk River (see map). The higher elevation along the Milk River Ridge provides more precipitation and lower temperatures than the surrounding lands. This makes this Grasslands Natural Area a unique transition zone between the mixedgrass natural sub-region and foothills fescue sub-region. Both these types of sub-regional grasslands are under-represented in the parks and protected areas system in Alberta. More information on the significance of these native grasslands is provided in a separate fact sheet.
Both classifications fall under the Wilderness Areas, Ecological Reserves, Natural Areas and Heritage Rangelands (WAERNAHR) Act.
Twin River is currently classified as a Natural Area. Natural Areas are established for the conservation of nature in smaller sites of local significance and provide opportunities for low impact, nature-based outdoor recreation, nature appreciation and education, which are dependent on and compatible with the conservation of nature. The Natural Area classification has a limited regulatory capacity to manage recreational use.
Heritage Rangelands are established for the conservation of representative areas of Alberta’s prairies, using livestock grazing to maintain the native grassland ecology. This class ensures the protection of biological diversity and maintenance of ecological health of native grasslands in perpetuity while also sustaining the historic culture and economic function of ranching on Alberta’s native rangeland. Heritage Rangelands also provide a broader range of legislative and policy tools for the management of recreational use.
Further detail on the differences between the activities permitted within each classification is provided in Table 1 of the “Heritage Rangeland” Natural Areas backgrounder.
The proposed boundary amendment would add 3,173 hectares (7,840 acres) of Crown lands along the northwest boundary of the existing Twin River HRNA (see map). This amendment would increase the size of the protected area from 190 km2 to 222 km2. The proposed boundary amendment was requested by grazing leaseholders who would like to have their leasehold lands included in the protected area.
The proposed addition of these lands to the protected area will continue to address shortfalls in legal protection of native grasslands. More information on the significance of these native grasslands is provided in the “Grasslands in Context” fact sheet.
Existing petroleum and natural gas tenure would continue to be honoured in the proposed expansion area, consistent with existing government policy. An existing disposition for fire management access with the County of Warner would also be honoured.
Grazing dispositions would continue to be managed under the Public Lands Act. If the site is classified as a Heritage Rangeland, the regulatory commitment to grazing would be strengthened through both legislation and, potentially, length of tenure. Consent from the grazing disposition holder for recreational access would still be required.
Motorized access for these disposition holders would continue to be permitted when working within the terms of their disposition.
Heritage Rangelands are working landscapes that use long-term grazing leases to maintain native grassland ecology. Recreational off-highway vehicle (OHV) use is prohibited in these areas as it has the potential to degrade sensitive and rare grassland ecosystems and conflict with grazing operations. However, limited OHV use by agencies, leaseholders and disposition holders for management purposes is permitted. The use of on-highway vehicles in a Heritage Rangeland is limited to public roads.
Currently, public access within the site by vehicle is enabled by an existing fire access road which is under disposition by the County of Warner for wildfire management purposes. Following the reclassification to a Heritage Rangeland, public access to this road will remain.
Yes, hunting is a permitted activity in a Heritage Rangeland, subject to grazing lease access conditions.
A decision regarding the proposal will be made after First Nations consultation is completed, the public comment period is over and all comments have been considered.
The resulting proposed action(s) will be posted on www.albertaparks.ca/consult once a decision has been reached.
|
<urn:uuid:648fdbeb-1629-4ebc-975b-3c2172626825>
|
CC-MAIN-2020-05
|
https://www.albertaparks.ca/albertaparksca/about-us/public-consultations/archives/twin-river-expansion-and-reclassification/twin-river-faqs/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594209.12/warc/CC-MAIN-20200119035851-20200119063851-00455.warc.gz
|
en
| 0.946156 | 1,265 | 2.625 | 3 |
Improving strawberry yield with a recycled food waste-based liquid compost
Synthetic or chemical or inorganic fertilizers are commonly used in many conventional crop production systems providing essential nutrients necessary for optimal plant growth and yields. While these fertilizers provide plants with readily available nutrients, excessive application could lead to leaching into the ground water or increase the attractiveness of plants to pests and diseases. Organic fertilizers, on the other hand, are generally made from plant or animal sources. Compared to synthetic fertilizers where nutrients are readily available, nutrients are slowly released from organic fertilizers and thus have a lower risk of nutrient leaching. Organic fertilizers add organic matter to the soil, which improves soil structure, water holding capacity, and root growth. Organic matter also supports beneficial microbial communities in the soil that improve nutrient availability to the plant and protect plants from plant pathogens and other stress factors.
Organic fertilizers, especially those made from food waste, have a significant environmental benefit by recycling valuable nutrient and energy resources that would have, otherwise, been wasted (Senesi, 1989). Several studies emphasized the importance of soil organic matter and its positive impact on soil fertility, crop productivity, and environmental sustainability (Tisdall and Oades, 1982; Baldock and Nelson, 2000; Johnston et al., 2009). However, a balanced used of both synthetic and organic fertilizers is a good strategy both to meet plant needs and environmental sustainability (Chen, 2006).
In the United States, food waste at consumer and retail levels was estimated to be about 30% of the food supply, which is equal to 133 billion pounds valued at $161 billion (USDA-ERS, 2016). Food waste is the largest part what goes into landfills and is the third largest source of methane in the United States. Converting food waste into a fertilizer will have a major impact on agriculture and environment.
To evaluate the efficacy of a recycled food waste-based liquid compost on strawberry yield, a study was conducted during the spring of 2013 on a conventional strawberry field at DB Specialty Farms, Santa Maria.
Materials and Methods
Harvest-to-Harvest (H2H), made by hydrolysis of freshly expired produce, meat, and other food items collected from grocery stores, was evaluated alone and in combination with the grower standard. The formulation of H2H used in the study had NPK at 1-1-0, 5-7% of amino acids, 6-8% of lipids, 8-10% carbohydrates, and 20-25% organic matter according to the label. Treatments included i) Grower standard or GS (proprietary fertilizer regimen), ii) H2H at 73 gallons/acre, and iii) H2H:GS at 50:50. H2H was administered through the drip irrigation system 28 March, 9 and 18 April. Each treatment had a block of about 1.6 acre that were adjacent to each other. On six randomly selected beds within each block, a 40-plant section was marked as a sampling plot. Yield data were collected from these plots from 4 April to 20 May on 10 sampling dates following grower's harvest schedule.
Data were analyzed using analysis of variance and significant means were separated using Tukey's HSD test.
Andres Tapia administering treatments through a special pump built by Joe Coelho (above) and observation plots (below).
Results and Discussion
Compared to the yield in GS plots, marketable strawberry yield was significantly higher (P < 0.05) for H2H treatment on four of the harvest dates and for GS:H2H combination on two of the harvest dates (Table 1). The average marketable berry yield was significantly higher (P = 0.0003) in both H2H and GS:H2H treatments compared to the GS treatment (Fig. 1). There was no difference (P = 0.283) in the weight of unmarketable berries and their proportion of the total yield was 18.7, 15.5, and 16.2 for GS, H2H, and GS:H2H, respectively.
Table 1. Marketable berry yield on different harvest dates. Means followed by the same letter within the same column are not statistically different based on Tukey's HSD test.
Fig. 1. Average marketable and unmarketable yield during the observation period.
This first commercial field study using H2H shows promising results in improving strawberry yield with recycled food waste. Manufacturer made changes to the H2H formulation and recommendation rates after the study was conducted. Additional studies in different fields with different application rates from the beginning of the production season are essential to make valid conclusions. Soil conditions and nutrient management practices vary among various fields and additional studies will add value to the results obtained in this preliminary study.
Acknowledgements: Thanks to Daren Gee for the collaboration, California Safe Soils for financial support, and Joe Coelho and Andres Tapia for their technical assistance.
Baldock, J. A. and P. N. Nelson. 2000. Soil organic matter. In: Sumner, M. E. (Ed.) Handbook of Soil Science. CRC Press, Boca Raton, FL, USA, pp. B25-B84.
Chen, J.-H. 2006. The combined use of chemical and organic fertilizers and/or biofertilizer for crop growth and soil fertility. International workshop on sustained management of the soil-rhizosphere system for efficient crop production and fertilizer use. Vol. 16. p. 20. Land Development Department Bangkok, Thailand.
Johnston, A. E., P. R. Poulton, and K. Coleman. 2009. Soil organic matter: its importance in agriculture and carbon dioxide fluxes. Adv. Agronomy 101: 1-57.
Senesi, N. 1989. Composted materials as organic fertilizers. Science of the Total Environment 81: 521-542.
Tisdall, J. M. and J. M. Oades. 1982. Organic matter and water-stable aggregates in soils. European J. Soil Sci. 33: 141-163.
United States Department of Agriculture Economic Research Service (USDA-ERS). 2016. US Food Waste Challenge FAQ's. Accessed on 9 December, 2016 from http://www.usda.gov/oce/foodwaste/faqs.htm
|
<urn:uuid:e27d2271-4678-4fb4-b3c5-8d834ed81426>
|
CC-MAIN-2017-47
|
http://cesantabarbara.ucanr.edu/?blogasset=26598&sharebar=email&blogpost=22769
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806310.85/warc/CC-MAIN-20171121021058-20171121041058-00709.warc.gz
|
en
| 0.914938 | 1,328 | 3.421875 | 3 |
Modern day Consociational Democracy vs Socialism
After knowing about the origin, we should also get to know the modern day Consociational Democracy vs Socialism theories and the way in which these governments have evolved. Given below is a summary of modern day Consociational Democracy vs Socialism ideas:
Early modern period: Consociational Democracy- This type of democracy emerged in the 19th. It was not prevalant in the early modern period.
Socialism- 1789: Emergence in the French Revolution..
18th and 19th centuries:
Consociational Democracy- The Netherlands, as a consociational state, was between 1857 and 1967 divided into four non territorial pillars, although until 1917 there was aplurality ('first past the post') electoral system rather than a consociational one.
Socialism- 1789: Emergence in the French Revolution. 1848: Socialist Revolutions swept Europe. 1899: First Socialist Party Elected, Austrailian Labor Party in Queensland..
20th and 21st centuries:
Consociational Democracy- The Dayton Agreement that ended the 1992–1995 war in Bosnia and Herzegovina, which is described as a "classic example of consociational settlement" by Sumantra Bose and "an ideal-typical consociational democracy" by Roberto Belloni
Socialism- 1950-1980: Rise of New Left.
|
<urn:uuid:d9aa3da6-d4b0-4922-98e5-26d2521e4c7e>
|
CC-MAIN-2020-40
|
https://www.governmentvs.com/en/consociational-democracy-vs-socialism-history/comparison-68-27-1
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400221980.49/warc/CC-MAIN-20200925021647-20200925051647-00664.warc.gz
|
en
| 0.928268 | 284 | 3.109375 | 3 |
“There are only two ways to live your life. One is as though nothing is a miracle. The other is as though everything is a miracle.”
― Albert Einstein
Born in Ulm, Germany March 14, 1879
Died: April 18, 1955
Genre: Science, Philosophy, Physics
Influences: Bertrand Russell, Sigmund Freud, Baruch Spinoza, Niels Bohr, Karl Pear and many more.
He completed his Ph.D. at the University of Zurich by 1909. His 1905 paper explaining the photoelectric effect, the basis of electronics, earned him the Nobel Prize in 1921. His first paper on Special Relativity Theory, also published in 1905, changed the world. After the rise of the Nazi party, Einstein made Princeton his permanent home, becoming a U.S. citizen in 1940. Einstein, a pacifist during World War I, stayed a firm proponent of social justice and responsibility. He chaired the Emergency Committee of Atomic Scientists, which organized to alert the public to the dangers of atomic warfare.
|
<urn:uuid:19592b72-1879-41bb-9738-cb3200086653>
|
CC-MAIN-2019-43
|
https://www.wrayowen.com.au/blog/?cat=63
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986648343.8/warc/CC-MAIN-20191013221144-20191014004144-00353.warc.gz
|
en
| 0.95115 | 220 | 3.453125 | 3 |
Syllabus Diploma in computer Engineering, Regulation 2010, Short Suggestion, Exam Dates, Exam Routine, Question Out, Book list with code
- To develop skill to use computer and computer operating system.
- To perform skill on using word processing software packages to create documents.
- To perform skill on using presentation software packages for documents presentation..
- To perform skill on using Internet and e-mail for sending and receiving documents.
Computer hardware System, Operating Systems, perating system environment, Customizing and configuring operating System files; Utility software and Anti viruses; Fundamentals of word processing; Create Simple documents; Print and preview the document; Manage files; Format the documents; Merge files; skill on presentation software, skill on Internet, e-mail and web browsing.
- Show skill on computer hardware.
- Identify the main components of Personal Computer.
- Identify the CPU components and commonly used I/O devices and memories.
- Identify Primary and secondary storage devices & demonstrate the maintenance of the devices.
- Identify the allied equipment used with PC system(UPS, Stabilizer band IPS).
- Make the cable connection of PC system, UPS and printer with power line.
- Turn ON the power Switch and demonstrate booting effect of PC system.
- Practice on windows operating system environment.
- Observe the windows Screen and identify each item on desktop.
- Show the function of start button & taskbar.
- Start and quit programs.
- Switch between programs.
- Open and close a document.
- Find something using find command.
- Start a program by using run command.
- Practice on customizing and configuring windows operating system.
- Change system setting (say, system date, time, password, etc).
- Configure the taskbar, shortcuts, desktop items etc.
- Install driver software & configure printer, plotter, mouse & other PC equipment.
- Use windows explorer for copy, move, delete or rename files and folder.
- Add items to the start menu.
- Create a shortcut on the desktop.
- Customize windows i.e. desktop colors, patterns, wallpaper, screen saver, etc.
- Practice on advance features of windows operating system and disk utilities.
- Use windows efficiently (i.e. copying, moving files quickly).
- Organize your applications into groups (i.e. creating & deleting a group).
- Install a new application program.
- Back up, compare and restore files.
- Freeze disk space (i.e. check your system’s disk space, delete unnecessary files).
- Practice on Disk Operating System(DOS).
- Restart the computer in DOS mode.
- use internal and external DOS commands.
- Create,delete and view directories.
- Change directories.
- Use wild card in DOS mode.
- Perform skill in managing disk.
- Format and unformat a disk.
- Create a system disk.
- Make a system disk.
- Restore directories and files.
- Recover files from defective disks.
- Perform skill in working with files and folder.
- Organize files and folders.
- Copy files (copy a single file, a group of files).
- Rename a file.
- Delete files (delete a single file, a group of files).
- Copy directories & sub directories.
- Show directories such as directory tree directory name, paths, and the current directory.
- Perform skill in working with utilities software and anti viruses.
- Run anti virus software (say Toolkit, Norton Anti virus, PC cillin, Kaspersky etc) and scan for viruses.
- Protect the computer from viruses.
- Run utility software such as PC, Tools, NC, NU, etc.
- Use utility software for copying, renaming, deleting and moving folders or files.
- Develop keyboard skills by standard touch typing rules using typing tutor packages.
- project1: Connect each part of a personal computer(PC) ,operate it with windows operating system and install / uninstall programs/soft
- Practice on creating a simple document using word processor.
- Open windows based word processor and identify the different elements of the editing window.
- Type text, edit text using word processor.
- Select text and modify the text.
- Save the document then quit & reopen the document.
- Copy, move, and delete text.
- Copy from one word document to another.
- Practice on working with graphics and drawing.
- Import graphics using insert picture command.
