text_en
stringlengths
184
648k
uid_prefix
stringlengths
5
11
meta_data
dict
Do you know the difference between letters in Italian and how they are pronounced in Italian? Pronunciation may be hard, but there are various ways how to improve your Italian pronunciation. Mastering pronunciation in a foreign language is arguably the most challenging aspect of learning a foreign language, in this case, Italian. This is because you’re used to pronouncing sounds in a certain way that might be very different from the way sounds are pronounced in Italian. Also, Italian might have sounds that don’t exist in your native language. Thus, you shouldn’t feel frustrated if you can’t pronounce sounds perfectly. We all have the same ”problem” when learning a foreign language. We weren’t born with the ability to pronounce every possible sound. How to improve your Italian pronunciation? There are two skills you need to work on if you want to improve your pronunciation: listening and speaking. Listening is a receptive skill. This means that, by listening, you’re assimilating the pronunciation of words. You don’t necessarily need to pay attention to every single word you hear. Speaking is a productive skill, which means that when you speak, you produce, reproduce, or imitate sounds. This is the most practical way of improving your pronunciation. You need to combine these two skills to improve your pronunciation. Tips to improve your Italian pronunciation Here are some tips for you to improve your Italian pronunciation: - Read our pronunciation guide Check out our detailed article with videos and practical tips. - Listen to Italian Listen to as many Italian songs, podcasts, TV shows, and friends, and watch as many Italian movies as you can. - Listen to our audio course Listen to our audio lessons which will help you improve your listening skills and will make you forget about your native language for a while. - Spot the sounds that you find difficult. Make sure you spot those sounds that you find difficult. Take notes and record those sounds. This will motivate you to improve your pronunciation. - Exaggerate the sounds that you find difficult. When you hear a word or sound you find difficult, don’t just imitate it. Exaggerate it! This way, you’ll push yourself to go further, and next time, it’ll be easier to pronounce it in a more natural way. - Record yourself Record yourself saying words you find easy and then do it with words and sounds you find difficult. Listen to yourself, and spot and improve the mistakes. Practice regularly and be perseverant (and patient! ).
004_1653969
{ "id": "<urn:uuid:a4c79172-677a-48cd-85c6-276a9b4d5d4e>", "dump": "CC-MAIN-2024-10", "url": "https://www.thinkinitalian.com/how-to-improve-italian-pronunciation/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474674.35/warc/CC-MAIN-20240227085429-20240227115429-00277.warc.gz", "language": "en", "language_score": 0.931869387626648, "token_count": 546, "score": 2.53125, "int_score": 3, "uid": "004_1653969_0" }
Have you ever seen your horse sleep and watch their hooves twitching as though they were running through a pasture of daisies? Have you heard them snore or seen them have REM? For most of us horse owners the answers to those questions is yes. So the question is do horses dream? This is a question that has been bandied about for generations. Horses often sleep standing up, but they need to lie down for rest from time to time. Scientists believe that it is when a horse lies down to rest that it is truly in ‘deep sleep. ’ Like humans horses experience rapid-eye-movement (REM) in deep sleep. People dream during REM sleep, and it appears that horses do too. REM is a strong sign that horses dream. Scientists believe that dogs often dream so there is no real reason to not believe that horses dream too. One must ponder what a horse dreams of. Dogs we can see dreaming of chasing a rabbit or a cat. Perhaps horses dream of endless waves of green grass and sparkling streams or of riderless ventures into the world beyond their fence. Our horse filled lives just seem more fulfilled believing that our four legged companions can dream as we do, that they have that outlet. So the next time your horse hits the hay for a little deep sleep let’s hope they dream for science is now uncovering that dreams play a central role in our emotional health, our memory and our learning and could very well do the same for animals. REM sleep is linked to the restoration of mental wellbeing. So dream well our four legged friends, dream well.
009_3782238
{ "id": "<urn:uuid:db01ef1b-0e34-41ad-bba0-626467f11aff>", "dump": "CC-MAIN-2019-09", "url": "https://www.ofhorse.com/view-post/Hitting-the-hay-do-horses-dream", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247489343.24/warc/CC-MAIN-20190219041222-20190219063222-00245.warc.gz", "language": "en", "language_score": 0.9689604043960571, "token_count": 330, "score": 2.515625, "int_score": 3, "uid": "009_3782238_0" }
(February 2007) No Ultracaps In Electric Cars Yet, But Maybe There Should Be from Electronic Design, Feb 15 2007, p. 24 After noting the Chevy Volt, a GM concept car using Lithium-ion batteries, author Tuite cites comments by Maxwell Technologies VP John Miller which suggests that the hybrid can be structured to include Ultracaps (electrochemical capacitors). Supporting the idea is that the cycle life of batteries may be an important factor to consider because of the many partial charge/discharge cycles encountered in driving. Adding Ultracaps to absorb the dynamic cycling and leaving the batteries for deep energy discharges may extend the energy storage portion of the hybrid to 15 years. (Ed. Note: With road experience for a decade coming in for the Toyota RAV4 with Nickel-metal hydride batteries, the 100,000 mile barrier appears to be a virtual wall which has been broken. Because Lithium-ion can add a degree of size reduction, and therefore potentially offer greater range for a given size, the question arises as to the need for greater life than that offered by Lithium-ion batteries. Note that the last two versions of the Honda FCX, fuel cell powered auto have used supercaps instead of batteries. ) (December 2005) Selecting an Ultracapacitor Price reductions of two orders of magnitude in the last 10 years have changed the designer’s choices in dynamic power control. This story identifies The important characteristics of electrochemical double layer capacitors which make them complementary with battery or fuel cell systems, or as stand alone power sources. High rate of charge acceptance, discharge and cyclability all are good characteristics. Utilization in series and parallel opens challenges of discharge characteristics and cell balancing. Often overlooked is the low impedance of the cell which must be taken into consideration when charging. Electronic Products, November 2005, pp. 29-32 (Oct. 2003) Gold is studied as a replacement for carbon in ultracapacitors. Professor Michael Cortie of the University of Technology, Sydney and Dr. Elma van der Lingen from Mintek in Jahannesburg are finding that the ‘gold’ ultra-capacitors did not over heat and could store up to six times the energy of standard capacitors. Gold does not suffer from the high internal resistance that limits carbon-based ultracapacitors. In working with their prototype, the researches used an intermetallic compound of gold and aluminum called purple glory. The aluminum is them chemically removed, thus leaving a sponge of pure porous gold. Because of the holes (pores), there is a very large surface area which is utilized for the rapid exchange of electrical charge. Shield Ultracapacitor Strings From Overvoltage Yet An ultracapacitor connected in series for greater terminal Voltage can suffer damage during charge due to individual cell overvoltage. This story describes the advantages and disadvantages of passive and active Voltage equalization methods to protect each cell in the string. (07-2BD76-13) May 27, 2002, pp. 81-85 T/J Technologies receives $2 million award from U.S. Dept. of Commerce to develop hybrid ultracapcitor/fuel cell power packs for portable electronics. The Company promises to alleviate two key frustrations for users of rechargeable batteries: limited run-time and access to a wall or vehicle outlet for recharging. The hybrid power packs are expected to deliver five times longer run time and be instantly “rechargeable” simply by refueling. (12-01 BD69-12) (02-01-02 BD70-9) Ness Capacitor Co. introduces 2. 7 Volt ultracapacitors. The company says it is the first ultracapacitor family with continuous operating Voltage rating higher than 2. 5 Volts. The NESS 2. 7 V ultracapacitor is said to have the highest capacitance and energy storage densities and the lowest Equivalent Series Resistance of any commercially available components of comparable size and weight. The key to performance is attributed to its porous carbon electrodes. Some targeted markets are for EVs’ and hybrid EVs’ acceleration and braking, industrial actuation and control, wind and fuel cell power conversion, and UPS switchover bridging.
011_617844
{ "id": "<urn:uuid:fd819289-537e-4014-9db1-afb00750d59c>", "dump": "CC-MAIN-2022-40", "url": "https://www.batteriesdigest.com/supercapacitors.htm", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337473.26/warc/CC-MAIN-20221004023206-20221004053206-00683.warc.gz", "language": "en", "language_score": 0.9110037088394165, "token_count": 926, "score": 2.6875, "int_score": 3, "uid": "011_617844_0" }
White Cart Loom Vicky Isley and Paul Smith (United Kingdom Bournemouth University / boredomresearch) White Cart Loom has been produced in response to scientific research looking to interpret and understand data encoded in the biological process of shell formation in the now endangered freshwater pearl mussel. The project connects biodiversity with human creativity and its first expression through programming, with textile designers use of the first programmable machine the Jacquard loom. In Paisley Scotland, this process was used exploring the creative possibilities of the world renowned paisley pattern. Rapid industrialisation of textile production contributed to habitat destruction and freshwater pearl mussels are now locally extinct. Opening a space to reflect on the interaction between industrial processes and sustainability in a world populated by 7. 4 billion humans – each with a strong sense of unique identity – boredomresearch are integrating biology and computation to create a unique pearlescent paisley form for every human alive on earth. In doing so they have re-imagined the paisley pattern as if it had grown in the shell of a freshwater pearl mussel, reconnecting the design with its bio-inspired origins. boredomresearch ask: “Can a digital, data rich, world advance the value of the individual both in terms of human culture and the last surviving representative of an endangered species. ” White Cart Loom is a digital artwork built using real time 3D software, presented in the form of a full size reconstruction of a Jacquard loom, where the Jacquard (the mechanism which reads punch cards to control the raising a lowering of threads), has been replaced by a contemporary computer. A large HD screen is mounted behind a length of white fabric, as though in production. On this screen a digital shuttle shoots back and forth and unique forms, inspired by the paisley pattern and freshwater pearl mussels, are fed in from the top. Once fully in view, each form is released, bursting into life with its unique motion characteristics propelling it in smooth liquid spirals across the screen. Eventually these forms drift from view as new ones are created. The forms are composed by combining geometric elements, following a bio- inspired grammar and nodular construction, with modulated oscillations of scale and rotation. The forms are textured with a pearlescent quality, varying in hue, and include some coloured jewel like elements and occasional glowing parts. Every form created is unique and the process of creation will continue until a form has been created for every human alive on earth on the date of first launch (1 November 2016). The process is accompanied by a mellow and somber generative audio composition, including dark G major 7th and E minor tones, natural motifs and the gentle rhythmic beats of the loom. The structure is illuminated from inside by a caged light, picking out the threads and casting shadows on the surrounding surfaces. boredomresearch is a collaboration between British artists Vicky Isley and Paul Smith, their work benefits from a long lasting fascination in the mechanics of the biological world which they explore using contemporary technology. They transcend boundaries between art, science and society, with previous projects exploring topics including: the intricate biological signatures of neural activity, the frontiers of disease modeling and our cultural obsession with speed. boredomresearch projects open channels for valuable dialogue and engagement between public and scientific domains – including their recent artwork AfterGlow, a new representation of a malaria infection transmission scenario which was awarded the 2016 Moving Image Lumen Prize. Based at the National Centre for Computer Animation, Bournemouth University, Isley and Smith are Co- Founders of BLAST (Bournemouth Lab of Art, Science & Technology) an innovative program of interdisciplinary workshops and eco-action events demonstrating the value of art as a catalyst for negotiating the complexities of rapid, technologically complex, social and ecological change. The artworks of boredomresearch are in collections around the world including the British Council and Borusan Contemporary Art Collection, Istanbul. Recent exhibitions include: TRANSITIO MX_06 Electronic Arts and Video Festival, Mexico City Soft Control: Art, Science and the Technological Unconscious, Slovenia. is an International Conference designed to use art as a catalyst to explore intersections between NATURE, SCIENCE, TECHNOLOGY and SOCIETY as we move into an era of both unprecedented ecological threats and transdisciplinary possibilities. Today Upcoming Events No upcoming events for today 15 Next Events No upcoming events for today
002_4710665
{ "id": "<urn:uuid:27e1b3f1-a35d-4053-b1ba-36b56a517152>", "dump": "CC-MAIN-2020-29", "url": "http://balance-unbalance2017.org/events/white-cart-loom/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657146845.98/warc/CC-MAIN-20200713194203-20200713224203-00319.warc.gz", "language": "en", "language_score": 0.924393892288208, "token_count": 911, "score": 2.609375, "int_score": 3, "uid": "002_4710665_0" }
There is a reason why professional skiers wear protective goggles, and why even beginners are asked to wear some type of eyewear. For one, the ultraviolet light reflected from the snow can lead to sunburn of the cornea. Furthermore, intense reflected light makes it difficult to see the snow-covered surface ahead. This lapse in vision can cause the skier to overlook any bumpy or dangerous terrain ahead. Also, chilly winter air can make the eyes water, which again, makes it exceedingly difficult for a skier to see the path ahead. Anti-fogging Skiing GoggleA goggle with an inbuilt battery-operated fan which is used for removing fog from the lens. More importantly, not protecting your eyes against cold air, snow, and bright light can lead to snow blindness. Wearing simple sunglasses or prescription glass does not provide adequate protection for the eyes, which is why, it is imperative that every skier use skiing goggles. This Buzzle guide for buying the right skiing goggle discusses the features to look for, and the purpose served by each of them. Shape of Skiing Lenses Perhaps the most important feature of a goggle is its lens. During your search, you will come across cylindrical (flat) and spherical lens skiing goggles. Flat Lens Goggles Cylindrical lenses are curved along a single axis. Therefore, the lens has a vertically flat structure and is curved horizontally. Although flat lens skiing goggles are comparatively cheaper than spherical lenses, they provide limited peripheral vision. Secondly, its flat edges also tends to reduce optical quality and makes the viewing window to appear distorted, because the lens allows light to pass through it from the top and bottom of the flat vertical axis. Therefore, since the light is not displaced evenly by a flat lens, its surface points cause blind spots and glare. The shape and limited volume/space between the user's face and the flat lens goggle leads to increased fogging. On the other hand, spherical lens goggles are curved horizontally as well as vertically. Spherical lenses were designed to mimic the curvature of the eyeball, and therefore, provide excellent peripheral vision and a broadened field of view. The curvature of the lens ensures that light reaches the eye at a uniform angle, which prevents the view from getting distorted. This feature also reduces glare because the curved lens causes much of the light to bounce off its surface. Additionally, the extra space between the user's face and the goggle, helps reduce fogging to a large extent. It is because of these advantages that spherical lenses are more expensive as compared to flat lens ski goggles. VLT and Tint of Lenses Visible Light Transmission (VLT) is the percentage of visible light that passes through the lens. The VLT of a lens is determined by its tint. Darker the tint, the lower the VLT and vice versa, which helps in increasing the contract and visibility of the skier. Each lens color offers variable percentages of VLT that range from 0-100% and are accordingly, supposed to be used on sunny or cloudy days. For instance, a skier who wishes keep most of the light out on a bright day, must go in for darker tints, such as mirrored gray and black lenses, that have lowered VLT ranging between 5-30%. On the other hand, in low visibility conditions, such as a cloudy or foggy day, or while its snowing, skiers must opt for tints that increase visibility. Blue-, yellow-, or rose-tinted lenses have higher VLT percentage ranging between 55-90% and let more light pass through the lens. Amber, brown, gold, and p lenses are suitable for moderate light conditions, such as overcast conditions, and help detect shadows and bumps on the snow. Those looking for lenses that can be worn in all types of light conditions, should consider go in for photochromic lenses that automatically adjust their tint and VLT. Number of Lenses Skiing goggles are available in single as well as double lenses. As a matter of fact, double lens goggles are better and more adept at keeping the goggles from fogging. While a single lens goggle is usually made of plastic or polycarbonate. Although this type of skiing goggle shields your eyes from the outer weather conditions, it does not prevent fogging. On the other hand, double lens goggles are made of polycarbonate lenses. The two lenses are separated by an air barrier and are sealed together on all sides with foam. While the inner lens keeps fog at bay, by moderating the heat from the wearer's face and the cold external temperature, the outer lens protects the eyes from the environment. Therefore, the air barrier creates a thermal cushion that prevents cold air from affecting the user's vision. You will also come across skiing goggles with chrome coated or mirrored lenses, which are excellent for reflecting light, thereby reducing glare to a large extent. Secondly, mirrored lens limit the amount of light that can pass through, thereby making such goggles suitable for being used in bright conditions. Once a lens is mirrored, it can be hard to tell the actual color of the lens, therefore, make sure you wear the goggles to check whether you're buying the right colored lens. Make sure you ask the seller for goggles with 100% UV protection. Consider opting for polarized lenses as these provide greater UV protection and reduces glare from the snow and sunlight, which enhancing visibility and contrast even in low light conditions. OTG (Over the Glasses) If you are required to wear prescription glasses, you will need to go in for OTG skiing goggles that are meant to be worn over prescription glasses. These goggles have ample space behind the lens to accommodate glasses, and are thus, comparatively deeper than usual skiing goggles. The goggles have slots on the arms, which are meant for accommodating the arms of the glasses behind them. Make sure that you wear a couple of OTG glasses, and choose one that feels the most comfortable. Frame Size and Fit Not every skiing goggle fits perfectly. For most kids and some adults with small faces, a small framed goggle will do; however, for many, a medium- or large-sized goggle is more suitable. Wear the goggles along with your skiing helmet or cap, to check whether it fits well. Go for a goggle that has a frame that does not pinch or press on any part of your face, and is equipped with an adjustable strap. Another important feature that every good skiing goggle must have is vents. These vents are meant for preventing the lenses from fogging up, and therefore, should be worn and tested before purchase. Secondly, wear the helmet along with your goggle to make sure that it is not blocking any of the vents on the goggle. Lastly, go for goggles with foam inserts as these make the goggles more comfortable to wear and block out cold air and moisture. For greater support and comfort, choose goggles that have a thick strap as these will not rub into your skin or leave pressure marks.
008_6816725
{ "id": "<urn:uuid:98ba67c4-9bcd-45a4-b3ce-5befe0ab4719>", "dump": "CC-MAIN-2016-22", "url": "http://www.buzzle.com/articles/a-guide-for-buying-the-right-skiing-goggles.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049275764.90/warc/CC-MAIN-20160524002115-00228-ip-10-185-217-139.ec2.internal.warc.gz", "language": "en", "language_score": 0.9491977095603943, "token_count": 1446, "score": 2.578125, "int_score": 3, "uid": "008_6816725_0" }
Worldwide broadcasting, at a limited scope, started during World War I, when British and German channels broadcast media communiqués utilizing Morse code. Broadcasters in 1 nation have motives. The examples provided below are not intended to be exhaustive, but are still descriptive. Although television and radio programs do traveling outside national boundaries, in many instances reception by thieves is accidental. But for functions of propaganda, devoting spiritual beliefs, keeping connected with colonies or expatriates, schooling, enhancing commerce, raising domestic prestige, or boosting goodwill and tourism, broadcasting solutions have functioned outside services as the 1920s. International broadcasting is broadcasting that’s intentionally aimed at a foreign, instead of a national, audience. It normally is broadcast by way of longwave, mediumwave, or (more generally ) shortwave radio, however in the past few decades has also used direct satellite broadcasting as well as the net as way of reaching viewers.
008_4009695
{ "id": "<urn:uuid:575ec2de-b8ab-4737-b2d4-c9351825a57b>", "dump": "CC-MAIN-2019-04", "url": "http://www.syvjournal.com/archive/7/41/5251/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583657097.39/warc/CC-MAIN-20190116073323-20190116095323-00470.warc.gz", "language": "en", "language_score": 0.9487770199775696, "token_count": 188, "score": 3.28125, "int_score": 3, "uid": "008_4009695_0" }
Each World of Learning Centres curriculum is designed by our educator to reflect their local environments needs and wants. The curriculum is based around the national Early Years Learning Framework (EYLF). The EYLF guides our educators to design programs that support learning outcomes for children aged six weeks to six years. The framework is based around the theory that children learn best through play based activities. A child’s communication skills, literacy and numeracy and social and emotional development are also recognised through the framework. “Play-based learning is a context for learning through which children organise and make sense of their social world, as they engage actively with people, objects and representations. ” It is our aim to ensure children in our care become: - Successful learners; - Confident and creative individuals, and - Active and informed learners It is our job as educators to ensure programs consider each factor of a child’s early development. Research shows from birth to six years, a child is connected to their family, community, culture and their home. Our educators ensure the each experience is an extension of a child’s home life and their first educators – their family. Through our curriculum, children will be able to learn through three main concepts: Being, Becoming and Belonging. Each environment and learning program ensures children are able to thrive and get to know themselves and others. Children should be confident in learning new skills and meeting new challenges. Throughout the year, children will become more confident as their skills and experiences change. Their understanding and acceptance will grow and evolved through programs designed to encourage active participation. Programs are designed to ensure children form relationships and a sense of belonging to their family, care and education centre and wider community. Each World of Learning facility it specially resourced to ensure each child is encouraged to learn through play. Research shows that children do better in care and education services when parents talk often with educators and become involved. There are number of ways that parents and educators can communicate with each other, rather than relying on the scheduled parent-teacher interviews. At World of Learning, we encourage parents to participate in our programs, allowing them an insight into their child’s day to day activities. Parents are welcome to spend time in the centre and share those special moments with their children. Information regarding your child’s day will be documented daily for you to view. This includes details of sleeping habits, toilet practices, child’s response to the day and any health and safety issues that may have arisen. Our staff will also speak with you informally upon collection of the child or through phone calls if any issues arise during the day. Please do not hesitate to discuss your child at any time with our Educators or Centre Director. World of Learning Centres pride themselves on offering age appropriate resources and materials to ensure your child receives the best opportunities to develop their skills. Each of our services is decorated keeping a child’s home-life in mind. Calming areas and natural play spaces have been created including outdoor areas. The environment in which your child learns is considered the third teacher; alongside parents and educators. Each room is carefully designed by each room’s lead educator to ensure there are organised areas to promote learning. For your convenience a range of services are offered at each Centre including nappies, nutritious meals, courtesy bus services and Outside School hours care. To find out more about each individual World of Learning, please search ‘Find Your Closest Centre.’ Each World of Learning Centre teaches a specialised Kindergarten program to children aged three to five years. Each program is developed in accordance with the Early Years Learning Framework (EYLF) in mind. The program is taught by qualified early childhood teachers including bachelor qualified teachers. Specifically catering to the three to five years age group, each program is aimed at providing children with the skills and knowledge needed for primary school. As part of the program, children engage in play based learning to develop early literacy and numeracy concepts and communication skills which will help their reading and writing ability. Qualified and Caring Educators Each World of Learning educator is employed to ensure your child is cared for while receiving a quality early education. Our staff qualifications range from trainee educator to bachelor qualified. Our educators are equipped to calm even the most challenging situation, such as a toddler tantrum or separation anxiety, by providing consistent and caring guidance and effective methods of communication. All of our educators are passionate about working with and assisting families as children grow to become confident and active learners. Child Development Portfolio A development portfolio documents your child’s journey in our care. Each child receives a personal development portfolio as a record of their achievements at the centre. The portfolio includes a collection of observations, photos, artwork and other examples of the child’s learning and development. For children and families, portfolios can offer the chance to become part of a collaborative process where all contributions are welcomed and add to the understanding of children learning.
002_4682977
{ "id": "<urn:uuid:0e42a19e-66c2-4a9c-95d9-efdf0fa02802>", "dump": "CC-MAIN-2017-43", "url": "https://www.worldoflearning.com.au/curriculum/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823605.33/warc/CC-MAIN-20171020010834-20171020030834-00856.warc.gz", "language": "en", "language_score": 0.9595416784286499, "token_count": 1046, "score": 3.515625, "int_score": 4, "uid": "002_4682977_0" }
Tata Trusts and Harvard University South Asia Institute (SAI) recently embarked on a collaborative journey in knowledge creation and capacity building for social and economic empowerment in India. The 18-month research project titled, ‘Livelihood Creation in India through Social Entrepreneurship and Skill Development’ (beginning October 2015) was the first step in this direction. The project focused on three key areas including rural livelihood creation (emphasis on the handicrafts and handloom sectors); educational, social and economic empowerment of women; and science and technology-based interventions for poverty alleviation. There is consensus that India’s future growth depends in part on addressing the severe current deficit in gender equality. Much work has been done to address this discrimination through legislation, social policy, grass roots organizing, educational targeting, and public sector training. Despite the imperative of higher education as a preparation for engagement in a skill based global economy, only 6% of rural girls make it to college. 46%of Indian girls are still married before they are 18, and 16% experience their first pregnancy before they are 15 years old. At the same time, sexual violence against women continues to be reported at high levels—every third Indian woman between the ages of 15 and 49 years has experienced sexual or physical violence during her lifetime. Women are severely underrepresented in leadership positions in industry, academia, and government. One component of the Livelihood Creation Project—Building Pathways with Women Project (Pathways)—aimed to make an impact on the highlighted issues through three sustained interventions at the educational, social and economic levels. The culminating step in this project focused on economic empowerment of women in India. India’s impressive growth, improved physical infrastructure, strong manufacturing capabilities, and an evolving higher education system, have positioned it as an emerging world leader. With the second-largest population in the world, India generates 14% of the global talent pool; however, India’s women are forced to navigate a familiar—and daunting—set of obstacles and challenges in their search for economic empowerment and professional success. Although the knowledge economy in India has created enormous opportunities, a large proportion of Indian women are still prevented from reaching their full potential in the workforce. The interventions in this area focused on the legal and social reforms for strengthening women’s economic self-sufficiency, legal and financial incentives for generating better opportunities for women, exploring organizational platforms for women’s economic empowerment in India, studying examples of institutions that have achieved considerable success in the economic empowerment of women, and suggesting ways in which they can be scaled up. In a recent feature on NDTV, The Startup Wednesday show explores how women with informal employment often don’t reap the benefits of progressive equality legislation. Eight out of ten working women in urban India are informally employed. The women who work in garment factories, construction sites, as rag-pickers, tailors, and domestic helpers have no social security, no formal places of work and no legal contracts to protect their rights. This feature presents the challenges of home-based working women and startups that are employing and empowering women in India. Watch as experts, entrepreneurs and the working women themselves talk about the issues they face.
008_4342334
{ "id": "<urn:uuid:b9d2e818-a23a-4d0d-8f55-846de4cb5ce8>", "dump": "CC-MAIN-2019-09", "url": "https://mittalsouthasiainstitute.harvard.edu/2017/06/does-the-fight-for-working-womens-rights-in-india-leave-out-informal-workers/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247486936.35/warc/CC-MAIN-20190218135032-20190218161032-00099.warc.gz", "language": "en", "language_score": 0.9448572993278503, "token_count": 652, "score": 2.609375, "int_score": 3, "uid": "008_4342334_0" }
Deoxyribozymes: New players in the ancient game of biocatalysis - Additional Document Info - View All The repetitive and extraordinarily stable polynucleotide chains of DNA serve as an ideal storage system for genetic information. Although it is best known for its helical structure and relatively inert character, in vitro selection can be used to compel DNA to perform a surprising variety of chemical reactions. These artificial DNA enzymes or 'deoxyribozymes' generate large chemical rate enhancements and demonstrate precise substrate recognition, much like their protein and RNA counterparts. Recent studies with these prototypic deoxyribozymes indicate that DNA has a substantial untapped potential for intricate structure formation that could be exploited in novel chemical and biological catalysis. has subject area
006_1779567
{ "id": "<urn:uuid:3ce0b7b9-abcf-4f21-afe4-8d307a0332bf>", "dump": "CC-MAIN-2021-21", "url": "https://experts.mcmaster.ca/display/publication1525989", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989856.11/warc/CC-MAIN-20210511184216-20210511214216-00036.warc.gz", "language": "en", "language_score": 0.9212508797645569, "token_count": 153, "score": 2.703125, "int_score": 3, "uid": "006_1779567_0" }
In General > s. a. topology / CW-Complex; tiling [cellular decomposition of manifolds, including in physics, froth]. $ Topological p-cell: A space homeomorphic to (the interior of) a p-disk. $ Affine p-cell: A bounded convex polygon. $ Finite, regular cell complex: A finite set of non-empty pairwise disjoint open cells, such that (a) The closure of each cell is homeomorphic to a ball and its boundary to a sphere in some dimension, and (b) The boundary of each cell is a union of cells. * Applications: Used in math to define homology theories (simplicial, cubical); For physics, see below. * Relationships: Cell complexes can be PL-manifolds, but it is not possible to check if a given 4D one is a PL-manifold or not. @ General references: Fritsch & Piccinini 90. @ Related topics: Forman Top(98) [Witten-Morse theory]. Properties and Operations on Cell Complexes > s. a. euler number. * Duality: An operation which produces a new cell complex Ω* starting from any given complex Ω, by associating with each k-dimensional cell ω in Ω a (n−k)-dimensional dual cell ω*, whose boundary consists of the duals of all cells which have ω on their boundary. Simplicial Complex > s. a. Link of a Vertex; manifolds; simplex; * Idea: A cell complex in which the cells are simplices; One of the most widely used types. $ Def: A simplicial complex in \(\mathbb R\)n is a collection K of simplices, such that (1) for all σ in K every face of σ is also in K; (2) for all σ and τ in K, σ ∩ τ is a face of both σ and τ, unless σ ∩ τ = Ø. * Abstract simplicial complex: A collection S of finite non-empty sets such that all the non-empty subsets of an element of S also belong to S; If A ∈ S then for all B ∈ 2A with B ≠ Ø, B ∈ S; Every abstract simplicial complex has a unique representation as a simplicial complex, up to a linear isomorphism. * Duality: The dual of a simplicial complex is a Voronoi complex. * And manifolds: The polyhedron of a simplicial complex is a topological manifold iff the link of each cell has the homology of a sphere, and the link of every vertex is simply connected [@ in Thurston 97, p121]. * Saturated: A shellable complex with maximal modular homology. @ General references: in Sakai 13. @ Discrete differential geometry: Kheyfets et al PRD(89); Ambjørn et al NPB(97)ht/96 [4D, integral invariants and curvature]; Korepanov n. SI/00 [moves, curvature]; Alsing et al CQG(11)-a1107 [Ricci tensor]; Thüringen MG13-a1302 [fields and discrete calculus]; > s. a. discrete geometry. @ With constant-curvature simplices: Rovelli & Vidotto PRD(15)-a1502 [and quantization of geometry]; in Han JHEP(16)-a1509 [and approximation of smooth 4-geometries]. @ Related topics: Korepanov JNMP(01)m. GT/00 [invariants of PL-manifolds]; Brown et al DM(04) [k-polynomial and k-fractal]; Mnukhin & Siemons JCTA(05) [saturated]; Hachimori DM(08) [2D, decompositions]; Barmak & Minian a0907 [strong homotopy types]; Miller et al CMP(14) [simplicial Ricci flow]; > s. a. 3D manifolds [torsion invariant]; graph [neighborhood complex]; harmonic maps; morse functions; cover of a topological space [nerve]; random walk [quantum walk]; types of topological spaces [finite]. > Examples: see Vietoris-Rips Complex. > Online resources: see Wikipedia page. And Physics > s. a. computational physics; laplace operator; types of quantum field theories [discrete]. @ Quantum-gravity motivated: Oriti in(07)gq/05; Finkelstein a1108-conf [simplicial quantum dynamics]; > s. a. action for gravity; regge calculus; types of spacetimes. @ Gauge theories: Halvorsen & Sørensen a1107 [Yang-Mills-Higgs action]; > s. a. BF theories; chern-simons theories; solutions of gauge theories; yang-mills theories. – journals – comments – other sites – acknowledgements send feedback and suggestions to bombelli at olemiss. edu – modified 7 feb 2016
009_1071830
{ "id": "<urn:uuid:9fe61a13-a678-49d0-8ed5-cd95c2e8dbb0>", "dump": "CC-MAIN-2019-13", "url": "http://www.phy.olemiss.edu/~luca/Topics/top/cell_complex.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203842.71/warc/CC-MAIN-20190325072024-20190325094024-00499.warc.gz", "language": "en", "language_score": 0.7823587656021118, "token_count": 1140, "score": 2.53125, "int_score": 3, "uid": "009_1071830_0" }
The Cinematographer is, essentially, the filmmaker He shoots the film! In this Film Craft course, Michael Wohl gives you an inside look at the art and science of cinematography. Being a Cinematographer is a lot like being a great musician: You've got to practice lots of technical skills before you can apply them to your art. But once you own these skills, they become your filmmaking palette, enabling you to capture perfection when you're behind the lens! So, who better to learn them from than the renowned filmmaker/educator Michael Wohl? ! Michael starts this example-filled course with a series of tutorials that cover essential techniques. It is here that you learn camera basics. He shows focus techniques and explains the roles of the camera team. From there you learn about exposure, camera sensitivity, lenses and white balance. The next collection of tutorials is where science and art crossfade. Michael explains framing, composition and camera movement. Here, you learn about focal length, depth of field, shooting angles, the rule of thirds, tracking, dolly shots and much, much more. Throughout this course, Michael gives you lots of insider knowledge and shows you actual filmed examples based upon his extraordinary experience both as an award-winning filmmaker and an acclaimed educator. There is no better way to learn the art and craft of cinematography than in this Film Craft series by Michael Wohl! Table of Contents:1. Introduction (02:31)2. Essential Controls (02:38)3. Camera Focus (02:28)4. Focus Techniques (03:00)5. Focus Assist (01:17)6. Exposure & Camera Sensitivity (03:05)7. Exposure & Lenses (03:37)8. Setting Exposure (03:29)9. White Balance (02:46)10. Focal Length (05:06)11. Depth of Field (03:39)12. Vertical Angles (03:08)13. Incorporating Angles (02:46)14. Basic Composition (02:26)15. The Rule of Thirds (01:55)16. Framing People (02:33)17. The Background (03:13)18. Using Depth (01:23)19. Moving the Camera (02:04)20. Pans and Tilts (04:38)21. Handheld Camerawork (01:33)22. Tracking and Dolly Shots (03:37)23. Zooming the Camera (02:41)24. Other Types of Movement (01:37)25. Summary and Conclusion (01:53) What's new in version 2. 0.2 ReleaseApril 10, 2015 Date AddedMarch 24, 2015 Additional RequirementsCompatible with . iTunes account required.
002_3058342
{ "id": "<urn:uuid:48682519-cef9-4641-bf50-0a440b2f30ba>", "dump": "CC-MAIN-2023-40", "url": "https://download.cnet.com/film-craft-105-the-cinematographer/3000-20415_4-76350327.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510219.5/warc/CC-MAIN-20230926175325-20230926205325-00351.warc.gz", "language": "en", "language_score": 0.8544713854789734, "token_count": 596, "score": 3.328125, "int_score": 3, "uid": "002_3058342_0" }
St. Gayane Temple, Echmiadzin Ancient St. Gayane Temple occupies an important place in the list of sights of Armavir. The Temple was built a little later than St. Ripsime's. The temple was erected in 630 on the site of the 4 th - century chapel and to this day is one of the best monuments of Armenian architecture. This is a harmonious laconic and strict building. Its only decor consists of floral ornament on the door and window frames. The interior of the temple is divided into three parts by two rows of columns. The columns support the octahedral drum decorating the temple arch. The hallows of St. Gayane rest in the southern wall of the temple next to the altar niche. The 17 th - century wall frescos depicting the Nativity have survived above the western entrance. In 1652 the temple was capitally renovated and in 1683 they added the gallery for Armenian Church ministers' burial. From the sides the gallery is decorated with graceful belfries. There is a special room in St. Gayane Temple for sacrificial animals slaughter. The ceremony of sacrifice has been practiced by Armenian Church since the time of St. Gregory the Illuminator and is called matakh. It is observed for various occasions: weddings, births and so forth.
011_1316069
{ "id": "<urn:uuid:6b426cd7-bd12-4d95-92c7-c61810bc563a>", "dump": "CC-MAIN-2022-40", "url": "https://www.advantour.com/armenia/echmiadzin/gayane.htm", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335304.71/warc/CC-MAIN-20220929034214-20220929064214-00296.warc.gz", "language": "en", "language_score": 0.9446423053741455, "token_count": 271, "score": 2.6875, "int_score": 3, "uid": "011_1316069_0" }
The name of the mountain is sometimes also written as Monte Cencio. Otherwise "cengio" means "ledge" and indeed the most interesting hike up goes by exposed ledges. Big portions of text on this page were written by Chaberton - who temporarilly left SummitPost and is now back again with us. In the World War I the frontline came from Monte Pasubio, over Monte Cimone, across Val d'Astico on Asiago plateau and went further into Lagorai mountains and Dolomites. The high edge of Asiago plateau was very important, dominating Val d'Astico. Until 1916 Italian army was holding Monte Cengio, but then in June 1916 lost it during the fierce Austro-Hungarian attack called Strafexpedition, having severe casualties. Later Austro-Hungarian army was not able to penetrate into the plane of river Po and Italians regained the summit. Most of the fortifications which can today be seen, were build in 1917. The summit of Monte Cengio is today proclaimed as "Zona Sacra alla Patria" - a sacred area. By a big summit cross there's a memorial plateau where commemorations are held. A monument and chapel are also above the parking place. The summit rock of Monte Cengio is also called "Il Salto del Granatiere" - in the last, desperate combat soldiers of Granatiere squad (from Sardinia) jumped over the cliffs, if possible taking with them a nearby Austro-Hungarian soldier. More heroic and touching stories are being told from those times. Here is another story: The overwhelmed crew on Monte Cengio continued to resist after the grenadier Samoggia Alfonso returned from headquarters. He was sent there to ask for reinforcements, but got none. On his return to Monte Cengio he was deadly wounded. Before he died he sent to his officer, Lieutenant Joseph Verdecchia, a "sublime lie": "Lieutenant, the reinforcements are coming, resist to death. " From the times of World War I another place is famous. North of Monte Cengio there are the remains of a big stronghold, one of many which were build along the border between Italy and Austro-Hungarian Empire. Forte Corbin, 1077 m, was built between 1906 and 1914 and was then also partly destroyed and abandoned during the war. Today it's a private property, there's a restaurant and a small museum. Guns of. . . Wood? In 1916, during the so-called Punitive Expedition of the Austro-Hungarian army against Italy, this fort, defended by a handful of Italian soldiers, fell into Austrian hands. His guns, at that juncture, did not fire a single shot to defend Italy, because they were of. . . . . wood! Shortly after the outbreak of war with Austria, given the distance from the front lines and the chronic shortage of artillery of the Italian army, the Fortress of Corbin was unarmed, his guns sent to the front and replaced with wooden poles painted. If this gambit worked from a tactical standpoint, the Austrians, believing still armed, continued to bomb (The 381 mm mortar. , Named "Barbara", fired fifty bullets on a fortress completely disarmed), from a strategic point of view turned out to be a huge mistake. In times of need, when its guns were supposed to defend Italy from the Austrian offensive, all was quiet! It was just a huge box of concrete and useless. |The visit of the ruins of the fort is very interesting, also from the scenic, is in fact the beautiful view enjoyed from the top Corbin.| In 1969, in the ruins of the fortress, was shot a beautifully film by Ermanno Olmi: "The recoverers. " Which tells the true story of the poor mountain people, who, after the war, risking their lives, went to recover precious metals from the debris of war. It was a mighty Austro-Hungarian army's offensive against the Italian army, which, until then, had conducted eleven (bloody and unproductive) offensives on the Isonzo front. It was named "Strafexpediton", to punish the Italians of the turnaround. They were in fact allies (Triple Alliance) with Germans and Austrians, but after a period of no-war, a conflict already began, they allied with the English and French. In the night between 14 and 15 May 1916, a heavy bombing stage was Strafexpedition or "Punitive Expedition", the great offensive on the plateaus of Trentino that the Austro-Hungarian command planned for over a year. The Italian army, surprised lines of mostly offensive was repulsed all along the seventy miles, and invested from the Eleventh and Third Austro-Hungarian Army. The folding Italian clung to some of the cornerstones areas, as the Pasubio and Passo Buole, also known as the "Thermopylae of Italy". The breakthrough began in crisis around the defensive system, allowing the Austrians to occupy Asiago and Arsiero. In those days the Italian troops were preparing a new defensive line back from the eleventh, in the field of Monte Cengio, was developed between the tip Corbin and Mount Lemerle, east of the country Cesuna. Initially, the entire sector was defended by only one brigade: The "Grenadiers of Sardinia". On 28 May 1916, after a brief resistance because of the few troops available, the fort Corbin was lost (which was absurdly disarmed of his guns). On May 29, failure of the repeated Italians counter attacks, to regain the fort, began the fighting for the upstream Cengio. The grenadiers of Cengio, reinforced by other departments gathered at the beautiful and good and partly disbanded after the failed counterattack at Corbin, resisted until the morning of June 3 when, after a furious melee in the trenches and tunnels, run out of ammunition, last survivors retreated to Rogue Valley. in the bloodiest phase of the Battle of Monte-Cengio Cesuna. The Grenadiers are almost completely surrounded, the ammunition scarce, there are no adjacent units in a position to intervene to help. The Grenadiers counterattack with bayonets, rifles as clubs seek, throw stones, and engage in furious combat, rather than be taken prisoner, clinging closer to the Austrian and rush from the spur that will be called "The Leap of Grenadier ". " Lost the top, the entire defensive line was now clinging to the edge of the southern basin of Asiago; last bulwark against the spread of the Austro-Hungarian troops in the plain Vicentina. But the stubborn defense to the last of the grenadiers and infantry brigades "Liguria and Catanzaro" throughout this area, allowed the Italian army to gain time, to flow by reinforcements from the Isonzo, from the rest of Italy and even Libya and Albania. After June 6 the Austrian offensive began to lose strength, and for the difficulty of supplying the troops too advanced, for what counters sie Italians, increasingly urgent and effective. The Monte Cengio and the Fort Corbin returned so under Italian control, becoming part of the defensive line. The field of Cengio was powerfully fortified, becoming one of the cornerstones of the Asiago Plateau front, and remained in Italian hands until the end of the war. Just after you deter westwards from the road Piovene-Rocchette - Asiago, you can choose also a road, which goes over the plateau to Forte Corbin. All these roads over the plateau are very nice for biking. What To Do There? A longer hike is possible if you park on one parking place more towards the east. From there the military path goes all the time by the southern edge of the plateau, mostly by ledges. Below the last parking place it joins the path, described above. For that hike you'd need 1 h on top and one hour back. Several years ago I saw in the cliffs below the ledges path several climbers. In those rocks it looks there are short and appealing climbs. The third outdoor option of Monte Cengio is a bike tour. All the roads on Asiago plateau are great for biking, so in the area of Monte Cengio you can for example combine in one tour a visit of Monte Cengio and Forte Corbin or extend the tour even more towards the east. When To Come? On Monte Cengio you can come in almost any time of a year. In winter on Asiago plateau there's usually a lot of snow, so make an inquiry in Asiago tourist office if the road is cleaned. Otherwise in winter many roads on the plateau are converted into cross country ski tracks. External Links> Magico Veneto - Monte Cengio (in Italian) Your Help Is NeededPlease add additional information: > Of climbing routes in the walls of Monte Cengio. > Any winter experience of that area?