- Use clipboard to insert art.
- Resize graphics, crop graphics with mouse and with picture command.
- Open drawing tools bar.
- Draw a textbox and write text to it.
- Draw graphs using different objects from the drawing tools bar.
- Group, Ungroup, rotate and flip objects.
- Fill drawn items with different color, change line styles, arrow heads, line colors & shades of gray.
- Show skill on managing file.
- Open previously saved documents.
- Open documents form or within word.
- Open non-word documents.
- Open documents as read only.
- Find files, searching by file names, dealing with large lists, Searching inside documents.
- Save under a different file name and save to other location.
- Save in non-word formats.
- Make backup files for safe keeping and recover damaged file.
- Show skill on formatting a document.
- Change document margins.
- Set margin with the page setup dialog box.
- Drag margins in pint preview.
- Pint in the margins.
- Repaginate documents.
- Force page breaks and force paragraphs to start on a new page.
- Move and delete page breaks.
- Keep things (lines, paragraphs, etc.) together on a page .
- Show skill in selecting characters and fonts.
- Format the character with the formatting toolbar.
- Create and use different options of font dialog box.
- Create keyboard shortcuts for character formatting.
- Underline text (double, single, dotted, etc) and create bold Italicized character.
- Expand and condense character spacing.
- Create superscripts and subscripts and color character.
- Demonstrate the change case command.
- Remove and toggle to remove character formatting.
- Type special characters and symbols using the symbol command.
- Bullet the existing paragraphs.
- Type new bullet lists, change bullet styles and specify custom bullets.
- Practice on paragraphs, line spacing, borders and shading.
- Create paragraphs and split text into multiple paragraph.
- Join and delete paragraphs.
- Format the paragraph with the formatting toolbar, paragraph dialog box & keyboard shortcuts.
- Index paragraphs automatically and index with the ruler, toolbar keyboard shortcuts and with paragraph dialog box.
- Align and justify text and a adjust the space between lines such as single spacing, double spacing etc.
- Create and remove borders and shading.
- Create lines with the border command.
- Show the border toolbar.
- Show custom border and lines increase the space between border and text.
- Practice on tables and Perform skill in modifies table design.
- Create a simple table using table button & table menu.
- Enter and edit text in a table.
- Select cells, columns, rows group of cells and the whole table.
- Add rows at the end and in the middle of a table, than delete rows.
- Change row heights, and resize rows with cell height and width.
- Change the spacing between rows.
- Insert columns at the right edge and in the middle of a table, then delete the columns.
- Change column and cell width with the ruler and the auto fit bottom.
- Marge cells.
- Change the space between columns merge different cells.
- Project 2 : Create a complete document(such as a personal bio-data) with MS Word in Bengali and English using all necessary formating with graphics,table and save it in a created folder.
- Practice on previewing & printing.
- Connect printer to computer and keep paper in the printer tray.
- Open page setup dialogue box and set the paper size.
- Show print preview to adjust document.
- Open print dialog box options to print document.
- Show, use and leave print dialog box.
19 Create a powerpoint Presentation .
19.1 Identify the different components of MS powerpoint package.
19.2 Design templates.,colour schemes, animation schemes etc.
19.3 Add/delete slides in the Presentation .
19.4 Add pictures, graphs, charts and other objects into slides.
19.5 Animate text and other objects in a very attractive way or motion.
19.6 Save and execute the slides.
20 Enhance powerpoint Presentation.
20.1 Use sound effects and custom path of animation effects in the Presentation
20.2 Add video clips.
20.3 View slides of powerpoint Presentation in different ways(for exmple outlining,slide shorer etc.).
20.4 Reorder slides on the outline tab.
20.5 Preview and print the Presentation .
- Perform attracive Presentation using MS powerpoint.
21.1 Customize slide show setup for a prticulr audiance.
2 1.2 Setup a slide show, rehashing and timing of a Presentation .
21.3 Review and adjust slide timing as per requirements.
21.4 Perform skill on Packaging for CD and Show the Presentation .
- Perform skill on Internet applications.
22.1 Connect to the Inernet using dial up or broadband connection.
22.2 Identify the different components of browsing softwares like Internet explorer, mozila firefox etc.
22.3 Browse and visit the reputed websites all over the world.
22.4 Use the search engines for searching informaion on the web.
22.5 Read news papers from the Internet.
- Perform skill on Electronic mailing system.
23.1 Create an e-mail account (on yahoo, hotmail, gmail etc.)
23.2 Compose an e-mail message.
23.3 Attach file to an e-mail message and open an attached file.
23.5 Send and receive e-mil messages by using your created account..
23.6 Delete messages temporarily and permanently.
23.5 Sign out from your created e-mail account.
|
<urn:uuid:4fe1d7f0-9fd4-444d-b279-aba69881b037>
|
CC-MAIN-2019-18
|
https://www.info57.com/computer-application-1-syllabus-diploma-in-computer-engineering-regulation-2010/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578532050.7/warc/CC-MAIN-20190421180010-20190421202010-00544.warc.gz
|
en
| 0.71191 | 2,221 | 3.375 | 3 |
|Siege of Jerusalem|
|Part of the First Jewish-Roman War|
Roman army progress during the siege of Jerusalem (70 AD)
|Roman Empire|| 20px Jews of Judea
|Titus Flavius Vespasianus||Simon Bar Giora|| John of Gischala|
Eleazar ben Simon
|70,000 men||20-30,000 men||10,000 men|
|Casualties and losses|
The Siege of Jerusalem in the year 70 AD was the decisive event of the First Jewish-Roman War. The Roman army, led by the future Emperor Titus, with Tiberius Julius Alexander as his second-in-command, besieged and conquered the city of Jerusalem, which had been occupied by its Jewish defenders in 66 AD.
The siege ended with the sacking of the city and the destruction of its famous Second Temple. The destruction of both the first and second temples is still mourned annually as the Jewish fast Tisha B'Av. The Arch of Titus, celebrating the Roman sack of Jerusalem and the Temple, still stands in Rome.
Template:Campaignbox First Jewish-Roman War Template:Refimprove section Despite early successes in repelling the Roman sieges, the Zealots fought amongst themselves, and they lacked proper leadership, resulting in poor discipline, training, and preparation for the battles that were to follow.
Titus surrounded the city, with three legions (V Macedonica, XII Fulminata, XV Apollinaris) on the western side and a fourth (X Fretensis) on the Mount of Olives to the east. He put pressure on the food and water supplies of the inhabitants by allowing pilgrims to enter the city to celebrate Passover, and then refusing to allow them back out. After Jewish allies killed a number of Roman soldiers, Titus sent Josephus, the Jewish historian, to negotiate with the defenders; this ended with Jews wounding the negotiator with an arrow, and another sally was launched shortly after. Titus was almost captured during this sudden attack, but escaped.
In mid-May Titus set to destroying the newly built Third Wall with a ram, breaching it as well as the Second Wall, and turning his attention to the Fortress of Antonia just north of the Temple Mount. The Romans were then drawn into street fighting with the Zealots, who were then ordered to retreat to the temple to avoid heavy losses. Josephus failed in another attempt at negotiations, and Jewish attacks prevented the construction of siege towers at the Fortress of Antonia. Food, water, and other provisions were dwindling inside the city, but small foraging parties managed to sneak supplies into the city, harrying Roman forces in the process. To put an end to the foragers, orders were issued to build a new wall, and siege tower construction was restarted as well.
After several failed attempts to breach or scale the walls of the Antonia Fortress, the Romans finally launched a secret attack, overwhelming the sleeping Zealots and taking the fortress. Overlooking the Temple compound, the fortress provided a perfect point from which to attack the Temple itself. Battering rams made little progress, but the fighting itself eventually set the walls on fire; a Roman soldier threw a burning stick onto one of the Temple's walls. Destroying the Temple was not among Titus' goals, possibly due in large part to the massive expansions done by Herod the Great mere decades earlier. Titus had wanted to seize it and transform it into a temple dedicated to the Roman Emperor and the Roman pantheon. The fire spread quickly and was soon out of control. The Temple was destroyed on Tisha B'Av, in the beginning of August, and the flames spread into the residential sections of the city.
The Roman legions quickly crushed the remaining Jewish resistance. Part of the remaining Jews escaped through hidden underground tunnels, while others made a final stand in the Upper City. This defence halted the Roman advance as they had to construct siege towers to assail the remaining Jews. The city was completely under Roman control by September 7 and the Romans continued to pursue those who had fled the city.
Destruction of Jerusalem
The account of Josephus described Titus as moderate in his approach and, after conferring with others, ordering that the 500-year-old Temple be spared. (Solomon's Temple dated to the 10th century BC, though the physical structure was Herod's Temple, about 90 years old at the time.) According to Josephus, the Roman soldiers grew furious with Jewish attacks and tactics and, against Titus' orders, set fire to an apartment adjacent to the Temple, which soon spread all throughout. However, Josephus may have written this in order to appease his coreligionists.
Josephus had acted as a mediator for the Romans and, when negotiations failed, witnessed the siege and aftermath. He wrote:
Now as soon as the army had no more people to slay or to plunder, because there remained none to be the objects of their fury (for they would not have spared any, had there remained any other work to be done), [Titus] Caesar gave orders that they should now demolish the entire city and Temple, but should leave as many of the towers standing as they were of the greatest eminence; that is, Phasaelus, and Hippicus, and Mariamne; and so much of the wall enclosed the city on the west side. This wall was spared, in order to afford a camp for such as were to lie in garrison [in the Upper City], as were the towers [the three forts] also spared, in order to demonstrate to posterity what kind of city it was, and how well fortified, which the Roman valor had subdued; but for all the rest of the wall [surrounding Jerusalem], it was so thoroughly laid even with the ground by those that dug it up to the foundation, that there was left nothing to make those that came thither believe it [Jerusalem] had ever been inhabited. This was the end which Jerusalem came to by the madness of those that were for innovations; a city otherwise of great magnificence, and of mighty fame among all mankind.
And truly, the very view itself was a melancholy thing; for those places which were adorned with trees and pleasant gardens, were now become desolate country every way, and its trees were all cut down. Nor could any foreigner that had formerly seen Judaea and the most beautiful suburbs of the city, and now saw it as a desert, but lament and mourn sadly at so great a change. For the war had laid all signs of beauty quite waste. Nor had anyone who had known the place before, had come on a sudden to it now, would he have known it again. But though he [a foreigner] were at the city itself, yet would he have inquired for it.
"The slaughter within was even more dreadful than the spectacle from without. Men and women, old and young, insurgents and priests, those who fought and those who entreated mercy, were hewn down in indiscriminate carnage. The number of the slain exceeded that of the slayers. The legionaries had to clamber over heaps of dead to carry on the work of extermination."
Many fled to areas around the Mediterranean. Titus reportedly refused to accept a wreath of victory, saying that the victory did not come through his own efforts but that he had merely served as an instrument of God's wrath.
- Judaea Capta coinage: Judaea Capta coins were a series of commemorative coins originally issued by the Roman Emperor Vespasian to celebrate the capture of Judaea and the destruction of the Jewish Temple in Jerusalem by his son Titus in 70 during the First Jewish Revolt.
- Temple of Peace: In 75, the Temple of Peace, also known as the Forum of Vespasian, was built under Emperor Vespasian in Rome. The monument was built to celebrate the conquest of Jerusalem and it is said to have housed the Menorah from Herod's Temple.
- Flavian Amphitheater: Otherwise known as the Colosseum built from 70 to 80 AD. Archaeological discoveries have found a block of travertine that bears dowel holes that show the Jewish Wars financed the building of the Flavian Amphitheatre.
- Arch of Titus: In around c.82, Roman Emperor Domitian constructed the Arch of Titus on Via Sacra, Rome, to commemorate the capture and siege of Jerusalem in 70, which effectively ended the Great Jewish Revolt, although the Romans did not achieve complete victory until the fall of Masada in 73.
In later art
The war in Judaea, particularly the siege and destruction of Jerusalem, have inspired writers and artists through the centuries. The bas-relief in the Arch of Titus has been influential in establishing the Menorah as the most dramatic symbol of the looting of the Second Temple.
- The Franks Casket. The back side of the casket depicts the Siege of 70.
- The Destruction of the Temple at Jerusalem by Nicolas Poussin (1637). Oil on canvas, 147 x 198,5 cm. Kunsthistorisches Museum, Vienna. Depicts the destruction and looting of the Second Temple by the Roman army led by Titus.
- The Destruction of Jerusalem by Titus by Wilhelm von Kaulbach (1846). Oil on canvas, 585 x 705 cm. Neue Pinakothek, Munich. An allegorical depiction of the destruction of Jerusalem, dramatically centered around the figure of the High Priest, with Titus entering from the right.
- The Siege and Destruction of Jerusalem by the Romans Under the Command of Titus, 70 by David Roberts (1850). Oil on canvas, 136 x 197 cm. Private collection. Depicts the burning and looting of Jerusalem by the Roman army under Titus.
- The Destruction of the Temple of Jerusalem by Francesco Hayez (1867). Oil on canvas, 183 x 252 cm. Galleria d'Arte Moderna, Venice. Depicts the destruction and looting of the Second Temple by the Roman army.
- Assyrian Siege of Jerusalem
- Council of Jamnia
- Herod's Temple
- Jerusalem’s Model in the Late 2nd Temple Period
- Jewish-Roman wars
- Judaea Capta coinage
- Kamsa and Bar Kamsa
- Second Temple
- Siege of Jerusalem (1099)
- Siege of Jerusalem (1187)
- Solomon's Temple
- Western Wall
- ↑ 1.0 1.1 Levick, Barbara (1999). Vespasian. London: Routledge, pp. 116–119. ISBN 0-415-16618-7
- ↑ Flavius Josephus. The Wars of the Jews or History of the Destruction of Jerusalem. Containing The Interval Of About Three Years. From The Taking Of Jerusalem By Titus To The Sedition At Cyrene. Book VII. Chapter 1.1
- ↑ Flavius Josephus. The Wars of the Jews or History of the Destruction of Jerusalem. BOOK VI. Containing The Interval Of About One Month. From The Great Extremity To Which The Jews Were Reduced To The Taking Of Jerusalem By Titus.. Book VI. Chapter 1.1
- ↑ Josephus, The Wars of the Jews VI.9.3
- ↑ "Milman, The History of the Jews, book 16". Crcbermuda.com. http://www.crcbermuda.com/reference/ellen-white-books-g-m/great-controversy/1897-chap-1-the-destruction-of-jerusalem. Retrieved 2013-08-31.
- ↑ Philostratus, The Life of Apollonius of Tyana 6.29
- ↑ "Cornell.edu". Cals.cornell.edu. http://www.cals.cornell.edu/cals/public/comm/pubs/als-news/2003-april/ancient-parks.cfm. Retrieved 2013-08-31.
- ↑ ALFÖLDY, GÉZA (1995). "Eine Bauinschrift Aus Dem Colosseum.". Zeitschrift für Papyrologie und Epigraphik 109: 195–226.
- ↑ Yoma, 9b
|Wikimedia Commons has media related to: Siege of Jerusalem (70)|
- Second Temple and Talmudic Era. The Jewish History Resource Center: Project of the Dinur Center for Research in Jewish History, The Hebrew University of Jerusalem
- The Temple Mount and Fort Antonia
- Map of the siege of Jerusalem
|
<urn:uuid:1acec685-754c-4596-a83d-9e77d67343c6>
|
CC-MAIN-2017-13
|
http://religion.wikia.com/wiki/Siege_of_Jerusalem_(70)
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189252.15/warc/CC-MAIN-20170322212949-00650-ip-10-233-31-227.ec2.internal.warc.gz
|
en
| 0.957338 | 2,614 | 3.328125 | 3 |
We can order this for you! (This book cannot be returned.)