000_3438225
{ "id": "<urn:uuid:ad44c260-5f2a-4fab-8fa9-624a35d32bfe>", "dump": "CC-MAIN-2017-30", "url": "http://www.summitpost.org/monte-cengio/789682", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426133.16/warc/CC-MAIN-20170726102230-20170726122230-00530.warc.gz", "language": "en", "language_score": 0.9678121209144592, "token_count": 1901, "score": 2.90625, "int_score": 3, "uid": "000_3438225_0" }
- This optional theme considers urban environments (cities) as places of intense human interactions. - They are focal points of production, wealth generation and consumption. - Cities share common characteristics and processes irrespective of the national level of development. - They show diversity in patterns of wealth and deprivation, which can result in conflict. - Transport improvements have led to rapid growth and shifts in population and economic activities, which produces stresses and challenges for planners. - This theme will also explore ideas of sustainability, where a city is regarded as a system, with inputs and outputs that need to be managed. - At least two case studies should be used to discuss the idea of sustainable city management and the urban ecological footprint. - At least one case study of socially sustainable housing, environmentally sustainable pollution management and the control of rapid city growth from in-migration needs to be evaluated. - These case studies will take up at least one third of the teaching time on this unit. The definitions of the terms used in studying this theme, urban environments, vary from one source to another. To avoid confusion, the following definitions are used and expected of students. Brownfield site this refers to abandoned, derelict, or under-used industrial buildings and land, which may be contaminated but has potential for redevelopment. Counter-urbanization a process involving the movement of population away from inner urban areas to a new town, a new estate, a commuter town or a village on the edge or just beyond the city limits / rural urban fringe. Re-urbanization the development of activities to increase residential population densities within the existing built-up area of a city. This may include the re-development of vacant land and the refurbishment of housing and the development new business enterprises. Suburb a residential area within or just outside the boundaries of a city. Suburbanization the outward growth of towns and cities to engulf surrounding villages and rural areas. This may result from the out-migration of population from the inner urban area to the suburbs or from inward ruralurban movement. Sustainable urban management strategy an approach to urban management that seeks to maintain and improve the quality of life for current and future urban dwellers. Aspects of management may be social (housing quality, crime ) economic ( jobs, income ) and environmental ( air, water, land and resources). Urban sprawl the unplanned and uncontrolled physical expansion of an urban area into the surrounding countryside. It is closely linked to the process of suburbanization. For all sections of this optional theme (unless stated otherwise), two case studies of cities/large urban areas must be studied in two countries at contrasting levels of development. For both introduction and review, go to the BBC Bitesize site on Urban Environments You might also consider a visit to the URBAN EARTH project.
004_7364302
{ "id": "<urn:uuid:e3b92545-7084-400d-aa8b-866c141fa99f>", "dump": "CC-MAIN-2018-17", "url": "http://share.nanjing-school.com/dpgeography/hlsl-common-options/urban-environments/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947822.98/warc/CC-MAIN-20180425135246-20180425155246-00452.warc.gz", "language": "en", "language_score": 0.9161563515663147, "token_count": 580, "score": 3.703125, "int_score": 4, "uid": "004_7364302_0" }
The grainy image said to show Hitler with his lover [Globo] The evil dictator fled to Paraguay, via Argentina, before settling in a small town in the state of Mato Grosso, Brazil, according to a shocking new book. Hitler is said to have used the assumed name of Adolf Leipzig and was known to the 12,000 locals in Nossa Senhora do Livramento as “the Old German”. The man at the centre of the controversial claim is pictured, two years before his death in 1984, posing happily with his black girlfriend Cutinga.Simoni Renee Guerreiro Dias, who wrote Hitler in Brazil – His Life and His Death, claims he was in the area hunting for buried treasure using a map given to him by friends withing the Vatican. She insists that Hitler was using his lover Cutinga to hide his true identity as a vile Aryan supremacist. Simoni, a Brazilian jew, refuses to accept that the Fuhrer shot himself in his Berlin bunker on April 30 1945. She is demanding that Leipzig’s remains be exhumed and his DNA tested against living relatives of Hitler. She told local journalists: “I just laughed at first, I thought it was a joke. Today I’m convinced it is true and Adolf Hitler didn’t end up here by chance. ” Simoni spent two years in the small town near the Bolivian border, which was founded during an 18th century gold rush, investigating her oddball theory. She has linked the Fuhrer’s alleged arrival in the area to a Vatican offer of ownership rights over buried Jesuit treasure in a cave near his adopted home. And she claims that he chose the surname of Leipzig because it was the birthplace of Hitler’s favourite composer, Bach. Hitler addresses a Nazi rally in 1944 [Express Archive] Her suspicions about Adolf Leipzig increased after she Photoshopped a mustache onto the grainy picture she obtained of him and compared it to photos of the Nazi leader. According to Simoni, an unidentified Polish nun recognised an elderly man due to have an op at a hospital in Cuaba in the early eighties as Hitler and demanded he leave – but was reprimanded by a superior who claimed he was there on Vatican orders. Conspiracy theorists have long argued Hitler escaped from Germany and fled to south America, following fellow Nazis Adolf Eichmann and Josef Mengele. This theory became the centre of a fresh row last year when two British authors were accused of plagiarism by a journalist in Argentina. Gerrard Williams and Simon Dunstan claimed in a 2011 book Grey Wolf: The Escape of Adolf Hitler, that the Fuhrer fled with his mistress Eva Braun to Patagonia and had two daughters before dying in 1962 aged 73. The book was later made into a documentary film. Argentine journalist accused the British pair of using his research to substantiate claims made in the book, a charge Williams and Dunstan denied. The claims about Hitler’s life in Argentina were ridiculed by historian Guy Walters, who described them as “2,000 per cent rubbish” when the book came out. He added: “It’s an absolute disgrace. There’s no substance to it at all. It appeals to the deluded fantasies of conspiracy theorists and has no place whatsoever in historical research. ” Academics in Brazil have also rubbished the theory Hitler lived and died in Nossa Senhora do Livramento. Candido Moreira Rodrigues, a history professor at Mato Grosso’s Federal University said: “There’s nothing new in people who claim to be historians coming up with the most far-reaching theories about Hitler supposedly living in south America and subsequently dying in one of the countries in this region. ” Tens of thousands of Nazis escaped after the war, including the notorious Adolf Eichmann and Josef Mengele. Investigators probing Hitler’s demise were hampered by the lack of any physical evidence for his death. Fantasists were given added ammunition he didn’t die in his Berlin bunker when 2009 DNA tests on skull fragments found near the bunker and believed to be his, turned out to belong to a woman. Rochus Misch, a former bodyguard of Adolf Hitler who has been named as the last man to see the Fuhrer alive during his final hours in Germany, died last September aged 96. Misch, who lived with Hitler and his mistress in their underground refuge as the allies closed in, told before his death he saw Hitler slumped with his head on the table after hearing a gunshot behind his closed door.
010_5102298
{ "id": "<urn:uuid:91a8f179-003c-4aad-8a4c-b016517b7daa>", "dump": "CC-MAIN-2019-30", "url": "https://www.thetrentonline.com/incredible-photo-proves-adolf-hitler-lived-95-brazilian-lover-look-10/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526931.25/warc/CC-MAIN-20190721061720-20190721083720-00391.warc.gz", "language": "en", "language_score": 0.9766062498092651, "token_count": 985, "score": 2.578125, "int_score": 3, "uid": "010_5102298_0" }
Children who are a healthy weight are more likely to maintain a healthy weight as adults. Here’s how to help your child build healthy habits without hurting their self-esteem. Weight can be a tricky subject for parents to discuss with their children. This is largely because weight, though a physical issue, often has a significant impact on mental health, as well. Accordingly, many parents have a difficult time striking the right balance between instilling healthy habits and protecting their child’s self-esteem. What’s more, it can be difficult to pinpoint a “healthy weight” when a child is young, which only adds to parents’ confusion. As a rule of thumb, parents who are concerned about their child’s weight should speak to their child’s pediatrician before taking any drastic action. That said, there are several straightforward steps parents can take to ensure their child has the best chance of maintaining a healthy weight without significant intervention. 1. Make decisions based on a growth chart, not just BMI. A person’s body mass index (BMI) is calculated by dividing their weight in kilograms by their height in meters squared. BMI is the most common way to screen for healthy weight in children over the age of two, but it’s also somewhat controversial — especially for children under the age of six. A 2017 study even found that BMI was a poor predictor of body fat percentage and total fat in children under nine. As such, it’s wise to look at both your child’s BMI and their growth chart. At your child’s checkups, their doctor will plot their height and weight against the average growth of children their age, but rather than drawing definitive conclusions based on the percentile your child falls in, be sure to focus on any changes on their growth chart. If your child has been at the 75th percentile for years but suddenly shoots to the 95th or the 25th percentile, that should raise some red flags. If they keep growing around the 75th percentile, there’s usually no reason to worry. 2. Divide food and nutrition responsibilities strategically. Satter’s division of responsibility in feeding, a mealtime framework developed by registered dietician Ellyn Satter, is a great way to understand parents’ roles in helping their child develop healthy, positive eating behaviors. The framework is based on the idea that children will naturally obey their body’s hunger and fullness cues as long as they’re set up to do so. According to this framework, a parent is responsible for determining what, when, and where their child eats, whereas their child is responsible for deciding how much and whether to eat. Trying to control the amount your child eats can lead to increased pickiness, overeating, refusal to eat, or the desire for what is perceived to be “forbidden food. ” 3. Encourage active play. One of the best ways to help your child maintain a healthy weight is to encourage them to get outside and engage in active play. Physical activity is a vital component of healthy development, providing benefits for the body and mind alike. Start by creating plenty of opportunities for your child to play, with the end goal of finding a handful of activities that they’ll want to return to again and again. Whether it’s jogging, playing on a sports team, or taking a dance class, the best activity for your child is one they enjoy doing. Finding a Partner in Your Child’s Health The premier independently-owned pediatric office in Beverly, Massachusetts, Kids’ Health is dedicated to helping your child reach their best physically, emotionally, and academically. Issues as sensitive as your child’s weight and eating habits are complex, and require a truly holistic approach — the approach that we take at our practice. To make an appointment, contact us today. Originally published by Kids' Health on March 10, 2020
011_4988703
{ "id": "<urn:uuid:0f5a80da-d721-4cbe-9871-0eed59b8ab3f>", "dump": "CC-MAIN-2022-40", "url": "https://u12know.com/stages-in-life/Family-with-Young-Children/blog/2020/November/Is-Your-Child-a-Healthy-Weight", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336921.76/warc/CC-MAIN-20221001195125-20221001225125-00494.warc.gz", "language": "en", "language_score": 0.9655506014823914, "token_count": 835, "score": 3.546875, "int_score": 4, "uid": "011_4988703_0" }
Where there is a Will, there is a Way Message by Dr Kerim As 200 world leaders gather at the Climate Change Conference 2015 (COP21) in Le Bourget, France, we are starting to experience the true meaning of the saying “Where there is a will, there is a way. ” At the onset of the conference, it is crucial to keep in mind that the political will of nations in reducing greenhouse gas emissions, fossil fuels and global warming is of essential importance. The main goal in our strives to adequately addressing climate change is both creating legally bind treaties but also precise measures that will aid and stimulate innovation and new technologies. Such a measure was implemented by Mr. Bill Gates yesterday, initiating a global fund for the financial support of clean energy technologies and development. Also, the Prime Minister of India, Mr. Narendra Modi revealed the start of a Solar Power Alliance alongside the support of France and other nations in providing alternative and innovative ideas for supplying power and electricity to communities. Such bold and effective measures can eliminate skepticism and can create progress on the ever important question on climate change. The indispensible role of the United Nations in the entire process, as well as our endurance and determination which the Secretary General Ban Ki-moon and I showed during the 62nd Session of the General Assembly as well as other presidents did in the sessions after, definitely paid off as we see in the initial talks at the Paris Conference. Let these goals and visions serve as guidance for a successful conference and even more effective outcomes for our environment in the days that follow. 1 December 2015
005_5394197
{ "id": "<urn:uuid:375f6b76-5af8-4e1c-829d-218992e92e85>", "dump": "CC-MAIN-2018-22", "url": "http://srgjankerim.com/new-horizons-messages-ns_article-cop21start.nspx", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865702.43/warc/CC-MAIN-20180523180641-20180523200641-00324.warc.gz", "language": "en", "language_score": 0.9528982639312744, "token_count": 325, "score": 2.8125, "int_score": 3, "uid": "005_5394197_0" }
Robots at war can be a movie title a science fiction one sadly its not, robots at war is a reality that is taking place now in Iraq and Afghanistan. P.W. Singer the author of Wired For War discusses the issue of the existence of robots at war in Iraq and Afghanistan he talks about the advantages and disadvantages. The benefits are saving lives and preventing critical medical cases while the nuisances are low morality and injustice to the fighting opponent, Singer clarifies his argument and says “Replacing men with machines may save some lives, but will lower the morale and psychological barriers to killing. ” For example, if a massacre occurred who would hold responsibility for it the robots or the creators? The answer most probably is not pleasing or fair; if this does not put our “ethical system” on the judgment scale then what would. The world has reached to its lowest conditions, evolution is no more the label of humanity it is the label of inhumanity and injustice. A year or two ago when the movie Iron Man came out starred by Robert Downey Junior where he played the role of a millionaire who creates a warrior robot and helps the civilians of Afghanistan and save them from the American troops. It was exciting to imagine how cool would it be to have a robot warrior but since it is a fact now the idea lost its glamour because it made war easier to start and more accessible because of the limited human losses it pervades for the owners of the robots. Robots at war would be acceptable if both fighting countries have access to the technology this way its usage will be justified and fair. Till the time when all countries at war have access to robot warriors it is not tolerable to allow some countries to have the upper hand and the right to kill and destruct an unarmed country. It is unethical to value a human life over another all lives are precious and it is our responsibility as intellects to prevent any acts of injustice to occur.
010_3683296
{ "id": "<urn:uuid:a9ff3073-f73a-4962-9198-14873ddc0958>", "dump": "CC-MAIN-2019-18", "url": "https://fifihassan.wordpress.com/2009/11/09/robots-at-war-the-new-battlefield/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578582584.59/warc/CC-MAIN-20190422195208-20190422220146-00011.warc.gz", "language": "en", "language_score": 0.9478598833084106, "token_count": 395, "score": 2.546875, "int_score": 3, "uid": "010_3683296_0" }
Prostatitis is swelling of the prostate gland. Prostate tissue becomes inflamed. This problem can be caused by an infection with bacteria. Acute prostatitis starts quickly and chronic prostatitis lasts for 3 months or more. Ongoing irritation of the prostate that is not caused by bacteria is called chronic nonbacterial prostatitis. Men age 50 or older who have an enlarged prostate have a higher risk for prostatitis. The prostate gland may become blocked. This makes it easier for bacteria to grow. Any bacteria that can cause a urinary tract infection can cause acute bacterial prostatitis. Infections spread through sexual contact can cause prostatitis. These include chlamydia and gonorrhea. Sexually transmitted infections (STIs) are more likely to occur from: - Certain sexual practices, such as having anal sex without wearing a condom - Having many sexual partners In men over age 35, E. coli and other common bacteria most often cause prostatitis. This type of prostatitis may begin in the: - Epididymis, a small tube that sits on top of the testes - Urethra, the tube that carries urine from your bladder and out through the penis Acute prostatitis may also be caused by problems with the urethra or prostate, such as: - Blockage that reduces or prevent the flow of urine out of the bladder - Foreskin of the penis that cannot be pulled back (phimosis) - Injury to the area between the scrotum and anus (perineum) - Urinary catheter, cystoscopy, or prostate biopsy (removing a piece of tissue to look for cancer) Symptoms can start quickly, and can include: - Flushing of the skin Symptoms of chronic prostatitis are similar, but not as severe. They often begin more slowly. Some people have no symptoms between episodes of prostatitis. Urinary symptoms include: - Blood in the urine - Burning or pain with urination - Difficulty starting to urinate or emptying the bladder - Foul-smelling urine - Weak urine stream Other symptoms that may occur with this condition: - Pain or achiness in the abdomen above the pubic bone, in the lower back, in the area between the genitals and anus, or in the testicles - Pain with ejaculation or blood in the semen - Pain with bowel movements If prostatitis occurs with an infection in or around the testicles, you may also have symptoms of that condition. During a physical exam, your health care provider may find: - Enlarged or tender lymph nodes in your groin - Fluid released from your urethra - Swollen or tender scrotum The provider may perform a digital rectal exam to examine your prostate. During this exam, the provider inserts a lubricated, gloved finger into your rectum. The exam should be done very gently to reduce the risk of spreading bacteria into the blood stream. The exam may reveal that the prostate is: - Large and soft (with a chronic prostate infection) - Warm, soft, swollen, or tender (with an acute prostate infection) Urine samples may be collected for urinalysis and urine culture. Prostatitis may affect the results of the prostate-specific antigen, a blood test to screen for prostate cancer. Antibiotics are often used to treat prostate infections. - For acute prostatitis, you will take antibiotics for 2 to 6 weeks. - For chronic prostatitis, you will take antibiotics for at least 2 to 6 weeks. Because the infection can come back, you may need to take medicine for up to 12 weeks. Often, the infection will not go away even after taking antibiotics for a long time. Your symptoms may come back when you stop the medicine. If your swollen prostate gland makes it hard to empty your bladder, you may need a tube to empty it. The tube may be inserted through your abdomen or from inside your body. To care for prostatitis at home: - Urinate often and completely. - Take warm baths to relieve pain. - Take stool softeners to make bowel movements more comfortable. - Avoid substances that irritate your bladder, such as alcohol, caffeinated foods and drinks, citrus juices, and hot or spicy foods. - Drink more fluid (64 to 128 ounces per day) to urinate often and help flush bacteria out of your bladder. Get checked by your provider after you finish taking your antibiotic treatment to make sure the infection is gone. Acute prostatitis should go away with medicine and minor changes to your diet and behavior. Acute prostatitis may come back or turn into chronic prostatitis.
002_4713032
{ "id": "<urn:uuid:270ccf70-9b71-4399-8342-4f0af764d599>", "dump": "CC-MAIN-2020-29", "url": "https://harbinclinic.com/term/prostatitis", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655880616.1/warc/CC-MAIN-20200706104839-20200706134839-00121.warc.gz", "language": "en", "language_score": 0.918071985244751, "token_count": 1007, "score": 2.765625, "int_score": 3, "uid": "002_4713032_0" }
Sea level rise coordinator for the Florida Fish and Wildlife Conservation Commission and Florida Sea Grant, spoke in a Friday morning session of an environmental conference on the University of Florida campus. What does a "Sea level rise coordinator" actually do? Just how do you coordinate sea level rise? Coordinate it with what or whom? Does she coordinate rows of citizens on the beach commanding the sea to retreat, like latter-day Canutes? Never mind, I'm done wonderin', just as I've ceased wonderin' what a "Climate Change Officer" does for a local authority - anti-rain dances? When asked about how species in Florida are affected, Gray said she believes they are at a uniquely high risk, due to the state’s sloping land and problems with rising sea levels. “The average person can do so much,” she said. “Recycle everything you can; treat every bit of waste as if it was a resource to be used over again instead of creating new. ” Gray recommends restoring your yard with native species to help create a good environment for the species already there. She also said people who are more inclined toward activism can participate in different campaigns and donate money. "Sloping land" creates a risk? It only creates a risk if you're on roller skates (no brakes). WRT sea-level, it only creates a risk if it's sloping downwards, away from the sea. Then you've got a real problem (unless you're Dutch of course). If it slopes upwards then you can watch the breakers in safety and comfort. “The average person can do so much,” she said - how many "average people" are there in Florida? Recycle that bag and save a frog - simple really. How does "restoring your yard with native species" help to "create a good environment for the species already there"? Extending the food chain maybe? Gray said she feels it’s her mission to help people understand what rising sea levels could do to Florida. “To me, it’s important that people understand that it’s not just going to effect their life, their little bubble that they live in, but it’s going to effect the lives of everything around them,” she said. “Our economy is intrinsically tied to our environment and our ecology, so we’re going to feel effects. ”That's the nub of the problem, then - "average people" living in "little bubbles". "Sea level rise coordinators" with empty minds and empty thoughts and a "mission". God help us all.
011_6537826
{ "id": "<urn:uuid:6f332048-c1f4-4351-8448-64d710cb064b>", "dump": "CC-MAIN-2017-13", "url": "http://mostlyharmless-room-101.blogspot.com/2013/02/recycle-everything-you-can-and-save.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188773.10/warc/CC-MAIN-20170322212948-00232-ip-10-233-31-227.ec2.internal.warc.gz", "language": "en", "language_score": 0.9429661631584167, "token_count": 543, "score": 2.53125, "int_score": 3, "uid": "011_6537826_0" }
Posted by Anonymous on . A block of mass m = 5 kg is attached to a spring (k = 35 N/m) by a rope that hangs over a pulley of mass M = 7 kg and radius R = 4 cm, as shown in the figure. Treating the pulley as a solid homogeneous disk, neglecting friction at the axle of the pulley, and assuming the system starts from rest with the spring at its natural length, answer the following. (a) Find the speed of the block after it falls 1 m. (b) Find the maximum extension of the spring (a) MgX - (1/2)kX^2 = increase in kinetic energy = (1/2) M V^2 + (1/2) I w^2 Solve for V M = 5 kg g = 9. 8 m/s^2 X = 1 m k = 35 N/m I = (1/2)*Mpulley)*Rpulley^2 w = V/Rpulley b) Maximum extension Xmax occurs when V = 0
011_6521885
{ "id": "<urn:uuid:fd8e0e92-b7bd-4dd5-a755-05203743e82a>", "dump": "CC-MAIN-2017-13", "url": "http://www.jiskha.com/display.cgi?id=1301882761", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189239.16/warc/CC-MAIN-20170322212949-00249-ip-10-233-31-227.ec2.internal.warc.gz", "language": "en", "language_score": 0.9139803051948547, "token_count": 238, "score": 3.375, "int_score": 3, "uid": "011_6521885_0" }
“The future ain’t what it used to be. ” Yogi Berra We are in the midst of a massive revolution that will dramatically transform ground transportation. It is anticipated that autonomous vehicles (or driver-less cars) will be commercially available by 2020, if not sooner. By A wave of new transportation technology is coming to Columbus after the city won the federal Smart City Challenge. The grant money will usher in driverless cars but could end the idea of rail as a mass-transit option. “The City of Columbus plans to leap-frog fixed rail” by using new modes of transportation, Columbus says in the U.S. Department of Transportation application. The city last month won a $40 million grant from the U.S. Department of Transportation, besting cities like San Francisco and Portland, Oregon. They already have rail options and still struggle with traffic congestion. Those cities are also larger and attract far more visitors to their cores. The fact that Columbus is without rail might actually have helped its case in the smart-city competition, as it is the test case for new transportation methods that could scale to similar cities. Columbus is the biggest city in the U.S. to not offer rail service – something like light rail, streetcars, monorail – as a mass transportation option. The city’s application said its bus-based mass transit system, operated by the Central Ohio Transit Authority, can “demonstrate emerging mobility solutions at a lower cost and with greater flexibility than a fixed-rail infrastructure. ” — Columbus will ‘leap-frog’ light rail as transit option after Smart City Challenge win According to Philippe Crist, an economist with the Organization for Economic Co-operation and Development (OECD) “Fleets of shared, self-driving vehicles could indeed remove nine out of every ten vehicles on city streets, eliminating the need for all on-street parking and 80% of off-street parking, according to a recent study by the group. ” — Urban Transit’s Uncertain Future The rise of a “taxibot” may further reduce the need for car ownership and enable the sharing of vehicles that make shared, self-driving vehicles possible. According to Emilio Frazzoli, head of Future Urban Mobility for the Singapore-MIT Alliance for Research and Technology “You couldn’t have imagined this ten years ago when people didn’t have smart phones and mobile computing was not available. Now you have this ability to connect and book a car. You see it with Uber and the proliferation of taxi booking apps or public transportation schedule routing apps, and this is at the same time you have autonomous vehicle technology that is evolving. You can marry the two. ” — Urban Transit’s Uncertain Future If you doubt the accelerating adoption of new technology, it is worth to pause for a moment and consider that the iPhone was introduced in June 2007 and now is a ubiquitous device that has fundamentally transformed entire industries. The mass adoption of new technologies continues to accelerate. One recent estimate suggests that the typical luxury sedan now contains over 100 MB of binary code spread across 50–70 independent computers. An analysis of the history of technology shows that technological change is exponential, contrary to the common-sense “intuitive linear” view. So we won’t experience 100 years of progress in the 21st century — it will be more like 20,000 years of progress (at today’s rate). — The Law of Accelerating Returns Uber and Gilt are selling passes for unlimited uberPOOL rides in New York City. “The deal is being called a “commute card” and can only be used Monday through Friday during commuting hours (7-10am and 5-8pm) in Manhattan. These are the same hours during which Uber offers $5 flat rate uberPOOL rides in NYC. As a refresher, uberPOOL is Uber’s carpool product where the company matches you with riders headed the same direction … this deal means commuting in an uberPOOL is cheaper than taking the subway. ” Uber and Lyft are looking beyond competition with traditional taxi services. They may be creating the first practical, affordable personal rapid transit (PRT) systems that will compete with buses. In 2014, Uber launched UberPool, enabling multiple parties to share a ride along similar routes. The following year, the company announced uberCOMMUTE in China, which they described as ” carpooling at the press of a button. ” In the U.S., it’s being tested in Chicago. Then, in December, Uber launched uberHOP in Seattle, which operates along pre-selected commuters routes. Virtually all mass transit systems are publicly subsidized. Farebox revenues rarely cover more than 50 percent of expenses, which are labor and capital-intensive. In Pinellas Park, Florida—a Tampa suburb—has just replaced two bus lines with Uber service, subsidized to the tune of $3 per ride. It’s cheaper than running the buses. The Pinellas Suncoast Transit Authority budgeted $40,000 a year. Running the two bus lines cost four times as much. — Uber and Lyft Revolutionize Public Transit A recent study by the Boston Consulting Group found the cost of conveying one passenger by an autonomous vehicle would be 35% less than by conventional taxi at the average taxi occupancy rate of 1. 2 passengers. Increase an autonomous vehicle’s rate of occupancy to just two passengers and the cost per passenger becomes competitive with mass transit. — Urban Transit’s Uncertain Future “… private companies like Uber, which recently began test-driving its own autonomous vehicle, could drive down the cost of shared transport to such a point that car ownership wouldn’t be worth it. ” — Urban Transit’s Uncertain Future In addition, autonomous vehicles will greatly enhance mobility for transit dependent populations that may be disabled, too young or too old. For example, in the US there are approximately 36 million people with disabilities. Given the mobility and autonomy of this new technology, this will improve utilization of assets like vehicles, roadways and parking lots to further reduce the cost of these services by providing better efficiency. U.S. transportation chief visits Google to unveil 30-year plan “We’ve got to look at our own regulatory framework … to make sure we’re being as nimble and flexible and adaptive as we can be. … That’s what the future is demanding,” Foxx said. Foxx and Schmidt took a quick ride in the tiny electric-powered pod that dropped them off at an entrance to the corporate campus. It then drove away on its own. “This is awesome, this is cool,” Foxx remarked as Schmidt and Chris Urmson, the head of Google’s self-driving car project, showed him how it worked. Autonomous vehicles will be a disruptive innovation with major implications for society. requiring policy makers to address many unresolved questions about their effects. One fundamental question is about their effect on travel behavior. It will be easier to share cars and that this will thus discourage outright ownership and decrease total usage, and make cars more efficient forms of transportation in relation to the present situation. Autonomous vehicles may reduce public transit travel demand, leading to reduced service. Think that’s unlikely? Many companies are investing heavily in this area and it will have a massive impact on how we move people (and things). Several companies have already announced that they will have partially autonomous vehicles (Level 3) ready in the next 5-6 years including Audi. Baidu, BMW, Ford, Google, LeTV, Mercedes, Nissan, Tesla, Uber The avionics system in the F-22 Raptor, the current U.S. Air Force frontline jet fighter, consists of about 1. 7 million lines of software code. The F-35 Joint Strike Fighter, scheduled to become operational in 2010, will require about 5. 7 million lines of code to operate its onboard systems. And Boeing’s new 787 Dreamliner, scheduled to be delivered to customers in 2010, requires about 6. 5 million lines of software code to operate its avionics and onboard support systems. These are impressive amounts of software, yet if you bought a premium-class automobile recently, ”it probably contains close to 100 million lines of software code,” says Manfred Broy, a professor of informatics at Technical University, Munich, and a leading expert on software in cars. All that software executes on 70 to 100 microprocessor-based electronic control units (ECUs) networked throughout the body of your car. — This Car Runs on Code Disruptive innovation in terms of low-cost and high-quality can shape the market even before the launch. One such example is the technology developed by a 19-year-old Romanian high-school student, Ionut Budisteanu, who created a camera and radar system for autonomous cars that costs a fraction (10%) of the cost for the existing solutions. Or Edgar Sarmiento, a 24-year-old from Columbia, who designed a self-driving minibus and built it in weeks with Local Motors. Or recent advances by MIT which has reduced the large and expensive LIDAR to lidar-on-a-chip system that is smaller than a dime, has no moving parts, and could be mass produced at a very low cost to be used in self-driving cars, drones, and robots. What is an Autonomous Vehicle? In the United States, the National Highway Traffic Safety Administration (NHTSA) has proposed a formal classification system: - Level 0: The driver completely controls the vehicle at all times. - Level 1: Individual vehicle controls are automated, such as electronic stability control or automatic braking. - Level 2: At least two controls can be automated in unison, such as adaptive cruise control in combination with lane keeping. Many of these features are available in cars today. - Level 3: The driver can fully cede control of all safety-critical functions in certain conditions. The car senses when conditions require the driver to retake control and provides a “sufficiently comfortable transition time” for the driver to do so. - Level 4: The vehicle performs all safety-critical functions for the entire trip, with the driver not expected to control the vehicle at any time. As this vehicle would control all functions from start to stop, including all parking functions, it could include unoccupied cars. An increase in the use of autonomous cars would: - Increased roadway capacity and reduced traffic congestion due to reduced need for safety gaps and the ability to better manage traffic flow. - Reduce total number of cars by increased car-sharing, since an autonomous car can drop off a passenger at one location and go to a different location to pick up another. Also see Uber perpetual rides. - Higher speed limit for autonomous cars. - Greater efficiency with coordinate platooning using vehicle-to-vehicle and vehicle to infrastructure communications allowing for drafting, better mileage efficiency, faster transit times and coordinated traffic signaling. - Time-shifting freight traffic to off-peak hours, reducing congestion during peak travel times and increasing highway capacity. - Alleviation of parking scarcity, as cars could drop off passengers, park far away where space is not scarce, and return as needed to pick up passengers. - Reduction of physical space required for vehicle parking. - Elimination of redundant passengers – the robotic car could drive unoccupied to wherever it is required, such as to pick up passengers or to go in for maintenance. This would be especially relevant to trucks, taxis and car-sharing services. - Fewer traffic collisions, since unlike a human driver with limited situational awareness an autonomous car can continuously monitor a broad range of sensors (e. g. visible and infrared light, acoustic incl. ultrasound) both passive and active (LIDAR, RADAR) with a 360° field of view and thus more quickly determine a safe reaction to a potential hazard, and initiate the reaction faster than a human driver. - Avoid traffic collisions caused by human driver errors such as tail gating, rubbernecking and other forms of distracted or aggressive driving. - Relief of vehicle occupants from driving and navigation chores. - Removal of constraints on occupants’ state – in an autonomous car, it would not matter if the occupants were minors, elderly, disabled, unlicensed, blind, distracted, intoxicated, or otherwise impaired. - Reduction in the need for traffic police and premium on vehicle insurance. - Reduction of physical road signage – autonomous cars could receive necessary communication electronically (although physical signs may still be required for any human drivers). - Smoother ride. - Reduction in car theft, due to the vehicle’s increased awareness. - Removal of the steering wheel and remaining driver interface saves cabin space and allows a cabin design where no occupant needs to sit in a forward facing position Individual vehicles may also benefit from information obtained from other vehicles in the vicinity, especially information relating to traffic congestion and safety hazards. Vehicular communication systems use vehicles and roadside units as the communicating nodes in a peer-to-peer network, providing each other with information. As a cooperative approach, vehicular communication systems can allow all cooperating vehicles to be more effective and increase efficiency of our existing roadway infrastructure thereby dramatically reducing traffic congestion. According to a 2010 study by the National Highway Traffic Safety Administration, vehicular communication systems could help avoid up to 79% of all traffic accidents. In 2012, computer scientists at the University of Texas in Austin began developing smart intersections designed for autonomous cars. The intersections will have no traffic lights and no stop signs, instead using computer programs that will communicate directly with each car on the road. Congestion and traffic operations can be reduced using autonomous vehicle through the use of sensors that can sense traffic flows by monitoring vehicle braking and acceleration through V2V monitoring. V2I monitoring can also be used to improve flow and safety in intersections and high-problem areas. These systems will utilize information from other vehicles, smart traffic systems and other forms of smart infrastructure, allowing for a much higher throughput of traffic and further reducing the risk of accidents through the use of predictive trajectory modeling.
002_2539916
{ "id": "<urn:uuid:5906a654-daac-4368-8ba8-b8c015d0655e>", "dump": "CC-MAIN-2020-29", "url": "https://smarttransitfuture.org/tag/congestion/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655890092.28/warc/CC-MAIN-20200706011013-20200706041013-00167.warc.gz", "language": "en", "language_score": 0.9427143335342407, "token_count": 2953, "score": 2.65625, "int_score": 3, "uid": "002_2539916_0" }
Sexual images in early Homo sapiens European art: A. A "Venus" figurine from Willnedorf, Austria, 105 millimeters in height, dated about 28,000 years ago; B. Female "vulvar" symbols carved on a limestone block from the La Ferrassie rock shelter, southwest France, dated about 35,000 years ago; C. A phallus, carved from the horn core of a bison, from the Blanchard rock shelter, southwest France; the carving is about 36,000 years old and is 250 millimeters long. Ancient Figurine of Voluptuous Woman Is Found - NYTimes. com No one would mistake the Stone Age ivory carving for a Venus de Milo. The voluptuous woman depicted is, to say the least, earthier, with huge, projecting breasts and sexually explicit genitalia. Nicholas J. Conard, an archaeologist at the University of Tübingen in Germany, who found the small carving in a cave last year, says it is at least 35,000 years old, “one of the oldest known examples of figurative art” in the world. It is about 5,000 years older than some other so-called Venus artifacts made by early populations of Homo sapiens in Europe. Another archaeologist, Paul Mellars of the University of Cambridge in England, agrees and goes on to remark on the obvious. By modern standards, he says, the figurine’s blatant sexuality “could be seen as bordering on the pornographic. ”
009_1207760
{ "id": "<urn:uuid:6c60bc0b-8a52-4b62-b470-659fada99145>", "dump": "CC-MAIN-2016-40", "url": "http://englisheclectic.blogspot.com/2009/05/blog-post.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738662527.91/warc/CC-MAIN-20160924173742-00051-ip-10-143-35-109.ec2.internal.warc.gz", "language": "en", "language_score": 0.9107194542884827, "token_count": 321, "score": 3.140625, "int_score": 3, "uid": "009_1207760_0" }
What Kindergarten Teachers Wish Parents Knew Kindergarten is an exciting and critical time in your child’s development and growth. You can play an important role in this wonderful journey. Here’s what kindergarten teachers want parents to know: 1. Your job isn’t over when you drop your little one off at school; it has only just begun. Your child’s teacher wants to be your partner. Keep them informed about what goes on at home that might affect your child’s behavior or academic performance. Share with them how what they do at school affects your child at home. 2. This is not your grandfather’s kindergarten. Sadly, much of what happens in kindergarten is driven by high standards and preparation for standardized tests. The expectations of what children need to know when they enter kindergarten are closer to what used to be expected in 1st grade. To boost your child’s academic skills: - Talk with her about what interests her. - Encourage her to be curious and ask questions. - Point out letters and numbers when you see them in books and around town. Support her in solving everyday problems. 3. The more self-control your child has, the more successful he will be in school. Children need practice in deciding how and when to express their feelings and needs, and when and if to act on impulses. Help him develop and practice these skills at home before he tests them at school, where the consequences are a loss of learning for him and for others. 4. Make yourself known. Come in. Look around. Peruse the textbooks and materials. Knowledge is power. When you know about the subjects your child is studying, you will be able to help her better and have a common understanding for discussion. Volunteering is a wonderful way to learn about what goes on at school and to show your child how much you care about what she is doing. 5. Your child needs lots of opportunities for play outside of school. Play is the way in which he learns about himself and the people and world around him. But more often than not, play has been squeezed out of the school day. Playing both alone and in small groups helps facilitate learning and allows your child to practice skills and concepts. 6. Reading to your child once a day is not enough. Try to read together at least three times a day. Books are the gateway to building vocabulary, learning about print, and developing listening and early literacy skills. When you read, talk about the book. Discuss the characters and setting, make predictions, and create new endings. Point out letters and words in the text, and encourage him to recognize rhyming sounds and words and to identify beginning and ending sounds. 7. Writing exploration at home is critical. Your child needs to have opportunities to use pencils, crayons, markers, colored pencils, and other writing instruments as she attempts to express herself in written form. She begins with scribbles and lines, moves on to letters and her name, and then to words and sentences. 8. Homework is an opportunity for talking, sharing, and listening. Teachers give homework to extend the learning of the classroom. It is a chance for you to find out what your child is studying and how well he is grasping the skills and concepts being taught at school. Talk with your child about his homework. It shows him that you care and value what he does at school. 9. Television and video games use up valuable playtime. Limit screen time. The hours spent with these electronic devices could otherwise be spent talking, reading, or actively learning through play. 10. First-hand experiences are another teacher for your child. Take her to museums, the zoo, the aquarium, the library, parks, arts performances, and geographic locations such as the mountains, beach, forests, and deserts. And do it often. She’ll grasp concepts and skills better if she has experiences with the real thing. Recommended Products for Your Child Ages 5-5
005_1996318
{ "id": "<urn:uuid:d75b98c5-7951-4f4a-9d9f-21509a7f3e5c>", "dump": "CC-MAIN-2015-18", "url": "http://www.scholastic.com/parents/resources/article/what-to-expect-grade/what-kindergarten-teachers-wish-parents-knew", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246661095.66/warc/CC-MAIN-20150417045741-00184-ip-10-235-10-82.ec2.internal.warc.gz", "language": "en", "language_score": 0.9662246108055115, "token_count": 826, "score": 3.484375, "int_score": 3, "uid": "005_1996318_0" }
Note: This article is a sidebar to one of this issue's feature stories. Congress passes the Antiquities Act. It gives the president power to "declare by public proclamation . . . objects of historic and scientific interest that are situated upon the lands owned or controlled by the government of the United States to be national monuments, and may reserve as a part thereof parcels of land, the limits of which in all cases shall be confined to the smallest area compatible with proper care and management of the objects to be protected . . . " President Theodore Roosevelt uses the new powers to designate Devils Tower National Monument in Wyoming. Later that year, he establishes the Petrified Forest and Montezuma Castle national monuments in Arizona, and the El Morro National Monument in New Mexico. Although the backers of the Antiquities Act had envisioned it as a way to protect relatively small archaeological sites, Roosevelt deep-sixes that assumption with the designation of 800,000 acres of the Grand Canyon as a national monument (it became a national park in 1919). An Arizona politician mounts a legal challenge to the monument, arguing that it's much larger than the "smallest area compatible with proper care and management," but the Supreme Court upholds the designation in 1920. Today, national monuments range in size from 10 acres to 12 million acres, and total about 70 million acres. With just hours left in his presidency, Roosevelt establishes Mount Olympus National Monument, now Olympic National Park. He begins a tradition of lame-duck monument proclamations. Presidents Taft, Wilson, Harding and Coolidge establish monuments at a brisk pace, including Dinosaur, Zion and Bryce Canyon in Utah, Glacier Bay in Alaska, and the Statue of Liberty in upper New York Bay. Just before leaving office, Herbert Hoover establishes Saguaro, Black Canyon of the Gunnison, and Death Valley national monuments. Over the objections of Congress, Franklin Roosevelt designates Jackson Hole National Monument, setting off the first major controversy over the Antiquities Act. Wyoming Sen. Edward Robertson calls it a "foul, sneaking, Pearl Harbor blow," and Congress passes a series of bills abolishing the monument. None make it past Roosevelt's veto. Jackson Hole National Monument is incorporated into Grand Teton National Park. In exchange for congressional approval of the bill, Harry Truman signs a provision exempting Wyoming from the Antiquities Act. At the end of his term, Lyndon Johnson establishes Marble Canyon, now part of Grand Canyon National Park, and expands several other national monuments. In one day, Jimmy Carter creates 17 national monuments in Alaska - 56 million acres' worth - after Congress fails to pass an Alaskan lands bill. From the rim of the Grand Canyon, Bill Clinton declares the Grand Staircase-Escalante in southern Utah a national monument. It's the largest national monument in the lower 48 states, and the 105th monument designated since the passage of the Antiquities Act. Although 29 of these monuments have since become national parks, the Escalante monument may not be on the same path. While almost all other monuments are overseen by the Park Service - with the exception of two Forest Service monuments - the Grand Staircase-Escalante is managed by the BLM.