This book is concise, easy -to-use guide to the individuals, peoples, parties, movements, events, decisions and wars that have shaped the history of the United States.
About the Author
Thomas L. Purvis has a BA from Washington University in St. Louis and a PhD from The Johns Hopkins University. Having taught at the Peabody Conservatory of Music, the University of Georgia, Auburn University, and the College of William and Mary, he now devotes his time to historical research and writing. His books include The Historical Almanac of Revolutionary America 1763-1800 (1995), and Proprietors, Patronage and Paper Money (1986). He contributes to American National Biography as an associate editor.
|
<urn:uuid:328e77f5-f628-4684-9538-7799937cc26f>
|
CC-MAIN-2021-43
|
https://www.northwindbook.com/book/9781577180999
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585242.44/warc/CC-MAIN-20211019043325-20211019073325-00229.warc.gz
|
en
| 0.919859 | 163 | 2.59375 | 3 |
The advanced growth in UAV technology and huge investments provided for their developments have contributed to their popularity in every sector such as security, agriculture, photography, environment, transport and among other areas, furthermore, their accessibility in the market for commercial and personal uses have to lead them to be almost everywhere, today’s drones are efficient, reliable, fitted with high-quality cameras and chips that act as its brain, this has made them efficient and dependable and can be controlled remotely while they are miles and miles away in the air, it is these abilities that have made drone to be a security concern because some have been caught in most sensitive areas hence raising an issue in many countries about their regulations and permit to the users. It can be difficult to control how the drones in the hands of the public will be utilized, despite strict regulations on their usage in many countries, there have been instances where the drones have been caught in highly secured areas such as military basis, this niche that law is unable to protect has contributed to countermeasures to control the unwanted drones, one of the measures being utilized is anti-drone technology which detects and dispel or destroy the unwanted drone by detecting their radio frequency or jamming by blocking the RF wave the unwanted drone is using. To learn more about drones and anti-drowns technology make sure you continue reading this article.
Drones are small aircraft that cruise in the air without a pilot, for them to achieve high cruising altitude and acquire their maneuverability they are made of light yet strong composite materials, and to effectively serve their purpose the drowns are fitted with infrared cameras, GPS and laser which make it easier for them to be controlled remotely and while sending information to the ground using the ground control system which is also known as the ground cockpit.
In most cases the sensors are placed on the nose of the drones, the navigation systems are also situated here in most updated unmanned aerial vehicles. The reset is the motherboard, chips, and other systems the drone requires to work efficiently since does not have to leave spaces for people, additionally, the composite materials used to make drowns are designed to absorb vibrations that decrease the noise of the drone significantly when on the flight.
Some drones because of their difficulty to detect nature have to lead them snuck in highly sensitive areas which become a security issue, as a result, anti-drone technology has been designed and is used to hunt such unwanted drones. There variety of anti-drone technology which includes but is not limited to jammers, geofencing, thermal detection, radar detection for big drones at high attitude, RF detection as well as video detection which can be used independently or several techniques used together for easy and reliable drone detection purposes. Those are some of the information we have about drones and anti-drone technology.
|
<urn:uuid:e5be89c0-ef38-4f43-a91d-7f23904a6b41>
|
CC-MAIN-2021-17
|
http://niueeducation.info/what-no-one-knows-about-15/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038469494.59/warc/CC-MAIN-20210418073623-20210418103623-00221.warc.gz
|
en
| 0.976898 | 565 | 2.59375 | 3 |
The dace is smaller and more slender than its relatives, the ide and the chub. This silver flanked and green backed fish is about 20 centimetres long. It inhabits clean inland waters in the eastern and northern parts of Finland, except for the northern parts of Lapland. It also resides along the coastline. Dace spawn in early spring, once the ice has receded, on gravel and sand bottoms in flowing waters. Lively dace eats Trichoptera and other insect larvae and some aquatic plants. Due to its small size, it is not valued as a food fish although some claim it is quite savoury.
|
<urn:uuid:242c1046-7259-4d06-abda-380439c46ada>
|
CC-MAIN-2022-33
|
https://maretarium.fi/en/seipi/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00340.warc.gz
|
en
| 0.97054 | 132 | 2.875 | 3 |
The code of Hammurabi - also sometimes transliterated into our alphabet as Hammurapi - is a staple for history classes. It stands as an early marker for the concept of the rule of law.
Beyond its legal ramifications, however, it can tell us about Babylonian society at the time. A law code reveals the values and the problems of a society: nobody bothers to make a law against something unless someone’s been doing it.
Hammurabi’s society has quite of bit of magic and superstition: talk of casting “spells” and of “sorcery” inhabits the code, and such things are dealt with through trial by ordeal, which implies either that the river has supernatural powers, or is being manipulated by some supernatural spirit.
The class structure of Babylon is quite rigid, and the laws can confidently mete out punishments based on whether a crime was committed against an aristocrat or against a commoner. In any case, human life is quite cheap, and is readily extinguished for mere crimes against property.
The coarse equation of human life with money is evidenced in cases concerning the death of a slave or of a pre-born child.
Despite its underdeveloped pre-religious spiritual outlook, the economics and mathematics of Hammurabi’s code are relatively sophisticated. There is talk of altering interest payments during years in which the weather reduced the harvests.
Likewise, the legal documentation is not simple-minded, as is independently confirmed by other cuneiform texts from the same era.
Gender inequality is starkly presented in cases of adultery. A woman convicted, or in some cases even merely accused, receives capital punishment. It is implied that a man in the same circumstances receives a lesser punishment, if any.
Hammurabi’s code, probably written sometime prior to 1750 B.C., reflects a modern sensibility against incest; a man who sleeps with his daughter is exiled.
The lex talionis is quite literal between equals, but a freeman who harms a slave can simply offer money as restitution.
A certain liability is born by someone who knew that his ox was in the habit of goring. The frequency of agricultural specifics reveals the extent, and the type, of farming which supported the society.
Hammurabi’s code is a rather neutral legal document, as opposed to a moral statement. Certain actions entail specific consequences, but are not condemned as immoral, and no imperative against them is given. One might simply understand the fine of silver coins as the price to be paid if one wishes to injure a neighbor’s slave.
The code is designed to support, reinforce, and maintain the status quo in Babylon. It reflects a static society, not a revolution in social forms. This fits a circular sense of time, rather than a linear conception of time which allows for progress.
Hammurabi’s people were outer-directed, motivated by shame or the avoidance of it. Motive does not play a large role in legal consideration.
Moses will form, in many ways, a counterpoint to Hammurabi, in a Hebrew society which, only a few decades after Hammurabi, will be quite different on some of these points.
|
<urn:uuid:c9415e24-8fd8-4cf2-aec7-4d6189acc464>
|
CC-MAIN-2017-34
|
http://humanities-notes.blogspot.com.au/2015/03/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104636.62/warc/CC-MAIN-20170818121545-20170818141545-00157.warc.gz
|
en
| 0.967285 | 672 | 4.125 | 4 |
A European team of physicists working in the lab of Professor Nicolas Gisin in the physics department at the University of Geneva, has demonstrated a method that can teleport quantum information to a solid-state quantum memory over telecom fiber.
This marks a crucial milestone towards the development of quantum Internet, for physicist Félix Bussières who has been heading the research group through a string of experiments carried out in the last decade in order to perfect quantum data transfer using entanglement.
What occurred was teleportation of the quantum state of a photon to another doped with rare-earth ions, placed at a distance of 25 kilometers, essentially transferring information from light to matter, over an ordinary telecom optical fiber in use all over the world. The previous record was of 6 kilometers (3.7 miles) set in 2003 by the same team.
To set things in perspective, Quantum teleportation is a process by which quantum data can be transmitted from one location to another, with the help of classical communication and quantum entanglement between the sending and receiving location, without traveling through the space in between. Matter itself doesn’t make this journey, only the information that describes it, explains the MIT Technology Review.
The researchers were able to generate entangled pairs of photons (suppose photon A and B) with different wavelengths, one of which passes easily through telecoms optical fiber(say photon B). So these guys send photon A, as a signal to the quantum memory (doped crystal) where it is stored, while transmitting photon B, through a fiber to another apparatus that prepares a third photon (also at the same wavelength as B, we call it X) with the polarization to be teleported.
This is when the teleportation takes place. When B and X photons interact in a certain way, the polarization is teleported to the quantum memory at the other end of the experiment, to A.
“The team’s measurements on these photons show that the polarization state is indeed teleported as quantum mechanics suggests. A crucial part of the experiment is a new generation of single photon detectors that can spot telecoms photons with much greater efficiency than has been possible before,” reports the MIT Technology Review.
This marks a small step towards the possibility of quantum internet, the kind of machinery that needs to be developed to make it happen.
The findings of the research were published in the journal Nature Photonics on September 21.
For further reading, see here.
(Image credit: University of Geneva)
|
<urn:uuid:89fa7fa8-a67c-4fb5-95e2-0cf73db5703f>
|
CC-MAIN-2019-18
|
https://dataconomy.com/2014/09/quantum-teleportation-covers-more-miles-with-latest-milestone-at-the-university-of-geneva/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578583000.29/warc/CC-MAIN-20190422235159-20190423021159-00202.warc.gz
|
en
| 0.925749 | 510 | 3.25 | 3 |
Title: Malawi Orphans and Vulnerable Children Evaluation (MOVE)
Context: Between 700,000 and 1.2 million children in Malawi have been orphaned by AIDS, and many others are vulnerable. The Funders’ Collaborative for Children (FCFC), a novel collaboration between 4 independent funding organizations, is funding an intervention that aims to establish a collaborative, replicable, and sustainable model of prevention, treatment, and care which will result in a “system of care” better able to support children and their families than the currently fragmented organization of agencies and groups. The program is implemented in Salima District, Malawi, by Family Health International (FHI) in collaboration with XXX implementing partner organizations. Duke University and Malawi’s College of Medicine were contracted to jointly evaluate the effectiveness of the 5-year program. MOVE assesses the impact of the intervention on child outcomes in four domains: health; education; social welfare; and nutrition and livelihood.
Study Aims: The FCFC intervention aims to improve the lives of 65 percent of vulnerable children in Salima District in terms of their education, health, livelihood, and social welfare. Researchers at Duke University and the College of Medicine will determine if the Funder’s Collaborative for Children achieved its objective.
Methods: The effectiveness of this intervention model is evaluated using qualitative and quantitative monitoring and evaluation methods. Repeated cross-sectional cluster surveys with a total of 1,260 vulnerable children and their caregivers assess district-level intervention coverage and changes in outcomes over time. Repeat assessments with 200 of these children, half in intervention areas and half in non-intervention areas seek to attribute changes to the program. Twice-annual surveys with implementing partners assess changes in scale and scope of service delivery.
This evaluation will determine if the FCFC intervention is effective in improving the wellbeing of orphans and other vulnerable children in Salima District, Malawi. If the evaluation demonstrates that the intervention is effective, it will help funders and national policymakers design more integrated and more effective care systems for orphans and vulnerable children.
Investigators: Karen O’Donnell (Duke University) Jan Ostermann (Duke University), Eric Umar (College of Medicine, Malawi), Kathryn Whetten (Duke University), Sara Legrand (Duke University)
Funding Source: Funders’ Collaborative for Children (Children’s Investment Fund Foundation, Comic Relief, Elton John AIDS Foundation and the Diana Princess of Wales Memorial Fund)
|
<urn:uuid:4027bf2b-c53a-46ed-afc6-ff99404120a1>
|
CC-MAIN-2019-22
|
http://ovcwellbeing.org/malawi-orphans-and-vulnerable-children-evaluation-move/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257497.4/warc/CC-MAIN-20190524024253-20190524050253-00253.warc.gz
|
en
| 0.914542 | 513 | 2.625 | 3 |
SMALL TOWNS and hamlets interspersed
among vast stretches of corn and wheat fields dominated Frederick County's
Antebellum landscape. Along its southern border, the Potomac River,
and after 1828 the Chesapeake and Ohio Canal, came from the southeast.
Moving westward, the Blue Ridge Mountains, Catoctin Mountains, and generally
foreboding terrain reflected the topography of the rest of Maryland.
Yet, by land and water, Marylanders and other Americans trekked from points
east during the early-1800s. African Americans were among them, including
those free-born, those who had been manumitted, and even those still enslaved.
Those still enslaved moved as chattel property with their owners.
Others, though enslaved, moved without their owner's knowledge or consent.
This study has considered several locally-oriented,
weekly Maryland-based newspapers, and two dailies, the Baltimore Sun, and
Washington, D.C.'s Daily National Intelligencer. Our study has produced
a yield of greater than four-thousand runaway advertisements and notices of comitial
from the various presses for the period 1830-1860. Only fifty-nine ads (1.4%)
concerned slaves of Frederick County owners, and of those, more than half
(31) came from three available years of a Frederick County newspaper, The
Frederick County's runaway slaves were
not being sought in Baltimore City, and according to extant jail dockets
they were not being caught there either. In the Baltimore City Jail
Docket for suspected runaways, of 749 blacks identified as slaves of a
specific owner between 1827 and 1850, only eighteen (two percent) were identified
with Frederick County owners. Likely this means that Frederick
County fugitives fled beyond the state, and owners sought them outside
of Maryland through advertisement and other measures.
As with Baltimore County, and all Maryland
counties sharing a border with the State of Pennsylvania, the study of
Frederick County must consider both blacks fleeing the county itself, and
Frederick County as the final obstacle before the Mason and Dixon Line.
Advertisements placed in Frederick County newspapers represent the latter
variety nearly as much as the former. Of the nearly eighty advertisements
placed in the Frederick Herald between 1831 and 1834 for fugitives at-large
or apprehended and detained by sheriffs, sixty-four percent made reference
to Frederick County as the origin of flight or residence. However,
the majority of the remaining notices placed in the Herald concerned non-Marylanders
primarily from Washington, D.C., and Virginia. Only twelve percent
of notices in the Herald came from other Maryland counties. This
suggests that both fugitives from beyond the county, and those who pursued
them understood the opportunities for flight presented by Frederick County.
Baltimore County realized a similar immigration
of non-county fugitives. Many of them were as likely to remain in
Baltimore City, at least in the short term, as they were to move on to
Pennsylvania. However, in terms of an alternative to out-of-state
flight, Frederick City does not seem to have offered the same prospects
to blacks on the run as did Baltimore City. While both were bustling centers
of commerce and activity, Baltimore operated on a much larger scale in
terms of actual numbers of people. Baltimore also had a much larger community
of free and enslaved blacks, which may have been the crucial difference.
Throughout the Antebellum Era, the majority of Frederick County's black
population - enslaved, as well as free, resided outside of Frederick City
in the southeast districts bordering Montgomery County, the districts
bordering the Potomac River/C & O Canal and also Frederick District.
By 1860, these six districts - Petersville (No. 12), Jefferson (No. 16),
Buckeyestown (No. 1), Urbana (No. 7), New Market (No. 9), and Frederick
District (No. 2) - held sixty-four percent of the county's enslaved blacks and
fifty-nine percent of all blacks, enslaved or free. Blacks of all castes
do not appear to have settled into the Frederick City community in any
great numbers, and pursuers of fugitives, even those from other Frederick
County locales, do not seem to have sought them there. Frederick
City likely served as a vital hub, a way station for information, respite,
resources, but not a permanent stop, as was often the case with Baltimore
Frederick County may have represented,
a fork in the Southern Underground Railroad. Fugitives traveling
on foot over the roads from Montgomery County, Maryland, Washington, D.C.
or, crossing the Potomac river from Virginia, likely sought different destinations
based upon the direction of their steps through Frederick County.