003_6557422
{ "id": "<urn:uuid:0679f64d-6c77-4027-b26e-2ff57a7fd9c6>", "dump": "CC-MAIN-2014-52", "url": "http://www.hcn.org/issues/167/5389", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802768957.83/warc/CC-MAIN-20141217075248-00035-ip-10-231-17-201.ec2.internal.warc.gz", "language": "en", "language_score": 0.8909403681755066, "token_count": 653, "score": 3.953125, "int_score": 4, "uid": "003_6557422_0" }
Common misconceptions surrounding mental illness involve beliefs of violence towards oneself or others, unintelligibility, and criminal behavior. These beliefs perpetuate stigma and further denote the mental illness for what it really is – a mental illness and not the whole person. The Psychiatric Times notes that the aggressiveness and impulsivity shown by characters with schizophrenia in movies and televisions shows increases stigmatization and poorer treatment outcomes. According to the Scientific American, approximately 60 to 80 percent of the population believes that individuals with schizophrenia are likely to commit violent acts. Psychiatrist E. Fuller Torrey states that most people with schizophrenia are not violent and do not exhibit dangerous behaviors. Dr. Irene Levine, psychologist and co-author of Schizophrenia for Dummies notes that, “People with schizophrenia more often tend to be victims rather than perpetrators of violence although untreated mental illness and substance abuse often increase the risk of aggressive behavior. ” Hallucinations and delusions involving suspiciousness may cause someone to become aggressive, but proper treatment and medication can prevent this. Individuals without treatment will have less knowledge on their disorder, which will cause them to have less control over their behavior. Southeastern Arizona Behavioral Health Services (SEABHS) claims that there is a small link between schizophrenia and violence, and in fact there is more of a link between violence and substance abuse problems. There is much more of a risk that a person will harm you if they have a drug or alcohol addiction than if a person has schizophrenia. What’s most important for someone with schizophrenia is to be diagnosed and treated so that they can better understand their condition and how to manage their symptoms, which typically involves medication. The Scientific American claims that “, severely mentally ill people account for only 3 to 5 percent of violent crimes in the general population”. The stigma behind schizophrenia and violence needs to cease because each person is different and mental illness should not be blamed or stereotyped. Understanding the reality and facts behind mental illness can help break the stigma. If you have schizophrenia and are ready to seek treatment for your symptoms, call us today at 888-958-7511. Avalon Malibu is a California state-licensed mental health and addiction recovery treatment center. We offer a home-like center for you to feel comfortable and focus solely on your recovery. We believe in holistic recovery, meaning that we will work with you to restore your mind, body, and spirit. Call us today for a consultation.
005_5384593
{ "id": "<urn:uuid:ba53608f-5018-4c5c-bce4-2cc39d961fb5>", "dump": "CC-MAIN-2018-22", "url": "https://www.avalonmalibu.com/blog/are-people-with-schizophrenia-dangerous/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864466.23/warc/CC-MAIN-20180521181133-20180521201133-00314.warc.gz", "language": "en", "language_score": 0.9452574253082275, "token_count": 496, "score": 2.90625, "int_score": 3, "uid": "005_5384593_0" }
Common evening primrose Oenothera biennis (L.) other common names: night willow-herb, large rampion, tree-primrose, king's cure-all, scurvish, evening primrose Oenothera: a name used by Theophrastus for a species of Epilobium, another genus in this family. It also is Greek for "wine scented," referring to the scent of the flowers or to the fact that the roots were once used for wine. Biennis: meaning "biennial," for its characteristic of living two years Evening primrose family: Onagraceae Photograph by Thomas Rosburg, Wildflowers of the Tallgrass Prairie: The Upper Midwest, Second Edition
002_1044164
{ "id": "<urn:uuid:389b98d5-b019-46d7-8e29-5d5cacac8f5a>", "dump": "CC-MAIN-2017-43", "url": "http://buroakblog.blogspot.com/2012/08/plant-of-week_17.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824931.84/warc/CC-MAIN-20171022003552-20171022023552-00150.warc.gz", "language": "en", "language_score": 0.9343307614326477, "token_count": 158, "score": 2.578125, "int_score": 3, "uid": "002_1044164_0" }
This will be an informal group discussion for white educators who would like accountability towards doing the work of unpacking white privilege. Participants will engage in dialogue around identifying and understanding white privilege and how to engage in conversations around race so that we do not perpetuate racial injustice in our schools and classrooms. It is a space where white educators can practice, model, and improve anti-racist practices through asking ignorant questions and processing deep emotion without co-opting multiracial dialogues or hurting colleagues of color. This group was started in the 2016-2017 school year, is ongoing, and welcomes new participants. Facilitator: Michael Russoniello *This event is seat-free for members of The Collaborative for Inclusive Education. **Members do NOT need permission from a school leader to register for this event, despite the checkbox in the registration page.
004_7052066
{ "id": "<urn:uuid:8fba3f31-a24b-4149-a0d7-0c4336c19b14>", "dump": "CC-MAIN-2020-50", "url": "https://nycsped.org/event/white-anti-racist-affinity-group/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141686635.62/warc/CC-MAIN-20201202021743-20201202051743-00651.warc.gz", "language": "en", "language_score": 0.9188200235366821, "token_count": 174, "score": 2.609375, "int_score": 3, "uid": "004_7052066_0" }
Bayliss, G. (2013). Exploring the Cautionary Attitude toward Wikipedia in Higher Education: Implications for Higher Education Institutions. New Review of Academic Librarianship,19(1), 36-57. Bishop, C. (2015). 5 ways Wikipedia can help teach research and critical thinking skills- Wiki Education Foundation. from https://wikiedu.org/blog/2015/10/19/5- wayswikipedia-can-help-teach-research/ Chen, H. (2009). The use and sharing of information from Wikipedia by high‐tech professionals for work purposes. The Electronic Library,27(6), 893-905. Chen, H. (2010). The perspectives of higher education faculty on Wikipedia. The Electronic Library,28(3), 361-373. Diaz, E. (2016). Wikipedia: the 'intellectual Makerspace' of libraries programming librarian. from http://programminglibrarian.org/articles/wikipedia-intellectual- makerspacelibraries Dooley, P. L. (2010). Wikipedia and the two-faced professoriate. Proceedings of the 6th International Symposium on Wikis and Open Collaboration - WikiSym 10. doi:10. 1145/1832772. 1832803 Head, A. J., & Eisenberg, M. B. (2010). How today’s college students use Wikipedia for course-related research. First Monday,15(3). doi:10. 5210/fm. v15i3. 2830 IFLA (2016). Opportunities for Academic and Research Libraries and Wikipedia: A Discussion paper, Presented at the IFLA library and information congress: Ohio: Columbus. Knight, C., & Pryke, S. (2012). Wikipedia and the university, a case study. Teaching in Higher Education, 17(6), 649-659. Lim, S. (2009). How and why do college students use Wikipedia? Journal of the American Society for Information Science and Technology, 60(11), 2189-2202. Luyt, B., & Tan, D. (2010). Improving Wikipedia’s credibility: References and citations in a sample of history articles. Journal of the American Society for Information Science and Technology, 61(4), 715-722. Mesgari, M., Okoli, C., Mehdi, M., Nielsen, F. Å. , & Lanamäki, A. (2015). The sum of all human knowledge: A systematic review of scholarly research on the content of Wikipedia. Journal of the Association for Information Science and Technology, 66(2), 219-245. doi:10. 1002/asi. 23172. Okoli, C., Mehdi, M., Mesgari, M., Nielsen, F. Å. , & Lanamäki, A. (2014). Wikipedia in the eyes of its beholders: A systematic review of scholarly research on Wikipedia readers and readership. Journal of the Association for Information Science and Technology, 65(12), 2381-2403. Wiki. (n. d.). Retrieved August 02, 2019, from https://meta.wikimedia.org/wiki/ List_of_ Wikipedias The present study has been carried out to ascertain the level of usage of Wikipedia among the library users of University of Mysore. To conduct this study, the questionnaire method was adopted. Simple random sampling was adopted for data collection. In total 150 questionnaires were distributed and 137 responses were received. The response rate was 91. 33 percent and the users' opinions that Wikipedia is very helpful to study purpose and also to get more information on a specific topic. The users point out that access to Wikipedia is essential for updating knowledge.
002_4948293
{ "id": "<urn:uuid:d0dde1cd-9a3f-4cbc-a9fe-b7c8f87d89ed>", "dump": "CC-MAIN-2020-34", "url": "https://digitalcommons.unl.edu/libphilprac/3677/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735792.85/warc/CC-MAIN-20200803083123-20200803113123-00311.warc.gz", "language": "en", "language_score": 0.7480723857879639, "token_count": 797, "score": 3.03125, "int_score": 3, "uid": "002_4948293_0" }
Ketamine continues to gain recognition, by both lay public and medical professionals, as a remarkably effective antidepressant, with minimal side effects and a much faster onset time compared to traditional antidepressants. These differences are explained by Ketamine’s mechanisms of action, which are multiple. The most important is by correcting the glutaminergic dysregulation seen in major depressive disorder. In other words, Ketamine acts on glutamate, the most predominant neurotransmitter in the brain, by blocking NMDA and AMPA receptors. (Conventional antidepressants act on the brain’s monoamines, such as dopamine, serotonin, and norepinephrine. ) Additionally, Ketamine promotes neuroplasticity, ie it repairs parts of the brain which have been damaged by depression, anxiety, and stress. It does so by increasing BDNF, or Brain-Derived Neurotrophic Factor, which is effectively ‘brain fertilizer’. Other mechanisms include its effect on sleep, central nervous system inflammation, and more. Due to Ketamine’s minimal side effect profile, rapid onset, and superior therapeutic efficacy, it is more and more being considered not only as an advanced alternative for treatment-resistant depression like Electroconvulsive Therapy (ECT) and Transcranial Magnetic Stimulation (TMS), but as a first or second-line option. We often refer to Ketamine as “the most powerful antidepressant yet invented”. In addition, our patients tell us that it relieves many of their other mood disturbances as well, such as anxiety, PTSD, and even their OCD symptoms. Furthermore, most chronic pain sufferers have issues with depression and anxiety, and ours are no exception. When they receive an infusion to relieve their chronic pain, they tell us that they come away feeling improved in both pain and mood. The unprecedented relief that Ketamine confers has sparked a entire new area of psychopharmaceutical research to find a drug that Big Pharma can patent and profit from (this is ironic because Ketamine itself is quite inexpensive, having been on the market as an anesthetic drug since the Vietnam war). Indeed, Johnson & Johnson’s Spravato (esketamine), is one example of this – even though it is nowhere near as effective an antidepressant as regular Ketamine (as detailed in our post).
004_5333602
{ "id": "<urn:uuid:08bd4af7-43a6-4587-89f9-37cd19266783>", "dump": "CC-MAIN-2024-10", "url": "https://bouldermindcare.com/ketamine-the-most-powerful-treatment-for-depression-yet-invented/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474843.87/warc/CC-MAIN-20240229134901-20240229164901-00121.warc.gz", "language": "en", "language_score": 0.9557302594184875, "token_count": 469, "score": 2.625, "int_score": 3, "uid": "004_5333602_0" }
Global Vaccination Equity The COVID-19 pandemic is not over. While high- and some middle-income states have secured more than enough doses to vaccinate their populations, the world’s poorest countries, constrained by funding and supply, have barely begun vaccinating theirs. As of April, 2021, the world’s high-income countries, which represent 16% of the global population, hold 4. 6 billion doses while low-income countries hold 770 million. At current rates, the Duke Health Innovation Center estimates that low-income countries “may not reach 60% coverage until 2023 or later. ” This inequity in vaccine distribution, though not inherently unfair, is both a moral matter and a global health risk. As COVID variants emerge and continue to circulate, whatever gains are being enjoyed in health and economic recovery in richer states will be at risk unless the virus is contained in poorer ones. In addition to waiving intellectual property constraints, researchers recommend significant investment and assistance in supply chain and logistics, training and availability of health workers, ethics-guided vaccine distribution, and better international cooperation in ensuring global access to high quality vaccines. In April, Human Rights Watch (HRW) released a 224-page report in which it concluded after a legal analysis of relevant articles of the International Criminal Court’s statute (2002) and Apartheid Convention (1976) that Israel’s practices concerning the Palestinians had crossed a threshold and could be legally described as crimes against humanity, including the crime of apartheid. The organization was not the first to draw this conclusion. B’Tselem and Yesh Din, two Israel-based human rights organizations had done the same legal analyses earlier and reached similar conclusions. The publication of HRW’s report elicited the expected polarized reactions, but one thing is clear: there is no such thing as a “status quo” in the Israeli-Palestinian conflict. The realities on the ground are evolving, and not for the better. The question before the world—Israelis, Palestinians, UN Security Council, the International Criminal Court, the United States, civil society, and so on—is whether those findings matter. Would a human rights-based approach work apart from independent Palestinian statehood? Some contrasting views can be found here, here and here. (The Knesset is hosting an event with human rights groups on the matter today. ) Famine continues to threaten the lives of millions around the world. The World Food Program, winner of the 2020 Nobel Peace Prize, reports that approximately 41 million people in 20 countries are on the brink of famine. It notes that contrary to common belief, much of the hunger is man-made, driven by problems like conflict, loss of jobs and land, inequality, the mishandling of COVID-19, and so on. With attacking water resources being a common war tactic, the lack of clean water is worsening matters as diseases like cholera spread and threaten whole communities. Food aid alone is insufficient. Effective solutions will require comprehensive efforts from all stakeholders to address conflict, “the single biggest driver of hunger today,” the WFP maintains. Religious Liberty at the U.S. Supreme Court On June 17, 2021, the Supreme Court of the United States unanimously ruled in Fulton v. Philadelphia that “the refusal of Philadelphia to contract with CSS [Catholic Social Services] for the provision of foster care services unless CSS agrees to certify same-sex couples as foster parents violates the Free Exercise Clause of the First Amendment.” The case is one of many in the US, Europe, and other parts of the world in which the tensions between the practice of religion and non-discrimination provisions are at issue. In his 77-page concurrence in Fulton, Justice Alito noted that “the decision might as well be written on the dissolving paper sold in magic shops” because it hardly addresses the core issues and many more cases like it will inevitably find their way back to the Court. American Christianity and Politics As the American church continues to wrestle with the politicization of Christianity, Elite Source Pro has created the “God Bless the USA Bible” scheduled for distribution this September. Being marketed as “the Ultimate American Bible,” the King James Version contains texts of the U.S. Constitution, Bill of Rights, Declaration of Independence, Pledge of Allegiance, and a handwritten chorus of Lee Greenwold’s “God bless the USA. ” Critics are seeing in the venture an expression of White Christian nationalism and are concerned that linking American founding texts with what they believe is inspired Scripture will inevitably cause confusion. One writer observed that not only does the mingling suggest God’s endorsement of America to the exclusion of others, but it is also unclear which texts would be authoritative in cases of conflict. Despite the political context within which this Bible is being released, Elite Source Pro’s president reportedly denied that the Bible has anything to do with current politics. On a lighter (or darker) note, earlier this month, at 45 feet deep, Massachusetts diver Michael Packard suddenly found himself in the mouth of a humpback whale. Terrified and in death’s jaw, he awaited the inevitable. But about thirty seconds later, the whale surfaced and spit him out. The fascinating story reminded many of the biblical story of Jonah who, unlike Packard, was swallowed by a fish and spent three days in its belly before it expelled him along with other stomach contents. Packard had only a few bruises to show for his adventure and a heart full of gratitude for having lived to tell the tale! Hear the story first-hand here.
009_3855648
{ "id": "<urn:uuid:f9cdd974-a508-4e3d-b37e-7ad42931b2a9>", "dump": "CC-MAIN-2022-05", "url": "https://monicamoyo.com/2021/06/22/things-to-ponder/comment-page-1/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301720.45/warc/CC-MAIN-20220120035934-20220120065934-00650.warc.gz", "language": "en", "language_score": 0.9528335928916931, "token_count": 1172, "score": 2.78125, "int_score": 3, "uid": "009_3855648_0" }
Fun and educational art projects for kids to create, make, draw, paint, learn and enjoy. Includes coloring pages, paper art, broomstick art, sketch books, printable activities and much more. Here is an opportunity for children to color the world with their imagination. Kolam is a South Indian style of painting that is drawn by using rice powder/chalk/chalk powder. While it is popular in many parts of Asia it is generally associated with Tamil Nadu, Karnataka, Andhra Pradesh, and most parts of Kerala. Step by step guideline for creating a Kolam: Prepare a grid of the required dimensions. Most Kolams are made with simple geometric shapes and are generally symmetrical. Then it becomes easy to follow the pattern. . . . Sudheer is very fond of the letter S. Perhaps because his name begins with it. But when the letter S sleeps, Sudheer can see a mouse creeping out of it. You, too, can see and draw it. Easy to Draw — 6 How to solve the Dot 2 Dot: Using a pencil, draw a line, connecting number “1” or alphabet “a” to the last character in the series to create the hidden image. One can always use the image later for colouring. Note: This is an offline activity. You may need to print this page in order to solve the puzzle. Join the dots and you will know the number of apples in this picture. It took an hour for Mrs Batliwala to decide on her meal. . . . Pitara literally means ‘a chest full of surprises’. For over 20 years (this website was started in 1998) we have been publishing original multi-cultural, multi-lingual and inclusive content to help kids explore, discover, learn, play, enjoy. . . All our content is copyright protected. If you wish to use our content ask us — some of the world's leading publishers regularly license our content.
009_1316494
{ "id": "<urn:uuid:3da1c4b2-a9de-4e00-8dd8-6fb66dac0a22>", "dump": "CC-MAIN-2022-21", "url": "https://www.pitara.com/art-craft-for-kids/art-for-kids/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662558030.43/warc/CC-MAIN-20220523132100-20220523162100-00013.warc.gz", "language": "en", "language_score": 0.9433985948562622, "token_count": 415, "score": 3.0625, "int_score": 3, "uid": "009_1316494_0" }
The global campaign on environmental protection has gone viral and it’s revolutionizing the way some dental practices provide their services. In many parts of the country, including cities like Concord, California, many dental practices are transitioning from the traditional methods of dental care to more cost-efficient and energy-saving ones. The change is believed to offer more benefits to both dental practices and their patients. The transition involves the adoption of such measures as eco-friendly sterilization, strict compliance with existing community waste management and recycling programs, use of the latest technology that consumes less energy, and others. An article for TriplePundit. com provides more information how a dental practice can go green: “It Reduces Waste and Pollution According to the EDA, there are four main sources of dental office waste: 1. Sterilization and disinfectant products. 2. Removal of mercury-containing dental materials. 3. Conventional x-ray systems. 4. Conventional vacuum systems. It Saves Time, Energy, and Money What’s the most valuable tool dentists use? Is it a pick? Or a drill? It’s water – the most valuable resource on earth. Depending on the types of dental tools used, hundreds or thousands of gallons can be wasted each year. Investing in tools such as a dry vacuum will prevent this waste. The same goes for the power consumption the average dental office uses. ” Ensuring one’s oral health and helping save energy at the same time can be a personally fulfilling experience. In addition, green dental practices do not significantly affect the costs of the dental care provided, thus sparing the patient of having to spend more for the services. The savings green practices result in, however, can exponentially increase over time, contributing greatly to the protection of the environment. It’s easy to tell if a trusted Concord dentist provides eco-friendly services by the tools and equipment found in the office. The practice will most likely be using products that have been rated for energy-efficiency, as well as reusable or recycled materials. Likewise, the practice will be aiming to reduce paper use by digitizing as much as possible. Many reputable dental practices like sm:)le Family Dentistry are now replacing their film x-rays with digital x-rays. This eliminates the need for film and other conventional x-ray materials that are non-recyclable and may be harmful to the environment. Digital x-rays also lessen patients’ exposure to radiation. As more and more skilled dentists in Concord, CA turn to eco-dentistry, patients can be assured that they will not only get healthy smiles, but will also be doing their share in protecting Mother Earth. (Source: Eco Dentistry: The Future of Sustainable Care for Your Mouth, TriplePundit. com)
003_6436499
{ "id": "<urn:uuid:0b472816-ef82-4021-90eb-a18e657a8895>", "dump": "CC-MAIN-2020-45", "url": "https://drkentdavis.com/green-dentistry-trusted-concord-dentist-protects-environment/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107876307.21/warc/CC-MAIN-20201021093214-20201021123214-00260.warc.gz", "language": "en", "language_score": 0.9276903867721558, "token_count": 590, "score": 2.96875, "int_score": 3, "uid": "003_6436499_0" }
When determining the treatment for your illness, your doctor will often require information regarding changes in your body tissue, blood or other body fluids to diagnose and provide you with the best medical care. The process of examining these specimens is called pathology. Dorevitch Pathology, one of Victoria's largest private pathology providers, has been providing Victorian communities with fast and accurate pathology testing for over 45 years. Aware that pathology testing can be a daunting experience for many people; this website is designed to make the process as simple as possible with a search function to locate Collection Centres in your region, instructions for test preparation and the capability to pay your account online. What is Pathology Pathology is the medical specialty concerned with the study of the nature and causes of diseases. It underpins every aspect of medicine, from diagnostic testing and monitoring of chronic diseases to cutting-edge genetic technologies. Pathology testing of patient samples is integral to the diagnosis of every cancer and is central to over 70% of all decisions made in health care. Pathologists are specialist medical practitioners who study the cause of disease and the ways in which diseases affect our bodies by examining changes in tissue, blood and other body fluids. The doctors you see in a surgery or at a clinic all depend on the knowledge, diagnostic skills and advice of pathologists. Pathologists, scientists, blood collectors and support staff work as part of a medical laboratory team. They work together to collect your specimen, transport your specimen to the medical laboratory, perform testing and interpretation, and report back the medical findings and test results to your doctor to assist with your medical care. What type of Pathology testing does Dorevitch Pathology perform? We are one of Australia’s leading specialist medical laboratory and pathology providers providing a full range of diagnostic testing and information services. Our medical laboratory testing services include: - Biochemistry tests which examine the chemistry of various body systems such as the liver or kidneys - Haematology which studies the cell lines in blood, eg red and white cells, and blood clotting - Microbiology looks for causes of infection - Histopathology looks at the structure of the tissues to find abnormalities such as skin cancer - Cytology looks at individual cells in from tissues to find abnormalities e. g. PAP smears - Immunology studies the body’s immune system eg. Allergy testing - Toxicology performing drug screening and testing - Genetics (Cytogenetics and Molecular genetics) for genetic abnormalities Dorevitch Pathology performs medical tests and analysis that aid your doctor in the diagnosis or detection of diseases, and measure the progress or recovery from a disease. We have specialised expertise in diabetic testing, cancer, cardiovascular diseases, infectious diseases, drugs of abuse screening and molecular tests.
010_6227741
{ "id": "<urn:uuid:4f588448-3400-4838-9227-67d5e853a0f9>", "dump": "CC-MAIN-2019-26", "url": "http://dorevitch.com.au/IamaPatient.aspx", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998708.41/warc/CC-MAIN-20190618083336-20190618105336-00358.warc.gz", "language": "en", "language_score": 0.9357780814170837, "token_count": 570, "score": 2.515625, "int_score": 3, "uid": "010_6227741_0" }
Diagnostic Tests for Shortness of breath Diagnostic Test list for Shortness of breath: The list of diagnostic tests mentioned in various sources as used in the diagnosis of Shortness of breath - Physical examination - Blood pressure, pulse rate, temperature - Inspect for blueness of tongue and skin, reduced alertness and distress due to breathing problems - Lung examination to listen to breath sound quality, intensity and for added sounds. Crackles suggest congestive heart failure, pneumonia, chronic bronchitis, lung fibrosis or bronchiectasis. Wheezes suggest asthma, chronic bronchitis or emphysema - Abdominal examination for enlarged liver which may be a sign of congestive heart failure - Blood tests - Full blood count to exclude anemia as cause of breathing difficulties and also to detect signs of infection, inflammation and asthma ( increased eosinophil cells) - Renal function tests and electrolytes - Serial cardiac enzymes and troponin to detect cardiac damage from heart attack - Arterial blood gases - to look for signs of pulmonary embolism, pneumothorax, pneumonia and other lung diseases. - Sputum microscopy and culture - to detect bacterial and fungal causes of pneumonia and exacerbations of bronchiectasis and cystic fibrosis. - Sputum acid-fast stains- for tuberculosis, if indicated and routine sputum stains are negative - Mantoux skin testing - if suspicious for tuberculosis active infection. - Electrocardiograph (ECG) - to look for signs of heart attack and some causes of congestive cardiac failure. - Pulmonary function tests - can be useful in diagnosing asthma and distinguishing pulmonary fibrosis from emphysema. - Exercise testing - can be helpful in distinguishing between lung and heart disease and also assessing fitness. - Radiological investigations - Chest X-Ray - to look for signs of lung disease and also enlarged heart of congestive cardiac failure. - Ventilation - perfusion scan to exclude pulmonary embolism. - Pulmonary angiography if ventilation- perfusion scan is inconclusive in ruling out pulmonary embolism - Echocardiogram can help diagnose congestive cardiac failure - Bronchoscopy - may be needed to exclude foreign body, lung cancer, bronchiectasis and sarcoidosis. - Cardiac catheterization and pulmonary angiography - may be needed to identify acute pulmonary embolism, chronic recurrent pulmonary embolism, intra-cardiac shunts and pulmonary hypertension. Home Diagnostic Testing These home medical tests may be relevant to Shortness of breath causes: - Lung & Respiratory Health Tests: Conditions listing medical symptoms: Shortness of breath: The following list of conditions have 'Shortness of breath' or similar listed as a symptom in our database. This computer-generated list may be inaccurate or incomplete. Always seek prompt professional medical advice about the cause of any symptom. Select from the following alphabetical view of conditions which include a symptom of Shortness of breath or choose View All. Conditions listing medical complications: Shortness of breath: The following list of medical conditions have 'Shortness of breath' or similar listed as a medical complication in our database. » Next page: Glossary Medical Tools & Articles: Tools & Services: Forums & Message Boards - Ask or answer a question at the Boards:
007_7222914
{ "id": "<urn:uuid:f350c1f7-04dd-4ab9-9912-8fb050887107>", "dump": "CC-MAIN-2016-07", "url": "http://www.rightdiagnosis.com/symptoms/shortness_of_breath/tests.htm", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701165484.60/warc/CC-MAIN-20160205193925-00045-ip-10-236-182-209.ec2.internal.warc.gz", "language": "en", "language_score": 0.8523976802825928, "token_count": 727, "score": 3.140625, "int_score": 3, "uid": "007_7222914_0" }
The Nares ice bridge is still blocking the strait. My forecast of breakup on April 07 ± 3 days was wrong. A forecast is only as good as the assumptions it is based on. My forecast was based on valid assumptions, but I missed something vital: the 'plug' in the ice bridge isn't just consolidated ice: it is homogenous ice. It is likely also that it is less salty than ordinary first year sea ice. That would mean that the ice bridge is much stronger than average. After the flow of ice towards Baffin Bay came to a virtual halt, ice formed downwind of the ice jam. Such ice is normally blown away by the wind into warmer waters where it melts. When the Nares ice bridge forms at the other end of Kane Basin, or near Petermann Glacier, the resulting polyna is longer and more capable of melting fresh ice. Accordingly, there is less chance of a truly solid plug of ice forming. This year, new ice which formed near the ice jam remained in place, thickened and was blown back against the ice jam to form a very substantial ice plug - the ice bridge proper. Considering the amount of snow and ice which had been melting in the area and the fact that warmer, less saline water tends to form a layer over colder, denser, more saline water, it is likely that this plug is formed from less saline waters than most sea ice. The 2011 Nares ice bridge forming in Kane Basin In previous years when the ice bridge formed in the same location as this year the ice bridge did not allow melt out and full mobility in the Nares Strait until about the end of June, and sometimes early July. Based on the ice bridge being formed merely of consolidated salty ice floes glued together with fresh ice, and based on the state of the ice following the warm winter of 2010-2011, I had wrongly assumed a very early melt of the ice bridge. The Nares ice bridge anchor points The green lines in the image above show the anchor points of the ice bridge. At the top a roughly triangular area can be seen which shows melting and refreezing. This is the strongest anchor point. At the bottom, the anchor point is relatively small. The ice plug is jammed solidly against an island. Once the ice can move there due to melting around the island, the whole plug will be free to rotate anticlockwise. There are already many fissures in the ice plug kept closed by pressure. Once the ice moves it is very likely to break up in less than a day. My amended assessment is that unless the ice bridge is broken up by violent winds, it will break up some time in May. Given that regional melt events in the Arctic are tending to occur ever earlier, I consider it most unlikely that the ice bridge will survive into June. The large fissure in Petermann Glacier now extends across its full width. ASAR images show hints of fissures further back. Once the sea ice has melted out in Petermann Fjord, the new ice island will calve as soon as a strong enough wind blows down the fjord. This is likely to occur by late July. I hope to post an updated prediction in another Arctic Ice report. Petermann ice tongue April 14 2011 The dashed lines correspond to features which are intermittently visible in ASAR images. Provided that these are not image processing artifacts - and I suggest that they are not - then there are fissures forming across the ice tongue which will eventually become new calving fronts. The area of the projected 2011 ice island will be about 200 km2. Once it has calved and its back-pressure no longer affects the ice tongue, the other fissures will be free to expand laterally, when they will become more prominent. Petermann Fjord tapers towards the point where the calving front was in 2009-2010. With the 2010 ice island removed from that bottleneck, it seems likely that there will be substantially less back-pressure on areas near the new calving front. The ice tongue is held back only by winter sea ice and by a jumble of ice at its edges, most fragmented on the northern edge. I consider it likely that each new calving will allow the ice to move forward in a brief spurt until the new calving front is jammed across the fjord. From that point, lateral expansion will cause the jamming to increase back up the fjord. Any substantial fissure across the ice tongue near the calving front will result in a large calving event once either or both of the jumbled ice margins is loosened sufficiently by surface and bottom melt and by meltwater penetration. North West Passage - NWP and Canadian Archipelago - CA Judging from the current state of the ice and the current weather patterns, the whole NWP and the passages through the CA will melt out this year as they did last year. The melt out of the NWP will likely be about 2 weeks earlier than 2010. In terms of a navigable NWP, that would be about the end of July. Bering, Chukchi, Beaufort and East Siberian seas There is currently a great deal of ice movement in all of these areas, with fissures extending from the Beaufort Sea well into the Arctic Basin. The ice in these areas is mostly young ice less than 2 meters thick, except where piled up on shores. March 2011 Sea Ice Summary from Sivuqaq/Gambell The ice pack [at Gambell] is different thus far compared to that of the past. It is generally agreed that it has a poorer quality, probably from mostly fluctuating temperatures; storms; and not fully developing, as it has before, into thicker ice. It is in all probability prone to rapid melting with the coming of warmer spring climates. The Siberian lead [between St. Lawrence Island and Siberia] has been open as well with the ice pack drifting beyond the horizon at least a couple of times. The shorefast ice was broken off from the Qitelnguk, Devleghaq, and Aqeftapak bays [along the north shore, around Cape Sivuqaq] around the first of the month of March and remains open to date. Fissures in Arctic ice mid April 2011 Laptev, Kara and Barents Seas As the Kara Sea and the Barents Sea lose ice to open water it is replaced by ice moving out from between the many islands in the area. Although this tends to maintain the extent in those seas, the ice becomes more broken and thinner. Ice moving from land into Laptev and Kara seas The ice in the Kara, Barents and Laptev seas is holding up in extent as ice breaks up, but the extent will drop sharply when the melt season gets fully under way. My forecasts posted in March were wrong: Arctic Ice March 2011 Update #2 March 24th 2011Here are my amended forecasts taking account of a later break-up of the Nares ice bridge: Dates given should be taken as plus or minus 3 days. The Nares ice bridge will be fragmented, and the ice in Kane Basin will be melting out by April 7th. Ice from Lincoln Sea will be advecting through Nares Strait by April 14th. The main North West Passage ice will show strong evidence of breakup and melt by April 30th. By April 30th, ice extent graphs will show a strong downward trend similar to that of May - June 2010. The Nares ice bridge could hold out for 2 to 3 more weeks. It is more difficult to predict the break up of a solidly wedged homogenous ice mass than an aggregate held together mostly by uniform pressure. It will take about 7 days after the ice bridge breaks up for the ice to be advecting from Lincoln Sea through Nares Strait. My prediction for ice extent to trend downwards by April 30th does not depend on activity in Nares Strait and remains unchanged. Petermann glacier will calve an ice island about 200 km2 by late July. The North West Passage will be navigable by the end of July. Using AMSR-E data from IJIS-IARC, link below, I have projected possible melt scenarios. The melt patterns of 2003-2010 from April 04 of each year to minimum extent were appended to the 2011 data at April 14. The method determines what the extent will be IF the behavior of the Arctic mimics a particular year. Here are listed in projected order the recorded extent for the year and the projected extent for 2011 in terms of that year's behavior: year . . . . . . . . . recorded . . projected 09,29,2006, 5959219, 6331250 09,12,2004, 5806719, 5910781 09,18,2003, 6032031, 5455468 09,22,2005, 5315156, 5376564 09,13,2009, 5249844, 4891719 09,24,2007, 4254531, 4469218 09,10,2010, 4952813, 4379375 09,17,2008, 4718594, 4275781 The 2007 melt season was unusual in that conditions generally favored ice loss. The 2010 melt season was unusual in that at the end of June, conditions began to favor ice retention. If ice melt conditions this year fall between those of early June 2010 and those of 2007, then ice extent will likely fall well below the 2008 level, otherwise 2008 is likely to be equaled. I project an end of season extent range between 3. 9 million km2 and 4. 5 million km2. Arctic Sea Ice Blog arctic sea ice graphs An Arctic Decade 2001 - 2011 Arctic Ice 2011 - Sail, Steam And Satellites Arctic Ice March 2011 Arctic Ice March 2011 - Update #1 Arctic Ice March 2011 Update #2 The ChatterBox Arctic Index
003_6255929
{ "id": "<urn:uuid:98bea9f8-e933-4564-b243-94f02236689a>", "dump": "CC-MAIN-2023-50", "url": "https://www.science20.com/chatter_box/arctic_ice_april_2011-78127", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100499.43/warc/CC-MAIN-20231203094028-20231203124028-00631.warc.gz", "language": "en", "language_score": 0.9526481628417969, "token_count": 2092, "score": 2.75, "int_score": 3, "uid": "003_6255929_0" }
One way to organize information from resources is to create a notecard for each idea you want to incorporate into your paper. Before we begin to discuss such document as a bibliography, it is important to define its meaning. Unlike a typical essay or research paper, a bibliography involves only the list of sources that student used to study a particular subject. It may be assigned as a separate assignment or as a part of the research paper. The bibliography also goes at the end of your paper. It covers the last one or few pages. Here are some hints you should know to write a complete paper of this type: It is much easier to prepare a full bibliography if you write down every title, name, publication date, and author when inserting any direct or indirect quotes. Mind these factors that you have to include in each category: Year of publication Pages if any direct quote was used In fact, these elements depend on the required writing style. Formatting is one of the basics. Stick to the chosen format. It is impossible to have the first part of the paper in Chicago, and the second part bibliography in APA. When you have an opportunity to choose the paper format, we recommend choosing MLA. It is the simplest format which requires minimum efforts. Judith White, Albert Namatjira: National Gallery of Australia, Collection highlights: Authors are publishing their materials to be recognized, and no one wants his ideas to be stolen. The bibliography is a way to reward creative people for their unique language, breaking news, hard times they went through, and more. The need to cite all sources even electronic is explained by intellectual property. You should respect the ability to access any sources that you want. Any failure to insert full citations could be regarded as plagiarism. You may find more details here. After all, if you got it wrong, you may still prove to your teacher that the idea was taken from another author. It might save your bibliography. You need to go to your preferred search engine Google, etc. Quizlet makes simple learning tools that let you study anything. Start learning today with flashcards, games and learning tools — all for free. When writing a research paper or essay in Modern Language Association (MLA) style, source cards can help you stay organized and make preparing your works cited page much easier. If you document each source that you refer to during the writing process, you will also easily be able to identify and return to relevant sources for further study. Students in high schools, colleges and universities may be needed to write annotated bibliography as part of their research or course work. It is important to grasp the basic concepts of writing an annotated bibliography since it helps you to know how to write the literature review for your college research paper, college thesis or university dissertation. Aug 24, · When writing out source cards by hand, the title of the book should always be underlined, so it is easy to identify. If you are typing out your source cards on a computer, however, the title of the book should be placed in italics instead%(30). When creating bibliography cards for Internet research, it is important that you write down all the relevant information, in the order required by your format, such as MLA or APA. When you complete your research you want to be able to use your cards to create a proper bibliography page so your reader can find these sources and verify your work. However, before pressing forward, here is a handy checklist that you can use to make sure that you are gathering all of the information needed to create a bibliography, and that a great one! In the proceeding pages, you will find detailed information regarding how to properly write and format the bibliographical sources based on the specifics of the source material.
012_6921652
{ "id": "<urn:uuid:eaa73b82-0fd4-494e-9824-30ffe2d46080>", "dump": "CC-MAIN-2019-47", "url": "https://loluqahekiqago.iridis-photo-restoration.com/how-to-write-a-source-card-for-a-website-mla-format-19592mc.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496671411.14/warc/CC-MAIN-20191122171140-20191122200140-00437.warc.gz", "language": "en", "language_score": 0.9428688883781433, "token_count": 785, "score": 3.71875, "int_score": 4, "uid": "012_6921652_0" }
Deciding when to euthanize a sick pet is one of the hardest decisions that we have to make. When my cat of 18 years became seriously ill, my family was too emotional to make objective decisions. In hindsight, I think we waited too long to put him to sleep, but we wanted to make sure that we tried everything to extend his life. Now a new survey, developed by researchers at Michigan State University, may help us make clear decisions in these stressful situations. The pilot version of their questionnaire was created to help assess the quality of life of dogs undergoing chemotherapy for cancer . In their study, families completed a questionnaire at the time of diagnosis comparing the dog's current behavior with their typical behavior six months prior. Follow-up surveys were filled out three and six weeks later to document changes in behavior as the pups underwent chemotherapy. The veterinarians also filled out shorter questionnaires based on their observations. The separate surveys aimed to balance the more subjective, but complete view of the people who live with the dogs (since they see the day-to-day behavior changes) and the objective, scientific view of the veterinarians. The researchers found that family and veterinarian responses were fairly well-matched, showing that the questionnaire can be a helpful way to find common ground for treatment decisions. The answers were particularly aligned on three questions involving changes in the dogs' play behavior, clinical signs of disease, and perceived canine happiness. Agreement on those questions led researchers to use them as effective indicators of quality of life that could be used in animal cancer clinics. Now the team is planning a follow-up study with hundreds of dogs and their families so that the survey can be adapted to a wider range of illnesses. This tool could potentially help countless stressed families make educated decisions for their pets.