Staying close to the Potomac River, and the C&O Canal, traveling northwesterly
into Western Maryland, and ultimately Western Pennsylvania, fugitives faced
formidable terrain. Yet they likely benefited from the
presence of the county's largest slave communities. Moving due north,
through the center of the county, those who reached Frederick City came
into a world of urban, free blacks, and potentially, a system for moving
fugitives out of the state. This same thesis applies to those moving
in a northeast direction, through a gamut of small towns and hamlets: Urbana,
New Market, Unionville, Johnsville. William Still of the Philadelphia
Vigilance Committee, documents the successful flight of sixteen Frederick
County fugitives during the 1850s. Of the thirteen whose district
of origin was recorded, eight fled a slaveholder from an eastern district
of the county, the other five from Frederick City, at the county's center.
It is also instructive that relatively
few Frederick County slave owners seeking runaways placed advertisements
in the Baltimore Sun, Daily National Intelligencer, or other major dailies
of the period brought under consideration by this study. This
suggests a northward, interstate travel agenda, rather than the sporadic, city-oriented travel vectors of the
southern counties. This would have taken Frederick County fugitives, and their pursuers, into Pennsylvania and beyond.
Frederick County's topographical features, included
the Potomac River, the Blue Ridge and Catoctin Mountain Ranges. These, and its
developed infrastructure, especially the Chesapeake and Ohio Canal, combined
with its central location within the state and its proximity to Pennsylvania
to make it attractive to fugitives. Of all these features, the C&O
Canal's emergence in the late-1820s most unnerved slave owners, especially
those in Frederick County, for its potential impact. Not only may
it have offered fugitives a route to freedom, but by working on the canal,
runaways, especially men, may have been able to finance their flight by
working on the canal. When Tom Jefferson ran from Prince George's
County during the Christmas Season of 1829, his pursuers believed him to
have headed for the Canal. A few months later, a slave named Bill also
fled Prince George's County. Bill's owners were certain that he would
ultimately make for Pennsylvania but would first attempt to get employment
on the canal to finance the rest of his journey. A third fugitive
from Prince George's County, Frank Shaw, remained at large for at least
three years without leaving the state, probably supporting himself by
working on the canal. Work on the canal apparently afforded both
two necessities for a fugitive; a livelihood and anonymity. As people
and goods thickened the canal traffic, owners of fugitives feared that
their wayward property might go unnoticed amid the shuffle, and that men
without respect for the law might employ their fugitives, despite its illegality,
thereby easing the slave's escape. The canal could also serve as
a conduit whereby family members might assist
each other or move together. Such was the suspicion of those pursuing
Jim Hagan from Southern Maryland. Not only could Jim's skills as
a carpenter and joiner be employed in canal labor, but Jim's brother lived
in Frederick County. Canal work gave free blacks income which might
be put to the use of assisting kinfolk on the run, as was the case from
George Soloman, a free black man whose wages from canal work were suspected
to have facilitated his son's flight from Southern Maryland in 1830.
Even without a substantial number of runaway
advertisements, the records tell of people running from slavery in Antebellum
Frederick County, and of others willing to help those on the run.
Frederick County's fugitives and their accomplices held several considerable
advantages. In the fall of 1853, Perry Hilleary, also know as Perry Ridgely,
an eighteen-year-old enslaved boy from Frederick County, fled the farm
of Mr. Abraham H. Simmons. His pursuers believed him to be headed
for Baltimore City, and apparently had their suspicions corroborated by
people who believed they had seen the boy in the city. His
direction of travel, was probably influenced by his familiarity with the
city, and the possibility of shelter and/or assistance. Such was
the likely motive for Gassaway, another fugitive from Frederick County
slavery. According to the 1850 Census, Michael B. Carroll of the
Nottingham District, Prince George's County, Maryland, held ninety human beings
in chattel bondage. Carroll died in 1853 and his slaves were ordered
sold-off by the Orphan's Court. On February 14, 1853, a public auction
was held. At least sixtey people, many of whom were families, were divided
among the twenty-two successful bidders representing interests across the
state, and likely throughout the South. One of the late Carroll's
slaves, Gassaway, was sold to a man named Bradley, who in turn sold him
to Meredith Davis of Frederick County. Within a year, Gassaway was
gone from Davis's Gunpowder Mill's farm, and his owner believed him to
be headed back to Prince George's County. If that was his destination,
it likely reflected the perspective held by blacks in Maryland's Southern
Counties on the possibilities of flight. Perhaps his familiarity
with the region gave Gassaway confidence to attempt a reconnection with
family, perhaps even seeking kin out to flee again at some future point.
Evidence shows that flight from Frederick County involved consideration
on the part of the fleeing slave, and was not simply a matter of deciding
While most fugitives are believed to have
fled alone, records convincingly show that not all did. Fred Fowler,
for example, ran from W. L. Willis of New Market in May 1858. He
was believed to have run with John Shaw, property of William Hoffman, who
also lived in Frederick County, between New Market and Frederick City.
Shortly before their disappearance, the twenty year old Fowler and twenty-four year
old Shaw were seen together. Sometimes, it seems, grand schemes of
flight requiring preparation and forethought were concocted by a group
of slaves. This was true in Frederick County as it was elsewhere.
Such a design saw one Unionville farmer lose his whole enslaved labor force.
Thornton Poole held nine slaves in 1850, with most of these persons being
members of a single family, the Aldridges - a mother (aged forty), and at
least seven children (ranging in age from seven to twenty years old). By the mid-1850s,
Poole ran a store and a farm in Unionville, Liberty District, eastern Frederick
County. Of Liberty's 1,103 black residents, only 376 (34%) were enslaved.
At some point in 1856, two Aldridge brothers ran from Poole, followed shortly
thereafter by their mother, and three siblings. In the wake of this
loss, Poole sold two slaves - the children and siblings of those who fled.
Following the sale, the remaining Aldridge siblings Basil (b. 1840), and
Caroline (b. 1834), decided to run as well. Basil ran first, in the
company of Israel Todd, another Unionville slave belonging to a nearby
plantation. Caroline followed shortly thereafter. Basil and Caroline
presumed that all but their brother and sister sold south had reached freedom.
They hoped to reunite with the entire Aldridge family in Canada.
Did the Aldridges and others recieve assistance from the growing, diverse
free black population of Frederick County? We cannot be certain.
Yet, at least one resident of Frederick County per decade under consideration
- David Bruce (1833), Lorenzo Penn (1843), and Charles Hall (1850) - was
incarcerated at the Maryland Penitentiary for being an accomplice to fleeing
|
<urn:uuid:5bbc94b6-b610-491c-b5c4-819f22bbf608>
|
CC-MAIN-2017-51
|
http://slavery.msa.maryland.gov/html/antebellum/fr.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948563629.48/warc/CC-MAIN-20171215040629-20171215060629-00070.warc.gz
|
en
| 0.962039 | 2,728 | 3.453125 | 3 |
Uttar Pradesh Current Affairs - 2019
Category Wise PDF Compilations available at This Link
The government of Uttar Pradesh has initiated One District, One Product scheme to encourage indigenous and specialized products and crafts of the state. The scheme aims to capitalize the rich heritage of the Uttar Pradesh by reviving them through modernization and publicisation to enhance the reach of these products.
Objective of the Scheme
Uttar Pradesh is a vast state with vast diversity in all facets of life. The diversity of products and crafts in UP is breathtaking. The vast diversity encompasses the ancient and nutritious Kala namak rice, the rare and intriguing wheat-stalk craft, world-famous chikankari and zari-zardozi work on clothes, the intricate and stunning horn and bone work that uses the remains of dead animals rather than live ones, a nature-friendly replacement for ivory. Many of these rich traditions are facing the existential threat. The One District, One Product aims to revive these traditional heritages by reviving them through modernization and publicisation.
Uttar Pradesh based startup HelpUsGreen has been honored by UN for its works to clean River Ganga by recycling tonnes of floral waste. UN presented the award to the 14 other countries along with India at the Nations Climate Action award ceremony during the UN Climate Change Conference in Katowice.
How It Works?
The startup collects the floral waste daily from the temples. These flowers are then recycled to produce charcoal free incense, organic vermicompost and biodegradable packaging material through Flowercycling technology.
According to UN the startup flower cycled 11060 metric tonnes of temple waste by the women working with the startup. According to data, more than 800 million metric tonnes of flowers are used in temple and these flowers are thrown into the Ganga river. The river filled with lots of waste, toxins and pesticides dumped into it, eventually lead to pollution and water borne diseases.
HelpUsGreen started as world’s first profitable solution to the waste problem created by flowers in monumental temple. Total of 8.4 tons of floral waste is collected by the startup everyday from the temples in Uttar Pradesh. The startup helped 1260 women who have been supporting the startup and 19 children whose mother works at manual scavengers started going to school.
|
<urn:uuid:2f35464c-ea42-4c3b-b837-be64d2fe35e0>
|
CC-MAIN-2019-09
|
https://currentaffairs.gktoday.in/tags/uttar-pradesh/page/5
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247487624.32/warc/CC-MAIN-20190218175932-20190218201932-00224.warc.gz
|
en
| 0.923817 | 471 | 2.546875 | 3 |
By Casey J.
This quantity is made from electronic photos created throughout the collage of Michigan collage Library's upkeep reformatting software.
Read or Download A treatise on the analytical geometry of the point, line, circle, and conical sections PDF
Best geometry and topology books
This booklet offers a robust solution to examine Einstein's distinctive concept of relativity and its underlying hyperbolic geometry during which analogies with classical effects shape the ideal software. It introduces the suggestion of vectors into analytic hyperbolic geometry, the place they're referred to as gyrovectors. Newtonian speed addition is the typical vector addition, that is either commutative and associative.
Differential Geometry, Lie teams and Symmetric areas Over basic Base Fields and jewelry
- Arithmetic and Geometry around Hypergeomet
- A Generalization of Rolle's Theorem with Application to Entire Functions
- Elementary Euclidean Geometry: An Undergraduate Introduction
- Conformal Groups in Geometry and Spin Structures
Additional info for A treatise on the analytical geometry of the point, line, circle, and conical sections
Let us introduce a new spectral parameter k such that λ(k) = − ω1 k 2 + 14 . From now on we consider the case where m is a Schwartz class function, and m(x, 0)+ω > 0. Then m(x, t) + ω > 0 for all t . The spectral picture of (10) is : 38 A. I. Ivanov continuous spectrum: k — real; discrete spectrum: finitely many points kn = ±iκn , n = 1, . . , N where κn is real and 0 < κn < 1/2. Eigenfunctions: for all real k = 0 a basis in the space of solutions can be introduced, fixed by ¯ k), such that its asymptotic when x → ∞: ψ(x, k) and ψ(x, ψ(x, k) = e−ikx + o(1), x → ∞.
Tu × ts ) dsdu on a unit sphere is just the solid angle δΩ. Substituting Eqs. (26) and (27) in Eq. (25), we get δΦinc = δΦF W + δΩ. (28) This is the general geometric relationship between the two types of geometric phases, and it is valid for all smooth curve evolutions. Returning to Eqs. (19) and (20) with ∆t = 0, we get Ku = gs − hτ, τ 0 = (hs + gτ )/K. (29) So far, our analysis has been quite general. We must now find g, h and τ 0 in such a way that Eqs. (17) and (18) are obtained. In turn, this would imply the equivalence of the Schr¨ odinger equation (15) and the curve evolution equations (1) and (5), as already explained.
9) The total phase is then given by the following expression: Φ=− u2 s0 du u1 −s0 Rs ds. (10) Using the s and u derivatives of t, we get that ts ∧ tu = kht. This allows us to give a geometrical interpretation of the total phase: Φ=− u2 s0 du u1 −s0 t · (tu ∧ ts )ds. (11) The expression t · (tu ∧ ts )dsdu represents the element of area on the unit sphere. Fermi-Walker parallel transport 45 A. Quantum mechanical phase: Berry’s phase Note that the quantity R can be expressed using the complex vector N: R = − 2i N ∗ ·Nu With this the expression for the geometric phase becomes: Φ= i 2 s0 −s0 ds ∂ ∂s u2 N ∗ ·Nu du.
A treatise on the analytical geometry of the point, line, circle, and conical sections by Casey J.
Categories: Geometry And Topology
|
<urn:uuid:ee77150b-032e-48de-9130-6544a67e35d1>
|
CC-MAIN-2019-13
|
http://alimentosvillares.com.ar/ebooks/a-treatise-on-the-analytical-geometry-of-the-point-line-circle-and-conical
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201996.61/warc/CC-MAIN-20190319143502-20190319165502-00516.warc.gz
|
en
| 0.864398 | 891 | 2.625 | 3 |
THE STUART DYNAMO.
THE STUART DYNAMO.
The only efficient Miniature Dynamo.
Alternating Current for direct lighting, It will not run as a Motor nor charge Accumulators.
Height 3-ins., Length Overall 4-ins,
Pulley with V Groove 3/4-in. in diam.
At 2,500 r.p.m. two 4 volt 1 watt lamps
,, 3,000 ,, four ,, ,, ,,
,, 6,000. ,, eight ,, ,, ,,
21/- Post Free.
Foreign orders should include Postage for 3-lbs.
Special Spring Driving Belt, 1/- ; Grooving your Flywheel to suit, 2/-.
This dynamo has been specially designed to be driven by the Stuart Mill Engine, No. 10, B.B., Star, Sun and other small engines.
We have therefore endeavoured to produce a machine that shall be as good as
can possibly be made.
The scientific design from an electrical and magnetic point of view, sound mechanical design and great accuracy of workmanship, whereby the air gap is reduced to .005 ins., make the efficiency of the dynamo extraordinarily high. A lamp can be made to glow merely by twisting the spindle between the fingers.
The Spindle is of silver steel and the Bearings are long and of best gunmetal.
The current is collected from 2 slip rings by spring brushes and led to the terminals,
Note.—On no account remove the Armature without first bridging the field
magnet poles with a piece of iron.
The rating plate is marked “ R.P.M. 3,000, volt varied by running at higher or lower speed.
The following outputs are obtained with our standard engines and boilers. :
Mill Engine and Boiler. Maintained pressure 30-lbs. 2 one watt lamps.
No. 10 ,, ,, ,, No, 501 Boiler. ,, ,, 50 lbs. 4 ,, ,, ,,
No. 10 ,, ,, ,, No. 504 Boiler. ,, ,, 60-lbs. 8 ,, ,, ,,
No. 10 ,, ,, ,, No. 499 Boiler. ,, ,, 30-lbs. 1 ,, ,, ,,
With these engines, boilers and dynamos, a complete and strikingly realistic lighting plant can be constructed entirely without a lathe.
Beds for direct coupled engines are shown on page 24.
A carefully designed little dynamo that accuratly replicates its full sized counterpart. Ideal for powering small AC bulbs. As mentioned in the text this is not suitable for charging batteries or for running as an electric motor.
"i received the dynamo and am exceedingly pleased with same. i am sure you ought to be proud to have produced such an excellent little machine both from an efficient and appearance point of view.."