005_2921712
{ "id": "<urn:uuid:38441bd3-5d7e-4450-99f0-ecfc6d4de42b>", "dump": "CC-MAIN-2015-22", "url": "http://thebark.com/print/5803?page=show", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207927767.46/warc/CC-MAIN-20150521113207-00305-ip-10-180-206-219.ec2.internal.warc.gz", "language": "en", "language_score": 0.9753012657165527, "token_count": 361, "score": 2.625, "int_score": 3, "uid": "005_2921712_0" }
5 Quick Tips to Use Less Water Are You Wallet Or Water Conscious? Check out these 5 conservation tips. - Scratch the grass. And replace it with xeric shrubs, ground covers and water-efficient grasses, such as Blue Grama, Buffalo Grass and Dog Tuff™. - Reduce fertilizer fever. Fertilizer promotes plant growth, but also increases water consumption. Apply the minimum amount needed. - Train your turf. Proper lawn watering techniques, like using less water and irrigating deeply and infrequently, can save thousands of gallons of water annually. - Upgrade and save. CPNMD offers rebates when you upgrade your sprinkler system with Rotary Nozzles, ET- based irrigation controllers and rain sensors. - Spend 90, save thousands. Sign-up for a FREE 90-minute sprinkler audit the includes minor sprinkler head adjustments, efficiency tests and a customized water schedule that could save thousands of gallons of water. Learn more below.
000_3559213
{ "id": "<urn:uuid:d0a0e7e2-1b4a-4683-826f-eac789a58faf>", "dump": "CC-MAIN-2023-23", "url": "https://www.cpnmd.org/5-quick-tips-to-use-less-water", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647614.56/warc/CC-MAIN-20230601042457-20230601072457-00294.warc.gz", "language": "en", "language_score": 0.8797797560691833, "token_count": 203, "score": 2.515625, "int_score": 3, "uid": "000_3559213_0" }
Influenza virus and endothelial cells: A species specific relationship Influenza A virus (IAV) infection is an important cause of respiratory disease in humans. The original reservoirs of IAV are wild waterfowl and shorebirds, where virus infection causes limited, if any, disease. Both in humans and in wild waterbirds, epithelial cells are the main target of infection. However, influenza virus can spread from wild bird species to terrestrial poultry. Here, the virus can evolve into highly pathogenic avian influenza (HPAI). Part of this evolution involves increased viral tropism for endothelial cells. HPAI virus infections not only cause severe disease in chickens and other terrestrial poultry species but can also spread to humans and back to wild bird populations. Here, we review the role of the endothelium in the pathogenesis of influenza virus infection in wild birds, terrestrial poultry and humans with a particular focus on HPAI viruses. We demonstrate that whilst the endothelium is an important target of virus infection in terrestrial poultry and some wild bird species, in humans the endothelium is more important in controlling the local inflammatory milieu. Thus, the endothelium plays an important, but species-specific, role in the pathogenesis of influenza virus infection. |Keywords||Endothelial cells, Highly pathogenic avian influenza, Influenza virus, Poultry, Zoonotic infection| |Persistent URL||dx. doi. org/10. 3389/fmicb. 2014. 00653, hdl. handle. net/1765/86172| |Journal||Frontiers in Microbiology| Short, K.R, Veldhuis Kroeze, E.J.B, Reperant, L.A, Richard, M, & Kuiken, T. (2014). Influenza virus and endothelial cells: A species specific relationship. Frontiers in Microbiology (Vol. 5). doi:10. 3389/fmicb. 2014. 00653
009_348367
{ "id": "<urn:uuid:674d2a2f-82c8-449f-8818-a742e96105aa>", "dump": "CC-MAIN-2019-13", "url": "https://repub.eur.nl/pub/86172", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202471.4/warc/CC-MAIN-20190320210433-20190320232433-00555.warc.gz", "language": "en", "language_score": 0.7645631432533264, "token_count": 416, "score": 2.890625, "int_score": 3, "uid": "009_348367_0" }
Gallium ArsenideGallium Arsenide (GaAs) is a compound taking the form of dark red, vitreous crystals; can react with steam and acid. Because it is flammable, we recommend a safe chemical storage building that meets specific regulations for storing Gallium Arsenide. Please review our fire rated products: FIRELoc, SUPERLoc Gallium Arsenide Storing Details - Flammable Details: Flash point data not available. - Storage Details: Keep separated from incompatible substances, such as oxidizers. Store and handle in accordance with all current regulations and standards. Use proper flammable materials storage building. - Compatible Details: - Description: Gallium arsenide is a compound of the elements gallium and arsenic. It is a III/V semiconductor, and is used in the manufacture of devices such as microwave frequency integrated circuits, monolithic . . . - Classification: CLASS 6. 1 - Brand Name: n/a Gallium Arsenide Properties |Formula||Density||Boiling Point;||IUPAC ID||Molar Mass||Soluble In||Melting Point| |GaAs||5. 32 g/cm³||n/a||Gallium arsenide||144. 645 g/mol||n/a||2,260°F (1,238°C)|
004_6404065
{ "id": "<urn:uuid:beac2111-0829-48ca-ae1f-81ad19ff92d5>", "dump": "CC-MAIN-2018-13", "url": "http://www.uschemicalstorage.com/chemical-storage-guide/gallium-arsenide.php", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257646375.29/warc/CC-MAIN-20180319042634-20180319062634-00118.warc.gz", "language": "en", "language_score": 0.7859246134757996, "token_count": 285, "score": 2.890625, "int_score": 3, "uid": "004_6404065_0" }
In our time George Washington's name is virtually unsullied and unassailable. So it's difficult to comprehend that, like anyone serving in a public capacity for half a century, he had his detractors, especially when things were not going well. Charles Willson Peale after Thomas Sully, 1812, Portrait Gallery (Second Bank) Benjamin Rush During the dismal autumn of 1777, these detractors included Granny Gates, an American general, a factious Congressional clique, Benjamin Rush, the highly esteemed "Father of American Medicine," and a certain ambitious foreign officer named Thomas Conway. They were all critical of Washington's handling of the war and they all wanted Washington replaced. Whether they united deliberately to form a "cabal," or plot, is debatable; regardless, their sniping, griping, and machinations have come to be known as the "Conway Cabal." George Washington learned of a letter written by Conway to Gates that called him a weak general; he learned of anti-Washington talk in Congress; and he was aware of broadsides, letters, and talk questioning his abilities. This "cabal" so frustrated and embittered Washington that he indicated that he would resign from the army if his performance continued to be brought into question. Charles Willson Peale, 1782, Portrait Gallery (Second Bank) Horatio Gates The campaign of 1777 was, by most estimations, the low point of Washington's military career. He retreated from Brandywine and he let slip away a probable triumph in the fog at the Battle of Germantown. Meanwhile his countryman General Horatio Gates had won a smashing victory at Saratoga. There was a desire expressed within the military and within Congress to have the commander in chief sent home to Mount Vernon and to replace him with the more successful Gates. Among Washington's detractors in Congress were Samuel Adams, Thomas Mifflin, and Richard Henry Lee. This group was dissatisfied with many aspects of the war — ranging from how supplies were procured, to battlefield performance, to the supervision of soldiers by the commander in chief. One of the most vocal critics of Washington's handling of troops was Dr. Benjamin Rush, the Father of American Medicine. This Signer of the Declaration of Independence, though no longer a member of Congress, was a respected army physician. He wrote a scathing, though unsigned letter to Patrick Henry, disparaging Washington's generalship and commending General Gates who was at the head of the northern army. In this letter was the following: The northern army has shown us what Americans are cable of doing with a GENERAL at their head. The spirit of the southern army is no ways inferior to the spirit of the northern. A Gates, a Lee, or a Conway would in a few weeks render them an irresistible body of men. In a separate letter Rush wrote, "The present management of our army would depopulate America if men grew among us as speedily & spontaneously as blades of grass. " John Adams, Rush's best friend, echoed the doctor's disgust, "I am sick of Fabian systems in all quarters! " Thomas Conway's name will forever be linked to the criticism of Washington due to his conspicuous attacks on the General. After Conway's able performance at the Battle of Brandywine on September 21, 1777, General Sullivan wrote: "His regulations in his Brigade are much better than any in the Army, and his knowledge of military matters far exceeds any officer we have. " (It was in rallying Conway's Brigade at Brandywine that the Marquis de Lafayette was wounded in the leg. ) Buoyed by his own bravery at Brandywine, Conway wrote a boastful letter to Congress asking for a promotion to major general. Such a promotion would have hopscotched him over many senior brigade leaders. While he waited for a reply from Congress, Conway continued disparaging Washington. He was overheard saying, "as to his (Washington's) talents for the command of an Army, they were miserable indeed. " When Washington got wind of Conway's self-important letter to Congress, he wrote to Richard Henry Lee protesting any appointment of Conway. "General Conway's merit, then, as an Officer, and his importance in this Army, exist more in his own imagination than in reality: For it is a maxim with him, to leave no service of his own untold, nor to want any thing which is to be obtained by importunity. . . " Washington goes on to write that promoting Conway would also have a disastrous effect on the morale of his longer-serving, more devoted officers who might resign. Washington continues, To Sum up the whole, I have been a Slave to the service: I have undergone more than most Men are aware of, to harmonize so many discordant parts, but it will be impossible for me to be of any further service, if such insuperable difficulties are thrown in my way. . . Some have suggested that Washington was oversensitive to criticism. But gossip, innuendo, and direct criticism flew about the commander in chief like grapeshot. Likely, he was privy to the reports sent from South Carolina Congressman Henry Laurens to his son John, who was an officer on Washington's staff. These letters were full of juicy anti-Washington whisperings floating about Congress. Laurens, who would later be President of Congress, cannily never named these "Actors, accommodators, Candle snuffers, Shifters of scene and Mutes" who impugned Washington. Then there were annoyances such as the circulation of an anonymous paper entitled, "Thoughts of a Freeman," written by Washington's enemies in Congress. It was critical of Washington's generalship, and particularly critical of the apotheosizing cult that had grown around him: "The people of America have been guilty of making a man their God." James Lovell, a Massachusetts delegate to Congress, and anti-Washingtonian wrote to Samuel Adams to complain about his fellow delegates, calling them, "privy Councillors to one great Man whom no Citizen shall dare even to talk about, say the Gentleman of the Blade." In other words, Lovell was concerned that various members of congress were unwilling to hear criticism of the General, while the General's defenders within the military were willing to defend his reputation with their swords. Lovell proved prescient as we shall see later. Conway and the "weak General" letter In late October 1777 Conway wrote a letter to General Gates which would bring the situation to a boil. It contained the following paragraph: "Heaven has been determind to save your Country; or a weak General and bad Coucellors would have ruined it. " As to Conway's motivations in writing Gates, only speculation serves. Perhaps he wished a transfer to Gates's army; perhaps it was part of his overall self-promoting public relations campaign; perhaps it was to rouse anti-Washington sentiment. Washington received word of the letter in a roundabout manner. A Gates aide, General James Wilkinson, was visiting the headquarters of the American officer Lord Stirling. Apparently while drunk, Wilkinson revealed the contents of the letter to a Stirling officer, Major McWilliams, who relayed its contents to Stirling. Stirling, mortified by "such wicked duplicity of conduct" felt obligated to report the letter's contents to Washington. In turn, Washington fired off a brief letter to Conway letting the upstart know that the contents of his letter had been exposed. Conway wrote back immediately saying falsely that he had never called Washington "a weak General." He went on to write that while he considered Washington a "brave man" he also thought that the general had been "influenced by men who were not equal to him in point of experience, knowledge or judgment. " Now he had not only disparaged the General, but his staff as well. On November 14 Conway offered his resignation to Congress. In enumerating reasons for his resignation he cited the rebuff by Washington, but also Congress's failure to promote him, and the promotion of Baron de Kalb who had held a lower rank than Conway in the French army. Congress passed Conway's letter on to the Board of War, whose members included the influential Thomas Mifflin. Washington's foes promote Conway While the War Board considered Conway's resignation, political foes of Washington in Congress promoted Conway to the newly formed position of Inspector General, which bore the rank major general. The Inspector General (ironically the post was conceived by Washington after a suggestion by a foreign volunteer) was to devote himself full time to the preparing of a training manual and assembling and implementing a guide to military maneuvers. Conway would work alongside Washington who was now at Valley Forge but would be responsible only to the War Board. To add insult to injury as far as Washington was concerned, Congress had appointed Horatio Gates as President of the Board of War, on November 27, 1777. War of the Letters Charles Willson Peale, 1781-82, Portrait Gallery (Second Bank) Baron Johann de Kalb Naturally, when Conway arrived at cold Valley Forge on December 29, Washington gave him the cold shoulder. Inspector General Conway began to shrink before Washington's wrathful eye and icy formality. In one charged exchange of letters, Washington wrote to Conway asking him how he intended to conduct business. Conway wrote back to the effect that if Washington found his service "disagreeable" that "I am very ready to return to France." Washington shot back that while he was very willing to work with Congress and accept their decisions, members of his staff felt slighted by Conway's promotion — particularly in light of how Conway complained after Baron de Kalb's promotion. Given enough time a loose cannon will shoot himself in the foot. Conway wrote another letter to Washington: We know but the great Frederick in Europe and the great Washington in this continent. I certainly never was so rash as to pretend to such a prodigious height. However, sir, by the complexion of your letter and by the reception you have honored me with since my arrival, I perceive that I have not the happiness of being agreeable to your Excellency and that I can expect no support in fulfilling the laborious duty of the Inspector General. On January 2, 1778, Washington forwarded Conway's diatribe to Congress along with a cover letter. In his letter, Washington confessed personal disdain for Conway but made it clear it never affected the professional manner in which business was conducted nor was the support Conway expected ever withheld. Placing Blame and Covering Up Conway had tracked down that it was Wilkinson who revealed the content of his letter to Gates. He reported this to Thomas Mifflin, who chastised Gates for being careless with his letters. Gates then wrote a letter concurrently to Washington and Congress. In it he asks for assistance in discovering the means by which Washington came in possession of Conway's letter to him. "Those Letters have been Stealingly copied," he wrote. Washington could do "a very important service, by detecting the wretch who may betray me, and capitally injure the very operations," he wrote. This was the first time that Washington discovered that Gates and Conway had been exchanging disparaging correspondence behind his back. Washington wrote back to Gates. In opening he expresses his dismay at Gates having sent the letter to both himself and Congress, questioning the motives, and then responding by doing the same himself, "lest any Member of that Honbl. body, should harbour an unfavourable suspicion of my having practiced some indirect means, to come at the contents of the confidential Letters between you and General Conway." He then revealed the sequence of events and goes on to say that the act rather than being one of betrayal of Gates was intended rather as an act of "Justice." Washington further stated that he had revealed the contents of Conway's letter to no one outside his family except the Marquis de Lafayette and then only upon demand and with the oath of secrecy. Washington stated that he was desirous of "concealing every matter that could, in its consequences give the smallest Interruption to the tranquility of this Army, or afford a gleam of hope to the enemy by dissentions therein. " Fulfulling Lovell's prediction, Gates challenged Wilkinson to a duel. The challenge was not accepted. Congress Reviews the Matter The Cabal collapsed on January 19 when Conway and Gates made a trip to Congress sitting at York. They went before Congress to try and clear their names but would not reveal the original "weak general" letter which was the catalyst for the cabal. Lafayette delegated himself spokesman for the French court. He did his utmost to convey the conviction that France regarded Washington as one and the same with the American cause. France could not even conceive of another commander, he implied. Eventually, that would be the French attitude, but only after Lafayette's efforts — especially his year of personal lobbying in France in 1779 — had worked to make it so. As we have seen other officers remained loyal to Washington throughout the affair, from the brigadier generals protesting Conway's promotion to the colonels writing anti-Wilkinson memorials to Congress. Another staunch ally was aide-de-camp Alexander Hamilton, a master manipulator who wrote a series of letters castigating the plotters. Congress, in light of the duplicity and foolishness of Gates and Conway, and in possession of letters of support from the majority of Washington's officers was forced to fully support Washington. The movement to unseat Washington lost all steam. The Fall Out Thomas Mifflin resigned from the Board of War. James Wilkinson resigned as Secretary of the Board of War. Horatio Gates returned to his troops a chastened general. Thomas Conway was transferred to a subordinate command in the Hudson Highlands. Naturally he protested this transfer and so resigned from the army. In 1778, Congress accepted his resignation. Yet Conway would not go away. He remained a burr in Washington's saddle by badmouthing the general to anyone who will listen. General John Cadwalader, a staunch Washington supporter, challenged Conway to a July 4 duel and "stopped his lying mouth" by shooting Conway in the mouth. Believing his wounds to be fatal Conway wrote a letter of apology to Washington. [Conway after the war].
012_270492
{ "id": "<urn:uuid:26187d09-7c05-4d7a-92fd-894352296dce>", "dump": "CC-MAIN-2017-17", "url": "http://www.ushistory.org/March/other/cabal.htm", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121355.9/warc/CC-MAIN-20170423031201-00556-ip-10-145-167-34.ec2.internal.warc.gz", "language": "en", "language_score": 0.9810654520988464, "token_count": 2939, "score": 2.75, "int_score": 3, "uid": "012_270492_0" }
A traumatic instability around the shoulder joint may occur in two distinct places. A shoulder separation involves the acromioclavicular (AC) joint, where the clavicle or “collar bone” articulates with the top of the shoulder (acromion). A shoulder dislocation involves the true ball and socket of shoulder joint, the glenohumeral (GH) joint. Shoulder separation describes various grades of injury to the ligaments which stabilize the acromioclavicular (AC) joint, resulting in a separation of the clavicle from the acromion. Shoulder separations usually are the result of a direct blow to the top of the shoulder, in a contact sport or an accidental fall. Shoulder dislocation occurs when the ball of the shoulder joint is forced out of the socket (dislocation of the glenohumeral joint). As a consequence of injury to the ligaments and capsule that stabilize the joint, the patient may experience a range of symptoms - from a sense of looseness of the joint resulting in “slipping” and subluxation or partial dislocation, to recurrent complete dislocation of the joint.
001_1089085
{ "id": "<urn:uuid:45b4677c-5b2f-4372-89d5-48321db3a26a>", "dump": "CC-MAIN-2020-16", "url": "https://www.hss.edu/condition-list_shoulder-separation.asp", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370497309.31/warc/CC-MAIN-20200330212722-20200331002722-00442.warc.gz", "language": "en", "language_score": 0.8477762937545776, "token_count": 242, "score": 3.078125, "int_score": 3, "uid": "001_1089085_0" }
Over three-quarters of the thousands of bumblebee colonies imported into the UK every year are riddled with parasites, a new study has revealed. Scientists say the discovery has "alarming" implications for the health of the UK's wild bees and honeybees, many of which are already in serious decline, and that urgent action is required to improve ineffective disease screening and close loopholes. "These parasites will undoubtedly be spilling over into wild and honey bees and very probably having negative effects on them," said Professor William Hughes, at the University of Sussex, who led the new research. "It is no great leap to think that damage is already being done. " The effects include killing bees outright, or harming their ability to learn, which is crucial in finding food. In Argentina, imported parasites are driving native species to extinction. Over a million bumblebee colonies a year are imported to countries around the world to pollinate greenhouse crops such as tomatoes, with the UK receiving 40,000-50,000. The colonies, sold by a handful of global suppliers, are said by the companies to be disease-free. But Hughes's team bought 48 commercially produced bumblebee colonies and used DNA testing to reveal five different parasites in the bees and three in the pollen provided by the suppliers as food. The research, published in the Journal of Applied Ecology, further showed that three of the parasites were able to infect bumblebees and four could infect honeybees. Hughes said independent checking of producers' disease-free claims was urgently needed. He said a particular concern was that one of the producers was marketing the colonies for use in peoples' gardens. "They are selling these to help preserve UK bumblebees, but if the imported colonies have parasites it's obviously counterproductive. " Natural England, the government's wildlife body, licences the use – but not the importing or disease screening – of bee colonies. An NE spokeswoman said the new evidence of risk to UK bees was "persuasive". But she said current regulations did not allow action against imported bumblebees which are originally descended from native British bees, but reared overseas. "It is therefore of particular concern that this research has revealed that imported bees – descended from British stock – have been found to be carrying disease. " A spokeswoman for the department of environment, food and rural affairs said: "Imported colonies of non-native bees are required to be screened for parasites and disease. We will continue to work with NE to ensure that growers who break the rules are punished. " New "tightened" regulations introduced in December require the producers to report the screening they have done and the location of non-native bee colonies imported into the UK to be registered, but no penalties have yet been issued. Friends of the Earth's Paul de Zylva said: "Limp regulation has already let in ash die-back and doomed millions of British trees. To avoid the same fate for our wild bumblebees ministers must ensure bee importers comply with stricter rules. " Bees and other pollinators are vital for three-quarters of the world's food crops but have experienced major declines in recent decades, due to starvation as their habitat is destroyed, heavy pesticide use and rising disease. "It's often a combination of all three and that may tip them over the edge," said Hughes. For example, he said, bees cannot resist a parasite if they are stressed by a lack of food and also weakened by sub-lethal doses of pesticides. On Tuesday, 23 of the EU's nations voted successfully to suspend the use of a common pesticide called fipronil because of an acute risk to bees. The UK abstained, as it did when other EU nations voted in favour of banning three neonicotinoid pesticides in April. Hughes's team bought the 48 colonies in two separate years, 2011 and 2012, to avoid the risk of sampling an unrepresentative year. The parasites found in the imported colonies included the three main bumblebee parasites (Crithidia bombi, Nosema bombi and Apicystis bombi), three honeybee parasites (Nosema apis, Ascosphaera apis and Paenibacillus larvae), and two parasites which infect both bumblebees and honeybees (Nosema ceranae and deformed wing virus).
002_1424135
{ "id": "<urn:uuid:dbd52476-bed1-421a-8f2c-8ea36cfff8cc>", "dump": "CC-MAIN-2014-41", "url": "http://www.theguardian.com/environment/2013/jul/18/bumblebees-honeybees-parasite-infection/print", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657136896.39/warc/CC-MAIN-20140914011216-00298-ip-10-234-18-248.ec2.internal.warc.gz", "language": "en", "language_score": 0.9635688662528992, "token_count": 879, "score": 3.203125, "int_score": 3, "uid": "002_1424135_0" }
“What’s today? ” I ask Joey, after we’ve counted all the numbers already posted on his wall calendar. “What comes next? ” I hold up two possible choices, and every time – every time – Joey grins, stares, and then carefully moves his arm so he can clutch the card with the correct answer. It never gets old watching him proudly select the right number to put on his calendar. Although he is always correct, as his teacher I try to stay fully aware that being able to recognize what number comes next in a pattern is different than a full development of age-appropriate number sense. There are so many facets to developing mathematical thinking, and I want to be sure Joey is getting a well-rounded foundation, despite his limitations. I was thrilled the other day when my Journal of Early Intervention arrived in my mailbox and included an article on how storybook read-alouds can be used to improve our preschooler’s mathematical ability. This is exactly what I hope to accomplish in my lessons with Joey. Seeing the research behind the study confirmed that Joey experiencing and practicing number sense activities throughout our sessions. The study focused on supporting the development of three different concepts – quantity comparisons, one-to-one correspondence counting, and oral counting. With Joey, I’m often looking for ways to count sets of objects in books. We recently read David Shannon’s Duck on a Bike (which, by the way, includes three of Joey’s favorite AAC words – duck, on, bike). As Duck rides his bike through the farm, he talks to many different farm animals. Although this is not a counting book, we can count each animal as Duck goes past. For this book I have plastic animals to represent each animal in the story, so we can line the animals up in front of Joey as Duck greets each one. This lets us be able to not just count a set of objects, but we can also watch as the line grows as we add each new animal. “Now there are four… but one more comes… and now there are… five! ” At the end of Duck on a Bike, each animal finds a bike to ride. This gives us another opportunity to work on comparing amounts and matching like-sets. For this, I have a laminated picture of the animal that Velcro’s onto a laminated bike. After reading the book we play a game where we spin a wheel to determine how many bikes we get to give to the animals. If Joey spins a 2, he gets to pick up two bikes and give them to two different animals. This integrates numeral recognition, selecting a set amount, and matching sets with one to one correspondence. We are now reading Dear Zoo , which also gives us an opportunity to count animals. In this book a child writes to the zoo for a pet, and each time the zoo sends an animal that just isn’t right (until the very end. ) Here, we can make our own line of animals that the zoo sends, to work on counting with one to one correspondence, and adding on by one to a set of objects. Although the child in the book sends back each animal after he receives it, I like to wait until we’ve collected all of the zoo’s animals, and then send them back one by one, so we can watch as the line of animals gets smaller and smaller until only the puppy is left. This lets us work on those early subtraction skills. Although Joey may not be able to explain his mathematical thinking to us (and really, how many four year olds can? ), he’s exploring early numeracy skills through acting out story books, reading the books, and playing with items related to the books. I am hopeful all of this will improve his math skills and give him a solid foundation as he continues to learn and grow. Green, K, Gallagher, P, and Hart, L. (2018). Integrating mathematics and children’s literature for young children with disabilities. Journal of Early Intervention, 40, 3-10.
008_29241
{ "id": "<urn:uuid:985fd1d2-0053-4b50-b73b-01d9c594cc5b>", "dump": "CC-MAIN-2018-47", "url": "https://joeys.foundation/2018/04/05/incorporating-math-skills-into-storybook-read-alouds/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746171.27/warc/CC-MAIN-20181119233342-20181120015342-00317.warc.gz", "language": "en", "language_score": 0.9639354944229126, "token_count": 847, "score": 3.5625, "int_score": 4, "uid": "008_29241_0" }
The above write-up treats books as concepts. Let me get a little more detailed about the history of books as physical objects. The paperbacks and hardbacks we are so familiar with today are the product of evolutionary change, fads and fashions, and the random mixing of cultural influences. The history of the modern book is primarily a European one, though many of the techniques and materials were invented elsewhere. Evolution of the Codex In ancient Greece and Rome, literature was stored in scrolls. Today, we tend to picture scrolls as unrolling from top to bottom, with the text in a continuous line. Like this. / \ \ | | | | | \ / / | writing writing | | writing writing | | writing writing | | writing writing | | / \ \ | |__| | \ / / That's not the way it worked. Rather, scrolls were held horizontally, and rolled up on the left as they were unrolled on the right. Text was written in blocks separated by columns of white space. Although this method wasted a little papyrus, it was much easier to write on and read from a scroll that wasn't unravelling on one's lap. / \ / \ | |_____________________________| | | | | | | | one block of a second blo | | | | writing one ck of writin | | | | block of wri g a second b | | | | ting one blo lock of writ | | | __ | ck of writin ing a second | __ | |/| \| g one block block of wri |/ |\| | |_/ of writing. . ting. . . . . . . . \_| | Scrolls are hard to store - they squash easily. When you put them in tubes to stop that, the resultant cylinders were a pain to stack. Sometime in the first century after Christ, someone had the brilliant idea of folding the scrolls in the white margins. Fan-folding a scroll makes a rectangular block, which almost invites stitching along one side. The next development was to write on both sides of each page, and fold it into signatures for stitching. The advantage of that approach was that they needed smaller pieces of whatever material they made the books out of. This meant that rather than importing expensive papyrus from Egypt, they could use parchment from a nearby sheep. This was the classic first-century codex, the ancestor of every book on your shelves. Books Through the Centuries Book design took centuries to change from the codex form into something more familiar. Bookbinders tend to be conservative even now - in medieval times, they were even more wary of new techniques which might threaten the sacred duty of the preservation of knowledge. Different geographical areas tried things out at different times, and practices tended to spread slowly from centres of innovation. Still, a general summary of European book design in each century shows the slow evolution of the modern book. (All dates are AD. ) - First - Third Centuries No books remain from this period, and descriptions are rare, so we have no idea how long the idea of the codex took to spread through the Roman Empire. - Fourth Century The Coptic form was well-established, with signatures joined by rows of chain-stitching and connected to wooden boards. As more books were made of parchment or vellum, which tend to cockle and buckle, the wooden covers became more important for large books (smaller ones were bound into limp bookbindings). Ties were often fastened to the heads and tails of the covers to hold the book closed when unused. Author and title information was recorded on the covers of books, and on the fore edges of pages. Books were stored lying flat, or fore-edge out on shelves. The first use of colour on the edges of the pages occurred in the fourth century. The technique is still in use today. - Fifth - Eighth Centuries Books were covered in vellum, leather, or tawed skins (skins treated with alum and salt rather than tanned). No attempt was made to stick the covering material to the spines of the books. Leather thongs or other materials were often glued to the boards before covering, so that the final surface was moulded over the raised portions. All animal surfaces (leather, vellum, and tawed skins) were decorated by blind tooling, a technique that is still in use now. - Ninth Century The first major innovation in bookbinding arose - sewing on exposed cords, where signatures were attached to leather thongs or cords rather than simply chain-stiched together. Wooden covers were laced onto the books with the ends of the thongs. - 10th CenturyTenth - Eleventh Centuries Sewing on cords was made easier by the invention of the sewing frame, which tensioned the thongs before the signatures were attached. This made for even book blocks. - Twelfth Century The 1100's saw the pace of change in bookbinding increase. Italian binders began working with a new material whose manufacture had just arrived from China - paper. The new material was easier to work with and cheaper than parchment, but it was also more fragile. Binders began to make header tape to protect the tops of the pages at the spine, stitching it into the signatures. - Thirteenth Century Italian papermakers continued to innovate, adding designs to their deckles to create watermarks. Binders refined the flexible style, attaching the covering material to spines for the first time. They used a technique of tying up to emphasise the leather thongs. In the Islamic world, gold tooling was introduced to decorate covers. - Fourteenth Century Designs on the edges of pages became more elaborate, with ornamentation added to the titles on fore edges. Toward the end of the century, leather began to replace other materials as the standard covering. Cut leather designs began to gain popularity, particularly in Germany. - Fifteenth Century By this time, leather was well-established as the normal covering material for books, though fabric was increasingly common in fancy bindings. It was still cut, moulded, and blind tooled, but could also be stamped to impress a design on it. In the 1460's, Italian binders began gilding the edges of the pages to protect them from dust damage. Within a generation, the gilded edges were being gauffered, stamped and ornamented with heated tools, and binders began to experiment with gold tooling. - Sixteenth Century This was when it all happened. The Renaissance and Gutenberg had a tremendous impact, as did the patronage of royalty, who set a fashion of large and elaborate libraries. King Henry VIII and Queen Elizabeth I both had extensive book collections (Elizabeth's were all bound in coloured velvet, which was apparently quite a sight). The structural changes to books were profound in this century. Sewing on sunken cords became popular, though false bands were often added to look like the book was still sewn on thongs. Books were rounded and backed, making them much more suitable to stand on shelves. They started to be stored spines out rather than fore edge out, and header tape, now manufactured separately, was in vogue. And wood was replaced with pasteboard in covers for the first time. Decoration changed as well. The fashion for cut leather faded, and stamping became increasingly popular. Endpapers were introduced, either of marbeled paper or paste papers (particularly in Germany, which was known for its red and blue papers). But the largest change was the ubiquity of gold tooling (sometimes to an excess that we find tasteless now). - Seventeenth Century As books were stored spine-out, titling on spines began to appear. Gold tooling became more elaborate, on spines and covers. There was a fad for edge paintings, visible only when the pages of the book were fanned out slightly. - Eighteenth Century This century was dominated more by consolidation of techniques than by innovation. Wove paper, without the lines of laid paper, was introduced. At the end of the century, binders in France introduced the hollow back book, where the spine cover moves separately from the book spine itself. - Nineteenth Century The nineteenth century saw Great Britain's binding industry catch up with, and eventually pass, the rest of the world. British binders adopted the hollow back book and abandoned wooden boards entirely. Apart from a brief fad for moulded papier mache, covers were exclusively pasteboard. The Victorian passion for invention saw the guilloutine introduced to trim pages faster than the traditional plough, and the patenting of the first form of perfect binding. Half binding and quarter binding became common to feed the growing market for books. The late Nineteenth century saw a nostalgic trend in fine binding, led by T.J. Cobden-Sanderson. The Arts and Crafts ideas of simplicity and handcrafting led to a re-introduction of flexible bindings, combined with delicate gold tooling and colourful marbeled papers. - Twentieth Century Twentieth-century books can be divided into two classes, mass-market bindings and fine bindings. Mass-market volumes were generally entirely machine-made. After the 1930's, paperbacks were commonly manufactured with perfect bindings, whose adhesives improved steadily after World War II. Hardcover books were either perfect bound or signature sewn, with hollow backs and French grooves. In fine binding, which was done exclusively by hand, the last century saw the introduction of contemporary artistic trends into binding styles for the first time. Previously, binders had lagged about half a century behind painters, but most modern artistic schools have been immediately reflected in binding. This is probably a result of the increasing rise of amateur binders, who don't have to play it safe to make money. Except for very thick volumes (where a hollow back was necessary), professional fine bindings generally used the flexible style with raised cords and tight joints. Amateurs were much more experimental, using a variety of styles. Source: The British Library Guide to Bookbinding, by PJM Marks, The British Library Press, 1998.
006_1082590
{ "id": "<urn:uuid:3dc2e4df-58ac-4e04-a3a3-c2195ba1b39b>", "dump": "CC-MAIN-2015-27", "url": "http://everything2.com/title/A+brief+history+of+books", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435376073161.33/warc/CC-MAIN-20150627033433-00151-ip-10-179-60-89.ec2.internal.warc.gz", "language": "en", "language_score": 0.9748197197914124, "token_count": 2130, "score": 3.03125, "int_score": 3, "uid": "006_1082590_0" }
Reviewed by Emily Miller Bonney BAR-IS 2256. Pp. 519, figs. 82, tables 46. Archaeopress, Oxford 2011. £70. ISBN 978-1-4073-8023-4 (paper). The volume under review is the collaborative effort of two scholars who previously have worked in quite different traditions with significant consequences for this project. Van Binsbergen has spent more than 35 years as an anthropologist and development sociologist in south-central and North Africa and has produced more than 200 publications, including most recently studies on intercultural epistemology and long-range reconstructions of history. While he sees much to admire in Bernal's Black Athena: The Afroasiatic Roots of Classical Civilization (New Brunswick, N.J. 1987), in his own view the similarities between the Aegean and Egypt in the Bronze Age result from the spread into both regions (and on into Sub-Saharan Africa) of peoples, linked linguistically and culturally, from west or Central Asia in the Upper Paleolithic, ca. 30,000 B.C.E. Woudhuizen, whose doctoral thesis van Binsbergen helped to supervise, trained in Mediterranean pre- and protohistory with a particular interest in Luwian. He contributed to The Phaistos Disc: A Luwian Letter to Nestor (W. Achterberg et al. [Amsterdam 2004]) and completed his dissertation ("The Ethnicity of the Sea People," Erasmus University), in 2006, a revised version of which constitutes section 2 of this book. The authors' differing perspectives—van Binsbergen, the Africanist, looking into the deep past for explanations, and Woudhuizen relying on more recent pre- and protohistory—account for some of the problems in this volume. But there also are serious methodological issues both in the authors' treatment of mythology as history and in their analysis of linguistics. To the extent that they herewith make available the textual references to the Sea Peoples, the strongest part of the book, they have made a positive contribution. Suggesting that the rest will be controversial understates the situation. The book consists of four major sections: "Ethnicity in Mediterranean Proto-History: Explorations in Theory and Method," by van Binsbergen (17–191); "The Ethnicity of the Sea Peoples: An Historical, Archaeological and Linguistic Study," by Woudhuizen (191–330); "The Ethnicity of the Sea Peoples: A Second Opinion," by van Binsbergen (331–94); and "The Ethnicity of the Sea Peoples: Towards a Synthesis, and in Anticipation of Criticism," by both authors (395–419). There is a final section of nearly 100 pages of references. Within each section, the text is arranged in a topical hierarchy, each section divided into chapters and the chapters (usually) further divided into subsections and (occasionally) sub-subsections. These topical analyses are for the most part hermetic, with no clear link to the next topic; these independent stand-alone arguments cause the chapters to lack a coherent narrative arc. The conceptual framework is equally fragmented, so that sections 1 and 2 in particular seem completely unrelated. What follows is an extremely compressed summary of the authors' densely argued case. In section 1, van Binsbergen outlines his theoretical model. According to him, analysis of the ethnic composition of the Mediterranean at the end of the Late Bronze Age (ca. 1200 B.C.E.) must consider the linguistic consequences of the departure of anatomically modern humans from Africa in 70,000–60,000 B.C.E. with a return from western Asia some 30,000 years later (74–5). Speaking languages descended from the Borean macrofamily (van Binsbergen follows Starostin here), these people shared mythemes that were spread through the eastern Mediterranean and into Sub-Saharan Africa. The subsequent replacement of a "Separation of Water and Land" cosmogony by one founded on the "Separation of Heaven and Earth" left etymological traces (104). During the Neolithic and Bronze Ages (ca. 11,000–1200 B.C.E.), a Pelasgian collection of cultural traits expanded from the eastern Mediterranean and western Asia to encompass Europe, the Eurasian steppe, and much of Sub-Saharan Africa. It is through this aggregate of lenses that van Binsbergen proposes to investigate Mediterranean ethnicity, which he defines as a sociopolitical process that involves both ethnogenesis and ethnicization (32–41). Having spent the first four chapters articulating his theoretical framework, he turns to two documents as case studies—the Homeric Achaean "Catalogue of Ships" (ch. 5) and the biblical "Table of Nations" (ch. 6). He concludes that the former expresses an overall Achaean identity broken down into smaller regional units, each associated with particular symbolic and cultic features but indistinguishable in terms of congenital somatic characteristics (115). The "Table of Nations," which van Binsbergen investigates through comparative mythology and long-range linguistics (141), does appear to contain "extensive positive evidence of one comprehensive ethnic classification system" (184), although its structure as a genealogy precludes identification of actual social-political structures relevant to ethnogenesis and ethnicization. In part 2, Woudhuizen takes over with the goal of determining the ethnicity of the Sea Peoples. Unlike van Binsbergen, Woudhuizen focuses on ethnicity within the Bronze Age not in terms of Paleolithic roots. Relying primarily on textual material but adducing pottery or other archaeological data when the written sources fail, Woudhuizen claims that the Sea Peoples, as named in the historical inscriptions of Merneptah at Karnak (1208 B.C.E.) and Rameses III's mortuary temple at Medinet Habu (events from 1179 and 1176 B.C.E.), comprised nine distinct ethnic groups from the central and eastern Mediterranean. The peoples in Sicily, Sardinia, and the Italic peninsula, pressed by the Urnfield population encroaching on the peninsula perhaps ca. 1300 B.C.E., traveled east, associating with other groups during the violent episodes recorded in the sources and settled ultimately in the Levant with new ethnic identities. In part 3, van Binsbergen responds to Woudhuizen's proposal. He contends that we can best understand the Sea Peoples as a diverse, peripheral, and archaic segment situated in the eastern Mediterranean, sharing a Pelasgian background or toolkit and reacting against the perceived threat of the Hittite and Egyptian states. While the latter subscribed to the newer cosmogony of the Separation of Earth and Heaven, the Sea Peoples, as demonstrated by the swans on the prows of their symmetrical ships, shared an archaic adherence to a cosmogony of the Separation of Earth and Water. Although linguistically and ethnically distinct, the shared Pelasgian traits of these groups drew them together in a unified cause. In part 4, the authors jointly claim to reconcile their competing views of the origins of the Sea Peoples by arguing that although there are differences in where they would situate these groups and hence in how they might perceive the movement of the subgroups (i. e., east to west [Woudhuizen], and both east and westbound [van Binsbergen]), there may be a synthesis, they claim, if one assumes widespread Pelasgian affinities predating the Sea Peoples episode that allowed these separate groups to recognize one another for purposes of collaborating in the attacks. This brief summary cannot convey the tortuous route by which the authors reach their final synthesis, a state of affairs that results from both the structure of the text described above and the difference in perspective between the authors noted at the beginning of this review. Van Binsbergen devotes more than 90 pages to the explication of his theory of ethnicity originating in the Paleolithic. Recognizing that his argument is open to challenge, he deploys myth, genetic evidence, linguistics, and texts ancient and modern to portray, among other things, an antiquity in which links between the Mediterranean and Africa extended into deep prehistory. The result is dazzling as he moves without hesitation from one type of evidence to the next. Woudhuizen likewise incorporates substantial amounts of excursus to shore up his fundamentally linguistic arguments. His approach, sharply criticized by Masson (rev. of Ancient Scripts from Crete and Cyprus, by J. Best and F. Woudhuizen, Syria 68 473–75), relies on linking words and word fragments independent of the internal logic of the language in question so that these linguistic bits can, as Masson observes, be manipulated to Woudhuizen's convenience. His technique results in an array of at best dubious claims and at worst incredible statements, such as his assertion that the region around Hagia Triada and Phaistos ca. 1500 B.C.E. was "inhabited by Luwians, who adopted the Semitic language [Cretan hieroglyphics] in religious and official matters in order to adapt to the international standards of the time" (280). Woudhuizen's decision to address such additional topics as the saga of Aeneas and the decipherment of Cretan hieroglyphic in separate chapters only compounds the confusion. It is not surprising, although still dismaying, that in a 58-page bibliography, more than three full pages consist of works written by either van Binsbergen or Woudhuizen and relied on to support some of their most controversial conclusions. One would have liked more independent support for their claims. For all its shortcomings, only incompletely identified here, the book may be of use to those interested in the archaeology of ethnicity (an emerging field) or in the history and identity of the Sea Peoples, and van Binsbergen, at least, articulates original and provocative claims. Whether the £70 investment is worth it depends on the prospective reader's interest in taking on a complex and problematic work. Emily Miller Bonney Department of Liberal Studies California State University–Fullerton Fullerton, California 92834
000_4350839
{ "id": "<urn:uuid:017479a2-04a5-47a3-a51e-f34a4b90d62e>", "dump": "CC-MAIN-2014-10", "url": "http://www.ajaonline.org/online-review-book/1529", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021775214/warc/CC-MAIN-20140305121615-00088-ip-10-183-142-35.ec2.internal.warc.gz", "language": "en", "language_score": 0.9301239252090454, "token_count": 2140, "score": 2.5625, "int_score": 3, "uid": "000_4350839_0" }
This chapter has been published in the book CHINA, KOREA & JAPAN to 1800. For ordering information please click here. We have seen how Chinese politics became more corrupt, cynical, and violent in the Spring and Autumn era and especially in the Period of Warring States. While many philosophers of the schools of Confucius and Mo-zi called for ethical reforms and Daoists let nature take its course or retreated into seclusion, others experimented with stricter laws and practical administration. One of the first of these was Guan Zhong, who advised Duke Huan of Qi in the early 7th century BC. His life and the fourth-century administrative reforms of the realists Shang Yang and Shen Buhai were discussed in Chapter 13 on the Zhou dynasty. About 302 BC King Xuan of Qi founded a scholarly academy known as Chi-Xia. An influential book named after Guan Zhong called the Guan-zi was probably written around the middle of the third century BC, supplemented over time, and edited into its final version by about 26 BC. Though still often recommending the same virtues the Confucians emphasized, this work is considered a forerunner of Legalism because of its practical political philosophy. In the Guan-zi agriculture and wealth are considered the basis of good behavior. The spirits and ancestors are to be venerated, and the four cardinal virtues are propriety, justice, integrity, and conscience. Successful government depends on following the hearts of the people. If the ruler can provide the people with prosperity and leisure, they will make sacrifices for their state. Punishment alone is not sufficient, because if it becomes excessive, orders will not be carried out. Trusting those with virtue puts the state on a firm foundation. Cultivating grain, mulberry, hemp, and domestic animals supplies the storehouses. Employing those with skill, giving orders that accord with the will of the people, using stern punishments and consistent rewards, and not cheating the people lead to good government. Those who govern should be impartial like heaven and earth, the sun and the moon. Walls and armed forces are not enough to meet the enemy, and vast territory and abundant wealth will not hold the masses, unless the way is followed. These scholars recommended that anyone who would question the present should investigate the past, and one can understand what is to come by studying what has gone before. To control the state one must be careful how one uses the people. The sovereign can instruct the people with wisdom and propriety but must also set an example and see that expenditures are proper while excesses are avoided. Laws establish the authority of the government and make use of the people's strength and ability. Serious attention must be paid to the granting of offices, their rewards, and to punishments. Collective responsibility for crime extends from the members to the head of the family, from them to group leaders, then to clan elders, the village commandant, subdistrict prefects, the district governor, and finally to the chief justice. Rewards were similarly applied, giving authority figures strong incentives to influence those under them. The Guan-zi criticized such Moist ideas as abolishing the use of arms and universal love out of fear that the troops would not fight. The art of warfare is discussed, commending speed, lightness of equipment, well organized troops, destruction of enemy fields, well paid spies, and prohibition of unorthodox doctrines. As usual, military morality violates universal ethical principles. Yet in the model guidelines the prince is urged to conform to the will of heaven in initiating affairs of state. This is interpreted as not bestowing favors on those close to him nor disdaining those far away. The prince is warned not to reward just because he is pleased nor to kill because he is angry; for if his orders are capricious, they will not be carried out, and the people will turn to outsiders. Pragmatically this work suggests examining the results when promoting what one thinks is good and counting the cost when one rejects what one dislikes. The prince should encourage those he respects, provide salaries for those with merit, and honor those who achieve success. Here spreading universal love is considered spreading the princely mind. The people can be influenced in a moral way by caring for them with kindness, humanity, justice, goodness, faithfulness, and propriety. They can be harmonized with music, limited with time, tested with words, sent forth with strength, and overawed with sincerity. However, one who is incompetent in government has barren fields, empty towns, offices in disarray, laws ignored, empty granaries, and full jails. The worthy withdraw, while the wicked advance; officials esteem flattery and look down on honesty. Citizens honor profit-seeking and despise martial courage; they love drinking and eating but abhor agricultural labor. The result will be exhaustion of fiscal resources and lack of food. Such a ruler is extremely severe and demanding, while the officials are disobedient and destructive, resulting in discord. Benevolent government opens up fields, regulates shops, cultivates horticulture, exhorts the citizenry, encourages farming, repairs the walls and buildings, and circulates wealth by developing hidden resources, building roads, making markets convenient, and providing travel lodgings. Government is liberalized by easing exactions, lightening levies, relaxing punishments, pardoning crimes, and forgiving minor errors. The people are assisted by being compassionate to orphans, the widowed, the sick, and the unfortunate. They are further aided in distress by clothing the freezing, feeding the starving, assisting the poor, and comforting the upset. Benevolent government can then lead to just conduct and propriety, resulting in respect. Heaven serves with its seasons, earth with its natural resources, spirits with their omens, and animals with their strength; but humans serve with their virtue. The Guan-zi notes that nothing destroys goods, impoverishes the people, endangers the country, or causes the ruler concern more than the armed forces; but from the ancient times no one has been able to dispense with them. Violent and reckless princes cannot avoid external disorders, but weak and irresolute princes cannot avoid internal disorders. Finally Guan-zi advises us that the enlightened kings governed by being cautious and making the people happy. The best thing is to criticize oneself. Then the people will not have to criticize. The people will criticize those who are unable to criticize themselves. Therefore, being able to judge one's own mistakes represents strength. Cultivating one's moral integrity represents wisdom. Not blaming evil on others represents goodness. Therefore, when the enlightened kings made mistakes, they took the blame themselves. When they did well, they gave credit to the people. When there are mistakes and one takes the blame oneself, one becomes cautious. When things are done well and credit is given to the people, they are happy. 1 At the same time the book named after Guan Zhong was circulating in the third century, there was another legalist tract going around attributed to the fourth-century chancellor of Qin, Shang Yang, called the Book of Lord Shang. It begins with a discussion led by Duke Xiao with three great officers on the world's affairs. The Duke wants to alter the laws but is afraid of being criticized by the people. Believing that the people's thoughts do not matter at the beginning, but they may rejoice in the completion, Shang Yang says, "The law is an expression of love for the people. "2 He believes the wise do not model themselves on antiquity nor adhere to established rites if they can benefit the people. The wise create laws, but the foolish are controlled by them. The great emperors and kings of the past did not copy one another but acted according to practical requirements. Thus according to Shang Yang's advice, the Duke decided to bring the waste lands under cultivation. In order to strengthen the country Shang Yang believed that everyone's efforts should be devoted to agriculture and war. A strict legalist, Shang Yang's book is definitely anti-Confucian, as seen by the beginning of the section on "Discussion About the People." Sophistry and cleverness are an aid to lawlessness; rites and music are symptoms of dissipations and license; kindness and benevolence are the foster-mother of transgressions; employment and promotion are opportunities for the rapacity of the wicked. 3 These eight things would make the people stronger than the government and the state weak. Shang Yang wanted the government to be stronger than the people so that the army will be strong, and the state can attain supremacy. If the officials are virtuous, the people will love their relatives; but if officials are wicked, people will love the statutes and spy on others so that crimes will be punished. Thus this book actually argues against virtue and the strength of the people but for a strong government and army. The poor should be urged to work by rewards, and the rich should be punished so that they will not be parasites. Private rewards to those below should be forbidden so that the people will fight forcibly against the enemy. In the best ordered state the laws are clear, and the judgments are made by the families; in a merely strong state judgments are made by the officials; and in a weak and disordered state judgments are made by the prince. Shang Yang's book recommends statistical methods in cultivating the grass lands and making uniform rewards for soldiers. Orderly government is to be brought about by law, good faith, and correct standards. When rights and duties are clearly established by law, self-interest will not do harm. The Book of Lord Shang criticizes contemporary states that are disorderly because of private benefits going to those in office. Bad ministers let their standards be influenced by money in order to obtain emoluments. When the ministers compete with each other in selfishness and neglect the people, inferiors are estranged from superiors, dividing the state. States are in disorder, because the law is not applied. Crimes are committed, because their perpetrators are not caught. This book argues that if punishments are too light, crime cannot be eradicated; but when punishments are heavy, people will not dare to do wrong. Then everyone will be virtuous without rewarding the virtuous. Rewarding the virtuous is not permissible, because it is like giving rewards for not stealing. The good may be good toward others but cannot cause others to be good; they may love others but cannot cause others to love. Thus goodness is not sufficient for governing the empire. The wise insist on good faith and have a method (law) by which the whole empire can be compelled to have good faith. Thus when law is correctly administered, the result will be virtue. The legalist argues that if a condition can be brought about where there is no other standard than the law, then the clever will be unable to do wrong. If people are controlled by law and if promotions are awarded by following systematic rules, then they will not be able to benefit each other with praise nor harm each other with slander. Then they will become accustomed to loving each other without flattery and hating each other without injuring each other, thus purifying love and hatred and producing the highest degree of order. Some of these principles of law are commendable, in my opinion, but the accompanying ideas of control by harsh punishments and that people should not be allowed to exert their capabilities in anything other than farming or war are abominable. Unlike the other great Chinese philosophers of this era (Lao-zi, Confucius, Mo-zi, Mencius, Zhuang-zi, and Xun-zi) who were impoverished noblemen, Han Fei-zi was a prince of the royal family in the state of Han. He was born around 280 BC and studied under the Confucian realist Xun-zi at the Chi-Xia academy along with Li Si, who considered Han the better student, according to Sima Qian's biography. Since he was not a good speaker, Han Fei submitted his writings to the rulers of Han. The king of Han, however, did not apply them; but Han Fei continued to complain that ambitious scholars and militarists were given prominence over honest gentlemen. Eventually the writings of Han Fei came to the attention of the young king of Qin, who began ruling in 246 BC and went on to become the founding Emperor of the Qin dynasty, Shi Huang Di. His prime minister was Han Fei's old friend Li Si, who informed his sovereign these writings were Han Fei's. In 234 BC Qin attacked the state of Han, and their king An sent Han Fei as his envoy to Qin. The king of Qin was delighted to meet the philosopher, but Li Si warned the king that Han Fei was of the royal family of Han and likely to remain loyal to that state and therefore be against Qin. Charges were brought against Han Fei, who wanted to plead his case before the king, but he was not allowed an audience. So Han Fei sent a written memorial in which he acknowledged the perpendicular alliance formed from a north-south line of countries against the western power of Qin; but he argued that they were weak and likely to run away in a confrontation, because they have no faith in rewards and punishments. In contrast the people of Qin respect courageous death, and it is a much more powerful country. Nevertheless Qin has not yet gained hegemony, because its counselors are not loyal. Han Fei suggested that Qin could conquer the powerful Chu in the south and Qi and Yan in the east as well as the three states of Zhao, Han, and Wei, which had formed out of Jin. He recounted several times in history when Qin lost its opportunity to gain this hegemony. Han Fei declared that if his advice was followed and Qin did not gain hegemony, then the king could behead him as a warning to others. In another memorial Han Fei urged the king of Qin to treat Han as a loyal ally rather than an enemy so that the perpendicular alliance would not be mobilized against him. However, Li Si argued against this theory to the king and sent poison to Han Fei in prison. Han Fei, unable to communicate with the king, drank it and died in 233 BC. Although the king regretted his decision and pardoned Han Fei, it was too late. Han Fei-zi is the main representative of the school of philosophy called Fa-jia, the legalists or realists. He drew the concept of law (fa) from the Book of Lord Shang and the idea of administration (shu) from the writings of Shen Buhai. From the logicians he borrowed the theory of forms and names (xing-ming), which he applied to politics as the correspondence between administrators' words and job descriptions and their actual functioning in practice. Han Fei-zi was also very much influenced by Daoism, making a strange combination of legalistic authoritarianism and passive acceptance. His essay on the "Way of the Ruler" shows this relationship. It begins, The way is the beginning of all beings and the measure of right and wrong. Therefore the enlightened ruler holds fast to the beginning in order to understand the wellspring of all beings, and minds the measure in order to know the source of good and bad. He waits, empty and still, letting names define themselves and affairs reach their own settlement. Being empty, he can comprehend the true aspect of fullness; being still, he can correct the mover. Those whose duty it is to speak will come forward to name themselves; those whose duty it is to act will produce results. When names and realities match, the ruler need do nothing more and the true aspect of all things will be revealed. Hence it is said: The ruler must not reveal his desires; for if he reveals his desires his ministers will put on the mask that pleases him. 4 Han Fei-zi did not want the ruler to be manipulated by his ministers, which is why he advised the sovereign not to reveal his will or express his likes and dislikes. The wise ruler does not expose his wisdom but has everyone know their place, does not display his worth but observes the motives of the ministers, and does not flaunt bravery in shows of indignation but allows subordinates to demonstrate their valor. The officials have their regular duties, and each is employed according to specific ability. The ruler practices inaction, but the ministers below tremble in fear. The inferior ruler uses his own ability; the average ruler uses the people's strength; and the best ruler uses the people's wisdom. The ruler takes credit for accomplishments but holds ministers responsible for their errors. The ministers labor and display wisdom, but the ruler is their corrector and maintains an untarnished reputation. The ruler should know but not let it be known that he knows. Each person's words are to be compared with their results. Officials should not know what others are doing. No one must be allowed to covet his power in this authoritarian regime. The ruler uses the two handles of rewards and punishments to control others and examines results to see how they match his objectives. The ruler is to be immeasurably great and unfathomably deep, while any attempt of ministers to form cliques is to be smashed. Thus ministers should not be allowed to shut out the ruler nor control the wealth of the state nor issue their own orders nor do good deeds in their own name nor build up cliques so that the ruler will not lose effectiveness, the means of dispensing bounties and command, his reputation for enlightenment, and his support. The way of the ruler is to observe calmly what others say and do without speaking or doing himself. He notes proposals and examines their results. He assigns tasks to ministers according to what they say and the accomplishments that result. Those whose deeds match their words are rewarded; when things do not match, they are punished. These rewards and punishments must be dispensed objectively so that even those close to the ruler may be punished and those far away can be sure of reward. Thus all will have to make effort, and none can be too proud. Nevertheless for Han Fei-zi what transcends even the ruler is the law. "On Having Standards" explains that an enlightened ruler uses the law to select officials by weighing their merits without attempting to judge them himself. True worth will not remain hidden, and faults will not be glossed over. Praise will not help some advance, nor will calumny drive others from the court. Ministers are to be like the hands and feet of the ruler, not presuming to use their mouths to speak for private advantage or their eyes to look for private gain. Even the ruler must never use wise ministers and able servants for selfish ends so that the government can be consistent and good. Han Fei-zi disdained those who leave their posts to search for another sovereign, controvert the law with false doctrines, censure their sovereign, try to gain a name for themselves by doling out charity, or even those who withdraw from the world and criticize their superiors or seek favorable relations with other states in order to make themselves indispensable in a crisis. If the ruler tries to monitor the government with his own eyes, ears, and mind, he can be manipulated by what is presented to him. Thus the ancient kings relied on law and policy to make sure that rewards and punishments were correctly implemented. Then even clever speakers could not deceive them. Authority and power should never be in more than one place or else abuse will become rife. If law is not respected, all the ruler's actions will be endangered. If penalties are not enforced, evil cannot be overcome. Even the highest minister must not be allowed to escape punishment, nor should the lowest peasant's reward be skipped. Thus those in high positions will not abuse the humble. If laws are clearly defined, superiors will be honored, and rights will not be invaded. Han Fei-zi warned the ruler against eight villainies. Though a ruler may share his bed with beauties, he should not listen to their special pleas. He should hold attendants personally responsible for their words and not allow them to speak out of turn. He should not allow kin and elder statesmen to escape appropriate punishment nor advance them arbitrarily. Buildings may be constructed to delight the ruler, but officials should not be allowed to use them to ingratiate themselves. Orders for doling out charity in time of need must never come from ministers but from the ruler. The true abilities of those who are flattered must be determined, likewise the faults of those who are denounced. Military heroes should not be given unduly large rewards, and those who take up arms in a private quarrel must never be pardoned. Officials must not be allowed to have their own soldiers, and requests of feudal lords should be granted if they are lawful, but rejected if they are not. In the essay "Ten Faults" Han Fei-zi listed them briefly and then gives numerous historical examples of each one. The list is as follows: 1. To practice petty loyalty and thereby betray a larger loyalty. 2. To fix your eye on a petty gain and thereby lose a larger one. 3. To behave in a base and willful manner and show no courtesy to the other feudal lords, thereby bringing about your own downfall. 4. To give no ear to government affairs but long only for the sound of music, thereby plunging yourself into distress. 5. To be greedy, perverse, and too fond of profit, thereby opening the way to the destruction of the state and your own demise. 6. To become infatuated with women musicians and disregard state affairs, thereby inviting the disaster of national destruction. 7. To leave the palace for distant travels, despising the remonstrances of your ministers, which leads to grave peril for yourself. 8. To fail to heed your loyal ministers when you are at fault, insisting upon having your own way, which will in time destroy your good reputation and make you a laughing stock of others. 9. To take no account of internal strength but rely solely upon your allies abroad, which places the state in grave danger of dismemberment. 10. To insult big powers even though your state is small, and fail to learn from the remonstrances of your ministers, acts which lead to the downfall of your line. 5 Han Fei-zi also wrote on the difficulties of persuading a ruler. This requires more than general knowledge and the ability to express oneself well. The most difficult part is to know the mind of the person one is trying to persuade so that fitting words can be used. One does not talk about profit to one who is seeking a reputation for virtue; and if one is talking to someone who wants profit, it is useless to talk about virtue. If the person secretly wants gain but claims to be virtuous, and you talk about virtue, he will pretend to listen but ignore you. If you talk about profit, he will appear to reject your advice but secretly follow it. Han Fei-zi also discussed many other complicated situations, many of them quite dangerous for the advisor because of the insecurity of the sovereign. He concluded that it is not difficult to know something; the difficulty is in knowing how to use what one knows. For Han Fei-zi the wise governs by rectifying laws clearly and establishing severe penalties in order to prevent the strong from exploiting the weak and the many from oppressing the few, to enable the old and infirm to die in peace and the young and orphans to grow freely, to make sure frontiers are not invaded, the ruler and minister are on intimate terms, fathers and sons support each other, and people do not worry about being killed in war or taken prisoner. He believed that stupid people want order but dislike the true path to order, which he considered to be the severe penalties, even though they are hated by people. Mercy and pity are welcomed by the people, but Han Fei-zi believed they endanger the state. Although he acknowledged that the legalist who makes laws in the state acts contrary to prevailing public opinion, he nevertheless believed that this is in accord with the way, virtue, and justice. In "Precautions within the Palace" Han Fei-zi wrote that it is dangerous for the ruler to trust others, for whoever trusts others will be controlled by them. Ministers have no blood bonds with their ruler, and they never stop trying to spy into the sovereign's mind. Thus many rulers are intimidated, and some are even murdered. If the ruler trusts his son or his consort, evil ministers may find ways to use them for their private schemes. The ruler must make sure that no one receives unearned rewards nor oversteps their authority. Death penalties must be executed, and no crime must go unpunished. However, if too much compulsory labor is demanded of people, they will feel afflicted and join local power groups. Local power groups then work to exempt people from labor service which enables their leaders to grow rich on bribes. Thus the ruler should keep labor services minimal so that the power groups will disappear, and all favors will come from the sovereign. Han Fei-zi was afraid that if the ruler lends even a little of his power to others, the superior and inferior will change places. Thus no ministers should be allowed to borrow the power and authority of the ruler. According to Han Fei-zi the ruler should be so strict that if what a minister says beforehand does not tally with what he says or does later, he must be punished even though he may have fulfilled his task with distinction. This, he believed, will keep the subordinates responsible. Han Fei-zi held that the ruler must be strict enough to put these theories into practice even though it means going against the will of the people. He noted how Lord Shang had to be guarded with iron spears and heavy shields, and eventually the people of Qin tore apart his body with two chariots. When Guan Zhong first instituted his reforms in Qi, Duke Huan had to ride in an armored carriage. Writing on "Pretensions and Heresies," Han Fei-zi argued that it is the duty of the sovereign to establish the laws and standards of right and distinguish these from private interests. Most ministers want to exalt their private wisdom; but if they condemn the law as wrong, their creeds must be regarded as heresy and suppressed. The ruler must forbid private favors and enforce what is ordered. Yet the private virtue of ministers is to practice personal faith with friends and not be encouraged by reward or discouraged by punishment. This, Han Fei-zi believed, leads to disorder; but where public virtue is practiced, there is order. Though ministers have selfish motives, their public duty is to obey orders and behave unselfishly in office. Thus ministers must use their calculating minds to put aside selfish motives and serve the ruler. The ruler also calculates how to protect the state from injury by private interests and uses rewards and penalties to overawe them. The commentaries on the teachings of Lao-zi in the Han Fei-zi may have been by his followers in an era when legalism was trying to survive by merging with Daoism. Some of the interpretations become rather absurd, as when compassion is extended to military victory and defense in order to be compassionate to one's soldiers (What about the enemy's? ) and even more absurdly to the weapons themselves. What could be more perverted than that? When Han Fei-zi's sage-king makes laws, the rewards must be enough to encourage the good, and his authority strong enough to subjugate the violent; his preparation must be sufficient to accomplish his task. In this system the good live on and flourish, while the bad fade away and die. If the pronouncements of the sovereign are clear and easy to understand, his promises can be kept. If the laws are easy to be observed, his orders will be effective. If the superiors are not self-seeking, the inferiors will obey the law. Han Fei-zi also recommended seven tactics to the sovereign and then gave historical examples of how they work. The first is to compare and inspect all available and different theories. Second, punishments must be definite and authority clear. Third, rewards are to be bestowed faithfully, and everyone is to exercise their abilities. Fourth, the ruler should listen to all sides of every story and hold speakers responsible for their words. So far these are clear and straightforward, but the last three use deception and manipulation to enhance the power of the ruler. The fifth is to issue spurious edicts and pretend to make certain appointments. Sixth, one may inquire into cases by manipulating different information, and seventh, words may be inverted and tasks reversed. Ostensibly the purpose of the last three is to help the ruler find out the truth by using indirect methods, but the lack of integrity and damage to credibility certainly makes them questionable for the long term. Han Fei-zi argued that people can be deterred from even small crimes by serious penalties, and then they will not commit major crimes at all. Thus he hoped that a strong government will not allow any serious crimes. Yet the problem is that criminals are not always caught no matter how vigilant the government may be. He noted that the gold-diggers in the south could not be stopped from stealing gold-dust even though some were caught and stoned to death in the marketplace, and there is no chastisement more severe than that. Duke Jing once asked a poor man about the prices in the market. Yen-zi replied that ordinary shoes are cheap, but shoes for the footless are expensive. Duke Jing, who had been busy inflicting many punishments (cutting off feet), was embarrassed. Thinking he was too cruel, he abolished five laws of the criminal code. Yet he was criticized by Han Fei-zi, who argued that loosening censure and giving pardons benefit the crooks and injure the good and thus do not lead to political order. Han Fei-zi did not consider personnel administration easy, but the ruler must regulate officials with rules and measures, and then compare their actions with their words. Projects that are lawful should be carried out; those that are not should be stopped. Results matching proposals should be rewarded; those not producing corresponding results should be punished. Han Fei-zi believed that only about one person out of a hundred would act correctly simply out of virtue, but everyone loves profit and dislikes injury. Thus effective government cannot rely on virtue. He believed that if the punishment for desertion is heavy, no one will run away from the enemy. Han Fei-zi criticized those who believed that heavy penalties injure the people and are unnecessary, because light penalties can be used. He argued that heavy penalties are more likely to deter than light ones, and therefore they can prevent all crime. I believe the error in his logic is that he incorrectly generalizes that heavy penalties will stop all crimes, which is not the case. He noted that people often trip on ant-hills, but no one stumbles over a mountain. He argued that people will either ignore light penalties or trip on them like traps. This may be true, but may not using heavy penalties like mountains lead to a monstrous society? Han Fei-zi described five kinds of customs as vermin, which he felt caused a disordered state. Scholars, who praise ancient kings for their virtue, put on a fair appearance but cast doubt on the laws of the time and confuse the ruler. Persuaders present false schemes and borrow influence from abroad to further their private interests but injure the welfare of the state's land and grain. Heroic swordsmen gather bands of followers and violate the government's prohibitions. Courtiers gather in private homes and bribe influential men to get out of military service. Finally, artisans and merchants make and collect useless articles and luxuries, accumulating wealth, cornering markets, and exploiting farmers. Han Fei-zi pointed out that even the wise Confucius was subordinate to Duke Ai of Lu because of his authority. He realistically argued that the people and even kings are not able to rise to the goodness and justice of a Confucius, who could convince only seventy followers. Rather the enlightened ruler should make punishments certain as well as severe so that people will fear them. Rewards should be generous and consistent so that people will seek them. The best laws are uniform and inflexible so that people understand them. Rewards must not be delayed nor should mercy deflect the administering of punishment. Praise accompanying the reward and censure following the punishment both stimulate people to do their best. The wise ruler takes into consideration the scarcity or plenty of the time. Punishments may need to be light but not because of compassion, while severe penalties are not imposed because the ruler is cruel. Circumstances change, and the ways of dealing with them must also change. Here Han Fei-zi showed some flexibility but still did not waver from his calculated policy. One method Han Fei-zi recommended for making rewards and punishments more effective was to have people watch each other and be responsible for reporting crimes in their community. By rewarding those who denounce criminals and punishing those who refuse to do so as complicit, he hoped that all kinds of culprits would be detected. However, this innovation, which was actually a regression to primitive times, was implemented by Lord Shang in Qin in the fourth century BC; it was one of the reasons he was so unpopular and led to his death. Han Fei-zi coldly and calculatingly suggested methods of behavioral modification as political theory under an authoritarian system of monarchy. He brought these to the attention of the leaders in the powerful state of Qin, where he became the first casualty of a policy that allows no one to challenge the authority of the ruler. Next we shall examine what happened when Qin implemented these ideas in its conquest of China. In 221 BC when Qin took over Qi, the last of the other six states, King Zheng's first official act was to declare himself First August Emperor (Shih Huang Di) of what we still call China from the name of his state of Qin. He abolished the traditional practice of having posthumous names assigned by one's successor and expected his successors to be called August Emperor of the second generation and third on down to one thousand and ten thousand generations, but ironically his dynasty was to end about four years after his own death. According to current cosmology the element water was to succeed the fire of the Zhou dynasty, and so the First Emperor adopted the corresponding characteristics of water such as the color black, the number six, and the harsh punishments of strict laws as indicated by the season winter. For this reason he refused to pardon any crimes. The chancellor suggested that feudal kings be set up in each region as the Zhou dynasty had done, but the commandant of justice, Li Si, argued that the son of heaven had been unable to control feudal rulers. Since the power of the new Emperor had united all the civilized areas between the seas, they should be made into provinces and districts in the usual Qin administration. The Emperor agreed with this, hoping that the unending warfare of the kings and marquises could thus be pacified by his sole rule. So the empire was divided into 36 provinces, each with a governor, military commandant, and superintendent. Weapons from all over the empire were confiscated and brought to the capital at Xian-yang, where they were melted down and cast into bells and statues of twelve giants weighing 29 tons each. All weights and measures were standardized as was the writing system. According to the historian Sima Qian, 120,000 rich and powerful families from all over the empire were moved to the capital. Replicas of the palaces of the conquered states were reconstructed near Xianyang. Extensive mansions with elevated walks and fenced pavilions were filled with beautiful women and treasure taken from the feudal states. Broad highways were built and lined with trees. The Emperor traveled and erected stone markers with inscriptions praising his accomplishments and claiming that "all is gauged by law and pattern. "6 He exalted agriculture and abolished "lesser occupations. " The edicts proclaimed that evil and wrongdoing were no longer permitted; so everyone was to practice goodness and integrity. When the Emperor had difficulty crossing a river because of winds, he ordered 3,000 convict laborers to cut down all the trees on the mountain of the offending goddess. In 218 BC when an attempted assassination failed, he ordered a search of the entire empire for ten days. Further inscriptions claim that he captured the kings of the six states, united all under heaven, ended harm and disaster, and then laid aside his arms for all time; he ordered the whole universe and had established justice, and his honored office holders so understood their duties that everything proceeded without ill feeling or doubt. The Emperor had local walls and fortifications torn down, waterways improved, and canals built. He claimed that when the land was fixed, the masses were freed from their forced labor; but in fact for ten years an army of 300,000 under General Meng Tian was not only fighting the barbarians in the north but also building the Great Wall to defend the empire. In 214 BC 500,000 men, who had run away from conscription or evaded taxes, were sent to invade Luliang. Convicts were sent to populate newly conquered territories. One day in 213 BC when the Emperor was entertaining seventy scholars with wine, one of them complained that the sons and brothers of the Emperor were commoners and that if anyone threatened him he would not be able to respond, because the Emperor had gone against the ancient tradition. The Emperor asked for discussion, and the chancellor Li Si replied that the greatest emperors did not imitate each other. He criticized past feudal strife and praised the Emperor's unified rule. Li Si then complained that scholars study antiquity and criticize their own age to mislead and confuse people. This discussion of the Emperor's laws causes problems and should be prohibited. Li Si therefore recommended that all historical records other than Qin's be burned. Anyone other than approved academicians with literature or writings of the philosophers must turn them in to be burned within thirty days or be subjected to tattoo and "wall dawn" labor. Books on medicine, divination, agriculture, and forestry were exempt, apparently because they were considered of practical value; but they could only be studied under the tutelage of a law official. Furthermore anyone who used antiquity to criticize the present was to be executed along with his family. The next year the Emperor felt his palace at Xianyang was too small; so he ordered the building of an immense palace at Epang that was connected to the Xianyang palace by an elevated walk across the Wei River. 700,000 people condemned to castration and convict labor were called up for this project and to build the Emperor's secret mausoleum at Mount Li, where 30,000 households were transported. All 270 palaces in the Xianyang area were connected by elevated walks and walled roads. Anyone revealing where the Emperor was visiting at the moment was put to death. Once the Emperor happened to notice the large number of carriages and attendants of the chancellor. A eunuch reported this to Li Si, who reduced the number of his carriages; but the Emperor was so outraged by the leak of information that he had all those eunuchs who attended him that day executed, since none confessed. Two advisors, noting the increasing arrogance of the Emperor and the futility of anyone trying to give him advice on pain of death, fled in secret. This led to an investigation of all the scholars in the capital and the execution of 460. Meanwhile increasing numbers of convicts were being transported to the border regions. When the oldest son Fusu tried to remonstrate with the Emperor, he was sent to supervise the activities of General Meng Tian in the north. In 211 BC a meteor landed, and someone inscribed on the stone, "The First Emperor will die, and his land will be divided. "7 Failing to find the author, the Emperor had everyone in the area put to death and the stone pulverized. The next year the Emperor went on tour with Li Si and his youngest son Huhai accompanying him. The magicians put off the Emperor, who was intent on finding the herb of immortality, by saying a large fish prevented them from getting to the island of immortality. The Emperor dreamed that he was struggling with an ocean god and later shot a huge fish himself with his crossbow. Shortly after that he fell ill; when his condition became grave, he wrote a letter under the imperial seal to his son Fusu, telling him to carry out the burial in the capital. The letter was sealed and given to Zhao Gao, the eunuch in charge of the seals, but it had not yet been entrusted to a messenger when the Emperor died at Sand Hill. Only Prince Huhai, chancellor Li Si, Zhao Gao, and five or six trusted eunuchs knew of the First Emperor's death. Since they were far from the capital and no heir had been designated, Li Si kept it a secret and put the body in a closed carriage where imperial government continued. Zhao Gao, who had kept the letter to Fusu and was Huhai's tutor, went to the latter and persuaded him to go along with what he knew was not virtuous. Huhai reluctantly agreed to let Zhao Gao consult with chancellor Li Si, and after a long discussion of Li Si's opposing prospects, he too agreed to Zhao Gao's proposal. Thus the three plotted together. Pretending they received an edict from the First Emperor making Huhai the successor, they forged a letter to the elder son Fusu accusing him and General Meng Tian of many things and suggesting that they commit suicide. Receiving the letter, Fusu wept and prepared to take his life, but Meng Tian recommended waiting for confirmation. At the messenger's insistent urging the prince committed suicide, and Meng Tian, who refused to do so, was imprisoned. As the Emperor's corpse was being returned to the capital, surrounding carriages were loaded with fish to disguise the smell. The body of the First Emperor was interred in the immense mausoleum at Mount Li along with the women in his harem who bore no sons and the artisans who knew about the secret tomb. The Second Emperor was 21 years old and entrusted the handling of state affairs to Zhao Gao, who urged him to make the laws sterner and the penalties more severe and extended to accomplices and families so that the chief ministers, who sow dissension, could be wiped out and the former Emperor's officials be replaced by those who could be trusted by the new Emperor. Meng Tian was forced to take poison, and his younger brother, some of the chief ministers, and six (or twelve) princes were executed in the marketplace of Xianyang; all their wealth was confiscated by the state. Construction work on the Epang palace and roads resumed, making taxes and levies on labor increasingly heavy. 