O.L.B. WRITES :-
"The small guinea Dynamo arrived safely and was much admired. I may say that I have spent a small fortune on dynamos, English, French, German, etc., but yours is the only one I could get the No. 1o to drive satisfactorily. The Displacement Lubricator also is a great success, and no doubt helps keep steam up."
|
<urn:uuid:4ce1c299-21f5-4fec-9b37-89b10726a340>
|
CC-MAIN-2021-43
|
http://stuartturnersteam.com/Machines/Dynamo/Dynamo.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585504.90/warc/CC-MAIN-20211022084005-20211022114005-00055.warc.gz
|
en
| 0.921701 | 711 | 2.515625 | 3 |
British-based riders who compete their horses in Europe must remain vigilant if the UK is to remain free of Equine Infectious Anaemia (EIA or swamp fever).
A veterinary assessment by Defra has found there is a “very low” overall risk of EIA being spread in the UK from horses that have visited infected areas. But the risk rises to “medium” if horses visit Europe between April and October, when flies, which transmit the disease, are most active.
The disease is circulating in Italy and Romania, but there were three cases reported in the UK last year (news, 21 April, 2010).
UK chief veterinary officer Nigel Gibbens said: “Competing with horses in endemic areas like Italy has its risks and owners have a responsibility to protect the rest of the industry.
“There’s a very low risk but it’s crucial that horses are regularly assessed when they’re abroad and back home, and that any suspicions are reported quickly.”
EIA is transmitted by biting flies and tainted blood products.
Signs include haemorrhages, intermittent fever, swelling of legs and head and anaemia. It can also cause organ failure and death.
The British Equestrian Federation’s Claire Shand told H&H that riders have been briefed on the dangers of EIA. But she feels they are unlikely to spread the disease.
“They all have such scrupulous checks and systems in place and the very best veterinary care for their horses,” she said.
This news story was first published in the current issue of Horse & Hound (7 July, 2011)
|
<urn:uuid:091ad949-5441-4bec-9b8a-45afabcba987>
|
CC-MAIN-2021-25
|
https://www.horseandhound.co.uk/news/riders-alerted-to-eia-disease-threat-308608
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488528979.69/warc/CC-MAIN-20210623011557-20210623041557-00271.warc.gz
|
en
| 0.97389 | 344 | 2.640625 | 3 |
Brassica juncea, or mustard greens, is another member of the brassica (a relative of kale and cabbage). Although its precise origins are unknown, there’s evidence that mustard is likely native to Eastern Europe and Asia, as is reflected by its common names—India mustard and China mustard. Here in the West we just call it “mustard greens.”
Why we like mustard greens
The ruffled leaves of mustard taste similar to radishes and can add a spicy bite to a salad, sandwich, or can be eaten by themselves (usually steamed). Mustard is often cultivated for its seed, which is used in brown mustard (the condiment) and has been used for centuries in folk remedies for aches, arthritis, and even to promote cow milk production in some areas of the world.
One of our favorite mustard varieties is Southern Giant Curled, but many varieties have been bred with different flavors and in colors ranging from green to dark purple.
Although mustard greens aren’t the first thing that come to mind when you’re creating a weekly menu, they are a great addition to spruce up a dish that is lacking in flavor. The strong taste of mustard makes it most useful to home cooks in small quantities. Selling mustard greens in large quantities will prove difficult. (Try suggesting a few recipes to interested customers to help them use their mustard greens!)
Ideal conditions for growing mustard greens
- pH range: 6.0–7.5
- EC/PPM: 1.2–2.4
- Temperature: 50–75º F
Mustard is another crop which is easy to grow, and a favorite with the Upstart Farmers. Mustard will grow almost anywhere using any technique, and although it will survive down to 35º F, it’s not as frost tolerant as some of its cousins.
When grown outside and/or in the soil, mustard greens can have issues with cabbage loopers, flea beetles, cabbage worms, and clubroot. Grown vertically and/or in healthy hydroponics systems, this is not likely.
Yield and pricing
Mustard greens can be managed similar to kale—grown from seeds, which take 4–7 days to germinate. The seedlings will be ready to transplant 2–3 weeks later (at 3–4 weeks from the seed planting). After 4–6 weeks growing, growers can harvest the greens partially (recommended), taking only 30% of the plant and leaving the rest to continue to grow. We’ve experienced yields of 3.1 lbs per 5-foot ZipGrow Tower this way, although light and nutrients impact that number.
Pricing for mustard greens varies widely by market, quality, and value points, but most Upstart Farmers are getting pricing at $5.00–6.00 per pound.
Think you might have a market for mustard?
Finding markets might sound intimidating, but it really comes down to understanding the market and a bit of hard work. There are four main markets that Upstart Farmers are exceptionally positioned to enter: restaurants, farmer’s markets, grocery stores, and CSAs.
Believe it or not, you do have unique value to offer those markets. Want to learn more about the markets and what you have to offer them? Take the 4 Markets course here on Upstart University.
|
<urn:uuid:1307f4ac-4186-41eb-9998-9c5c1c2b35f5>
|
CC-MAIN-2019-26
|
https://university.upstartfarmers.com/blog/growing-mustard-greens
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999273.79/warc/CC-MAIN-20190620210153-20190620232153-00475.warc.gz
|
en
| 0.953218 | 698 | 2.875 | 3 |
Synopsis by Sean Hurley
In the six-part Climate and Man series, producers from Films for the Humanities and Sciences deliver an in-depth exploration of the critical relationship existing between Earth's climate and the success or failure of every species existing on this planet. The Greenhouse Effect addresses the contentious issue of whether the increasing levels of carbon dioxide in the atmosphere are causing the mean temperature of the Earth to rise and what this means for the future of life on Earth. Experts look at historic changes in climate and the effect these changes played in the disappearance of, for example, the dinosaurs. Contrasting the climates of Venus and Mars, experts detail why life can't exist there although it thrives here on Earth.
|
<urn:uuid:ca368a36-ce3c-47b0-85b7-37b18e36e8fb>
|
CC-MAIN-2017-30
|
http://www.allmovie.com/movie/climate-and-man-the-greenhouse-effect-v61585
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549429485.0/warc/CC-MAIN-20170727202516-20170727222516-00526.warc.gz
|
en
| 0.896628 | 143 | 3.140625 | 3 |
Every year, many pests plague gardeners, destroying crops, fruit bushes and trees. Affected plants become stained, their leaves curl, fruits fall. Apple and other horticultural crops are susceptible to damage by the apple-flowered beetle, whose population significantly reduces the yield and reduces its quality. What are the distinctive features of the beetle and how to deal with it?
Appearance and nutritional characteristics of the apple bloom
The color beetle beetle is a small brown insect with a long curved down proboscis, on which the antennae are located. The size of an adult individual is only about 4 mm. The elytra has two transverse strips that distinguish the insect from other species. The beetle has wings that make it very mobile. This affects its distribution throughout the garden.
The nutritional habits of the apple flower beetle consist in the fact that it eats buds, which prevents the formation of the ovary. In addition to apple trees, weevil strikes raspberries and pears.
With the onset of spring heat (about +5 degrees), the beetle beetle moves to the trees and waits for the flowering period. Prior to this, it overwinters in the folds of tree bark or fallen leaves. The insect makes in the kidneys the grooves from which the juice stands out. At the same time it lays eggs for the appearance of offspring. The larvae, which were bred inside the flower, begin to eat it from the inside, thereby causing wilting and drying of the inflorescences.
Insect life cycle
In early spring, with a steady air temperature of about + 6-8 degrees, adult apple weevil waking up, hiding in fallen leaves or tree bark. When the first buds and buds of flowers appear, females start laying eggs inside. After only a few days, the larvae appear from them, feeding on the petals, pistils and stamens of the flower. At this place the fetus can no longer form, and the inflorescence itself becomes brown and sticky from the secretions of the larva. The larva lives from 9 to 11 days, after which it turns into a mature individual, ready for breeding. It has been established: only 20 female weevils are needed in order to almost completely destroy the harvest from a whole tree.
What does the affected tree look like
The first sign of the defeat of the tree by the apple-flowering beetle is the unopened buds. The affected areas are easily noticed against the background of a green plant. They have an unpleasant brown color and an extremely painful look. Also, the affected kidneys can secrete juice, especially noticeable in sunny weather. At the same time, if you look closely at the affected part of the tree, you can see a small hole through which the beetle laid eggs.
At the end of the flowering period, flowering weevils can nibble the foliage, leaving characteristic openwork holes. If you ignore the defeat of the tree, you can be left without a crop, as insects multiply rapidly and fill the entire garden.
How to get rid of the insect
In a short period of time, the beetle can cause great damage to garden crops, so it is important to start fighting it when it detects the first signs of a lesion. Unfortunately, without modern chemicals it is quite difficult to do this, but it is possible. How to deal with apple tsvetoedom folk methods? You can try the following methods:
- Collect insects by hand. The technology resembles the collection of the Colorado potato beetle - in the early morning, before the beetles had time to hide inside the buds, they should be collected in a bucket filled with salt water. Such a method exists, but it cannot significantly reduce the weevil population. Many of them hide in the bark or on the branches.
- Lubrication of the stem and branches with lime mortar. Whitewashing in the trees does not allow insects to climb a tree from the ground, but it is harmless to those who have already settled on the plant.
- Shaking off It is made with the help of wooden sticks wrapped with soft material, with which it is necessary to knock on the trunk in order for the beetles to unhook from the bark. Pre-tree need to lay a cloth in order to collect them. The apple tree beetle can pretend to be dead and lie still for some time, but it is imperative that you burn all the collected insects.
These methods are used quite often, but chemicals are considered the most effective.
Preparations against apple weevil
For the destruction of the population of insect pests using chemical agents. Spraying against apple flowering bean is done during bud break or autumn after harvest. The most commonly used drugs are:
- "Fufanon", instructions for use, reviews of which indicate its high efficiency. Used in an amount of 10 ml per 10 liters of water.
- Calypso is completely safe for bees, wasps and bumblebees. Diluted with water at the rate of 2 ml per 10 liters of liquid.
- "Kinmiks" is used not only from weevils, but also from other insects that feed on foliage. The concentration of the drug - 2.5 ml per 10 liters of water.
- "Tanrek" - not washed off with water during rain.
- Karbofosom sprayed buds on the tree. It is applied at the rate of 10% of the substance in 90% of water.
- The drug "Decis", the instructions for use of which recommends a concentration of 10 ml per 10 liters of water.
- "Inta-Ts-M" - 1 tablet per bucket of water.
These drugs from apple flowering beetle can destroy the pest population with minimal damage to the plant. Especially gardeners note in the reviews "Fufanon", the instructions for use of which is simple, and the cost is available. In addition, it has a wide spectrum of action and destroys not only the apple-flowered beetle, but also other pests.
As a preventive measure for the destruction of trees by the weevil, such popular methods are used:
- Overlay Trap Belt - To do this, you must twist the tight bundle of fabric and impose around the trunk. The matter is smeared with a special sweet sticky composition that attracts the insect. When the insect sticks, it is important to remove it and destroy it.
- Before applying a layer of whitewash can clean the tree from the old barkin which beetles can hide. In this way, their population can be significantly reduced.
- In the autumn, after falling leaves recommended pile them in a pile and send them to a compost pit or burn them. The fact is that it is in dead foliage that flowering beetles can winter.
- After cleaning the leaves you can dig the soil.
- Should be on time notice and remove affected buds and buds so that the pest does not spread further along the tree. This will significantly reduce the damage that the beetle can cause, and will save most of the crop.
Such prevention is good for holding in the spring, before budding, or in the fall, after the leaves fall. Unfortunately, most methods are ineffective in the midst of flowering.
How to spray a plant
Most chemicals against the beetle beetle are designed for dilution with water in the proportions specified by the manufacturer and spraying with a spray bottle. How to spray garden plants? Observe the following guidelines:
- It is important to properly dilute the concentrate in water so as not to harm the tree. To do this, it is recommended to use measuring dishes and instructions on the label means.
- Spraying is carried out after blooming buds in dry, warm weather so that the wind and rain do not prevent the preparation from getting into the affected areas of the tree.
- Some substances are toxic to humans, so the processing of garden crops should be done with gloves and a protective mask. It is for this reason that it is important to carry out spraying at the flowering stage so that the insecticide does not get on the emerging fruit.
- It is advisable to use a spray with a long hose to be able to handle the top of the tree.
- It is desirable to spray the drug at a distance of not less than 70 cm and not more than 90 cm from the foliage.
- Not only foliage and branches are sprinkled, but also the trunk, as well as the ground around the tree.
The correct approach to spraying insecticide on plants will help to destroy insect pests as much as possible.
In order to really protect the orchard, you need to take a responsible approach to the fight against insects. The best effect can be achieved by applying a set of methods, which consists of agrotechnical and chemical control, as well as prevention.
At the same time, in order to least injure the tree by spraying, experienced gardeners recommend selecting complex chemical agents that act not only on the apple tree beetle, but also on other harmful insects.
Selection of varieties of apple trees that are resistant to tsvetoedu
All varieties of apple trees can be divided into several types: low-resistant, medium-resistant, highly resistant, immune. Gardeners recommend to pay attention to the last 2 species, if there is no time, desire or ability to deal with fruit pests.
Among them are the following varieties - Soyuz, Fairy, Rodnichok, Vasilisa, Palette, Talisman, Linda, Red Poppy, Prima, Aphrodite, Red Amber. They are highly resistant not only to bugs, but also to many common diseases of fruit trees.
By effectively combining the right varieties of apple trees with decent care and timely processing, you can get a big and tasty harvest.
Treacherous apple beetle
Flowering beetle is a beetle family, small, 4.5 mm, brownish-gray, with head extended in long trunk. At the end of the proboscis is a gnawing apparatus. The flower beetle itself feeds on leaves or buds, while its larva feeds on flower buds and is considered the main cause of apple harvest loss. The flowering beetles overwinter under fallen leaves near the trunks and partly in the bark and hollows of apple trees. In spring, they awaken at an average daily temperature of + 6 ° C, begin to crawl and feed on swollen and blooming buds, gnawing (as if piercing) narrow recesses in them. From the wounds inflicted by the beetle, droplets of clear juice protrude. The kidneys, slightly moistened with flowing juice, seem to be "weeping." According to these characteristic features, it is easy to determine the time of appearance and the multiplicity of the flower beetle in the tree crown.
After 1-2 weeks, when the air warms up to + 12-14 ° C, the beetles begin to fly. Females gnaw round holes in barely marked green buds and lay 1 egg in each bud. In total, the female can lay 50-100 eggs.
Even before flowering, the larvae hatch from eggs, which eat away the inner parts of the bud - stamens and pistils, and with their excrement glue the petals from the inside. Damaged buds do not open, turn brown, dry up, taking on the appearance of a brown cap, and seem to be affected by frost. Pupation of larvae and the formation of beetles occurs inside the damaged buds.
Young beetles emerge from the pupae, gnaw a hole in the dried-up "cap" and get out about 2-3 weeks after the end of flowering and shedding the petals of an apple tree. For the first 10-15 days, flowering beetles feed on leaves. Then the beetles scatter throughout the garden, including trees that have not bloomed in a given year, stop feeding and remain until the autumn in cracks and hollows. With the beginning of leaf fall, they move to wintering grounds.
In the cool spring, when the budding phase is stretched out in time and females can lay their entire supply of eggs, the number of damaged buds reaches 70-80%, and with weak flowering close to 100%. In the warm spring, on the contrary, the development of fruit trees is rapidly and the number of larvae buds is lower.
- In the green cone phase, it is recommended to carry out the treatment with chemicals. Fufanon (10 ml per 10 l of water), Karbofos (75-90 g per 10 l of water), Inta-C-M (1 tablet per bucket of water) are used. During the growing season spend 2 spraying. Solution consumption: 2 l per sapling, 5 l per fruiting.
- If the apple tree is young, the first unopened flower with a brown cap is torn off and the beetle larva is destroyed. So do with all the brown buds.
How to deal with apple blooms
- To clear the trunks of dead bark, which is the wintering site of the pest.
- Put glue belts to catch beetles crawling into the tree crown. After the apple trees bloom, the belts are removed and burned.
- Flowering beetles poorly populate fruit-bearing apples, the crowns of which at the beginning of the swelling of the buds are whitewashed with lime milk (1.5–2 kg of freshly shed lime per 10 liters of water). But in order to attract beetles, one of the fruit-bearing apples is left without whitewash and only on it they fight, shaking the beetles.
- During the swelling and blooming of the kidneys to spend three to four times shaking off the beetles early in the morning on any litter with their subsequent destruction. With the help of wooden beaters or poles, wrapped with sacking or other soft material at the end, in order not to damage the bark, they sharply but not strongly hit them on the skeletal branches. Beetles fall on the litter, pretending to be dead. They are swept into a bucket of water, which is added a little kerosene and destroyed.
Shelter tsikoyeda. We noticed glued petals, which quickly dry out, and instead of a flower, there is a brown cap of dried petals — a flowering beater attacked your trees. Raise the cap - there is either a light yellow larva or brown beetle.
Description and photos of the pest
The beetle belongs to the weevil family, has a small size - up to 5 mm, is painted in brown-gray color, the head is elongated in a long proboscis. At its end there is a device with which the pest gnaws the foliage.
The adult prefers leaves and buds, and the larvae feed only on the kidneys. As a result of their appearance, you can lose the entire crop.
Home for beetles in winter is the fallen leaves and bark of trees. As soon as the average daily temperature rises to + 6 ° С, the larvae wake up, and they start eating the kidneys.Beetles make holes in the kidneys, from which transparent juice slowly flows out. This is the main feature by which the presence of a tsvetkoeda on the tree can be determined.
What is dangerous bug?
The fight against apple bloom should start long before its occurrence, since pests are able to tolerate the winter perfectly and almost unexpectedly appear in the spring.
When the air temperature warms up to + 12-14 ° C, the beetles start to fly. The laying of eggs begins: the female lays 1 egg in each bud. The total number of eggs laid by one female can reach 100 pieces.
Before the beginning of the flowering period, the larvae become active and gradually destroy the stamens and pistils. The excrement, falling on the petals, firmly glue them together, which leads to the fact that the buds can not open, become brown, gradually dry out and become like a brown cap.
Over time, young tsveroyedy leave the pupae, gnaw through the hole and go outside. The first time they eat the foliage, after which they move to other trees.
If the spring is held for a long time not too high temperature, pests can damage 70-80% of buds, if the flowering is weak - up to 100%. If the spring is warm, a smaller percentage of the larvae of the buds is observed. How to deal with the flower beetle on an apple tree will be discussed in the next section.
At the time when the swelling and blooming of the kidneys, it is advisable to carry out shaking. For this you will need a tarp or film. Early in the morning, before the air temperature rose above 10 ° C, the material is spread under a tree and the bugs are shaken off. To do this, use wooden beaters or poles, on the end of which is wound burlap or other soft material. This “stick” stands abruptly, but without applying great force, strike the skeletal branches.
To hold this event later does not make sense, as the beetles fly away as the temperature rises. Beetles that fall on the tarp, poured into a bucket with salted water or kerosene. This procedure is recommended several times.
If your garden has attacked the apple flower beetle, it is important to know how to spray the trees. The most effective way to combat pest is the use of broad-spectrum insecticides.
Processing should be carried out when buds begin to open. Unfortunately, most modern chemicals do not affect the eggs and are not able to destroy the flowering larvae. It is for this reason that re-treatment must necessarily be carried out in July.
To achieve maximum efficiency, it is recommended to change the drug every season, since pests can get used to the same remedy.
Color beetle beetle (weevil): struggle and prevention.Related articles
Apple flower beetle damages the buds of the apple tree. Spraying of trees during the period from bud breaks to bud exposure, during the transition of beetles from wintering grounds to the crown to laying eggs by females, one of toxic chemicals helps: chlorophos at a concentration of 0.2% (20 g per 10 l of water), 0.1% Sevine, 0.15% Phosphamide, 0.15% Trichlormetaphos-3, metaphos at a concentration of 0.3%.
Все это разводится на один литр воды и опрыскивается зараженное дерево.
Также можно воспользоваться другим способом борьбы с огневкой. Это – высокое окучивание. Но данный метод наиболее трудоемкий в использовании.
децис-профи – 0,0005 кг,
Very often, fruit trees and bushes are subject to various diseases, as well as the effects of pests. The main pests of the garden: beetle flower beetle, moth, apple podozhorka. Let's take a closer look at what effective methods exist to combat them.
Apple flowering beetles have few natural enemies. A small number of them are eaten by small birds. Also, pests are killed by parasitic wasps, the females of which implant their eggs in the larvae of the tsvetoeda.In the spring, when the beetles crawl out of their secluded places after wintering, you need to immediately take steps to save the next harvest. Pests can be eliminated without chemicals. You cannot completely get rid of all pests by safe means, but their number can be significantly reduced.
Spring is not only the time of plant awakening, but also of garden pests. In order to preserve the harvest on fruit trees, it is necessary in early spring to take measures to combat the most common garden pest, the apple-flowered beetle.
In the case when after shaking off a tree there are 40 or more beetles, it is necessary to spray the plant with insecticides: Intavir, Kinmiks, or others intended to destroy leaf-eating insects. It can also be treated with Tanrek, which is not washable with water and acts in a wide temperature range. To combat the weevil, it is recommended to do one treatment per season.
Preventive measures against the defeat of plants by the flowering beast should be started long before the budding. First of all, you should clean the trunks of trees from the remnants of dead bark, which serves as a convenient place for wintering pests. This operation allows you to destroy a significant number of beetles, settled to wait out the cold season. But to do this cleaning should literally with the first warm days, otherwise the pest will have time to leave their shelters.
The beetle beetle is called the beetle family of the weevil brownish-gray color with oblique white stripes on the elytra, up to 0.45 cm in size, having an elongated head in a long proboscis. At the end of such a proboscis there is a special gnawing apparatus for feeding on leaves and buds. This gluttonous pest is widespread throughout the entire Nonchernozem zone. But it causes the greatest harm in the northern regions, where effective control of the flower beetle becomes especially necessary. It damages the pest of apples, pears and other fruit trees.
In an integrated garden protection system, the need for spraying is determined not by the number of the pest, but by the force of flowering of the tree. With abundant flowering up to 15% of the remaining ovaries of the total number of flowers will give a full harvest. In this case, the extermination measures can not hold. With weak flowering weevil fight is necessary.
Additionally, you need to conduct an annual cleaning, collection and destruction of the bark, which dries up, that is, dies. Also, it must be remembered that it is very important to dig up the earth until the autumn.
The moth is a caterpillar that eats apple fruits. One such pest can eat up to four apples. Damaged fruit moth fruits fall and rot.
What does an apple blossom tree look like?
If there are apple trees on the plot, then it is necessary to take care of their protection, namely, the destruction of the flowering beetle beetle.
Without the use of chemicals pest control of fruit trees is not effective. For the destruction of adult tsvetoyorad insecticides used a wide range during the blooming of the kidneys. Modern chemicals do not affect the eggs and larvae of pests.
Lime whitewashing can protect against pests.
How to deal with tsvetoyedami without chemicals
Flowerbed on apple bud
If bugs are found in the crown in the summer, then the tree can be treated with toxic chemicals only in the fall. But this must be done, even with a small number of pests. One female tsveroyeda can lay up to hundreds of eggs, and when they are laid, no preparations will work on them. And next spring there will be much more pests in the garden, which will necessarily affect the quantity and quality of the crop.
The next stage of preventive treatment will be whitewashing trunks. Both experts and amateur gardeners have noticed long ago that flower beetles are much less populated with fruit trees, which were whitewashed before the buds swell. To prepare the solution, take 2 kg of fresh lime on a bucket of water. But experienced gardeners sometimes deliberately leave one of the apple trees without whitewashing - to attract beetles and their subsequent destruction.
Adult beetles winter, hiding in bark cracks, under fallen leaves, or simply in the upper layers of the soil. With the first heat, the weevils begin to rise in the crowns and feed on the kidneys, eating out narrow indentations in them, very similar to needle pricks. Often on such kidneys can be observed drops of juice, speaking from wounds - "the kidneys are crying." With the beginning of the outcrop of the buds, the females of the flower beetle gnaw through holes in them and lay there in an egg — one in each bud. The larvae appear after 7 - 8 days and begin to eat the contents of the buds. Affected buds no longer bloom, and dry up, never opened. When it comes to the formation of ovaries, the larvae pupate directly in the damaged buds. Young insects come out during the shedding of excess ovaries and feed on the pulp of the leaves, eating away the “little windows”. In July and August, beetles no longer feed, but begin to climb under the bark, hiding under fallen leaves, in the soil - for wintering. During the season only one generation of tsveroyed develops.
One apple tree consumes from 3 to 10 liters of this composition. It all depends on the age of the tree. Processing should be carried out in warm and clear weather, so that the beetles are the largest number, otherwise they will all be hidden in the cold.
We protect the apple trees from the beetle beetle
A large number of dried buds remaining on the branches of an apple or pear tree testifies to the damage by a weevil. As well as the so-called “flower-eater huts” - glued petals of flowers, which dry quickly and form peculiar brown caps. If such a cap is lifted, there will be a larva of light yellow or white color, and sometimes a brown beetle.
Around the trunks make traps of dry grass, where beetles are arranged for the winter. Late autumn grass is raked and burned.
When leaves and buds appear
In the fight against the pinwort itself, it is necessary to make a solution that consists of:
- An experienced gardener knows how to recognize the appearance of this pest. On the bushes of gooseberry or currant appear red berries, which are entangled in cobwebs. Butterflies that fly out of the ground in early spring lay their eggs in the ovary. Born caterpillars eat green berries. One such larva can eat up to 8 berries.
- You can also prepare a special solution and spray them with apple trees in the same period.
- Spraying trees with chemicals is the most effective measure.
At the base of the shtamb, you can apply glue belts or belts soaked in Carbofos. Pests that accumulate under them, you need to collect and destroy.
Ognevka: control measures
The larvae appear from them in a week and completely eat away the flower bud. Adult beetles gnaw leaves and damage the ovary. At the beginning of autumn the pests hide under the bark and hibernate there. Flower beetles can destroy a significant part of the crop, so you need to fight with them.
Cutting off dried-out buds on low fruit trees will also be useful in the fight against tsvetoedom. The removed buds do not destroy, but put in a jar without a bottom or a sieve, cover with gauze and put in a well-ventilated place. When the larvae in the buds pupate, the reservoir is covered with dense material. By the time the young beetles emerge, the pamples will also fly out at the same time - their parasites, insects resembling a wasp. They have transparent wings and a brown torso. The pamples are very mobile, and when removing the covering material they immediately fly out into the garden. After that, the remaining weevils should be destroyed.
In the autumn it is necessary to collect and burn leaves fallen from the trees, dig up the soil in the garden. Sometimes they also use such a simple trick to combat the tsierouedom: around the shtambas they lay out special piles of leaves that attract the pests to hibernate, after some time they are burned along with the bugs that had gotten there.
Damage to fruit trees by the beetle is especially dangerous in cold springs, when the flowering of trees is delayed, as well as during the years when the apple blossoms are weak. In these cases, the apple flower beetle is able to destroy more than half of all buds, significantly reducing the yield.
How to get rid of the apple moth
And I have these parasites devour daffodils. I'm just in shock. Just brazenly eat flowers. When they eat pistils on flowers of apples or pears, I’m not particularly upset. All the same, there are too many colors, and the ovary will fall off in huge quantities. But who needs gnawed daffodils.
Fitoderm - 0.002 l,
- You can fight the following method. In the autumn period of time or in early spring, after the snow melts, it is necessary to cover the base of the bush with roofing material to the crown. Thus, the butterflies wintering in the soil will perish, as they will not be able to get out into the wild and the berries will remain unharmed.
- 10 liters of water to take:
Karbofos is used to destroy tsieroedov. Spraying is carried out with a 10% solution in the period when a green leaf tip appears on the swollen bud. Such preparations as Decis, Kinmiks and others are also quite effective.
During the period of swelling of the kidneys in the morning at a temperature not higher than 10 degrees, the beetles are shaken off onto a film and poured into a bucket filled with salt water.
apple trees from the flower beater when it is better to process?
The main pest control measures are carried out in the spring, but in the fall some preventive measures can be taken. From under the trees, be sure to collect and burn fallen leaves. Below them can lurk a number of pests that fell from the tree, along with the foliage. Earth under the apple tree to dig up.
The fight against tsvetoedom - not a simple matter, requiring temporary, labor and material costs. Therefore, it is important not to bring the garden to a critical state, but to engage in prevention, restraining the number of pests at the “safe” threshold.
. Looking for a way to paradise.
At the time when the swelling and budding of the buds on the apple trees occur, it is very useful to shake off the beetles to a special bedding, which is placed under the crown. Wooden beaters or poles, wrapped with soft material to avoid damage to the bark, lightly hit the main branches of the tree. From the shaking, the beetles unhook and fall down on the litter, where they lie for some time, pretending to be dead. They are burned with litter or swept into a special container for destruction. Carry out such an operation should be at air temperature below 10 ° C, otherwise the beetles will have time to scatter.
Most other weevil damaged varieties with an average flowering period. In apple trees that bloom earlier, the most dangerous period for destruction is at a time when the beetles are not yet ready to lay eggs. And late blooming varieties - when the eggs are already laid. Particularly massive invasions of weevils occur in those gardens that are located close to forest belts or forests.
Agrees with evelina fruit trees need to process three times. but how the fruits will be tied up is harmful. since they can absorb them
Fight against apple bloom
Bio spark - 0,003 l.
With the onset of summer, these facilities can be removed.
The best effect can be achieved if the same drug is not used annually, but alternated with another effective remedy. In the gardens, where trees are constantly being treated from flowering beetles, pests do not damage the crop.
If the crowns of an apple tree are whitened with lime mortar, the tsier beetles will not inhabit them.
What does a weevil look like?
The flower beetle is a small beetle. Its length is about 0.4–0.5 cm. The color of this insect is dark gray or brown. The main feature of this beetle are 2 white stripes located on the sheaths.
The head of the beetle is oblong. On it is a rostrum, consisting of a long proboscis and mouth. In females, the rostrum is much longer than in males.
Weevil paws have a reddish tint. They have spikes: small at the ends, as well as in the middle and large at the front of the legs.
Additional wings give mobility to an apple weevilI. Thanks to them, he moves around the garden with ease.
Habitat garden pest
In winter, immature individuals hide from the cold in the cracks of bark or under a thick layer of fallen leaves. In the spring, as soon as the air temperature reaches +6 ° C, the beetles leave the wintering grounds.