50,000 crossbowmen were brought to the capital from all over the empire, and for them and their dogs, horses, and other animals food had to be shipped in from surrounding areas, increasing hardships. In the late summer of 209 BC a former laborer named Chen She, who was in charge of transporting 900 convicts to a penitentiary settlement, was delayed by rain from arriving on time. Knowing that his penalty for tardiness would be death, he started a rebellion and declared himself king of Chu. Using plow handles and sticks they rampaged over the empire. Numerous young men, calling themselves the magnifiers of Chu, murdered provincial Qin officials and set themselves up as marquises and kings, joined forces, and planned to attack Qin. When an official returning from the area reported the rebellion, the enraged Emperor ordered him punished. After that, envoys when questioned replied that it was just a bunch of bandits, who would soon be captured; this pleased the Emperor. Li Si tried to remonstrate with the Emperor, but he would not listen to him. The Emperor said that to work hard all the time like past emperors mentioned in Han Fei-zi's "Five Vermin" was to be a slave when his sole concern should be to gratify himself. Li Si's son was governor of a province the rebels had invaded, and he had not been able to stop them. By winter a rebel army of several hundred thousand was approaching the capital, but General Zhang Han, using a force of convicts pardoned and released from working on the Emperor's monument, forced the rebels to retreat to the east, where Chen She was assassinated by his charioteer. However, by now the rebellion was widespread. Li Si was reprimanded for allowing such outbreaks of bandits; so he wrote a scholarly reply to the Emperor in which he quoted from Shen Buhai and Han Fei-zi, arguing that if the techniques of supervision and reprimand are correctly applied, one cannot fail. Pleased, the Emperor increased the severity of the supervising and reprimanding activities. Those officials who squeezed the most taxes out of people were admired, as were those who put the largest numbers of people to death. Zhao Gao convinced the Emperor that he should not expose his shortcomings before the chief ministers in court but rather make decisions in the inner recesses of the palace, where he himself and a few other attendants could wait upon him. Soon all decisions were being made by Zhao Gao. This powerful eunuch then went to Li Si and asked him to remonstrate with the Emperor. Li Si said he would but could not see the Emperor, because he was hidden away. Zhao Gao offered to tell Li Si when was a good time to request an interview; but instead he told him the times when the Emperor was relaxing and did not want to be disturbed. Already perturbed, the Emperor was easily persuaded that Li Si and his son should be investigated. Unable to see the Emperor, Li Si wrote a memorial warning that Zhao Gao's power was dangerous. However, the young Emperor trusted his long-time tutor and had Li Si arrested instead. Zhao Gao had Li Si beaten until he confessed. In a letter to the Emperor Li Si listed his crimes as helping his king to annex all six states and become Emperor, driving out barbarians, honoring loyal ministers, standardizing measures and ordinances, constructing roads and pleasure parks, and relaxing penalties and lessening taxes. When the Emperor sent someone to question him, Li Si refused to speak, because he thought he was like the others who had examined him. Li Si's son had been killed by the rebels, but Zhao Gao falsified the report to make it look like he was a traitor. Finally Li Si underwent the most severe punishment of the five mutilations, and his body was cut in two in the marketplace. All his relatives were also executed. Zhao Gao was made chancellor. Zhang Han, losing battles against the fighters of Chu, sent the chief official to the capital for instructions, but Zhao Gao refused to see him or believe him. Learning that Zhao Gao was controlling the government and that he would be executed whether he won in battle or not, Zhang Han and others surrendered their armies to the leaders of the states. To test the ministers Zhao Gao had a deer presented to the Emperor but said it was a horse. The Emperor laughed at his chancellor calling a deer a horse and then asked his courtiers. Some who wanted to please Zhao Gao said it was a horse, and Zhao Gao secretly made sure that those who said it was a deer were charged with crimes. When Zhao Gao realized that the former states had set up kings and were defeating the Qin forces, he was afraid he would be punished for misleading the Emperor about the seriousness of the problem. So with his son-in-law he staged a fake rebel attack on the palace, killed thirty or forty guards, and forced the Second Emperor to commit suicide. When the one eunuch, who had remained loyal to the Emperor, was asked by the Emperor why he did not warn him sooner, he replied that if he had dared to speak he would have been put to death long before. Zhao Gao summoned all the officials and the royal family to inform them he had punished the Second Emperor. Then he set up Ziying, son of an older brother of the Second Emperor, as king of Qin, since the six independent states would have made the title Emperor a mockery. Afraid he would be put to death in the temple, Ziying waited for Zhao Gao to come get him where he was fasting. Then Ziying stabbed and killed Zhao Gao and had his relatives executed. After 46 days the Qin armies were defeated, and Ziying surrendered with a rope around his neck. Liu Bang, the governor of Pei, entered the capital without destroying it; but Xiang Yu came and burned the city, probably destroying more literature than the recent official burning of books. Ziying and the rest of the royal family were executed; the Qin empire was dead in 206 BC. Xiang Yu declared himself protector king of Western Chu and divided the empire among various kings and marquises, making Liu Bang king of Han. A Confucian scholar named Jia I (201-169 BC) wrote the "Faults of Qin." He observed that Qin's long military dominance was primarily due to its strategic geographical position in the fertile Wei River valley surrounded by mountains and the Yellow River with only a narrow pass to defend. Although the people hoped for peace under the unified empire, he criticized the First Emperor for being greedy and short-sighted and never trusting his officials nor getting to know the people. He cast aside the royal way by relying on private procedures, outlawing writings, making laws and penalties harsh, putting deceit first and humanity and justice last, and leading the whole world in violence and cruelty. These methods may have worked temporarily in seizing an empire, but they did not work in preserving it. Similarly Jia I argued that the Second Emperor might have been able to answer the people's hopes if he had cared for the nation's ills, corrected the First Emperor's errors, apportioned the land to the people, enfeoffed worthy ministers, set up states to order the empire with propriety, emptied the prisons, pardoned those condemned to death, abolished slavery and humiliating punishments, allowed people to return to their villages, opened the granaries and dispersed funds to help orphans and the poor, lightened taxes and labor requirements, simplified laws and reduced penalties, and allowed people to make a new beginning and practice integrity, presiding over the empire with authority and virtue; then the people would have flocked to him. However, the Second Emperor did not adopt these policies but rather multiplied laws and made punishments harsher with unjust rewards and penalties and unlimited taxes and levies. Officials could not supervise all the tasks assigned, and people sank into poverty and destitution. Then villainy and deceit sprang up all around, as superiors and inferiors turned on each other. The numbers of those accused of crimes grew, and everyone feared for their safety. Thus people were easily aroused to violent rebellion. After Qin commander Zhang Han defeated the first rebel attack inside the Hangu Pass, Wu Chen went to Zhao, where he set himself up as king of Zhao, Chen Yu as general, and Zhang Er and Shao Sao as prime ministers. Rebel leader Chen She wanted to have all their families executed, but his chief minister, Cai Ci, convinced him that this would be plaguing the people with a second Qin; so he confirmed their positions. Chen She, calling himself king of Chu, asked them for troops to attack the Hangu Pass again, but they decided it was safer to seize Yan. Zhang Han attacked the city of Chen and killed Cai Ci; Chen She retreated and was murdered by his carriage driver. Chen She had ruthlessly executed an old peasant friend of his for embarrassing him and had appointed two men, who severely punished generals for not carrying out orders exactly. Two officials in Pei, Xiao He and Cao Can, urged the magistrate there to revolt, but he changed his mind. Liu Bang shot a message over the wall which convinced the people of Pei to execute the magistrate, which they did; they then insisted that Liu Bang be their new governor, and his following quickly grew to 3,000 men. Meanwhile members of the royal Tian family in Qi had set themselves up as sovereigns there, and the martial family of Xiang Liang and his nephew Xiang Yu arose in Wu. Xiang Liang gave the new governor of Pei five thousand infantry to attack Fang. Hearing that Chen She was dead, Xiang Liang and the governor of Pei set up the grandson of former King Huai as king of Chu. The governor of Pei and Xiang Yu defeated Qin forces at Chengyang and massacred its inhabitants. Xiang Liang boasted of his victories over Qin but was defeated and killed by Zhang Han. Afraid, King Huai of Chu moved his capital to Pengcheng. He appointed the governor of Pei a marquis and Xiang Yu duke of Lu and second general under Song Yi, both of whom he sent north to rescue Zhao from Zhang Han's attacks. The governor of Pei he sent west to enter the Hangu Pass, promising that whoever should enter the Pass first and conquer the Qin region should be king there. The bold Xiang Yu wanted to attempt the Pass, but King Huai's elder generals advised him that Xiang Yu, who had butchered the inhabitants of Xiangcheng, was too impetuous and cruel; they argued that the tolerance and moral stature of the governor of Pei would be more likely to win over the suffering people of Qin. So Xiang Yu went north with Song Yi, whose head he personally cut off for refusing to attack in spite of hunger and cold, though he said that Song Yi was plotting with Qi. Confirmed as supreme general, Xiang Yu led his Chu armies across the Yellow River, sunk his own boats and smashed the cooking pots, and after nine battles defeated the Qin army. It was at this time that Zhang Han sent for instructions from the Qin Emperor and decided to ally himself with the revolt. Meanwhile the governor of Pei gained the advisor Li Yiji, who told him how to capture Qin's stores of grain. Another advisor, Zhang Liang, told him not to pass by the city of Yuan, where he was persuaded to enfeoff its surrendering governor. Then Zhang Liang sent Li Yiji and Lu Jia to bribe Qin's generals. The governor of Pei ordered his men not to plunder or seize prisoners, and the Qin armies were easily defeated. Soon Ziying, the king of Qin, surrendered with a rope around his neck. When the governor of Pei entered the capital at Xianyang, he ordered Qin's treasures sealed up; then he abolished all of Qin's irksome laws except for murder and reasonable punishments for assault and theft. The people of Qin rejoiced and brought gifts to the governor of Pei, but he declined them. Xiao Ho collected Qin's important charts, registers, and documents, which later proved of strategic value. The governor of Pei claimed to have a force of 200,000, which was actually 100,000, while Xiang Yu came through the Pass claiming one million men, which was actually 400,000. The governor of Pei apologized to general Xiang Yu for guarding the Pass at first and explained that he had preserved Qin's treasures while waiting for him. After killing Qin king Ziying and burning the capital, Xiang Yu declared King Huai the Just Emperor and himself protector king of Western Chu; but going back on the promise to the general who first entered the Pass, he assigned the Qin area to Zhang Han and two other former Qin generals, while the governor of Pei was only made the king of Han. Various generals and nobles were set up as eighteen local kings. Angry at the broken promise, the king of Han wanted to attack Xiang Yu but was restrained by Xiao Ho. So in 206 BC they all went to their own sovereignties. Han Xin persuaded the king of Han that his new position was really an exile and that this was the time he could re-unify Qin and then march east. That summer the king of Han made a surprise attack and defeated Zhang Han and the other Qin generals. He proclaimed an amnesty for criminals, allowed the people to use the parks and orchards that had been imperial Qin reserves, and granted two years' exemption from taxes and service. He appointed a local leader in each district from those over age fifty with cultivated personalities. In the east Xiang Yu had the Just Emperor moved and then assassinated. In Qi he tried to replace king Tian Rong with Tian Du, and he sent Peng Yue to lead a revolt in Liang. Chen Yu, resenting that he had not been made a king, asked Tian Rong to join him in attacking Chen's friend Zhang Er, king of Changshan, who fled to join the king of Han. Xiang Yu attacked and defeated Tian Rong and made all of Qi submit to Chu, but by burning its cities and enslaving the women and children the people of Qi were aroused to revolt again. In 205 BC the king of Han headed east and got the support of the king of Wei and subdued the king of Yin. As he crossed the Yellow River, a local leader told him that the Just Emperor was dead. The king of Han proclaimed mourning and vowed vengeance against Xiang Yu. With Xiang Yu busy in Qi, the king of Han was able to enter his capital at Pengcheng; but Xiang Yu marched back and inflicted a bloody defeat on the king of Han, capturing his parents, wife, and children. The king of Han escaped to the west, but many abandoned his cause. However, by establishing his base at Xingyang near the Ao Granary he was able to rebuild and supply his army. Xiang Yu attacked and cut off the Han supply road and then surrounded the Han army. The king of Han suggested they divide the empire in two, but Xiang Yu refused. Using the subterfuge of women dressed in armor and a general impersonating the king, once again the king of Han managed to escape with a few horsemen, this time to within the Pass. Eventually Xiang Yu and the king of Han personally faced each other across the ravine at Guangwu. Xiang Yu, the invincible warrior, challenged the king of Han to a single combat; but the latter accused the former of breaking his promise, murdering Song Yi, burning the palaces of Qin and killing its king, slaughtering 200,000 men he had tricked into surrendering, replacing local kings with his generals, and driving out and assassinating the Just Emperor. The king of Han intended to punish him for these crimes, but Xiang Yu shot an arrow, wounding him in the chest, though the king of Han pretended it was his foot. Han Xin was winning victories in the east, and the king of Han reluctantly appointed him king of Qi. The king of Han had to levy a poll tax for the first time but magnanimously ordered coffins so that killed soldiers' bodies could be returned home. After suffering repeated attacks by Peng Yue and Han Xin, Xiang Yu's army had little food. So he agreed to divide the empire with the king of Han and released his family. The king of Han was going to return to his western domain, but his advisors persuaded him that this was the opportunity to pursue Xiang Yu. At first he suffered a grave defeat from Chu, but with the help of Han Xin and Peng Yue he gathered a force of 300,000 to Xiang Yu's 100,000. The Han soldiers sang the songs of Chu, which convinced the soldiers of Xiang Yu that Han had conquered Chu. Xiang Yu fled in despair, pursued by Han cavalry who killed 80,000. After killing many enemies himself Xiang Yu eventually cut his own throat. Xiang Yu died believing he was destroyed by heaven, but the historian Sima Qian criticized him for not accepting responsibility for his errors. Finally in 202 BC the king of Han assumed the position of supreme Emperor and was renamed Gaozu meaning "Exalted Ancestor." Han Xin was transfered to be king of Chu; Peng Yue was made king of Liang and Wu Rui king of Changsha. Confirmed in their positions were Xin as king of a different Han, Qing Bu as king of Huainan, Zang Tu as king of Yan, and Zhang Ao as king of Zhao. Armies were disbanded, and Gaozu made his capital at Luoyang, giving credit to advisor Zhang Liang, chancellor Xiao Ho, and general Han Xin. Although Luoyang was considered the center of the world, Liu Jing persuaded the Emperor that in these circumstances it would be more strategic to locate his capital inside the Hangu Pass. Accordingly Gaozu established the imperial capital near Xianyang at Chang'an and declared a general amnesty. All slaves were freed, and refugees and exiles had their civil rights restored. During Gaozu's seven-year reign most of the kings were suspected of revolting and replaced by members of Gaozu's family. Zang Tu was replaced in Yan by Gaozu's boyhood friend Lu Wan. Han Xin was arrested and demoted. The other Han Xin joined the Xiongnu threatening his Han kingdom. The Emperor's son-in-law, Zhang Ao of Zhao, conspired to assassinate Gaozu and was demoted. General Peng Yue was arrested, sent into exile, and then executed. Qing Bu's rebellion was defeated, and he was killed. Lu Wan came under suspicion and moved his family and troops outside the Great Wall. When Gaozu died in 195 BC, nine of his sons and relatives ruled kingdoms, and only the small realm of Changsha was outside the imperial house. Gradually Emperor Gaozu became more receptive to Confucian influences. Once he angrily declared to Lu Jia that he had won everything on horseback and asked him why he should bother with the Odes and Documents. Master Lu asked whether he could rule the empire on horseback. He noted rulers who failed, because they paid too much attention to military affairs. If Qin had practiced goodness and justice, this Emperor would never have arisen. To the Emperor's delight Lu Jia wrote a book called New Discourses, explaining why Qin lost the empire and Gaozu won it. An edict in 196 BC proclaimed that those with reputations for virtue were to be sent to the chancellor so that they could be given appropriate positions. The heir apparent was Ying, the son of Empress Lu, but Gaozu felt that his son, Ruyi, by the concubine Lady Qi was more like him. However, his advisors were able to dissuade him from changing the heir apparent, which could cause conflict and turmoil. When Gaozu died in 195 BC, the Empress Lu was persuaded to proclaim mourning and a general amnesty. Her son succeeded as Emperor Hui in his sixteenth year. Empress Lu imprisoned Lady Qi and sent for her son Ruyi, who was king of Zhao. The kind Emperor Hui kept Ruyi with him to protect him but returned from hunting one morning to find he had been poisoned. The Empress Lu also had Lady Qi mutilated so horribly that the Emperor, when he found out, sent a message to his mother that no human being could have done such a thing. As her son, he reasoned that he was not fit to rule the empire and gave himself up to drinking. Empress Lu also tried to poison his brother Liu Fei, king of Qi. When Emperor Hui died in 188 BC, the Empress Lu set up his three-year-old son by a consort as Emperor. She established four of her nephews as kings and passed six Lu babies off as children of Hui. Empress Lü had the Emperor's real mother killed; but when he was old enough to discover that Empress Lu's daughter was not his real mother, he declared he would change things when he grew up. So Empress Lu had him declared insane and replaced with an even younger child. She had three kings of Zhao killed in succession, wiped out the royal families of Liang and Yan as well and divided Qi into four kingdoms. When she was bitten by a mysterious dog, the diviner declared it the evil spirit of Ruyi; she died of it in 180 BC. Although Lu family members were strategically placed as prime minister and commanding general, other officials, who had sworn to Emperor Gaozu that his family line should not be replaced, managed to oust them, kill the Lu family, and make the king of Dai Emperor Wen. Although not the oldest of Gaozu's living sons, he was selected both for his own ability and because his mother's family was of better character than the king of Qi's, who had someone they said was rebellious and no better than a tiger with a hat on. In spite of the macabre palace intrigues, the Daoist inactive rulership of Emperor Hui and his mother actually allowed the people a time of peace and prosperity, according to Daoist historian Sima Qian. In Qi the prime minister from 194-185 BC, Cao Can, was so won over to Daoism that he gave his authority in the main hall to his teacher, master Gai, and the state enjoyed such peace that he was known as a worthy minister. The Xiongnu invaded Henan in 177, and their founder Mao Dun died in 174 BC. This peace and prosperity was continued by the benevolent policies of Emperor Wen. In his first year he questioned the laws that punished the relatives of criminals as unjust and had these joint accusations and punishments abolished. At first he wanted to search for a virtuous person to be his heir but later gave in to the tradition of appointing the oldest son as a stabilizing practice. He made sure that the elderly and orphans were treated well. Emperor Wen abolished the cruel punishments of mutilation. He limited his own expenditures, sent women home from the palace so that they could marry, began civil service examinations, and eventually was able to eliminate taxes on land and produce as well as customs barriers and passports. In 162 BC he made peace with the Shanyu or king of the Xiongnu, who often had challenged the border regions, declaring, "We have bound ourselves together in the relationship of brotherhood in order to conserve the good people of the world. "8 The next year Emperor Wen proclaimed another general amnesty and freed all slaves held by the government. When Liu Pi, the king of Wu, pleaded illness and refused to come to court, because his son had been killed by the prince in a fight over a board game, Emperor Wen did not insist, sending him a stool and a cane as a sign he need not come. When Yuan Ang and other officials remonstrated with cutting words, he pardoned them and often put their advice into practice. Relationships throughout the empire improved, and the number of executions was greatly reduced. His successor Emperor Jing declared Wen the great exemplar of emperors and ordered that he should be worshipped along with Gaozu, the great founder of emperors. Emperor Jing ruled from 157-141 BC. Emperor Wen had heeded Jia Yi's advice to weaken the vassal kings by dividing Qi into seven kingdoms but avoided taking territory from the feudal kingdoms. However, Chao Cuo urged Emperor Jing to weaken the power of the vassal kings and began chipping away at their territories. Wu's recalcitrant King Liu Pi meanwhile had built up his power through state-owned copper and salt industries such that he even eliminated taxes. When he learned that the Emperor was going to move against him, he organized a coalition with Chu and five other kingdoms, which resented their losses of territory, to march on the capital and rid the world of Chao Cuo. Liu An, king of Huainan, decided to join the rebellion also; but he turned the soldiers over to the prime minister, who ignored him and remained loyal to the Han government. Emperor Jing summoned Yuan Ang, who had been prime minister in Wu, and he, once he was alone with the Emperor, suggested the whole rebellion could be easily defeated if he would execute Chao Cuo for wrongfully seizing territories from the feudal lords. Chao Cuo was beheaded in 154 BC, and Yuan Ang was sent to Wu as master of rites, where the king of Wu tried to enlist him as a general in the rebellion. Yuan Ang refused and would have been executed, but he was saved by a marshal he had previously pardoned for having a relationship with his maid. The Han commander Zhou Yafu craftily refused to battle the rebels until they were weakened by hunger. All the rebel kings were either killed or committed suicide; everyone else was pardoned. After this, vassal kingdoms were usually divided among the heirs so that the power of feudal lords faded away within two centuries. Wu Di (meaning "Martial Emperor") became emperor in 141 BC in his sixteenth year, and having been tutored by Confucian Wang Zang he requested that capable and good people with integrity, who will speak frankly, be recommended. However, those who followed the Legalist philosophies of Shen Buhai, Shang Yang, and Han Fei-zi were dismissed along with those guided by the diplomatic machinations of Su Qin and Zhang Yi. Wu Di appointed Dou Ying, Tian Fen, and Zhao Wan to the top three positions, all of whom were sympathetic to Confucian philosophy. Thus Confucians became influential and tried to reform the capital by establishing a ceremonial building for court receptions and sending the marquises back to their territories; but many marquises were married to royal princesses and did not want to leave the luxury of Chang'an. When the Confucians tried to bypass consulting with the Empress Dowager Dou (Wu Di's grandmother), this Daoist became enraged and had several Confucians secretly investigated; Wang Zang and Zhao Wan were compelled to commit suicide in jail, and Dou Ying and Tian Fen were dismissed. When the Empress Dowager Dou died in 135 BC, Tian Fen became chancellor and promoted Confucians like scholar Gongsun Hong while downgrading all others. At the urging of Confucian Dong Zhongshu an imperial university was established, and the five traditional classics of Documents, Odes, Changes, Rites, and The Spring and Autumn Annals became the basis of examinations for officials. Fifty students were sent to be trained academically, but by 110 BC Emperor Wu broke with the Confucians over the Feng and Shan sacrifices, and his later policies came to resemble the harsh punishments of Legalism. After chancellor Tian Fen died in 131 BC, Wu Di took greater control over his government. He ruled for more than half a century, and in the last 33 years Wu Di had seven chancellors, only one of whom died a natural death; the others were condemned for crimes. The Emperor's master of writing became more powerful than the chancellor, and attempts by relatives and confidants (including eunuchs) to influence the Emperor personally led to numerous court intrigues that weakened the Former and Later Han dynasties. Irritated by barbarian raids, in 133 BC Wu Di replaced diplomatic gift-giving with a military campaign against the Xiongnu in the northwest, but Chinese victory in Mongolia was not achieved until 119 BC when a cavalry general returned with 40,000 enemy heads. General Li Guang, who had fought the Xiongnu in 166 BC, led many of these campaigns but never was made a marquis. He once asked a diviner why not. The diviner asked him if he had ever done anything he regretted, and General Li Guang had to admit that he had once persuaded eight hundred men to surrender and then went back on his word and killed them. In 119 BC he ended up disobeying orders, losing his way, and facing charges, cut his own throat. While Gongsun Hong was recommending Confucian principles, Zhang Tang, the commandant of justice, was conducting wider investigations and applying stricter punishments. When the rebellious plans of the kings of Huainan, Hengshan, and Qiangdu were discovered in 122 BC, more than 20,000 people were tried and executed. Liu An, the king of Huainan was a grandson of Emperor Gaozu, and his father, after quarreling with the court and killing a man, had starved himself to death. When Liu An had presented the Daoist book Huainan-zi to Emperor Wu in 139 BC, he had been led by Tian Fen to believe that he might succeed to the throne. For years he made plans and preparations for a revolt, while his minister Wei Pei tried to persuade him it was inappropriate. Finally when King Liu An was about to revolt, Wu Bei went to the authorities; an imperial prosecutor was sent, but before his arrival Liu An cut his throat and died. Chinese military campaigns went into Manchuria and Korea in 128 BC and advanced well into Mongolia in 121 BC. Floods east of the mountains caused starvation in Shandong, and 700,000 people were ordered to migrate to lands west of the Pass in Shanxi. Daoist advisor Ji An was sent to observe what a fire had done in Henei, but on his way found such starvation and cannibalism in Henan that he ordered the imperial granaries opened to relieve the distress, showing that Daoism was not a do-nothing philosophy when the natural way was to act. Knowing he had overstepped his authority, he returned for punishment. Wu Di was impressed by his wisdom and tried to promote him. Ji An declined a governorship but occasionally would criticize the Emperor sharply, especially for attacking the Xiongnu. He berated Zhang Tang for excelling in evil and cruelty in tampering with the old laws. He argued for general principles in contrast to Zhang Tang's strict adherence to petty details. Ji An also criticized Gongsun Hong and Confucians for flattering the Emperor with hearts full of deceit and the facade of learning. Costs of the victory over the Xiongnu in 119 BC were enormous, resulting in new taxes. Merchants who were becoming rich forced the poor to work for them as they bought up and hoarded goods for profit. As the wealthy declined to help the poor in their misery, Wu Di was moved to issue a new currency and punish numerous counterfeiters. When Emperor Wu traveled east in 114 BC, two governors were so unprepared to provide for all the imperial attendants that they committed suicide. In the expedition to Nanyue in 112 BC criminals were pardoned to fight in the army, which became standard practice; convict workers were also used in imperial construction projects. The forces sent against the Yue kingdoms went as far south as Vietnam, and Dian was crushed by 109 BC. The next year four commanderies were established in northern and central Korea. Envoys were sent to western lands, lured by the incentive of making money in trade, and reached Seleucia on the Tigris in 105 BC. These profit-makers became so lawless that they took to quarreling and attacking each other, but eventually a series of defense stations was established. When Di Shan urged Wu Di to make peace with the Xiongnu, he was challenged by Zhang Tang as a stupid Confucian. Criticizing the severity of Zhang Tang's prosecutions of the kings of Huainan and Jiangdu, the Emperor was embarrassed as well and asked Di Shan if he were given a position in a province, could he keep the barbarians from plundering the region? Sensing that if he refused he would face a criminal trial, Di Shan agreed to command one of the border posts, where a few weeks later the Xiongnu raided and cut off his head. After that, officials were too terrified to criticize the military policies. Sima Qian described how officials became increasingly harsh, especially after Wang Wenshu rose from a grave-robber to become a corrupt official, who offered rewards to help catch thieves, conscripted more men into the army, condemned thousands to provide slaves for the government monopolies of salt, iron, and liquor, and freed tens of thousands who were accused so that they could work on imperial building. He did little to prevent corruption, and his whole family was executed for his crimes after he committed suicide. From his example lower officials went into lawbreaking, and the number of bandits increased until some had bands of several thousand men, assumed a title, attacked cities, seized weapons, freed convicts, humiliated governors, killed officials, and demanded they be supplied with food. Smaller bands of several hundred plundered numerous villages and hamlets. Wu Di sent high officials to call out troops and attack the bandits, cutting off as many as ten thousand heads at a time. They arrested even more people for aiding the bandits with food. In a few years most of the robber bands had been caught, but others went into hiding. Then a concealment law, specifying the execution of officials for not arresting reported bandits, led officials to avoid investigations. Thus the number of bandits increased again as officials sent in false reports to escape being involved. Du Zhou learned how to please Wu Di by trapping people he wanted removed into being arrested. When Du Zhou became commandant of justice, the number of officials in prison never fell below a hundred men. A hundred or more might be arrested on a case to be tried or to be witnesses. Prison officials would beat the accused until they confessed. Many fled into hiding to avoid arrest and later would be charged with more serious crimes even though an amnesty may have been issued. Eventually 60,000 people had been arrested, and officials had found grounds for charging another hundred thousand. Du Zhou rose from a poor secretary to one of the top three ministers with sons and grandsons in high offices and several hundred million in cash. In 99 BC Du Zhou was transferred to military command of the capital and prosecuted thieves, high officials, and even brothers of Empress Wei. This was the year historian Sima Qian was arrested for pleading on behalf of condemned general Li Ling. The historian was arrested and convicted but refused to commit suicide, because he wanted to finish writing his history. Not having sufficient funds to buy a commutation of the sentence, he suffered the humiliating punishment of castration, served as a eunuch palace writer, and continued the work that has given us so much knowledge of ancient China. He took the long view as indicated by the following proverb which he quoted: If you are going to be in a place for one year, then seed it with grain. If you are going to be there ten years, plant trees. And if you are going to be there a hundred years, provide for the future by means of virtue. 9 Sima Qian recounted how the harsh officials degenerated from those who decided right and wrong honestly to corrupted ones to the sycophants, who followed laws and regulations involving harsh penalties just to stay out of trouble themselves. Some of the governors in the provinces were even more cruel. In discussing the money-makers he noted that the desire for wealth does not need to be taught, because it is part of human nature. He felt that those who spend all their knowledge and abilities accumulating money never have strength left over to consider giving some of it away. Because of all its expenses, the government monopolized the sale of alcohol and controlled the salt and iron works. Levies were extended to wagons and boats and taxes to stock animals. In battles with the Xiongnu between 103 and 90 BC several times the Chinese commanders lost most of their men, numbering in the tens of thousands. In 91 BC tens of thousands were arbitrarily executed for witchcraft and black magic. Sima Qian also passed on the life and work of the Daoist poet Sima Xiangru, whose satires of royal ways were nonetheless appreciated by Wu Di. "Sir Fantasy" makes fun of the imperial hunt and is a phantasmagoria of rich language. In merriment the son of heaven becomes lost in contemplation and decides to implement the traditional reforms of cultivating land, stocking lakes with fish for the people, caring for those in need, lessening punishments, and opening the classics. Everyone shares in the joys of this new hunt, and they are transformed to goodness. The poem concludes with criticism of those lords whose domains are almost all taken up with the hunting parks so that the people have no space to grow food. Emperor Wu accepted the poem but objected to and removed the extravagant language describing the hunting parks. Xiangru served Wu Di by justifying the Chinese civilizing of barbarian lands with its virtuous ways while condemning those who abused their foreign missions by robbing and killing. He suggested that the western expeditions proved that Wu Di had the mandate of heaven, and he hoped that all could enjoy good fortune. He further glorified Wu Di in his poem on "The Mighty One" and in a poem he left after his death in which he encouraged the Emperor to carry out the auspicious Feng Sacrifice at Mount Tai. Before he died in 87 BC, Emperor Wu appointed his youngest son as his successor and, since Emperor Zhao was only in his eighth year, Ho Guang to run the government. Ho Guang managed to put down an attempted take-over by Wu Di's oldest living son, Liu Dan, who committed suicide. Ho Guang came from the common people and implemented reforms to revitalize the exhausted empire. Loans were made to the poor; payments and taxes were remitted in bad years or could be made in kind when grain prices were low. Horses were no longer demanded. Government was reduced, and imperial lands were distributed to the people. Japanese emperor Sujin ordered shipbuilding in 81 BC. A public debate on the state monopolies was held in 81 BC, an account of which was published in the next reign by Huan Kuan as the dialog Discourses on Salt and Iron. Imperial monopolies of the salt and iron industries had been instituted in 119 BC when Wu Di needed to raise money because of the Xiongnu war expenses. Four years later officers were appointed to equalize distribution by purchasing cheap commodities and selling when prices were high, thus preventing prices from being too low or too high and maximizing profit for the government. Four years after that in 110 BC a bureau of equalization and standardization was established by Sang Hongyang. Although treasury deficits were eliminated and adequate stores supplied the armies on the frontiers, the people, forced to eat without salt because of its high cost or use inferior iron tools to farm, became discontent. Thus sixty scholars were summoned from around the empire to debate the issues. In the dialog proponents of the government's current policies argued that they successfully provided iron tools to the peasants and increased trade and wealth. Criticizing this profiteering, Confucian reformers, emphasizing agriculture, wanted the use of money reduced with taxes collected in kind (grain or cloth). They found government harsh and oppressive, complaining of the disparities between the rich and poor. Critics also felt that expansion and foreign adventures had weakened China without maintaining safety. They argued the ancients had honored virtue and discredited the use of arms. Now these virtuous principles are discarded and reliance put on military force; troops are raised to attack the enemy and garrisons are stationed to make ready for him. It is the long drawn-out service of our troops in the field and the ceaseless transportation for the needs of the commissariat that cause our soldiers on the marches to suffer from hunger and cold abroad, while the common people are burdened with labor at home. The establishment of the salt and iron monopoly and the institution of finance officials to supply the army needs were not permanent schemes; it is therefore desirable that they now be abolished. 10 Government realists disagreed and, relying on laws and punishments, pointed to the success of Shang Yang; but critics countered that it was short-lived and that Qin policies were unscrupulous. The reformers emphasized moral principles and complained that government officials were using their positions to increase their incomes to incalculable levels, a practice Confucius disapproved. Sang Hongyang's family fortune was estimated at tens of thousands of gold. Those in power criticized the scholars for talking but not acting and asked them if they could devise a means to bring peace to the country and subdue foreign lands so that they would not raid and attack the frontiers. Both sides complained that people now had little honesty and that morals were decaying. The wealth of some led common people to try to imitate their luxurious ways. The debate revealed the clear divisions between the realistic legalists in power and the principled scholars who wanted reforms. The monopolies on salt and iron were retained by the government, but the one on alcohol was ended and replaced with taxation. Relations with the Xiongnu had improved; but when Fan Mingyu was sent out to aid the Wuhuan against them and found that the Xiongnu had withdrawn, he decided his orders must be carried out by attacking the Wuhuan. He took 6,200 heads and was made a marquis. Thereafter the Wuhuan raided China's northeast border. On the northwest border Ho Guang sent an envoy to assassinate the Loulan king. When Emperor Zhao died in 74 BC, one possible heir, Liu Ho, raced to the capital and was made Emperor, but forgetting about mourning while enjoying insatiable pleasures, he was removed from office after 27 days. Ho Guang and the ministers arranged for Xuan to become Emperor in his eighteenth year, arguing that he had been taught the Odes, Analects, and Filial Piety and that he was kind, benevolent, and loving to others. Ho Guang offered to resign, but he was retained and ran the government until his death in 68 BC. In the next two years the dangerous Ho clan was methodically and completely removed from power, and Emperor Xuan began to rule for himself. Brought up as a commoner and having observed the people's sufferings, Emperor Xuan rewarded kind officials and demoted the harsh ones. Instead of punishing corrupt officials, he allowed them to resign. His consent was required for capital punishment, and he implemented numerous other legal reforms such as appointing special judges for difficult cases, pardoning those hiding relatives, investigating deaths in prison, exempting the elderly from punishment in most cases, and searching for and reporting unjust trials. An official who had used capital punishment so much that he was called "Uncle Butcher" was publicly executed for his cruel tyranny. Emperor Xuan gave grants to the heirs of capable officials who died poor, exempted those in mourning from required services, abolished laws banning gatherings of people even at weddings, and increased salaries of lower officials to prevent extortion. During drought he reduced his own table and officials' salaries temporarily, while remitting taxes. Military garrisons were reduced; government land was loaned to the poor; royal preserves were opened to cultivation; and the price of salt was lowered. Heaven shone on these beneficent policies with abundant harvests. The Xiongnu struggled with civil wars, and one of their leaders, vying for support, visited the Chinese court; instead of resenting his imperial title Emperor Xuan honored him as a guest and sent him back with such rich presents that the other Xiongnu rival moved to the west. For several years the Confucian classics were studied and clarified with the Emperor having the final word in 51 BC. Near the end of his reign Emperor Xuan issued an edict declaring that not prohibiting evil is not clemency nor is dismissing criminals the absence of tyranny, while those who consider tyranny and wrong capability have missed the mean as well. Noting that military service and forced labor have been reduced, he found that there was still poverty and corrupt officials, because they took the extra money given them to use in place of soldiers. This Emperor seems to have done his best to harmonize the virtues of legalistic discipline and Confucian benevolence. Even when he was still only heir apparent Yuan criticized his father for applying laws too severely and suggested that he employ more Confucian masters. In 48 BC Emperor Xuan died, and 27-year-old Emperor Yuan selected Confucians to run his government. Modest reforms reduced expenditures and lightened punishments. The civil service examination system was expanded to include a moral component as well as the literary test. Emperor Yuan's adoption of Confucian rituals and principles led also to the favoring of relatives in the name of filial piety. Unfortunately the resulting nepotism and matriarchal influences contributed to the eventual fall of the Former Han dynasty in the next two generations. Under Yuan anyone who passed the examinations could become a student of a Confucian scholar, but soon the number was limited to one thousand persons. Confucian influence was checked somewhat by the eunuch Shi Xien, the chief palace writer, who had many Confucians arrested and executed because they criticized him. Rather than go to jail, the most prominent Confucian committed suicide. Shi Xien outlived Emperor Yuan; but he was exiled after Emperor Cheng came into power in 33 BC. The office of palace writer was abolished so that eunuchs would not have such power. Like his father, Emperor Cheng put his maternal relatives into the prominent positions. While he enjoyed drinking, banqueting, and music, the Wang clan controlled the government. Through education and patient application Confucianism had gradually triumphed in China, although it was tempered by realist Legalists and subtle Daoists. Yet the Former Han dynasty was in decline, and would be replaced in the next generation. Economic expansion during the Earlier Han dynasty led to prosperity for some but a concentration of land ownership employing convicts and debtors, mostly in large workshops as virtual slaves. Since the privileged landowners did not have to pay tax, this meant higher taxes for the peasants. Revolts by slaves in the government iron works and others began in 22 BC. Four years later Emperor Cheng (r. 33-7 BC) had to lower the price of court ranks, and he turned to omens and superstitions. His favorite wives, Zhao Feiyen and her sister, got the empress Xu deposed for black magic. Zhao Feiyen was declared empress in 16 BC; but she and her sister were childless, and their jealousy caused two of his sons by other women to be murdered, leaving no direct heir. Peasants revolted again in 14 BC, and they were soon joined by government slaves from the Shanyang iron works. During Cheng's reign the Wang family dominated the court in rivalry with three other families, but Wang Mang was dismissed from court in 7 BC. After Cheng Di died, Ai Di and Ping Di ruled for about six years each; but both emperors died young, making their deaths suspicious. Emperor Ai made his homosexual lover Dong Xian marshal and even talked of abdicating to him before his death. When Ai Di died, Dong Xian was degraded and committed suicide, as Wang Mang became marshal. 1. Guanzi 11:32, tr. W. Allyn Rickett, p. 426. 2. The Book of Lord Shang 1, tr. J. J. L. Duyvendak, p. 169. 3. Ibid., p. 206. 4. Han Fei Tzu 5 tr. Burton Watson, p. 16. 5. Ibid. 10, p. 49-50. 6. Qin Dynasty by Sima Qian (Ssu-ma Ch'ien), tr. Burton Watson, p. 46. 7. Ibid. p. 59. 8. The History of the Former Han Dynasty 4:17 by Pan Ku, tr. Homer H. Dubs, Vol. 1, p. 264. 9. Shih chi 129 by Ss-ma Ch'ien, tr. Burton Watson, The Age of Emperor Wu 140 to circa 100 BC, p. 492. 10. Discourses on Salt and Iron tr. Esson M. Gale, p. 6. This chapter has been published in the book CHINA, KOREA & JAPAN to 1800. For ordering information please click here.
009_2979369
{ "id": "<urn:uuid:a543f8fa-8faf-4749-a7c7-60abb5f51a93>", "dump": "CC-MAIN-2016-30", "url": "http://san.beck.org/EC16-Legalism.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257829320.70/warc/CC-MAIN-20160723071029-00282-ip-10-185-27-174.ec2.internal.warc.gz", "language": "en", "language_score": 0.9826425313949585, "token_count": 18932, "score": 3.546875, "int_score": 4, "uid": "009_2979369_0" }
Kirkpatrick, Pierce, and Team Publish Results of Promising NIH-Developed Candidate Dengue Vaccine Trial - By Jennifer Nachbur New results from an early-stage clinical trial of a dengue vaccine co-developed by researchers at the University of Vermont (UVM), Johns Hopkins University and the National Institutes of Health, bring positive news for the reported 50 to 100 million individuals infected annually with the deadly virus. According to the findings, the vaccine is safe and stimulates a strong immune response in most vaccine recipients. The study appears in the March 15, 2013 issue of the Journal of Infectious Diseases. Transmitted to humans by Aedes mosquitoes and prevalent in many tropical and subtropical regions of the world, dengue infection is caused by any of four related viruses: Dengue viruses (DENV) 1 through 4. Classically described dengue fever includes fever, headache, severe joint and muscle pain, and rash. Severe dengue infections, dengue hemorrhagic fever, and dengue shock syndrome include a higher risk of complications and death and are more commonly seen after a second infection with dengue viruses. The World Health Organization estimates that 500,000 patients, many of them children, are hospitalized every year with severe dengue-related disease. Launched in July 2010 and led by principle investigators Beth Kirkpatrick, M.D., UVM associate professor of medicine, and Anna Durbin, M.D., of Johns Hopkins Bloomberg School of Public Health in Baltimore, Md., the Phase I clinical trial tested a single dose of each of four versions of the investigational dengue vaccine TetraVax-DV. The vaccine was developed by scientists in the National Institute of Allergy and Infectious Diseases’ Laboratory of Infectious Diseases. It is a live-attenuated vaccine, which means that the viruses it contains are weakened enough such that they do not cause illness, but still can induce an immune response. Each of the four vaccines tested included different mixtures of components designed to protect against all four dengue viruses. The Phase I study was conducted in Baltimore, Md., Burlington, Vt., and Washington, D.C. The final study analysis included 112 healthy men and women ages 18 to 50 years who had not previously been exposed to dengue or related viruses such as West Nile virus and yellow fever virus. Participants were randomized into four groups. In each group, 20 volunteers received a single 0. 5-milliliter subcutaneous (under the skin) injection of one of the tetravalent candidate vaccine combinations, and eight others received placebo. All were monitored for immediate adverse reactions for at least 30 minutes after vaccination, and subsequently took their body temperatures three times daily for 16 days to check for possible adverse reactions. Participants also received a physical exam every other day up to Study Day 16, and then again on study days 21, 28, 42 and 180, when blood tests were also performed. The researchers found that all four candidate vaccine combinations induced antibody responses against each of the dengue viruses. However, one vaccine combination, TV003, appeared to induce the most balanced antibody response against the dengue viruses. A single dose of TV003 resulted in an antibody response to all four dengue viruses in 45 percent of participants and against three of the four viruses in an additional 45 percent. Overall, an immune response to at least three viruses was seen in 90 percent of vaccinees given TV003. Kristen Pierce, M.D., assistant professor of medicine and investigator at UVM, says that she and her collaborators found that a single dose of the NIH vaccine induced an immune response comparable to three doses of the leading candidate vaccine, which was developed by Sanofi Pasteur. Pierce adds that the trial had another plus – low production cost, and thereby, greater potential for better accessibility. “The safety of the vaccine has now been clearly demonstrated after many vaccine trials at both UVM and Johns Hopkins,” says Pierce. “Over the last year, the focus has really been to determine which of the formulations, or combinations, of the four vaccines will provide vaccine recipients with the best antibody response to all four serotypes of dengue. ” Infection with one dengue virus results in immunity to that specific virus, but not to the other three. Research shows that the likelihood of severe disease increases when a person is subsequently infected with a different dengue virus. This observation suggests that the ideal dengue vaccine would be tetravalent – that is, protective against all four dengue viruses. “What is promising about TV003 is that it elicited solid antibody responses after just one dose,” explained Stephen Whitehead, Ph.D., of NIAID’s Laboratory of Infectious Diseases, who led the development of the vaccine candidates. “Other vaccines in development require two or three injections at higher doses to achieve similar results. ” All four candidate tetravalent vaccines were found to be safe, and no participants experienced fever or dengue-like illness after vaccination. “The results of this Phase I dengue vaccine study look very promising, and the NIAID is pursuing further development of TV003,” says Kirkpatrick., director of UVM’s Vaccine Testing Center. The NIAID, in conjunction with the site investigators, are conducting studies to further evaluate the vaccine's safety and ability to stimulate an immune response in healthy volunteers and in people who have been infected previously by dengue or related viruses. TV003's inexpensive production cost – less than $1 per dose – is critical to its potential use in developing countries, Kirkpatrick says. Manufacturers in Brazil, India and Vietnam – countries where dengue is prevalent – have licensed the vaccine technology for production and further evaluation. Phase II trials to evaluate the safety of TV003 and its capacity to create an immune response will begin soon in Brazil and Thailand. To date, UVM Vaccine Testing Center researchers have tested the experimental vaccine on approximately 200 healthy volunteers. “The next phase is to ensure that this antibody response will be adequate to provide protection against natural dengue infection, and whether a booster of the vaccine would provide better protection,” explains Pierce. UVM’s Vaccine Testing Center has made significant contributions to the development and testing of a variety of vaccines of global importance since 2002. For the NIH dengue vaccine, UVM’s role in the future will focus on defining a precise dose and timing, as well as benefit of a second dose. In addition, says Pierce, the UVM researchers may also engage in vaccine trials on West Nile infection.
003_6316829
{ "id": "<urn:uuid:4bae2e94-1a0c-4517-8515-27ad633a3587>", "dump": "CC-MAIN-2014-49", "url": "http://www.uvm.edu/medicine/?Page=news&storyID=15684&category=comall", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931007324.75/warc/CC-MAIN-20141125155647-00064-ip-10-235-23-156.ec2.internal.warc.gz", "language": "en", "language_score": 0.9500695466995239, "token_count": 1389, "score": 2.71875, "int_score": 3, "uid": "003_6316829_0" }
We have a wych elm in the back garden. This year it’s been absolutely full of seeds, many more than usual: The seeds have been blowing all over the garden, covering the lawn and borders. They grow in clusters:One got caught in a cobweb: Here it is in close-up: Wych Elms are hardy trees and have greater resistance to Dutch elm disease than other elms. The name ‘wych’ comes from an Anglo-Saxon word meaning pliable and refers to the tree’s twigs. Its wood has many uses, including underground water pipes (in the past), boat building and the seats of chairs – it’s also the traditional wood used for coffins. I love trees – and they are good for you: A garden without trees is as hard to envisage as an art gallery with pictures. Trees soften the landscape. They provide shade in the summer and protection during the winter. A screen of trees around the house can provide enough wind-shelter to reduce by a tenth the energy consumption in the home. Their canopy of leaves acts as a highly effective pollution filter, absorbing many of the major atmospheric pollution gases, including carbon monoxide, nitrogen and sulphur dioxide. Research also reveals that we are happier and more relaxed when we are in leafy surroundings … (The Therapeutic Garden by Donald Norfolk page 105) For more Saturday Snapshots see Melinda’s blog West Metro Mommy Reads. Click on the photos to enlarge.