When the apple blossom beetle awakens from hibernation, the first buds appear on the trees. It is they who are the main source of food for the garden pest awakened from sleep. After the apple tree blooms start laying eggs inside the buds. Each female is able to lay from 50 to 100 eggs!
A couple of days from the eggs of the larvae appear. They eat unblown flowers from the inside, which leads to the emergence of pineal growths and the formation of dwarf fruits. In 10 days, a mature individual grows from the larva. As soon as the beetle strengthens its wings and chitin, it gets out.
Young flower eater eats leaves of trees and hides in the foliage until about mid-summer. It is during this period that beetles gain an enhanced mass gain.
Closer to August pests crawl under the bark of trees and hide there until the beginning of autumn leaf fall. With the onset of cold weather, weevils hid under the bark again or burrow into fallen leaves.
|
<urn:uuid:5a9477f6-ffd4-4e0a-9d66-c85f06a2a891>
|
CC-MAIN-2020-24
|
https://gb.blabto.com/373-apple-blossom.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348509972.80/warc/CC-MAIN-20200606031557-20200606061557-00578.warc.gz
|
en
| 0.942328 | 7,168 | 3.859375 | 4 |
Properties include having an argic horizon, which has a specific cation exchange capacity; a predominantly alic properties zone between 250mm and 1000 mm from the soil surface; and no diagnostic horizons other than an ochric, umbric, albic, andic, ferric, nitic, plinthic or vertic horizon.
Simply put, alisols are poorly drained soils with a dense subsurface clay layer, which causes a relatively high concentration of aluminum ions in the root zone.
There exist mixed forms, for example 'gleyic alisol', that are mainly alisol, but also contain components that are found in gleysols.
Alisols occur mainly in tropical and humid subtropical climates, though a few are found in unglaciated landscapes as far north as Brittany. Compared to Acrisols and Ferralsols, Alisols have much higher-activity clays and are likely to be found on younger terrains or more geologically active regions such as Kyushu and Chugoku.
Alisols are acidic (increased by limited drainage) and therefore need liming, contain few nutrients and therefore need fertilizer, and do not have much surface coherence so are easily eroded.
Aluminium and manganese toxicity is a very serious problem in Alisols, because at the low pH of these soils such generally insoluble metals become soluble and can poison plants which are not tolerant of them. Encyclopædia Britannica mentions oil palm, cotton, and maize (corn) as crops suitable to be grown on Alisols, though most crops require very intensive fertilisation for long-term success.
|
<urn:uuid:e2ffdf78-c98f-4ac7-a641-02bc865b39bb>
|
CC-MAIN-2017-17
|
https://en.wikipedia.org/wiki/Alisols
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122041.70/warc/CC-MAIN-20170423031202-00405-ip-10-145-167-34.ec2.internal.warc.gz
|
en
| 0.944315 | 343 | 3.40625 | 3 |
Tuesday, October 9, 2012
Cookies can be classified into various types based on their lifetime behavior and the domain they are stored for. Major type of cookies are:
Session Cookies: This cookie lives in memory of the client computer and its lifetime depends on the current browser session. If the user closes the browser these cookies are deleted from the client machine. If the user visits the website again after closing the browser these cookies will not be available.
Persistent Cookies: Persistent cookies are the cookies that are stored on the secondary storage of the client machine. These cookies do not depend on the browser session. If the user closes the browser and then access the website again then these cookies will still be available. The lifetime of these cookies are specified in cookies itself (as expiration time). The maximum age of such cookies could be 1 year.
Secure Cookies: These cookies have an attribute for security. there cookies can only be accessed by the HTTPS connections and not
HTTPconnections. The reason for having this type of cookie is that it lessen the chances of cookie stealing/eavesdropping(more on this later in the article)
HttpOnly Cookies: This mode will allow the cookie to be accessed using
Third Party Cookies: First party cookies are the cookies which set the domain of the cookie same as the domain or sub-domain of the website that is being browsed. Third Party Cookies on the other hand are the cookies with domain set to different domain then the website being browsed. These cookies are mainly used for tracking user browsing patterns and/or finding the Advertisement recommendations for the user.
State Management (Session Management)
The state management can be done using cookies. The cookies themselves are very good way to have client side state management that requires the state to e remembered between website visits.
Along with being client side state management, the cookies are also very useful in maintaining the sessions on servers.
Sessionbeing a server side state management technique stores all the state related data on the server. But the server still need to uniquely identify the client to associate the correct session data with it. This is facilitated by
Roles and Membershipand
Web Page Personalization
Web page personalization can also be achieved using cookies. User can set there personalization preferences and these preferences can be saved on server. Using cookies we can identify the same user and then load the personalized version for him.
Cookies are also user to track the user browsing patterns. This is mainly done to identify whether the user is visiting the site for the first time or is he a returning user. Also This is being done to find the Ad recommendations for the user.
at 11:02 AM
|
<urn:uuid:4f01d397-7c4a-4830-95e3-02211a1fc7c2>
|
CC-MAIN-2017-13
|
http://rayaspnet.blogspot.com/2012_10_09_archive.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218205046.28/warc/CC-MAIN-20170322213005-00342-ip-10-233-31-227.ec2.internal.warc.gz
|
en
| 0.905731 | 540 | 3.296875 | 3 |
A spondylolisthesis happens when one of the spine’s vertebrae (bones) slips forward over the vertebra beneath it. Spondylolisthesis occurs most often in the lumbar spine (low back).
Symptoms of Spondylolisthesis
Most patients with spondylolisthesis have no symptoms. When symptoms do occur, they may include the following:
- Pain in the low back, thighs, and/or legs – especially after exercise – that radiates into the buttocks
- Muscle spasms
- Leg pain or weakness
- Tight hamstring muscles
- Irregular gait (walking pattern)
Click below to view a video from our library about this condition.
Types of Spondylolisthesis
- Isthmic spondylolisthesis (51%) is the most common type (Fig. 2). It occurs as the result ofspondylolysis, a condition that leads to small stress fractures (breaks) in the part of the spinal bone called the pars interarticularis. Most cases actually develop before age 9 and are asymptomatic (no pain)
- Degenerative spondylolisthesis (25%) is the second most common form of the disorder. From age and activity, degererative changes occur to the spinal structures, especially the discs. When the discs and joints of the spine wear down, they are less able to resist movement by the vertebrae.
- Traumatic spondylolisthesis (<3%) which an injury leads to a spinal fracture or slippage.
- Pathological spondylolisthesis (<3%) results when the spine is weakened by disease — such as osteoporosis, an infection, or tumor
- Dysplastic (Congenital) spondylolisthesis (21%) results from abnormal bone formation in utero. In this case, the abnormal arrangement of the vertebrae puts the vertebrae at greater risk for slipping
- Post-surgical spondylolisthesis
Grading of Spondylolisthesis
Most spine physicians use the Meyerding Grading System to classify slips. This is a relatively easy system to understand. Slips are graded on the basis of the percentage that one vertebral body has slipped forward over the vertebral body below.
- Grade I: 1-24% of the vertebral body has slipped forward over the body below
- Grade II: 25-49% slip
- Grade III: 50-74% slip
- Grade IV: 75%-99% slip
- Grade V: If the body completely slips off the body below it is classified as a Grade V slip, known as spondyloptosis.
Generally, Grade I and Grade II slips do not require surgical treatment and are treated non-operatively. Grade III and Grade IV slips may require surgery if the spine is unstable and pain is unrelenting.
Imaging is necessary to diagnose spondylolisthesis. Simple x-rays of the lower back are usually adequate to show a vertebra out of place. However, computed tomography (CT) or magnetic resonance imaging (MRI) provides detailed images and may be needed to more clearly see the spinal structures involved.
Non-surgical Treatment. Non-surgical treatment for mild spondylolisthesis is successful in about 75% of cases. Non-surgical treatment may combine the following:
- Relative rest: The patient may be advised to temporarily avoid aggressive activities such as sports.
- Anti-inflammatory medication
- Analgesic medication
- Spinal injections (see transforaminal epidural steroid injection). Under x-ray guidance, strong anti-inflammatory medication (such as corticosteroids) are injected into and around affected spinal nerves. Spinal injections can help reduce inflammation and pain.
- A brace or back support may be prescribed to help stabilize the lower back and reduce pain.
- Physical Therapy: A program of passive therapy and active exercise to help increase range of motion, improve flexibility, and muscle strength.
Surgery. Surgery may be necessary if the vertebra continues to slip, or if pain is not relieved with non-operative treatment and interferes with daily activities. Surgery is successful in relieving symptoms in 85-90% of people with severe symptomatic spondylolisthesis.
Laminectomy and fusion. The most common surgical procedure used to treat spondylolisthesis is called alaminectomy and fusion. In this procedure, the compressed spinal canal is widened by removing or trimming the laminae (roof) of the vertebrae. This is done to create more space for the nerves and relieve pressure on the spinal cord. The surgeon may also need to remove all or part of the vertebral disc (discectomy) and then also fuse vertebrae together. If fusion is done, various devices (like screws or interbody cages) may be implanted to enhance fusion and to support the unstable spine.
|
<urn:uuid:31c08695-1297-4ad5-a124-52ee233664a6>
|
CC-MAIN-2019-30
|
http://vancouverspinedoctor.com/conditions/spondylolisthese/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195528869.90/warc/CC-MAIN-20190723043719-20190723065719-00157.warc.gz
|
en
| 0.900862 | 1,042 | 2.984375 | 3 |
Context: Pre-project 2018
Worldwide, railway companies are being faced with increasing public and political pressure to reduce the environmental impact of their operations, particularly by cutting back on herbicide use. This needs to be done without jeopardising transport and personal safety, however. In addition to a number of other projects with this focus, the SBB (Swiss Federal Railways) has ordered a feasibility study (2nd semester of 2018) on the greening of railway rights-of-way.
A study of the literature revealed this research subject to be technical and scientific virgin territory, although ample experience that could serve as a reference point exists in related fields – viz. tramway greenturfs and the greening of roofs. An expert panel concluded that a greening of rights-of-way could be successful and would indeed offer potential ecological advantages, provided that safety risks were avoided.
The expert panel recommends comprehensive tests in field trials, in-situ under real conditions and ex-situ under controlled conditions. At the sites in question, several treatments will be evaluated in replications via two vegetation surveys per year.
Based on the feasibility study, 81 plant species that were likely meet the safety and ecological requirements of a rights-of-way greening were selected from among thousands of taxons occurring in Switzerland. Taking account of natural plant communities, four mixtures were then created which are now being tested in field trials.
Plant species and monitoring:
- Choice of potentially suitable plant species
- Creation of mixtures based on natural plant communities
- Observation of development via two vegetation surveys per year
After careful consideration, sites were chosen on the Swiss Plateau only, since this region has the highest-density rail network and since – in the event of the project’s successful conclusion – the greening would be implemented in this region first.
Field trials of different design on several sites:
- Experimental trials at three in-situ sites (three plant mixtures)
- Empirical trials at two in-situ sites (one plant mixture)
- Experimental ex-situ trials under controlled and semi-controlled conditions at one site (four mixtures)
Motto: “Sow rather than control”
- Check for successful plant establishment: Do these indigenous plants sown in mixtures establish successfully under special railway rights-of-way conditions?
- Check for successful suppression of competition: If the indigenous plants establish successfully, do they inhibit / suppress the growth of spontaneous vegetation, especially neophytes?
- Clarify safety aspects: If the plant species establish successfully, do they comply with operational safety criteria (height, root depth, accessibility etc.)?
- Identify the evolution of biodiversity: If establishment is successful, can it be assumed that the greening of the railway rights-of-way with indigenous plants will result in the connection of different habitats for indigenous fauna and flora, owing to the corridor effect?
|
<urn:uuid:794b1999-b36e-4fd2-ad68-2ceabf24c6d6>
|
CC-MAIN-2023-14
|
https://www.agroscope.admin.ch/agroscope/en/home/topics/environment-resources/biodiversity-landscape/functional-ecological-compensation/tapisvert.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946584.94/warc/CC-MAIN-20230326235016-20230327025016-00085.warc.gz
|
en
| 0.951294 | 619 | 2.9375 | 3 |
Adolescent Alcohol Use Statistics: Key Findings from the 2000 National Household Survey of Drug Abuse (NHSDA)
Conducted since 1971, NHSDA is an annual survey of the United States population age 12 and older. The survey measures the prevalence of illicit drug, alcohol, and tobacco use in America. In 2000, more than 70,000 people were interviewed, including residents of households, noninstitutional groups (i.e., individuals residing in shelters, rooming houses, dormitories), and civilians living on military bases.
* The National Household Survey of Drug Use defines "binge" use as five or more drinks on the same occasion at least once in the 30 days prior to the survey and heavy use as five or more drinks on the same occasion on at least five different days in the past 30 days.
Substance Abuse and Mental Health Services Administration. (2001). Summary of Findings from the 2000 National Household Survey on Drug Abuse. DHHS Publication Number (SMA) 01-3549. Rockville, MD: U.S. Department of Health and Human Services.
|
<urn:uuid:7ab2f47e-b609-43de-9e56-e1debee69fb8>
|
CC-MAIN-2015-48
|
http://www.cspinet.org/booze/FactSheets/NHSDA2000.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398448227.60/warc/CC-MAIN-20151124205408-00199-ip-10-71-132-137.ec2.internal.warc.gz
|
en
| 0.912703 | 225 | 3.171875 | 3 |
with statement is a powerful and elegant feature in Python that enhances the management of resources and context within code blocks. It provides a cleaner and more efficient way to work with resources that need proper setup and cleanup, such as files, network connections, and database connections. The
with statement, also known as the context management protocol, simplifies resource handling, error handling, and code readability. In this comprehensive exploration, we will delve deep into the world of the
with statement, uncovering its definition, syntax, use cases, and the underlying mechanisms that make it an indispensable tool for managing resources and maintaining code integrity.
with statement in Python is used to create a context in which resources are managed efficiently and automatically. It ensures that resources are acquired before the block of code is executed and released afterward, regardless of whether an exception occurs. The context is created by an object that supports the context management protocol, which involves the use of special methods:
Basic Syntax of the
with context_object as alias: # Code block # Resource usage # Operations within the context # Resource is automatically released
In this syntax,
context_object is an object that supports the context management protocol,
alias is an optional alias for the object, and the code block represents the operations that use the resource. After the code block, the resource is automatically released, even if an exception occurs.
Use Cases and Benefits of the
- File Handling: One of the most common use cases for the
withstatement is file handling. It ensures that files are properly opened and closed, preventing resource leaks and simplifying code.
- Network Connections: The
withstatement is valuable for managing network connections, sockets, and other resources that require proper setup and cleanup.
- Database Connections: When working with databases, the
withstatement can ensure that database connections are established and closed reliably.
- Resource Cleanup: The
withstatement guarantees resource cleanup, eliminating the need for explicit
try...finallyblocks and enhancing code readability.
- Custom Context Managers: You can create custom context managers using classes that define the
__exit__()methods, providing a clean way to encapsulate resource management.
- Thread Safety: The
withstatement helps manage locks and synchronization primitives, ensuring proper thread safety and preventing deadlocks.
- Exception Handling: The
withstatement handles exceptions gracefully. If an exception occurs within the context, the
__exit__()method is called to clean up the resource.
Context Management Protocol and Magic Methods:
__enter__()Method: This method is called when the
withstatement is executed. It initializes the resource and prepares it for use. The return value of this method is bound to the alias specified in the
__exit__()Method: This method is called after the code block completes, whether normally or due to an exception. It is responsible for releasing the resource and performing cleanup operations. It receives information about exceptions, if any, allowing for specialized error handling.
Advanced Concepts and Considerations:
- Nested Contexts: Nested
withstatements allow you to manage multiple resources within a hierarchical structure, ensuring proper resource management even in complex scenarios.
- Resource Management Patterns: Understanding when to use the
withstatement versus other resource management patterns, such as explicit
try...finallyblocks, is essential for writing clean and efficient code.
- Contextlib Module: The
contextlibmodule provides utilities for creating context managers using decorators and generators, further simplifying the creation of custom context managers.
- Inheritance and Context Managers: Context managers can be used within inheritance hierarchies, ensuring that resources are managed properly across subclasses and parent classes.
- Thread Safety and Deadlocks: Proper management of locks and synchronization primitives within context managers is crucial for avoiding threading issues like deadlocks.
with statement in Python is a powerful tool that simplifies resource management, context handling, and error management. By ensuring proper setup and cleanup of resources, the
with statement enhances code readability, reduces resource leaks, and promotes better code organization. Its context management protocol, with the
__exit__() methods, provides a consistent and reliable way to work with resources. As you continue to explore Python’s capabilities, embracing the
with statement will undoubtedly lead to cleaner, more robust, and more maintainable code, especially when dealing with resources that require careful handling and cleanup.
|
<urn:uuid:6e958e7b-80a9-4897-ac9c-656b6cde6293>
|
CC-MAIN-2023-40
|
http://www.rojukaburlu.in/python/exploring-the-power-of-the-with-statement-in-python-context-management-and-resource-handling/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233505362.29/warc/CC-MAIN-20230921073711-20230921103711-00883.warc.gz
|
en
| 0.861497 | 964 | 3.171875 | 3 |
The Shar-Pei is probably among the most ancient of dog breeds. Pottery would suggest that he was present during the Chinese Han Dynasty and more specific references are made to the Shar-Pei during the 13th century. At that time he was used by farmers to guard both houses and livestock. It was believed that his wrinkles and purple tongue had the ability to frighten away evil spirits, making him a very popular breed. It’s been suggested that because the Chow Chow also has a purplish tongue he might share a common bloodline with the Shar-Pei.
Later, the Shar-Pei became a popular fighting dog. His loose skin allowed him to retaliate even after he had been clamped onto by another dog.
After the communist takeover of China, Shar-Pei numbers plummeted. They were considered to be a symbol of an overly decadent lifestyle and were only kept on rural farms and in Hong Kong, which was still part of the British Empire. Matgo Law, who lived in Hong Kong in 1973, took it upon himself to revitalize the breed which was rapidly nearing extinction. He wrote an article which informed Americans how rare the breed was and asked for help in saving it. America heard the call and responded in force, many desired the Shar-Pei simply because it was rare. The Shar-Pei made a stunning turnaround in the years following.
- Weight: 45 to 60 lbs
- Height: 18 to 20 inches
- Coat: Horse, brush or bear
- Color: Any solid color and sable
- Life Expectancy: 10 years
What’s the Shar-Pei like?
The Shar-Pei can be very territorial and suspicious, traits that echo from his origins as a guard dog. He needs to be socialized early and often to control these behaviors. The Sher-Pei will eventually accept new people but he will likely only ever form a strong bond with his family.
The Shar-Pei has a strong will and a desire to be independent. He can live outdoors much of the time but would prefer to split his time evenly between the house and yard.
The Shar-Pei will require only a daily walk to satisfy his exercise demands. After which, he’ll be a great companion for the family. He won’t bark unless he’s playing, or unless he has found something you really want to be paying attention to.
The Shar-Pei can suffer from a wide variety of health problems, including infections of the skin folds. You should keep an eye out for any of the following health concerns:
- The Shar-Pei doesn’t like strangers.
- The Shar-Pei has an independent streak.
- You must clean and inspect the skin folds of a Shar-Pei on a regular basis.
If you have any questions or concerns, you should always visit or call your veterinarian – they are your best resource to ensure the health and well-being of your pets.
|
<urn:uuid:03a5cd7b-e81f-4b41-b40e-99eafe454136>
|
CC-MAIN-2021-10
|
https://www.pethealthnetwork.com/dog-health/dog-breeds/shar-pei
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178375096.65/warc/CC-MAIN-20210306131539-20210306161539-00108.warc.gz
|
en
| 0.981835 | 620 | 2.90625 | 3 |
For Breast Cancer Survivors, Eating Soy Tied To A Longevity Boost
Women with breast cancer sometimes get confusing messages about soy-based foods, including soy milk, edamame and tofu.
On one hand, studies have suggested that the estrogen-like compounds in soy — called isoflavones — may inhibit the development or recurrence of breast cancer.
On the other hand, there's been concern that consuming soy-based foods can interfere with the effectiveness of breast cancer drugs such as tamoxifen.
A new study helps to resolve this question. "Our finding would suggest that soy food consumption does not have a harmful effect," says Fang Fang Zhang, a cancer epidemiologist at Tufts University.
And for some breast cancer survivors, soy seems beneficial. The study tied higher soy consumption to a longer life after breast cancer, especially for women with hormone receptor negative breast cancers — which tend to be aggressive, and don't respond to hormone therapy.
"We found a 21 percent reduction in all-cause mortality among women with the highest dietary intake [of soy], compared to those with the lowest intake," Zhang told us.
The findings are based on a study of 6,235 women with breast cancer in the United States and Canada, all of whom were enrolled in the Breast Cancer Family Registry. The women completed food-frequency questionnaires, so researchers could estimate how much soy they consumed.
This benefit of better survival odds was limited to women in the study with hormone receptor-negative cancers. The researchers found no associations for soy-consuming women who had hormone receptor-positive tumors or those who received hormone therapy.
Research in Asian women has shown that soy can protect against breast cancer. And a 2009 study that included 5,000 Chinese breast cancer survivors concluded that those who consumed the most soy did better in the four years following diagnosis and treatment.
Zhang says that given the evidence from Asia, she wasn't surprised to see a benefit for women in North America, too. Her findings are published in the journal Cancer.
In an accompanying editorial, Omer Kucuk, an oncologist who has studied nutrition and cancer prevention at the Winship Cancer Institute of Emory University, argues that the new data helps answer the question of whether soy is safe for women. "We now have evidence that soy foods not only prevent breast cancer but also benefit women who have breast cancer," Kucuk concludes.
But there are some limitations to the study. For instance, researchers point out that the women who consumed more soy in their study also tended to have higher incomes and healthier lifestyles, factors that can also influence longevity.
And there are other unanswered questions, according to Marian Neuhouser, a registered dietician and nutritional epidemiologist at Fred Hutchinson Cancer Research Center. She says the data from the new study is "a piece of the puzzle."
She points out that the amount of soy isoflavones that the North American women in the study consumed was quite small — less than 2 milligrams a day. "If you compare that to Asian populations that on average consume 40 to 50 milligrams, it's pretty low," she says.
She says it's not clear what the results — in terms of long-term survival — would be if women in the U.S. consumed a lot more.
For now, she says "soy seems to be safe" at the levels women in the U.S. typically consume it, "and it could be beneficial for some women who have had a diagnosis of breast cancer."
Copyright 2020 NPR. To see more, visit https://www.npr.org.
|
<urn:uuid:a4712e80-0f91-46ca-b885-c20ec29d5cff>
|
CC-MAIN-2020-45
|
https://www.wyso.org/2017-03-07/for-breast-cancer-survivors-eating-soy-tied-to-a-longevity-boost
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107876136.24/warc/CC-MAIN-20201021064154-20201021094154-00643.warc.gz
|
en
| 0.961972 | 742 | 2.90625 | 3 |
In the early days of railroading, the job of cleaning up a wreck was usually done by men and horses. The first steam wrecking crane, a relatively small affair with a 20-ton lifting capacity, appeared in 1883. Its maker, Industrial Works of Bay City Michigan, introduced a fully revolving model a decade later. As the product became popular, Industrial Works, now renamed Industrial Brownhoist, and its chief competitor, Bucyrus-Erie of South Milwaukee, introduced larger and larger models to cope with increasing locomotive and car weights. By the World War I era, steam-powered cranes of 120-ton capacity, like our RailKing model, were a common size.
While a wreck train on the way to a wreck had priority over other traffic, cranes were subject to rather low speed restrictions, typically around 35 mph with the boom trailing and 25 mph if the boom was facing forward. The larger hook closer to the cab was actually the main lifting hook, used for locomotives. The hook at the end of the boom was a lower-capacity auxiliary hook, used when more reach was needed. Slings, chains, and spreader bars were used to attach the hook to the car or locomotive being lifted; the hooks were never attached directly. While some cranes were capable of limited self-propulsion, that was only for positioning at a site, not for travel to and from wrecks or jobs.
High quality, traditionally sized RailKing Freight Cars provide detailed bodies and colorful paint schemes for the O Gauge railroader. MTH makes an enormous variety of RailKing Freight Cars, including many different car types and roadnames. No matter what era or part of the country you are modeling, RailKing is sure to have something for you.
|
<urn:uuid:ae89394e-b590-486e-b6c6-42f5796cc39d>
|
CC-MAIN-2022-49
|
https://www.mthtrains.com/30-79101
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711003.56/warc/CC-MAIN-20221205032447-20221205062447-00599.warc.gz
|
en
| 0.978167 | 366 | 3.21875 | 3 |
What is Child Sexual Exploitation?
Child sexual exploitation is a type of sexual abuse which can happen to any child. It happens when grooming behaviours are used alongside the promise of money, gifts, affection, protection or status in exchange for sexual activity with one or more person.
Anyone can be a perpetrator of child sexual exploitation regardless of their age, gender, class or ethnicity. In some cases, perpetrators will use positions of trust to access, or normalise sexual activity with vulnerable children and young people.
CSE can happen both on and offline and is often combined with other forms of abuse including threats, physical violence and psychological manipulation.
In many cases children and young people may respect, trust or bond with their abuser. This can make detection and disclosures of abuse complex because children may not understand or recognise the exploitation as abuse.
|
<urn:uuid:2271a880-1de6-45dd-8c34-8d5151b26fff>
|
CC-MAIN-2021-17
|
https://www.oursaferschools.co.uk/2021/03/18/cse-awareness-day-2021/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038060603.10/warc/CC-MAIN-20210411000036-20210411030036-00297.warc.gz
|
en
| 0.934603 | 168 | 3.46875 | 3 |
Studies of political literacy among children “upholds the basic conclusion that kids tend to have little genuine awareness of political figures, political parties, or the political process.
“But how much more ignorant are kids than the general population? Not much, it turns out. … ‘[T]here is no evidence to suggest that an enfranchised adult population actually knows more than … teenager[s] …’ National political moods, it seems, happen without national political awareness.” Just because people don’t know the details about a subject, Ryan Grim says, it doesn’t mean they don’t have an opinion about it.
source: This Is Your Country on Drugs: the secret history of getting high in America by Ryan Grim
|
<urn:uuid:c04afdac-7f6e-49ef-959a-9967902c0827>
|
CC-MAIN-2019-30
|
http://dareiread.blogspot.com/2010/12/you-can-have-opinion-on-topic-without.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526408.59/warc/CC-MAIN-20190720024812-20190720050812-00076.warc.gz
|
en
| 0.939631 | 159 | 2.703125 | 3 |
Wagonhound Tipi Rings
The tipi was used for shelter and sleeping. Most daily activities occurred outside the structure. A hearth in the center of the tipi was used for heat and cooking in poor weather.
In prehorse times, tipis averaged approximately 12 feet in diameter and poles used in their construction were up to 15 feet long. Eight to 12 buffalo hides were needed for the construction of a tipi. The hides of buffalo killed during the summer were preferred because they were thinner and lighter in weight. A smudge fire was built inside a new tipi, and the smoke was allowed to permeate the leather. This process waterproofed the leather and aided in its preservation.
It has been estimated that there are over 1 million tipi rings in the western United States. As such, they are one of the most common archaeological features to be found in this part of the country. The features at this area have been preserved
Location. 41° 37.883′ N, 106° 17.152′ W. Marker is in Elk Mountain, Wyoming, in Carbon County. Marker can be reached from the intersection of Interstate 80 and Elk Mountain Arlington Road. Touch for map. Marker is in the I80 rest area. Marker is in this post office area: Elk Mountain WY 82324, United States of America.
Other nearby markers. At least 5 other markers are within 8 miles of this marker, measured as the crow flies. Wyoming Winds (within shouting distance of this marker); Wagonhound Rest Area (within shouting distance of this marker); Old Cherokee Trail (approx. one mile away); Old Rock Creek Stage Crossing (approx. 4.7 miles away); Overland Trail (approx. 7.4 miles away).
Categories. • Native Americans •
Credits. This page was last revised on June 16, 2016. This page originally submitted on September 14, 2011, by Bill Pfingsten of Bel Air, Maryland. This page has been viewed 955 times since then and 40 times this year. Photos: 1, 2. submitted on September 14, 2011, by Bill Pfingsten of Bel Air, Maryland.
|
<urn:uuid:9142d91f-2cb3-425c-acde-7d03330f4df0>
|
CC-MAIN-2018-30
|
https://www.hmdb.org/marker.asp?marker=47141
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589350.19/warc/CC-MAIN-20180716135037-20180716155037-00078.warc.gz
|
en
| 0.970204 | 445 | 2.765625 | 3 |
Technology in the Classroom Paying Off
Previously, people used to think of technology in the classroom as a nice benefit. Computers and technological resources could be useful for some special projects, but they could not help improve student achievement and were ultimately costly. But with state and local education budgets under pressure and questions about student achievement front and center, administrators, parents, and teachers are now looking to advanced and increasingly less-expensive technology as a way to help address some of the current issues in education. One school district in particular, the Mooresville Graded School District, in Mooresville, NC stands out as an example of how technology can help improve student achievement in times of tightening budgets
According to the New York Times, “[Mooresville’s] graduation rate was 91 percent in 2011, up from 80 percent in 2008. On state tests in reading, math and science, an average of 88 percent of students across grades and subjects met proficiency standards, compared with 73 percent three years ago. Attendance is up, dropouts are down. Mooresville ranks 100th out of 115 districts in North Carolina in terms of dollars spent per student — $7,415.89 a year — but it is now third in test scores and second in graduation rates.”
How has Mooresville achieved these feats? The answer is technology, but not in the traditional sense of just adding computerized lessons to the curriculum. Instead, it is technology to enhance the fundamentals of education. Here, technology helps teachers enhance their instruction and reach new students. It also helps administrators find cost savings, spot issues, and develop new ideas for efficiency. Technology also allows for better connections between parents and their schools. As Karen Cator, a former Apple executive who is currently a director of educational technology for the United States Department of Education, says “[W]hat we see in Mooresville is the whole package: using the budget, innovating, using data, involvement with the community and leadership. There are lessons to be learned.”
It is case studies like this that the American Legislative Exchange Council (ALEC) has, for years, had model policies to promote the use of broadband throughout the country, to connect public schools to the Internet, and to keep regulations light to ensure that schools are able to adopt technology. As Mooresville demonstrates, technology is not only a nice benefit, it can be an effective tool to improving the U.S. education system.
|
<urn:uuid:653ff9f6-8b84-4d61-b72c-85dbf45239f5>
|
CC-MAIN-2015-32
|
http://www.americanlegislator.org/technology-in-the-classroom-paying-off/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988458.74/warc/CC-MAIN-20150728002308-00307-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.961938 | 504 | 3.3125 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.