003_4521496
{ "id": "<urn:uuid:f6a8bc71-14f7-4486-ad76-165918a3bf1b>", "dump": "CC-MAIN-2020-40", "url": "https://booksplease.org/2013/06/29/saturday-snapshots-wych-elm/?like_comment=30963&_wpnonce=b664138cd0", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401617641.86/warc/CC-MAIN-20200928234043-20200929024043-00423.warc.gz", "language": "en", "language_score": 0.9565976858139038, "token_count": 323, "score": 2.53125, "int_score": 3, "uid": "003_4521496_0" }
Anti-Vax Propaganda Helps Measles -- Once Eradicated -- Spread Across the Twin Cities Health officials expect the number of diagnoses to rise. Date Written: 08/05/2017 Year Published: 2017 Resource Type: Article Cx Number: CX20700 The anti-vaxxer misinformation campaign has led to yet another outbreak of a preventable disease. Minnesota's Department of Health has announced that 44 people in the state have been diagnosed with measles, a disease once eradicated in the United States. Forty-two of the cases are in children, most of them Somali-Americans who were never vaccinated. According to numerous sources, the outbreak is the result of a sustained anti-vaccination campaign.
005_5599543
{ "id": "<urn:uuid:ce41f7b8-42df-4e72-9053-9501fb2ae695>", "dump": "CC-MAIN-2018-22", "url": "http://connexions.org/CxLibrary/CX20700.htm", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867417.71/warc/CC-MAIN-20180526112331-20180526132331-00336.warc.gz", "language": "en", "language_score": 0.9016788601875305, "token_count": 152, "score": 2.609375, "int_score": 3, "uid": "005_5599543_0" }
The Divide-and-Conquer Approach As they say, there's "more than one way to skin a cat" and developing new languages that explicitly address concurrency is one way forward, but is anathema for developers that have significant investment in legacy (C++, C#, Java) code. The extension of existing languages and/or provision of libraries are alternative approaches, but since they are essentially retrospective, are likely to involve compromise somewhere along the line. Most would probably agree that algorithmic logic is normally best considered as a set of sequential steps involving conditional logic (e. g., if-then-else). On the other hand, scheduling logic is inherently parallel and is more naturally considered in terms of branching and merging metaphors. Scheduling and processing are clearly different, and separable concerns; and so an alternative way forward is to allow developers to specifically describe their application's concurrency in terms of its connectivity and dependency, but leave algorithmic and business logic in its current sequential form. This means that existing applications can be largely unaffected by migration to multi-core and most developers can continue to work in a familiar sequential environment using familiar tools and languages. Equally importantly, concurrency needs to be expressed in a manner that does not make any assumptions about the target platform; number of cores, number of machines, memory distribution, and so on. This means that programmers need to be presented with a simple and intuitive "idealized platform. " Mapping functionality to target hardware therefore needs to be another separate stage that should not involve or concern application developers. Blueprint uses a specialized visual programming paradigm to deal with concurrency aspects. This allows descriptions to include branching and merging information in a way that textual equivalents alone do not readily support. In the concurrency domain, statement "order" is replaced by "connectivity," but the algorithmic/business domain remains sequential and is decoupled from its scheduling; see Figure 2. Conventional text programs derive much of their "meaning" through precise statement ordering, whereas an electronic circuit diagram derives equivalent meaning through its connectivity; this means that the eye can scan circuits in many different orders and still derive exactly the same meaning. The obvious point here is that connectivity can branch and merge and is therefore an ideal medium for describing concurrency. It is no coincidence therefore that electronic circuitry is usually presented visually, whilst ASIC algorithmic programming (implicitly parallel) is more likely to involve textual descriptions (e. g., VHDL). So arguably, it is the nature of the logic, rather than the nature of the physical hardware, that determines the most intuitive programming approach; and the arrival of multi-core should not be allowed to drastically change the way that developers think. It is necessary to find a way to map the traditional OO model to code; and to do this it is also necessary to abstract the platform, capture the application's scheduling constraints, and use a new generation of translators to perform the "heavy lifting" required to take OO's high-level concepts, and generate the low-level synchronization code that implements it. The Blueprint Toolchain The first step to providing developers with OO's intuitive and widely accepted concurrent programming abstraction is to create an "idealized" environment for concurrent applications to execute within. The second step is to provide a series of independent (orthogonal) descriptions that take the high-level OO platform independent abstraction, all the way through to the deployment of an arbitrarily runtime-scalable set of executables. This six-part series of articles will describe each of these steps, and where relevant, reference early adopter projects like the UK's Surface Ship Torpedo Defense (SSTD) system as proof of concept. As Figure 3 illustrates, Blueprint separates the mapping of high-level program logic to physical executables into four independent stages: - The first stage is to develop an application for the idealized Single Virtual Process platform. In most cases it is possible to develop and debug this as a single process on a standard laptop or desktop (specialized I/O devices can be modeled using Blueprint devices). This involves two distinct components -- a textual algorithmic/business logic description, and a visual concurrency constraint description. - The second (independent) stage is to use the accretion editor to map program logic to one or more distinct "processes. " - The third stage is to use the colony editor to identify those processes that are to be "slaved". The translator can then build each required process type. - Finally, the task manager is used to allocate instances of each process type to appropriate machines in the available network. The latter three stages are relatively lightweight and do not involve modifying the application itself. There is no limit to the number of accretions, colonies, or network configurations that can be applied to a given logical Blueprint application. If the application itself is correctly written (no undetected race conditions) then each mapping will usually execute repeatedly (albeit at different speeds), allowing most debugging to be undertaken with a simple single process (and often single threaded) build. In the next installment of this six-part article, we examine the issues involved in separating an application's scheduling logic from its algorithmic/business logic by providing examples. For More Information - Multi-Core OO: Part 1 - Multi-Core OO: Part 2 - Multi-Core OO: Part 3 - Multi-Core OO: Part 4 - Multi-Core OO: Part 5
004_7270077
{ "id": "<urn:uuid:ad8adede-3069-4a7c-bba5-9df619748112>", "dump": "CC-MAIN-2015-11", "url": "http://www.drdobbs.com/multi-core-oo-part-1/212903146?pgno=2", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462548.53/warc/CC-MAIN-20150226074102-00325-ip-10-28-5-156.ec2.internal.warc.gz", "language": "en", "language_score": 0.9238362312316895, "token_count": 1129, "score": 2.5625, "int_score": 3, "uid": "004_7270077_0" }
from The American Heritage® Dictionary of the English Language, 4th Edition - n. An engineer trained in the design and construction of public works, such as bridges or dams, and other large facilities. from Wiktionary, Creative Commons Attribution/Share-Alike License - n. An engineer who is specificallly trained for and/or specialised in civil engineering from the GNU version of the Collaborative International Dictionary of English - n. a person skilled in the science of civil engineering. from WordNet 3. 0 Copyright 2006 by Princeton University. All rights reserved. - n. an engineer trained to design and construct and maintain public works (roads or bridges or harbors etc. ) Sorry, no etymologies found. Sorry, no example sentences found.
011_4133841
{ "id": "<urn:uuid:bad586ba-d550-4d92-b973-fff8ebe3244f>", "dump": "CC-MAIN-2017-09", "url": "https://www.wordnik.com/words/civil%20engineer", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00266-ip-10-171-10-108.ec2.internal.warc.gz", "language": "en", "language_score": 0.8558707237243652, "token_count": 164, "score": 2.515625, "int_score": 3, "uid": "011_4133841_0" }
UNDERSTANDING Eye Health You may not realize how much strain is put on your eyes each day. Whether you clock long hours in front of a screen or you prefer exploring the outdoors until sundown, it’s important to ensure eye health. Show your eyes the respect they deserve — from heaping on the greens to setting a digital curfew. Your eyes will thank you! Sun Protection 101: We all know moderation is key when it comes to sun exposure! Harmful UV rays can wreak havoc on our skin, causing early aging and even skin cancers like melanoma. From an early age, we’re told to lather on the sunscreen. But, did you know you also need to protect your eyes from the sun? How to Protect Your Eyes from UV Rays Invest in a quality pair of sunglasses and contact lenses that have UV protection. Make sure to wear a wide-brimmed hat to help shield your eyes from light that comes in from the side of your sunglasses. The sun is strong…and sneaky. Ultraviolet rays can damage your eyes even on cloudy days. A diet rich in nutrients can help reduce your risk of certain eye conditions. More good reasons to pass the veggies, please. Nutrition for Eye Health Foods that are loaded with antioxidants (Vitamin A, C, E) can help to reduce your risk of some potentially serious chronic eye conditions: cataracts and macular degeneration. Think: Color. Carotenoids pack a powerful punch when it comes to foods for eye health. Kiwi, red grapes, spinach, and carrots are beneficial in helping prevent vision damage later in life. Maybe mom was right. Omega-3 fatty acids benefit our bodies and our vision. Our bodies don’t produce it naturally, so add some salmon or tuna to your diet today. Not a fish fan? Try walnuts or chia seeds. DIGITAL SCREEN USAGE Do you reply to texts and emails at all hours? Suffer from “fear of missing out” when checking your friends’ social media updates? It’s a lot of work for your eyes to focus and refocus on small text and images, and it can cause eye strain and discomfort. People who use their computers a lot can develop eye dryness, difficulty focusing, headaches, and blurred or double vision. This is often known as Computer Vision Syndrome (CVS). Protect Your Eyes Today’s technology offers us little relief from our screens, but there are a few tips to help keep your eyes happier. Make sure to follow the 20-20-20 rule to give your eyes a break: look 20 feet away for 20 seconds, every 20 minutes. Also, keep your computer screen 20 to 28 inches away from your face and slightly below eye level. And always remember to blink! If you need vision correction, schedule an appointment with your eye care professional. GET STARTED WITH CONTACTS *Free trial contact lenses available only from participating eye care professionals. Exam and fitting fees not included. Click for more details. 1JJV Data on File 2015. In market assessment with 1-DAY ACUVUE MOIST MULTIFOCAL, 5-10 days DW with new and existing soft CL wearers. UK 82 sites and 901 subjects; USA 152 sites and 1,092 subjects.
005_1253365
{ "id": "<urn:uuid:125009d4-44db-4eb6-bf07-2fe5fe90f4f0>", "dump": "CC-MAIN-2021-10", "url": "https://www.acuvue.com/eye-health", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178364764.57/warc/CC-MAIN-20210302190916-20210302220916-00154.warc.gz", "language": "en", "language_score": 0.9092737436294556, "token_count": 699, "score": 2.921875, "int_score": 3, "uid": "005_1253365_0" }
- Health Library - Research a Disease or Condition - Lookup a Symptom - Learn About a Test - Prepare for a Surgery or Procedure - What to do After Being Discharged - Self-Care Instructions - Questions to Ask Your Doctor - Nutrition, Vitamins & Special Diets Tinea corporis is a skin infection due to fungi. It is also called ringworm of the body. Fungal infection - body; Infection - fungal - body; Tinea of the body; Tinea circinata; Ringworm - body Tinea corporis is a common skin disorder among children. However, it may occur in people of all ages. It is caused by mold-like fungi called dermatophytes. Fungi thrive in warm, moist areas. The following raise your risk for a fungal infection: - Long-term wetness of the skin (such as from sweating) - Minor skin and nail injuries - Poor hygiene Tinea corporis can spread easily to other people. You can catch the condition if you come into direct contact with an area of ringworm on someone's body, or if you touch contaminated items such as: - Pool surfaces - Shower floors and walls The fungi can also be spread by pets (cats are common carriers). Symptoms may include itching. The rash begins as a small area of red, raised spots and pimples. The rash slowly becomes ring-shaped, with a red-colored, raised border and a clearer center. The border may look scaly. The rash may occur on the arms, legs, face, or other exposed body areas. Exams and Tests The health care provider can often diagnose tinea corporis by how the skin looks. In some cases, the following tests may be done: Keep the skin clean and dry. You can buy antifungal cream without a prescription, or your health care provider may prescribe it. - Wash and dry the area first. - Apply the cream, beginning just outside the area of the rash and moving toward the center. Be sure to wash and dry your hands afterward. - Use the cream twice a day for 7 to 10 days. - Do not use a bandage over ringworm. - Creams that contain miconazole, clotrimazole, ketoconazole, terbenifine, or oxiconazole are often effective in controlling ringworm. Once treatment has started, a child can return to school. To prevent the infection from spreading: - Wash all towels in warm, soapy water and then dry them. - Use a new towel and washcloth every time. - Clean sinks, bathtubs, and bathroom floors well after using. - Wear clean clothes every day and do not share clothes Your health care provider will prescribe medicine taken by mouth to treat ringworm that: - Is severe or covers a large area of your body - Passes deeper into the skin to the hair follicle, such as in a beard. Antibiotics may be needed to treat secondary bacterial infections. Infected pets should also be treated. Ringworm usually responds to topical medications within 4 weeks. Severe or resistant cases usually respond quickly to antifungal medicines taken by mouth. - Bacterial skin infections, cellulitis - Skin disorders such as pyoderma or dermatophytid - Spread of tinea to feet, scalp, groin, or nails - Whole-body (systemic) side effects of medications When to Contact a Medical Professional Call for an appointment with your health care provider if ringworm does not improve with self-care. Habif TP, ed. Clinical Dermatology. 5th ed. Philadelphia, Pa: Mosby Elsevier;2009:pp 491-523. Hay RJ. Dermatophytosis and other superficial mycoses. In: Mandell GL, Bennett JE, Dolin R, eds. Mandell, Douglas, and Bennett's Principles and Practice of Infectious Diseases. 7th ed. Philadelphia, Pa: Churchill Livingstone Elsevier;2009:chap 267. Reviewed By: Linda J. Vorvick, MD, Medical Director, MEDEX Northwest Division of Physician Assistant Studies, University of Washington School of Medicine. Also reviewed by Kevin Berman, MD, PhD, Atlanta Center for Dermatologic Disease, Atlanta, GA. Review provided by VeriMed Healthcare Network. Also reviewed by David Zieve, MD, MHA, Medical Director, A.D.A.M., Inc.
007_4495749
{ "id": "<urn:uuid:964380d0-8fe8-4588-a127-ea29c266e2f0>", "dump": "CC-MAIN-2015-40", "url": "http://www.mhs.net/library/HIE%20Multimedia/1/000877.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737940789.96/warc/CC-MAIN-20151001221900-00202-ip-10-137-6-227.ec2.internal.warc.gz", "language": "en", "language_score": 0.8793690204620361, "token_count": 964, "score": 3.375, "int_score": 3, "uid": "007_4495749_0" }
Dehydration Care at Physicians Now Urgent Care in Rockville, MD Visit us for Dehydration Management and Treatment. Call Us, Walk in, or Reserve Your Spot Online! We are located at 15215 Shady Grove Road, Suite 100, Rockville, MD 20850. Dehydration is what happens when you lose more fluids than you are taking in. Dehydration can cause a number of side effects, from mild discomfort to serious issues. That’s because fluids are needed for a number of essential organ functions. When you don’t get enough, you will start to experience a number of symptoms. If you still don’t drink enough liquids to replace what you have lost, it might result in an even more serious problem. **Please note that IV Fluid services close 1 (one) hour prior to our end of business day** Causes of Dehydration Most cases of dehydration are connected to general illness. For example, if you have vomiting or diarrhea, you could be losing a lot of electrolytes — especially if you vomit any water you drink. The elderly, children and people who have been sick for more than a day or two are at a higher risk of dehydration because the effect is cumulative. If you are running a high fever you can also get dehydrated because you will be sweating more. Other causes of dehydration include: - excessive sweating due to hot, humid weather or intense sports training - increased urination (often related to diabetes or other underlying illness) Signs and Symptoms of Dehydration The first sign of dehydration is thirst. By the time you experience dry mouth and feel like you want to drink, your body is already dehydrated. If you don’t start drinking immediately, more symptoms will develop. You will stop sweating and producing tears, feel nauseous and lightheaded, experience heart palpitations and muscle cramps. If you are dehydrated and try to perform physical activities, you might find that your muscles don’t have enough strength for it. Severe dehydration will also cause a sort of mental fog, where you feel disoriented and have trouble concentrating. Untreated, dehydration can lead to kidney failure, shock and coma. Dehydration in Children Dehydration is very common in children. Part of the reason for that is that children get sick, develop diarrhea or get a fever more often than adults. In addition, young children might be reluctant to drink when they are feeling ill – and you might not be able to explain to them why they should. If you have a young child who has been vomiting or has severe diarrhea and is also refusing to drink, bring the child to our urgent care center in Rockville, MD. IV fluid therapy may be necessary in some cases. Treating Dehydration at Home The most obvious solution to dehydration is to drink water. However, this only works if you start drinking as soon as you notice the first symptoms of dehydration. If you wait until you are experiencing severe symptoms of dehydration, you might need replacement fluids instead. These are drinks that have added sugars and other ingredients to help balance your electrolytes faster and more efficiently. Examples of common drinks to try include Gatorade and Pedialyte. For children, you can try popsicles, Jell-O and clear broths. All of these can help with dehydration because they provide fluids to the body. Plus, they are more attractive to children than plain water, so they might be more likely to accept them when they’re not feeling well. When It’s Time to Call a Doctor If you have been trying to drink but keep vomiting or if the symptoms worsen over a period of 24-48 hours, it might be time to see one of our health care providers. We will be able to rehydrate you by giving you intravenous fluids and anti-vomiting and/or diarrhea medications. Elderly people or those with a compromised immune system should talk to a provider as soon as possible to avoid major complications.
004_3281325
{ "id": "<urn:uuid:e5cddbe6-c893-4218-b89e-4e6d863e8a58>", "dump": "CC-MAIN-2020-50", "url": "https://www.myphysiciansnow.com/symptoms-of-dehydration", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141181179.12/warc/CC-MAIN-20201125041943-20201125071943-00656.warc.gz", "language": "en", "language_score": 0.9512847661972046, "token_count": 834, "score": 2.546875, "int_score": 3, "uid": "004_3281325_0" }
A leading security expert has warned of the dangers of cybercriminals attempting to hack satellites orbiting the planet . According to Raj Samani, the chief technical officer of Intel Security for Europe, the Middle East and Africa, cybersecurity needs to be taken more seriously in today's space race . “The proliferation of satellites, used to support our everyday connectivity and communications, makes this a growing attack vector," Samani said. "Indeed we have seen multiple examples of vulnerabilities within satellite networks, and this being exploited for criminal gain. ” In theory, hacking a satellite isn't so difficult. After all, a satellite is just a relay station suspended a little bit higher than those on Earth. An uplink station on Earth transmits a signal to a satellite, which then processes and amplifies it (by changing the frequency) and beams it back to Earth. Government space agencies aren't the only ones getting involved in the satellite game. Giant technology companies like Facebook and Google are planning their own low-Earth orbit satellites to help spread internet signal to remote parts of the planet. “Our reliance on low-orbiting satellites to support our telecommunications infrastructure have been shown to be vulnerable to eavesdropping, and security through obscurity has been exposed as no real defence," explained Samani. "Such vulnerabilities are already being exploited with criminal groups leveraging commercial satellite communications to hide their command and control infrastructure which is of course achievable as the level of security deployed on compromised satellites lack the basic controls of most small businesses. ” Inmarsat, the leading provider of global mobile satellite communication services, explained to Mirror Online that it is only low-earth orbiting satellites likely to be vulnerable. The company explained that all its satellites are placed in geostationary orbit (25,000 miles from the Earth) and that it is heavily invested in increasing its cyber resliliance. "We serve leading governments (including the US and UK), which require commercial satcom providers to demonstrate cyber security compliance or certification as a pre-requisite for doing business with them," a spokesperson said. "This means that for our government and commercial services, we are compliant with cyber security requirements. "
007_3816582
{ "id": "<urn:uuid:d5da6b8a-4e1e-4e36-8555-e828dac4fabb>", "dump": "CC-MAIN-2018-43", "url": "https://www.mirror.co.uk/news/technology-science/technology/hackers-space-security-expert-warns-7018043", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583517495.99/warc/CC-MAIN-20181023220444-20181024001944-00342.warc.gz", "language": "en", "language_score": 0.9500067830085754, "token_count": 446, "score": 2.75, "int_score": 3, "uid": "007_3816582_0" }
2 Radioactive ElementsRadioactivity – release of energy and matter from changes in an atom’s nucleusSome elements or some of their isotopes (atoms w/ different mass #’s) are radioactiveA new way to write an atomic symbol:mass number Atomic Symbolatomic number12C6Try Sodium on your own…. 3 II. Transmutation of Elements Transmutation or Radioactive Decay – change of one element to another (e. g., U changing to Pb)Decay Series – series of steps by which a radioactive nucleus changes to a nonradioactive one (Fig 11-6)Alpha Decay – when a nucleus releases 2 protons and 2 neutrons together ( a He nucleus)Beta Decay – when a nucleus releases an electron…“But wait Mrs. O’Gorman, you told us that electrons are not in the nucleus…”Well, scientists believe that a neutron is nothing but a proton and an electron that are hooked up and disguised as a neutral charge… 4 III. Transmutation of Elements (Cont’d) Gamma Decay – release of energy in the form of gamma rays that accompanies α (alpha) and β (beta) decayDecay or die! (try these)Illustrate the alpha decay of Polonium – 216Illustrate the beta decay of Bismuth – 210 5 III. Transmutation of Elements (Cont’d) To sum up, the “rules” of radioactive decay are:Alpha Decay – nucleus loses 2 P’s and 2 N’sBeta Decay – nucleus loses an electron (the electron was produced by the breakdown of a neutron)Gamma Decay – accompanies Alpha and Beta Decays – nucleus releases a HIGH energy wave called a Gamma ray 6 II. Transmutation of Elements Half-life – amount of time it takes half the atoms in a sampleof radioactive material to decay into a stable, non-radioactive element (Fig )Half-life of Polonium-215 is secondHalf-life of Uranium-218 is 4. 5 billion years! ! Suppose you have 100 grams of Po-215…How much Po is left after seconds? After sec? After sec? Suppose you are given 600 g of U-238…How large was the sample 2. 25 billion years ago? In how many years would I expect to see ONLY 300 g of U-238 left in my sample? How much, and what decay material, would I have along with my 300 g of U-238 (see your textbook) ? 7 III. Transmutation of Elements Nuclear FissionSplitting of a large atom into two smaller ones by a neutron bulletReleases energyCan be controlled so it’s used for nuclear powerINDIAN POINT = FISSION235 U + 1 n Kr Ba nNuclear Fusionfusing of two smaller atoms to form a larger oneTREMENDOUS Release of energyDifficult to control so we don’t use it as an energy sourceThis is how the SUN produces so much heat and radiation energyFUSION = SUN 8 IV. Detecting & Measure Radioactivity Electroscope (Fig )Separated foil leaves collapse if a radiation source is nearGeiger Counter (Fig )Makes a click every time a radiation particle hits it# of clicks per unit time indicates the radiation strengthCloud chamber (Fig )Radiation particles leave visible trails through alcohol vaporBubble chamber (Fig )Similar to a cloud chamber 9 V. Uses of Radioactivity Radioisotopes – artificially produced radioactive isotopes of common elementsUsed as tracers whose paths can be followed with instrumentsIodine-131 collects in the thyroid gland so doctors can observe any problems that a person my be having with their thyroid. Iron-59 collects in bloodSome food is “irradiated” to kill bacteria so it will stay safe to eat for long periods of 10 Practice of Half-Life Calculations Fill in this chart of the half-life decay of Carbon-14Half Life # Time Elapsed Am’t of C14 Remainingggggg- In what year will you have half of the amount of radioactive material than what you started with (assuming that the decay process starts today)? - 7737How many years will it take to have 25% of what you started with? 11,460 years
001_7132994
{ "id": "<urn:uuid:de4eff4c-53f1-44c7-aa06-d3ef1d0fddc1>", "dump": "CC-MAIN-2017-39", "url": "http://slideplayer.com/slide/3526959/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818695726.80/warc/CC-MAIN-20170926122822-20170926142822-00209.warc.gz", "language": "en", "language_score": 0.8527287244796753, "token_count": 899, "score": 3.78125, "int_score": 4, "uid": "001_7132994_0" }
A software management system is a set of tools and procedures for keeping track of which versions of which software you have installed, and whether any local changes have been made to the software or its configuration files. Without such a system, it is impossible to know whether a piece of software needs to be updated or what local changes have been made and need to be preserved after the update. Using some software management system to keep up to date is essential for security purposes, and useful for non-security upgrades as well. Fortunately, nearly all Unix systems provide some form of software management for the core components of the operating system and the applications distributed with it. The most common approaches involve using management packages? precompiled executables and supporting files? and managing the software source code from which executables can be compiled and installed. Whether you use packages or source code, you need to get the files from somewhere. Vendors typically make their applications available on the Internet? through the Web or through an anonymous FTP site. With very popular operating systems or applications, however, a single web site or FTP site often can't keep up with the demand to download it, so many software vendors arrange to have other sites serve as mirrors for their site. Users are encouraged to download the software from the mirror site closest (in network geography) to them. In principle, all of the software on the vendor's site is replicated to each mirror site on a regular (often daily) basis. Mirror sites provide an important security benefit: they make the availability of software more reliable through redundancy. On the other hand, mirror sites also create some security concerns: Using a mirror site is thus a trade-off between the convenience of being able to get a high-speed download when you want it, and of possibly extending your trust to a third party. A typical package file is a file containing a set of executable programs, already compiled, along with any supporting files such as libraries, default configuration files, and documentation. Under most packaging systems, the package also contains some metadata, such as: Version information for the software it contains Information about compatible operating system versions or hardware architectures Lists of other packages that the package requires Lists of other packages with which the package conflicts Lists of which included files are configuration files (or are otherwise likely to be changed by users once installed) Commands to run before, during, or after the included files are installed The other important component of a package-based system is a database containing information about which versions of which packages have been installed on the system. Package-based systems are easy to use: with a simple command or two, a system administrator can install new software or upgrade her current software when a new or patched version is released. Because the packaged executables are already compiled for the target operating system and hardware platform, the administrator doesn't have to spend time building (and maybe even porting) the application. On the other hand, packages are compiled to work on the typical installation of the operating system, and not necessarily on your installation. If you need to tune your applications to work with some special piece of hardware, adapt them to an unusual authentication system, or simply compile them with an atypical configuration setting, source code will likely be more useful to you. This is often the case with the kernel, for example. Commercial Unix distributions that don't provide source code are obvious candidates for package-based management. For example, Solaris 2. x provides the pkgadd, pkgrm, pkginfo, and showrev commands (and others) for adding, removing, and querying packages from the shell, and admintool for managing software graphically. Package management isn't only for commercial Unix. Free software Unix distributions also provide package management systems to make it easier for system administrators to keep the system up to date. Several Linux distributions have adopted the RPM Package Manager (RPM) system. This system uses a single command, rpm, for all of its package management functions. Debian GNU/Linux uses an alternative package management system called dpkg. The BSD-based Unix systems focus on source-based updates, but also provide a collection of precompiled packages that are managed with the pkg_add, pkg_delete, and pkg_info commands. In its early days, RPM stood for "Red Hat Package Manager," but the name has since been changed to reflect its popularity on other distributions of Linux as well. In contrast to package-based systems, source-based systems focus on helping the system administrator maintain an up-to-date copy of the operating system's or application's source code, from which new executables can be compiled and installed. Source-based management has its own special convenience: a source-based update comes in only a single version, as opposed to compiled packages, which must be separately compiled and packaged for each architecture or operating system on which the software runs. Source-based systems can also be particularly useful when it's necessary to make local source code changes. From a security standpoint, building packages from source code can be a mixed blessing. On the one hand, you are free to inspect the source code and determine if there are any lurking bugs or Trojan horses. In practice, such inspection is difficult and rarely done, but the option exists. On the other hand, if an attacker can get access to your source code, it is not terribly difficult for the attacker to add a Trojan horse of her own! To avoid this problem, you need to be sure both that the source code you are compiling is for a reliable system and that you have the genuine source code. Moreover, source inspection is rarely done correctly! Knowing how to program is not the same as knowing how to audit code for security problems. Even so, there are an increasing number of cases in which source code distribution was successfully attacked and a Trojan horse was incorporated into code that was subsequently distributed. Ironically, both cases involved security-related software. In one case, a Trojan horse was incorporated into the source code for the tcpwrappers suite of programs. In another case, a Trojan horse was incorporated into the makefiles that build OpenSSH. The simplest approach to source management is to keep application source code available on the system and recompile it whenever it's changed. Most Unix systems use the /usr/src and /usr/local/src hierarchies to store source code to distributed and third-party software, respectively. When a patch to an application is released, it typically takes the form of a patch diff, a file that describes which lines in the old version should be changed, removed, or added to in order to produce the new version. The diff program produces these files, and the patch program is used to apply them to an old version to create the new version. After patching the source code, the system administrator recompiles and reinstalls the application. Although most users of Linux distributions that use the rpm or dpkg package management systems may never use one, both systems support packages containing source code rather than precompiled executables. Source packages install themselves in a special location, and include metadata that describes how to automatically compile and install the application from the source. For example, FreeBSD and related versions of Unix distribute many applications in their ports collection. An application in the ports collection consists of the original source code from the application's author, along with a set of patches that have been applied to better integrate the application into the BSD environment. The makefiles included in the ports system automatically build the application, install it, and then register the application's files with the BSD pkg_add command. This approach is widely used for maintaining third-party software on FreeBSD systems. Another approach to source management is to store the source code on a server using a source code versioning system such as the Concurrent Versions System (CVS), and configure the server to allow anonymous client connections. Users who want to update their source code to the latest release use the CVS program to "check out" the latest patched version from the remote server's repository. The updated code can then be compiled and installed. An advantage of CVS is that the system makes it easy for sites to maintain their own local modifications to an otherwise large and unwieldy system. CVS will detect the local modifications and reapply them each time a new version of the source code is downloaded. FreeBSD, NetBSD, and OpenBSD use CVS to distribute and maintain their core operating system software. In addition, tens of thousands of open source software projects maintain CVS servers of their own, or are hosted at sites such as sourceforge. net that provide CVS respositories.
006_260184
{ "id": "<urn:uuid:e2724c77-17cb-4a4c-9918-17a4a56615a8>", "dump": "CC-MAIN-2018-30", "url": "http://etutorials.org/Linux+systems/unix+internet+security/Part+IV+Secure+Operations/Chapter+17.+Keeping+Up+to+Date/17.1+Software+Management+Systems/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676594790.48/warc/CC-MAIN-20180723012644-20180723032644-00066.warc.gz", "language": "en", "language_score": 0.9372314214706421, "token_count": 1786, "score": 3.40625, "int_score": 3, "uid": "006_260184_0" }
The Shinya Yamanaka Lab at Kyoto University paved the way for stem cell research with the world’s first generation of mouse and human iPSCs. With this foundation, Dr. Akira Watanabe and his team at the Center for iPS Cell Research and Application (CiRA) are using single iPSCs to study epigenesis in more than 10 tissue types. They are building their model of epigenesis using the C1 Kit for mRNA Seq with the C1 system and the Illumina HiSeq 2000. Watanabe's team uses the C1™ system for transcriptome analysis of reprogrammed iPS cells. Because cellular reprogramming can revert differentiated cells to induced pluripotent stem cells, the team is investigating the mechanisms implicated in altering cell fate. Watanabe is exploring the mechanisms responsible for differentiation in complex cell types such as pancreatic β cells, as well as the chemical and transcriptional factors that drive reprogramming. “We have found that each iPSC is even different. If you study iPSCs from different tissues, they are different and differentiate differently as well. For instance, some iPSCs can differentiate into cardiomyocytes while others cannot. ” — Akira Watanabe, PhD, Center for iPS Cell Research, Kyoto University Through his work, Watanabe has found that iPSCs present heterogeneous profiles. For instance, Watanabe has found that iPSCs selected from different tissues may not be capable of differentiation into all somatic cell types but only a subset. Because observation of phenotypic results can take up to 30 days of cell maturation, Watanabe’s team is building a faster, predictive model using single-cell mRNA sequencing to expedite analysis. Through this methodology, Watanabe studies the transcriptional effects that chemical differentiation induction and reprogramming have in both normal and diseased cells. By understanding both differentiation and reprogramming in iPSCs, Watanabe aims to establish an iPSC standard for regenerative therapies and disease state modeling.
009_3639566
{ "id": "<urn:uuid:6bca453a-7a5b-4a57-90a1-e86120d2fe04>", "dump": "CC-MAIN-2021-49", "url": "https://jp.fluidigm.com/articles/dr-akira-watanabe?changeLanguage=true", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358847.80/warc/CC-MAIN-20211129225145-20211130015145-00316.warc.gz", "language": "en", "language_score": 0.9324964284896851, "token_count": 427, "score": 2.640625, "int_score": 3, "uid": "009_3639566_0" }
I'm reading in a fluid dynamics book and in it the author shortens an equation using identities my rusty vector calculus brain cannot reproduce. The author turns the left side of the equation into: Just to be clear; is a vector valued function, is a fixed vector, are scalar valued functions. The first part is fine: The divergence of a fixed vector is zero and so, Next I need to find I am not sure what to do with is. is a scalar valued function, but so is I think . I know of the product rule between a scalar and a vector valued function, but what happens when there are two scalar valued functions? Any suggestions are welcome, thanks.
004_1684554
{ "id": "<urn:uuid:289cbaf0-28c3-485e-bade-e5bd98d2482d>", "dump": "CC-MAIN-2014-52", "url": "http://mathhelpforum.com/calculus/195168-vector-calculus-identities-mess.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802775225.37/warc/CC-MAIN-20141217075255-00080-ip-10-231-17-201.ec2.internal.warc.gz", "language": "en", "language_score": 0.9324708580970764, "token_count": 149, "score": 2.546875, "int_score": 3, "uid": "004_1684554_0" }
Hobgoblin was a name "for the larger kinds" of Orcs found in Middle-earth in the Third Age. In the quest for Erebor, Gandalf warns Bilbo Baggins that the Grey Mountains are "simply stiff with goblins, hobgoblins, and orcs of the worst description". Other versions of the Legendarium The term appears only twice in the published writings on the legendarium (both in The Hobbit). It has been speculated that "the term perhaps, but doubtfully, refers to the large soldier-orcs known as Uruks", possibly since Tolkien had not created the latter name by the time of his writing of The Hobbit. Portrayals in Adaptations 1996, 1997: Middle-earth Collectible Card Game: - The card "Hobgoblins" was released in two editions: one for the expansion set Middle-earth: The Dragons (card art by Ron Chironna) and one for Middle-earth: The Lidless Eye (card art by Heather Hudson). |Legendary Races of Arda| |Animals:||Dumbledors · Gorcrows · Hummerhorns · Pards · Swans of Gorbelgod · Turtle-fish| |Dragon-kind:||Great glow-worms · Sea-serpents · Spark-dragons · Were-worms| |Evil Races:||Giants · Gongs · Half-trolls · Hobgoblins · Ogres · Snow-trolls · Troll-men · Two-headed Trolls| |Fairies:||Dryads · Mermaids · Sprites · Sylphs · White cow| |Other:||Badger-folk · Great beasts · Lintips · Mewlips · Nameless Things · Spectres| |Individuals:||The Hunter · Lonely Troll · Man in the Moon · The Rider · River-woman · Tarlang · Tim| - ↑ J.R.R. Tolkien, The Hobbit, [Preface] - ↑ Wayne G. Hammond and Christina Scull (eds), The Lord of the Rings: A Reader's Companion, p. 24 - ↑ J.R.R. Tolkien, The Hobbit, "Queer Lodgings" - ↑ "Hobgoblins", at Encyclopedia of Arda, as of 5 September 2010 - ↑ J.R.R. Tolkien; Humphrey Carpenter, Christopher Tolkien (eds. ), The Letters of J.R.R. Tolkien, Letter 319, (dated 8 January 1971)
002_4829490
{ "id": "<urn:uuid:1546749b-02f4-4c60-a1c2-259ce5e31dd8>", "dump": "CC-MAIN-2014-41", "url": "http://www.tolkiengateway.net/wiki/Hobgoblin", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657123996.28/warc/CC-MAIN-20140914011203-00328-ip-10-196-40-205.us-west-1.compute.internal.warc.gz", "language": "en", "language_score": 0.8070217370986938, "token_count": 531, "score": 2.609375, "int_score": 3, "uid": "002_4829490_0" }
"Indian Territory", General Land Office Period: 1887 (dated) Color: Printed Color 32. 3 x 24 inches 82 x 61 cm A most interesting and detailed map reflecting the status of lands allocated to various tribes shown through color-coding. Indian removals from their 'home lands' began as early as 1817 and in the years following many of the principal Eastern Indian tribes were relocated to Indian Territory. Here the "Five Civilized Tribes" formed the nucleus of an organized government. By 1885, however, representatives of some fifty tribes had settled on lands once promised to the original five. This map reflects many of these allocations and provides some data on the pertinent treaties involved. Does not include the panhandle, which by this time are Public Lands. Drawn by G. P. Strum. Published to accompany George Catlin's Indian Gallery, by Thomas Donaldson. Issued folding, now tissue backed. Beautifully colored with a little very light offsetting in blank area at bottom. Tear in upper blank margin not affecting map.
010_1639168
{ "id": "<urn:uuid:b7e2cd7c-8081-4beb-9bf5-455aafb107d9>", "dump": "CC-MAIN-2019-22", "url": "https://www.oldworldauctions.com/catalog/lot/103/192", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232259327.59/warc/CC-MAIN-20190526165427-20190526191427-00289.warc.gz", "language": "en", "language_score": 0.9529117345809937, "token_count": 220, "score": 3.859375, "int_score": 4, "uid": "010_1639168_0" }
Sweetwater in Monroe County, Tennessee — The American South (East South Central) —Knoxville Campaign — On November 4, 1863, to divert Federal forces from Chattanooga, Confederate Gen. James Longstreet led two reinforced divisions from the city to attack Union Gen. Ambrose E. Burnside’s garrison in Knoxville. Burnside confronted Longstreet outside Knoxville, then withdrew to his fortification on November 12, and Longstreet besieged the city. In Chattanooga, after Union Gen. Ulysses S. Grant’s army defeated Confederate Gen. Braxton Bragg’s forces at the end of the month, Grant ordered Gen. William T. Sherman to reinforce Burnside. As Sherman marched toward Knoxville, Longstreet withdrew on December 4. Sherman soon rejoined Grant. Settled in the 1820s, Sweetwater flourished when the East Tennessee and Georgia Railroad was constructed through the town in 1852. Trains stopped and drew water from two large tanks supplied by the nearby creek, and a freight depot stood in the parking area to your right. Because of its strategic location, this small town became an important supply center during the Civil War. Initially, a Confederate garrison protected the facilities at Sweetwater. The situation changed during Union Gen. Ambrose E. Burnside’s East Tennessee campaign when the 45th Ohio Mounted Infantry arrived in September 1863 and occupied the town. Military control of the Sweetwater Valley Gen. James Longstreet made the town his headquarters and staging area for the campaign against Knoxville in November 1863. Sweetwater was then the northernmost station held by the Confederate army on the only remaining railroad in the region. Longstreet’s troops and artillery rode the cars from Chattanooga, joined with the cavalry here, and prepared for the attack on Knoxville. When Federal troops reinforced Burnside, however, Longstreet withdrew. Confederate attempts to reoccupy Sweetwater resulted in several engagements later in the war. In February 1865, local resident Gen. John C. Vaughn reported that “Captain Maston, with seventy-five men from my brigade, captured the garrison at Sweet Water, forty-five miles below Knoxville, sixty mounted men, horses, and equipments of Second Ohio Regiment.” The Confederates burned the depot, but Federal troops controlled the railroad in Sweetwater until the end of the war. “We celebrated the Fourth of July (1865) at Sweetwater, and felt that it was ‘a glorious fourth’ indeed, that had brought back to our country ‘the white-winged angel of Peace.’” — Capt. Samuel W. Scott and Lt. Samuel P. Angel, 13 Tennessee Cavalry (U.S.) Gen. James Longstreet Courtesy Main Street, Sweetwater - Courtesy Philip Roy Erected by Tennessee Civil War Trails. Marker series. This marker is included in the Tennessee Civil War Trails marker series. Location. 35° 35. 978′ N, 84° 27. 728′ W. Marker is in Sweetwater, Tennessee, in Monroe County. Marker is at the intersection of North Main Street (U.S. 11) and East Walnut Street, on the right when traveling north on North Main Street. Touch for map. Marker is in this post office area: Sweetwater TN 37874, United States of America. Other nearby markers. At least 8 other markers are within 8 miles of this marker, measured as the crow flies. The Tennessee Overhill Experience (here, next to this marker); Longstreet Encampment (approx. 0. 3 miles away); Tennessee Meiji Gakuin High School 1989-2007 (approx. one mile away); The Great Craighead Cave (approx. 4. 8 miles away); Lost Sea (approx. 4. 8 miles away); Affair at Philadelphia (approx. 6. 3 miles away); Battle of Philadelphia (approx. 6½ miles away); Niota Depot (approx. 7½ miles away). Touch for a list and map of all markers in Sweetwater. Categories. • Railroads & Streetcars • War, US Civil • Credits. This page was last revised on June 16, 2016. This page originally submitted on October 15, 2013, by Don Morfe of Baltimore, Maryland. This page has been viewed 493 times since then and 40 times this year. Photos: 1, 2, 3. submitted on October 15, 2013, by Don Morfe of Baltimore, Maryland. • Bernard Fisher was the editor who published this page.
006_3696115
{ "id": "<urn:uuid:31c5f0e2-4bfd-456f-8983-5bdb25d61935>", "dump": "CC-MAIN-2018-30", "url": "https://www.hmdb.org/marker.asp?marker=69367", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590794.69/warc/CC-MAIN-20180719090301-20180719110301-00212.warc.gz", "language": "en", "language_score": 0.948269248008728, "token_count": 946, "score": 3.21875, "int_score": 3, "uid": "006_3696115_0" }
Computers isn’t limited to the areas where we most look forward to finding it reminiscent of business and industry. Once I determined to become a TUSD Tech Fellow I actually didn’t know what to expect from this system, nor did I fully understand the magnitude of the impact it might have in my class and myself as an educator. What I did know was that I wanted to implement the use of expertise in a purposeful strategy to take my Spanish lessons to another degree. Basically, I was on the lookout for ways to make meaningful connections between my students major language and Spanish to help them increase their development of a second language. Incorporating technology into my classroom has allowed me to develop an environment friendly technique to cover extra content while spending extra time working towards using goal language. To completely understand information techniques, it’s essential to understand the broader group, management, and information know-how dimensions of techniques. The expertise that I used this yr helped me scaffold writing structure, however next yr I might like to focus on refining college students understanding English Language Conventions. I hope to use EdPuzzle to be able to create interactive classes featuring vital grammar ideas. In this dystopian vision human freedom and creativity are gradually crushed as our working lives are more and more decreased to following a set ‘script’ for every part of our day, derived by management software based mostly on an analysis of its in-house ‘huge information’. Adverts have been disabled on your article, based on HubPages’ automatic content filters or moderator evaluate. If this occurs, a warning will appear on the high of your article. The desire to use robotics has been with engineers for so long as computers have existed. Their use is deep rooted within the want to have machines that carry out humanly tough chores or monotonous meeting line tasks. Miniaturization of business and different merchandise requires precision and this has dominated out the human hand which is liable to error when used for a lot of hours. Software programming is mainly involved with the coding stages in software improvement. In fact full software programming includes research, planning, designing and implementation stages, underneath the umbrella of software engineering. Software program engineering is a broad design framework very like some other professional engineering works. We may use conversion tracking pixels from advertising networks reminiscent of Google AdWords, Bing Advertisements, and Facebook as a way to establish when an commercial has efficiently resulted within the desired action, reminiscent of signing up for the HubPages Service or publishing an article on the HubPages Service.
001_1142698
{ "id": "<urn:uuid:a8d6a138-de8d-4a19-9ccb-b5a569c9701a>", "dump": "CC-MAIN-2020-16", "url": "http://tablettia.info/the-four-varieties-of-pc-software-program.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371818008.97/warc/CC-MAIN-20200408135412-20200408165912-00093.warc.gz", "language": "en", "language_score": 0.9493749737739563, "token_count": 517, "score": 2.515625, "int_score": 3, "uid": "001_1142698_0" }
An E3- L2 Set of ‘follow-me’ cards that can be used by a group of learners or as a domino card match ‘loop’ for an individual learner. Serves as a supplementary / plenary resource to identifying and defining common phrases/sayings. An interactive presentation to explain the meaning of nouns, verbs and adjectives and an accompanying hands-on activity to sort words into nouns, verbs and adjectives. This is good to use early in a course as it is fun and gets learners working in groups, A counting game along similar lines to Snakes and Ladders. Learners will learn turn-taking, following instruction & basic counting skills. In addition, they will pick up social and communication skills along the way. (Print onto A3 – a dice and counters needed) A PPT version is also included to enable the game to be played on a smartboard. This is a great session starter. Students will work on their sentence construction and vocabulary with a card game that allows them to experiment with word order and effective word choice. Students have to put the words into a sensible order, even if the subject of their film is far from sensible. In this game, students compete to make the scariest film title, or to sabotage other people’s film titles. It is a light hearted and fun game. The film titles created can also become writing prompts. This resource helps learners hear rhymes and recognise corresponding letters/digraphs, rimes and onsets etc. Take simple limericks and poems and get your learners to put them together. I created my own limericks to match work we had been doing on long vowel sounds (it is not that difficult to do once you get started). Well-known poems and nursery rhymes also proved particularly popular as many knew them already by heart from childhood and some were doing them now with their children. A useful game I created to help my students understand and recognise different types of documents. It is particularly useful as a plenary. I first used it several years ago in an observed lesson, and the game was highly complimented! With extensive instructions, differentiation ideas and full Functional English mapping.
012_6574062
{ "id": "<urn:uuid:04c1b02a-3b70-432a-a384-07eba35aeb23>", "dump": "CC-MAIN-2019-51", "url": "https://www.skillsworkshop.org/index.php/english?search=&amp%3Bamp%3B=&amp%3Bf%5B0%5D=area%3A639&f%5B0%5D=area%3A610&f%5B1%5D=area%3A2134&f%5B2%5D=english_resource_type%3A59", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540586560.45/warc/CC-MAIN-20191214094407-20191214122407-00174.warc.gz", "language": "en", "language_score": 0.9664243459701538, "token_count": 461, "score": 3.109375, "int_score": 3, "uid": "012_6574062_0" }
Complementing Exploring Creation with Zoology 3 , the Zoology 3 Notebooking Journal will provide everything your students need to complete their studies in Exploring Creation with Zoology 3 . This special notebooking journal will be treasured by your child as he or she illustrates and records fascinating facts and information learned during each lesson. There are beautifully decorated templates for completing every assignment in the book, as well as a detailed schedule to follow. Also included are pages to record projects, experiments, and activities. Finally, paste pages are provided to display the gorgeous, colorful lapbook-style miniature books your student will assemble. Dimensions: 8. 5 x 11 inches. Soft cover. 326 pp.
002_1514
{ "id": "<urn:uuid:aa3959e7-c1b7-407b-8e94-70f53711cd96>", "dump": "CC-MAIN-2014-23", "url": "http://www.setonbooks.com/viewone.php?ToView=P-SCAP-29", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997894140.11/warc/CC-MAIN-20140722025814-00186-ip-10-33-131-23.ec2.internal.warc.gz", "language": "en", "language_score": 0.92849200963974, "token_count": 141, "score": 2.671875, "int_score": 3, "uid": "002_1514_0" }
A kitchen tool, typically made of materials such as wood, metal, or silicone plastic, that are specifically constructed to withstand high temperatures when used for baking or cooking foods. There are several types of spatulas that are used for different purposes. One type is made with a handle attached to a flat blade or a spoon shaped blade. The straight shafted spatulas are most often used to spread toppings, scraping food from the sides of pots and mixing bowls, stirring ingredients in curved bowls, or folding ingredients into each other. They are generally made of a flexible silicone plastic or rubber that can move easily around and form into the shape of the bowl, pan, or pot containing the ingredients. The heat resistant spatulas are made to withstand high temperatures, exceeding 400 degrees, providing an all-purpose utensil to assist with meal preparation. Straight metal spatulas are most often made for spreading food toppings. Another type of spatula is one that is bent at an angle and is generally used for turning or flipping food. They are made of plastic, nylon, silicone, metal, or stainless steel. The size or shape of the spatula will often depend on the intended use of the spatula. The larger wide spatulas are used to turn, lift, or serve a portion of food. The smaller length spatulas work well for lifting and serving smaller food items such as quiche, pie, or cakes.
000_3227433
{ "id": "<urn:uuid:5fb881f0-aff7-4442-8f9e-e5eadaf16679>", "dump": "CC-MAIN-2017-30", "url": "http://www.recipetips.com/features/?edviser=9&id=38214&slide=2", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423785.29/warc/CC-MAIN-20170721142410-20170721162410-00709.warc.gz", "language": "en", "language_score": 0.950126051902771, "token_count": 285, "score": 3, "int_score": 3, "uid": "000_3227433_0" }
Peripheral Artery Disease (PAD) What is Peripheral Artery Disease (PAD)? When you’re walking, your legs require more oxygen than when standing still. Arteries carry oxygen-rich blood. With PAD (intermittent claudication), atherosclerosis has narrowed the arteries. This reduces the blood flow and, as a consequence, reduces the amount of oxygen that is carried to the legs. This can cause painful symptoms. PAD complaints and symptoms After a short walk, people with PAD often experience a painful ache, a cramp or a feeling of tiredness in their legs. Some experience the symptoms with normal activity while others only notice it during more intense exercise. People who have had PAD for some time can experience cold feet due to a thinning of the fatty layer directly under the skin. PAD can occasionally cause thickened nails. A sore in your foot or leg can take longer to heal or even fester. An especially intense work out requires more oxygen so symptoms will therefore develop more rapidly. Cold weather will also trigger symptoms because the cold causes your arteries to narrow. PAD prevalence and who it affects The chances of developing peripheral artery disease increase at an older age. Smoking is by far the greatest risk factor for PAD. Other factors that increase your chance of developing PAD include high blood pressure, diabetes, obesity, inactivity and a family history of PAD. Any combination of these factors generates an even higher risk. This means that if, for instance, you smoke and suffer from obesity, your risk of developing PAD increases even more. Your risk factor increases similarly if one of your parents developed cardiovascular disease before the age of 60, or if you suffer from high cholesterol. The risk factors for peripheral artery disease are similar to those for cardiovascular disease. Self-help for PAD For smokers it is advisable to quit as soon as possible. Smoking damages your arteries, which become narrower as a result. Your GP will be able to provide you with the necessary support. It is important to keep active, even when you’re in pain, because a daily walk or daily exercise improves the circulation in your legs. After a while you will notice you can stay active and symptom-free for longer periods of time. If you suffer with obesity it is recommended to lose weight. If you carry less weight, there is less strain on your muscles which results in a longer, pain-free walk. It is also important to take good care of your feet, especially if you also suffer with diabetes. This will stop sores from festering and avoids a poor healing process. Physiotherapy treatment for PAD A physiotherapist can help you to improve your symptoms and makes sure the risk of atherosclerosis is limited. The physiotherapist will help you find the right way to stay active. Walking workouts can improve your co-ordination and endurance. The physiotherapist aims to demonstrate how a healthy lifestyle can help you to manage your symptoms independently. He can show you how you can keep active by yourself and how to live a healthy life. Exercising accordingly will be hugely beneficial in the long run. Cardiothoracic physiotherapists are experienced in PAD treatment. A surgical procedure may be needed for severely narrowed arteries. Angioplasty or an artery bypass graft can remove the blockage and restore the blood flow. After the operation you might be advised to see a physiotherapist to help with your rehabilitation. Book an appointment
001_5731787
{ "id": "<urn:uuid:027c4207-7c43-434e-8f13-e59231b820a1>", "dump": "CC-MAIN-2020-24", "url": "https://www.fysiocity.nl/en/peripheral-artery-disease-pad/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347410535.45/warc/CC-MAIN-20200530231809-20200531021809-00273.warc.gz", "language": "en", "language_score": 0.9431666731834412, "token_count": 725, "score": 3.390625, "int_score": 3, "uid": "001_5731787_0" }
More Opportunities to Succeed for Aboriginal Students Ontario Ensuring Equity in Education Ontario is launching an innovative new pilot program to help more Aboriginal students develop business and entrepreneurial skills. The province is partnering with the Martin Aboriginal Education Initiative to support the Aboriginal Youth Entrepreneurship Program for First Nation, Métis and Inuit students. Through hands-on activities, Aboriginal students will learn how to develop a business plan and create a product- or service-based business, such as designing a website. Students will be mentored by established Aboriginal business owners, and eligible students will get funding to start their own businesses. Pilot programs will begin in September 2014 for students in grades 11 and 12 in Fort Frances, Kenora, London, Sioux Lookout, Sault Ste. Marie, Sudbury, Thunder Bay, Toronto and Wallaceburg. Building the province's knowledge economy is part of the government's economic plan that is creating jobs for today and tomorrow. The comprehensive plan and its six priorities focus on Ontario's greatest strengths - its people and strategic partnerships. - Innovative programs such as the Aboriginal Youth Entrepreneurship Program are helping Ontario students and schools achieve excellence and ensure equity. These are key goals of Achieving Excellence, Ontario’s renewed vision for education. - Students who participated in the program in other provinces had improved attendance, increased self-confidence, motivation to pursue postsecondary options, and enhanced skill development in entrepreneurship. - The province is investing $1. 35 million over three years in the pilot program, where students can earn two credits towards high school graduation. - Ontario’s five-year graduation rate is stable at 83 per cent, which is 15 percentage points higher than the 2004 rate of 68 per cent. The percentage of students graduating in four years is now 75 per cent, up from 74 per cent last year. “This program supports our government’s vision that Aboriginal learners deserve access to the training, programs and opportunities they need to succeed and reach their full potential. This pilot program will help boost their entrepreneurial skills through innovative projects, partnerships, and coaching from business leaders from the Aboriginal community. ” “We are very pleased that the Government of Ontario is supporting the implementation of the Aboriginal Youth Entrepreneurship Program in ten high schools across the province. Aboriginal youth are the fastest growing segment of the population and will be key drivers of the Canadian economy. The Aboriginal Youth Entrepreneurship Program is dedicated to ensuring that Aboriginal students are empowered with the skills and experience they need to fully participate in our growing economy, to enjoy greater economic self-reliance and a better quality of life. This brings the total number of schools offering the Aboriginal Youth Entrepreneurship program to 44 across the country. ” The Right Honourable Paul Martin “This innovative program will help Aboriginal students gain the needed entrepreneurial skills to be leaders in both their community and across Ontario. By giving Aboriginal students opportunities for today and tomorrow, this program is another example of how our government’s economic plan is working for all Ontarians.”
010_6134511
{ "id": "<urn:uuid:b48333f4-edb8-4fb0-acf5-1cf2341df7f4>", "dump": "CC-MAIN-2016-50", "url": "https://news.ontario.ca/edu/en/2014/04/more-opportunities-to-succeed-for-aboriginal-students.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542217.43/warc/CC-MAIN-20161202170902-00185-ip-10-31-129-80.ec2.internal.warc.gz", "language": "en", "language_score": 0.9426358342170715, "token_count": 629, "score": 2.90625, "int_score": 3, "uid": "010_6134511_0" }
When most of us think of summer we think of road trips, beach days, playing outside with the hose and the occasional visit with your cousins. But what often goes ignored is the disappointing reality that summertime is when the most unintentional injury related deaths occur in children. While most parents are aware of the risks for and ways to prevent drowning and sun-related illnesses like sunburn and heatstroke as well as the importance of wearing your seatbelt while riding in a car, there are several injuries that are more prominent during the summer which are often disregarded. 1. Bug Bites Mosquitos can carry West Nile Virus, ticks can carry Lyme Disease and any child can have an allergic reaction to various insect bites at any time. To protect your little one use a DEET-Free insect repellent to prevent bug bites and stings. The saying “as likely as getting stuck by lightning” has some merit, but to the hundred people who are killed every year by lightning, it’s not so funny. Make sure your kids are well-versed on how to seek shelter if a thunder storm rolls in while they’re outside playing. 3. Head injuries Sure, we grew up biking, skating, skateboarding, and more without a helmet, but we were lucky we didn’t end up hurt. Let’s not leave our children’s health and safety to chance. Make sure your child always has proper safety equipment like helmets, elbow pads, and knee pads while participating in these activities. 4. Playground falls If you’re going to the park, be sure to supervise your children at all times and double check the age and height requirements for the equipment. When it comes to summer safety and home play sets, be sure to have safety surfacing installed beneath your set to prevent injuries. Plants, household cleaners, small batteries, insecticides and household gases are all common sources of poisoning. Younger children and babies are are higher risk for poisoning from household products, so be sure to childproof cabinets and keep products out of their reach. If your child comes into contact with or ingests any substance that may be hazardous call the National Poison Hotline at 1-800-222-1222.
012_6408292
{ "id": "<urn:uuid:ebc4e0cc-a874-451c-bd0f-6a28c2de8ee5>", "dump": "CC-MAIN-2023-06", "url": "https://www.vitacost.com/all-terrain-poison-ivy-oak-bar-soap?isrc=vitablog060617bombshellmommy", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500076.87/warc/CC-MAIN-20230203221113-20230204011113-00403.warc.gz", "language": "en", "language_score": 0.9594581723213196, "token_count": 473, "score": 2.828125, "int_score": 3, "uid": "012_6408292_0" }
What Is Clean Eating? This would provide two vegetable servings and contains vitamins and fibre. The roll will provide calcium, B vitamins and is practically fat free. _______________________________________ MYTH: White meat is better for you than red meat. Chicken in white wine sauce: 390 cals, 32. 5g fat. For the original version including any supplementary images or video, visit http://www.dailymail.co.uk/health/article-207736/Healthy-eating-myths-exposed.html Clean eating is a dietary approach that advocates consuming food in its “most natural state. ” Purported benefits of clean eating include weight loss, increased energy and all-around improved health. There is no singular definition for clean eating, which often leads to confusion about the practice. However, clean eating usually http://www.prnewswire.com/news-releases/garcinia-cambogia-extract—crucial-data-released-231403591. html requires eating unprocessed and unrefined products, such as whole grains , fruits, vegetables, lean meats and other foods that don’t contain artificial ingredients or preservatives. There are a few simple clean eating guidelines to follow, including eating five to six times a day, drinking at least two liters of water a day, avoiding food that has a long list of ingredients and steering clear of foods and drinks that are high in sugar, saturated fats or trans fats, according to Clean Eating Magazine. The recent rise of the clean eating movement has sparked a number of dietary books on the subject, most notably Tosca Reno’s popular “The Eat-Clean Diet” (Robert Kennedy Publishing, 2007). In reference to Reno’s book, American Dietetic Association spokeswoman Roberta Anding told WebMD that readers should follow the book’s basic guidelines, but skip the nutrition information and advice on dietary supplements, which aren’t backed up by scientific evidence. For the original version including any supplementary images or video, visit http://www.livescience.com/42086-what-is-clean-eating.html Mediterranean diet: Heart-healthy eating plan She led the study that was published in BMJ Open. The research team identified 27 previous studies from 10 countries that garcinia cambogia side effects met their inclusion criteria and reviewed each of them. Fourteen studies were conducted in the U.S, two in Canada, six in Europe and five in other countries including South Africa, New Zealand, Japan and Brazil. Twelve of the studies were market surveys that evaluated the prices of anywhere from two to 133 foods each and included up to 1,230 stores. Fifteen studies were dietary surveys that ranged from 30 participants to more than 78,000. For the original version including any supplementary images or video, visit http://www.reuters.com/article/2013/12/13/us-healthy-eating-costs-an-extra-150-per-idUSBRE9BC0ZF20131213 Healthy eating costs an extra $1. 50 per day: study Herbs and spices make food tasty and can stand in for salt and fat in recipes. Go fish. Eat fish at least twice a week. Fresh or water-packed tuna, salmon, trout, mackerel and herring are healthy choices. Grill, bake or broil fish for great taste and easy cleanup. Avoid breaded and fried fish. For the original version including any supplementary images or video, visit http://www.wlwt.com/mediterranean-diet-hearthealthy-eating-plan/-/9838586/23527540/-/10bgxd6/-/index.html
004_6411700
{ "id": "<urn:uuid:bcd45ab5-40b8-4b85-968c-d45f20288190>", "dump": "CC-MAIN-2018-13", "url": "https://carrolzwlz.wordpress.com/2013/12/20/healthy-eating-myths-exposed/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648198.55/warc/CC-MAIN-20180323063710-20180323083710-00325.warc.gz", "language": "en", "language_score": 0.9329603910446167, "token_count": 780, "score": 2.875, "int_score": 3, "uid": "004_6411700_0" }
We review the salient evidence consistent with or predicted by the Hoyle-Wickramasinghe (H- W) thesis of Cometary (Cosmic) Biology. Much of this physical and biological evidence is multifactorial. One particular focus are the recent studies which date the emergence of the complex retroviruses of vertebrate lines at or just before the Cambrian Explosion of ∼500 Ma. Such viruses are known to be plausibly associated with major evolutionary genomic processes. We believe this coincidence is not fortuitous but is consistent with a key prediction of H-W theory whereby major extinction-diversification evolutionary boundaries coincide with virus-bearing cometary-bolide bombardment events. A second focus is the remarkable evolution of intelligent complexity (Cephalopods) culminating in the emergence of the Octopus. A third focus concerns the micro-organism fossil evidence contained within meteorites as well as the detection in the upper atmosphere of apparent incoming life-bearing particles from space. In our view the totality of the multifactorial data and critical analyses assembled by Fred Hoyle, Chandra Wickramasinghe and their many colleagues since the 1960s leads to a very plausible conclusion - life may have been seeded here on Earth by life-bearing comets as soon as conditions on Earth allowed it to flourish (about or just before 4. 1 Billion years ago); and living organisms such as space-resistant and space-hardy bacteria, viruses, more complex eukaryotic cells, fertilised ova and seeds have been continuously delivered ever since to Earth so being one important driver of further terrestrial evolution which has resulted in considerable genetic diversity and which has led to the emergence of mankind. New ages for flowstone, sediments and fossil bones from the Dinaledi Chamber are presented. We combined optically stimulated luminescence dating of sediments with U-Th and palaeomagnetic analyses of flowstones to establish that all sediments containing Homo naledi fossils can be allocated to a single stratigraphic entity (sub-unit 3b), interpreted to be deposited between 236 ka and 414 ka. This result has been confirmed independently by dating three H. naledi teeth with combined U-series and electron spin resonance (US-ESR) dating. Two dating scenarios for the fossils were tested by varying the assumed levels of (222)Rn loss in the encasing sediments: a maximum age scenario provides an average age for the two least altered fossil teeth of 253 +82/-70 ka, whilst a minimum age scenario yields an average age of 200 +70/-61 ka. We consider the maximum age scenario to more closely reflect conditions in the cave, and therefore, the true age of the fossils. By combining the US-ESR maximum age estimate obtained from the teeth, with the U-Th age for the oldest flowstone overlying Homo naledi fossils, we have constrained the depositional age of Homo naledi to a period between 236 ka and 335 ka. These age results demonstrate that a morphologically primitive hominin, Homo naledi, survived into the later parts of the Pleistocene in Africa, and indicate a much younger age for the Homo naledi fossils than have previously been hypothesized based on their morphology. The fossil record of ceratopsid dinosaurs between the occurrence of their proximate sister taxa in the Turonian and the beginning of their well-documented radiation from the late Campanian of North America onwards (approximately 90 and 77 Ma) is poor, with only seven taxa described from this early period in their evolution. We describe a new taxon of a highly adorned basal centrosaurine, Wendiceratops pinhornensis gen. et sp. nov. , from the lower part of the Oldman Formation (middle Campanian, approximately 78-79 Ma), Alberta, Canada. Over 200 bones derived from virtually all parts of the skeleton, including multiple well-preserved specimens of the diagnostic parietosquamosal frill, were collected from a medium-density monodominant bonebed, making the new taxon one of the best-represented early ceratopsids. The new taxon is apomorphic in having epiparietals at loci 2 and 3 developed as broad-based, pachyostotic processes that are strongly procurved anterodorsally to overhang the posterior and lateral parietal rami, and an ischium with a broad, rectangular distal terminus. Although the morphology of the nasal is incompletely known, Wendiceratops is inferred to have a large, upright nasal horn located close to the orbits, which represents the oldest occurrence of this feature in Ceratopsia. Given the phylogenetic position of the new taxon within Centrosaurinae, a enlarged nasal horn is hypothesized to have arisen independently at least twice in ceratopsid evolution. Large plant-eating dinosaurs are usually presumed to have been strictly herbivorous, because their derived teeth and jaws were capable of processing fibrous plant foods. This inferred feeding behavior offers a generalized view of dinosaur food habits, but rare direct fossil evidence of diet provides more nuanced insights into feeding behavior. Here we describe fossilized feces (coprolites) that demonstrate recurring consumption of crustaceans and rotted wood by large Late Cretaceous dinosaurs. These multi-liter coprolites from the Kaiparowits Formation are primarily composed of comminuted conifer wood tissues that were fungally degraded before ingestion. Thick fragments of laminar crustacean cuticle are scattered within the coprolite contents and suggest that the dinosaurian defecators consumed sizeable crustaceans that sheltered in rotting logs. The diet of decayed wood and crustaceans offered a substantial supply of plant polysaccharides, with added dividends of animal protein and calcium. Nevertheless, it is unlikely that the fossilized fecal residues depict year-round feeding habits. It is more reasonable to infer that these coprolites reflected seasonal dietary shifts-possibly related to the dinosaurs' oviparous breeding activities. This surprising fossil evidence challenges conventional notions of herbivorous dinosaur diets and reveals a degree of dietary flexibility that is consistent with that of extant herbivorous birds. Countershading was one of the first proposed mechanisms of camouflage [1, 2]. A dark dorsum and light ventrum counteract the gradient created by illumination from above, obliterating cues to 3D shape [3-6]. Because the optimal countershading varies strongly with light environment [7-9], pigmentation patterns give clues to an animal’s habitat. Indeed, comparative evidence from ungulates shows that interspecific variation in countershading matches predictions: in open habitats, where direct overhead sunshine dominates, a sharp dark-light color transition high up the body is evident; in closed habitats (e. g., under forest canopy), diffuse illumination dominates and a smoother dorsoventral gradation is found. We can apply this approach to extinct animals in which the preservation of fossil melanin allows reconstruction of coloration [10-15]. Here we present a study of an exceptionally well-preserved specimen of Psittacosaurus sp. from the Chinese Jehol biota [16, 17]. This Psittacosaurus was countershaded with a light underbelly and tail, whereas the chest was more pigmented. Other patterns resemble disruptive camouflage, whereas the chin and jugal bosses on the face appear dark. We projected the color patterns onto an anatomically accurate life-size model in order to assess their function experimentally. The patterns are compared to the predicted optimal countershading from the measured radiance patterns generated on an identical uniform gray model in direct versus diffuse illumination. These studies suggest that Psittacosaurus sp. inhabited a closed habitat such as a forest with a relatively dense canopy. VIDEO ABSTRACT. Defecation in communal latrines is a common behaviour of extant mammals widely distributed among megaherbivores. This behaviour has key social functions with important biological and ecological implications. Herbivore communal latrines are only documented among mammals and their fossil record is exceptionally restricted to the late Cenozoic. Here we report the discovery of several massive coprolite associations in the Middle-Late Triassic of the Chañares Formation, Argentina, which represent fossil communal latrines based on a high areal density, small areal extension and taphonomic attributes. Several lines of evidence (size, morphology, abundance and coprofabrics) and their association with kannemeyeriiform dicynodonts indicate that these large synapsids produced the communal latrines and had a gregarious behaviour comparable to that of extant megaherbivores. This is the first evidence of megaherbivore communal latrines in non-mammal vertebrates, indicating that this mammal-type behaviour was present in distant relatives of mammals, and predates its previous oldest record by 220 Mya. Sauropod dinosaurs are a group of herbivorous dinosaurs which exceeded all other terrestrial vertebrates in mean and maximal body size. Sauropod dinosaurs were also the most successful and long-lived herbivorous tetrapod clade, but no abiological factors such as global environmental parameters conducive to their gigantism can be identified. These facts justify major efforts by evolutionary biologists and paleontologists to understand sauropods as living animals and to explain their evolutionary success and uniquely gigantic body size. Contributions to this research program have come from many fields and can be synthesized into a biological evolutionary cascade model of sauropod dinosaur gigantism (sauropod gigantism ECM). This review focuses on the sauropod gigantism ECM, providing an updated version based on the contributions to the PLoS ONE sauropod gigantism collection and on other very recent published evidence. The model consist of five separate evolutionary cascades (“Reproduction”, “Feeding”, “Head and neck”, “Avian-style lung”, and “Metabolism”). Each cascade starts with observed or inferred basal traits that either may be plesiomorphic or derived at the level of Sauropoda. Each trait confers hypothetical selective advantages which permit the evolution of the next trait. Feedback loops in the ECM consist of selective advantages originating from traits higher in the cascades but affecting lower traits. All cascades end in the trait “Very high body mass”. Each cascade is linked to at least one other cascade. Important plesiomorphic traits of sauropod dinosaurs that entered the model were ovipary as well as no mastication of food. Important evolutionary innovations (derived traits) were an avian-style respiratory system and an elevated basal metabolic rate. Comparison with other tetrapod lineages identifies factors limiting body size. The highly derived morphology and astounding diversity of snakes has long inspired debate regarding the ecological and evolutionary origin of both the snake total-group (Pan-Serpentes) and crown snakes (Serpentes). Although speculation abounds on the ecology, behavior, and provenance of the earliest snakes, a rigorous, clade-wide analysis of snake origins has yet to be attempted, in part due to a dearth of adequate paleontological data on early stem snakes. Here, we present the first comprehensive analytical reconstruction of the ancestor of crown snakes and the ancestor of the snake total-group, as inferred using multiple methods of ancestral state reconstruction. We use a combined-data approach that includes new information from the fossil record on extinct crown snakes, new data on the anatomy of the stem snakes Najash rionegrina, Dinilysia patagonica, and Coniophis precedens, and a deeper understanding of the distribution of phenotypic apomorphies among the major clades of fossil and Recent snakes. Additionally, we infer time-calibrated phylogenies using both new ‘tip-dating’ and traditional node-based approaches, providing new insights on temporal patterns in the early evolutionary history of snakes. The use of limbs for foraging is documented in both marine and terrestrial tetrapods. These behaviors were once believed to be less likely in marine tetrapods due to the physical constraints of body plans adapted to locomotion in a fluid environment. Despite these obstacles, ten distinct types of limb-use while foraging have been previously reported in nine marine tetrapod families. Here, we expand the types of limb-use documented in marine turtles and put it in context with the diversity of marine tetrapods currently known to use limbs for foraging. Additionally, we suggest that such behaviors could have occurred in ancestral turtles, and thus, possibly extend the evolutionary timeline of limb-use behavior in marine tetrapods back approximately 70 million years. Through direct observationin situand crowd-sourcing, we document the range of behaviors across habitats and prey types, suggesting its widespread occurrence. We argue the presence of these behaviors among marine tetrapods may be limited by limb mobility and evolutionary history, rather than foraging ecology or social learning. These behaviors may also be remnant of ancestral forelimb-use that have been maintained due to a semi-aquatic life history. Fossorialism is a beneficial adaptation for brooding, predator avoidance and protection from extreme climate. The abundance of fossilised burrow casts from the Early Triassic of southern Africa is viewed as a behavioural response by many tetrapods to the harsh conditions following the Permo-Triassic mass-extinction event. However, scarcity of vertebrate remains associated with these burrows leaves many ecological questions unanswered. Synchrotron scanning of a lithified burrow cast from the Early Triassic of the Karoo unveiled a unique mixed-species association: an injured temnospondyl amphibian (Broomistega) that sheltered in a burrow occupied by an aestivating therapsid (Thrinaxodon). The discovery of this rare rhinesuchid represents the first occurrence in the fossil record of a temnospondyl in a burrow. The amphibian skeleton shows signs of a crushing trauma with partially healed fractures on several consecutive ribs. The presence of a relatively large intruder in what is interpreted to be a Thrinaxodon burrow implies that the therapsid tolerated the amphibian’s presence. Among possible explanations for such unlikely cohabitation, Thrinaxodon aestivation is most plausible, an interpretation supported by the numerous Thrinaxodon specimens fossilised in curled-up postures. Recent advances in synchrotron imaging have enabled visualization of the contents of burrow casts, thus providing a novel tool to elucidate not only anatomy but also ecology and biology of ancient tetrapods.
002_6169119
{ "id": "<urn:uuid:f9dfebea-8764-4670-8006-ff6c427bd4ea>", "dump": "CC-MAIN-2020-29", "url": "http://scicombinator.com/concepts/paleontology/articles", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655886516.43/warc/CC-MAIN-20200704170556-20200704200556-00439.warc.gz", "language": "en", "language_score": 0.9220638275146484, "token_count": 3024, "score": 2.546875, "int_score": 3, "uid": "002_6169119_0" }
The MIU system was created by Douglas Hoefstadter , author of GEB It is a simple, formal system. You have one MIU axiom, four MIU rules, and an MIU goal. Incidentally, you can't solve the MIU system. See GEB for an interesting proof of this, as well as to see the hidden meanings in the MIU system. There are four rules in the MIU system: - Given a string of the form Mx, you may get Mxx. - If a string ends in I, you may append U to it. - Given III in an MIU system string, you may replace the I's with a U. - Given UU in a string, you may remove them. The MIU system has one goal: Get from MI to MU. This may be facilited by the MIU rules. I encourage you to go through and try to get to the goal! It's fun. When you've given it a good try, go read the spoiler. . . Oh yeah. Incidentally, it's impossible explains this well. I've reproduced Harry's node here, because somebody nuked the MIU Goal node. Ah, well. Without further ado, Harry's node. - The goal contains 0 I's (a multiple of 3) - We begin with 1 I (not a multiple of 3) - Rules 2 and 4 do not change the number of Is. - Rules 1 and 3 will only result in a multiple of 3 Is if it takes a&string with a multiple of 3 Is as in input. It is impossible to go from a state without a multiple of 3 Is (start state) to a state with a multiple of 3 Is (goal state).
012_6553562
{ "id": "<urn:uuid:cad72b79-21a8-47f3-91f8-14b451a8dbe9>", "dump": "CC-MAIN-2019-51", "url": "https://everything2.com/title/MIU", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541319511.97/warc/CC-MAIN-20191216093448-20191216121448-00069.warc.gz", "language": "en", "language_score": 0.9245480298995972, "token_count": 377, "score": 2.921875, "int_score": 3, "uid": "012_6553562_0" }
What are the Advanced Measures? In line with the categorisation used in other sections of eventIMPACTS, advanced environmental impacts are generally considered to be those which constitute long-term behavioural change on behalf of spectators or other event attendees. However, in the case of advanced environmental measures linked to energy use, we include carbon footprints as an advanced measure. This is largely because estimation of the footprint is difficult and the achievement of quality estimates is resource intensive. Advanced measures relating to energy would include: - Carbon footprint in (CO2 equivalent) associated with event-related visitation - Carbon footprint per event-related visitor (CO2 equivalent) - Total event carbon footprint (CO2 equivalent) - Reductions in personal carbon footprint following events Carbon Footprinting of Events The term carbon footprint has become hugely popular in discussions around the environmental impact of human activity. Carbon emissions have been identified as a human-generated cause of changes in global climate. A key issue is how to measure carbon emissions. Here then it is necessary to understand the difference between: Direct emissions: these will overwhelmingly relate to those emissions released as a result of fossil fuel burned as a result of the event (i. e. before, during or after the event itself). For example, fuel burned in venue development, by organisers during the event (e. g. vehicle fleet) and critically by spectators travelling to and from and during the event. Indirect emissions: these relate to those that do not occur as a result of the immediate burning of fossil fuels, but which still are directly caused by event activity. For example, turning on flood lights for a rugby match places demands on the electricity grid, which is in part maintained by burning fossil fuels. Other indirect emissions would include those required to produce the goods and services that are consumed during or because of an event (including electricity at hotels, and energy used in processing food and drink consumed at an event, producing event merchandise etc). Clearly, the measurement of direct emissions is more straightforward than the measurement of indirect emissions. Importantly if the quantity and type of fuel burned can be ascertained, then the consequent level of carbon emissions can be estimated. Support is available. For example, the UK Department of Environment and Rural Affairs (DEFRA) and the European Union provides estimate of carbon emissions per km by vehicle type that remove the need to directly measure fuel consumption (although of course at the cost of some accuracy). Organisers can directly record fuel purchases in service of an event (or require contractors to do likewise) should the will and capacities exit. The measurement of indirect emissions is more problematic. In some cases the recording of kilowatt hours of electricity used by event organisers can be translated into carbon emissions with reference to the general mix of electricity generation types. For other indirect emissions such as those involved in the processing of goods that are consumed/purchased at an event, it is far more difficult. For example, specialist advice/consultants may be required to estimate the carbon emissions associated with the supply chain of an event. Below are several resources which can assist event organisers when using advanced measures to assess the impact of energy use at their event.
001_1177085
{ "id": "<urn:uuid:c1fe1bf0-db98-4ef3-b697-c21b55dfec3e>", "dump": "CC-MAIN-2023-23", "url": "https://www.eventimpacts.com/impact-types/environmental/content/energy/energy-advanced-measures", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647459.8/warc/CC-MAIN-20230531214247-20230601004247-00512.warc.gz", "language": "en", "language_score": 0.9523592591285706, "token_count": 650, "score": 3.359375, "int_score": 3, "uid": "001_1177085_0" }
Everyone who has ever turned to their friends Ben and Jerry for solace following a break-up is aware that painful emotions often lead to overeating. Yet when discussing the obesity epidemic among low-income families, policymakers tend to focus on more tangible factors, such as the cost and availability of healthy food. Over the past few years, a number of researchers have begun pointing out this emotion blindness, suggesting the stress of poverty is an underappreciated underlying problem. Two new studies that confirm and refine this proposition have just been published. A study from Scotland, published in the journal Appetite, demonstrates a connection between overeating and the anxiety that stems from income inequality. American researchers, writing in Psychological Science, find a link between growing up poor and a propensity to consume calories in the absence of hunger. A more equal society, where most members feel respected and experience a sense of belonging, is a lower-stress society, and this reduces anxiety-based eating. "It appears that humans and animals respond similarly to harsh and scarce environments, and this response takes the form of preemptive increases in food consumption," writes a research team led by Boyka Bratanova of the University of St. Andrews and Steve Loughnan of the University of Edinburgh. The American researchers, led by Texas Christian University psychologist Sarah Hill, provide evidence that this dynamic may be established during childhood, and stubbornly persist into adulthood. Hill and her colleagues conducted three experiments in which they either measured or manipulated the energy needs of a group of students, and then provided snacks for them to eat. In one, 60 female undergraduates filled out a form indicating their family's socioeconomic status, both when they were children and at the current moment. Half drank a 12-ounce can of Sprite (which satisfied their immediate energy needs), while the others drank an equivalent amount of mineral water. Ten minutes later, all we're asked to try, and evaluate, some cookies. Those who grew up in prosperous households consumed fewer cookies if they had just consumed the sweetened drink. Those who were raised in difficult economic circumstances ate just as many, whether they drank the water or the soda. "Among individuals who grew up in high-socioeconomic status environments, food intake varied according to immediate physiological energy need," the researchers write. "These individuals consumed more calories when their current energy need was high than when it was low. " "For individuals who grew up in low-socioeconomic status environments, however, the relationship between physiological need and food intake was decoupled. Their food intake appeared to be guided primarily by opportunity. " The Scottish study featured two experiments, also carried out on groups of undergraduates. In one, 54 participants wrote about the extent to which they identified with people living either in "material abundance" or "financial scarcity. " They then were then provided with snacks (cookies and crackers) to munch on as they watched two short videos. Strikingly, the students consumed an average of 54 percent more calories when they were primed to feel poor. They also reported liking the snacks more than their counterparts, and expressed a stronger intent to buy them in the future. "Feeling poor relative to others had a clear effect on calorie consumption," the researchers conclude, adding that the overeating was due to "increased anxiety—particularly anxiety due to anticipated negative social evaluation. " Intriguingly, the Scottish researchers find this dynamic doesn't exclusively impact the poor. While poverty is the dominant driver of this dynamic, being wealthier than those around you can also produce unease—"a fear of being envied"—and that, too, may lead one to pack on the pounds. So a more equal society, where most members feel respected and experience a sense of belonging, is a lower-stress society, and this reduces anxiety-based eating, which, in turn, combats obesity. Will we see such a thing any time soon? Fat chance. Findings is a daily column by Pacific Standard staff writer Tom Jacobs, who scours the psychological-research journals to discover new insights into human behavior, ranging from the origins of our political beliefs to the cultivation of creativity.
004_4148991
{ "id": "<urn:uuid:40e82708-e5cd-4b15-812b-0ad9ba83ea70>", "dump": "CC-MAIN-2018-13", "url": "https://psmag.com/economics/how-inequality-creates-obesity", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647322.47/warc/CC-MAIN-20180320072255-20180320092255-00723.warc.gz", "language": "en", "language_score": 0.9674257040023804, "token_count": 852, "score": 3.09375, "int_score": 3, "uid": "004_4148991_0" }
Nanoscience stands poised to change electrical work NANOTECHNOLOGY COULD CHANGE HOW THE ELECTRICAL industry does its job on several fronts. The tools electricians use are going to change in the next year or two, while dramatic shifts in the way power is generated, transmitted and stored will happen in the coming decades. Researchers and a growing commercial market are creating a new energy world order in which alternative energy can be easily and inexpensively transmitted across continents, and electricity can be stored in buildings, homes and even backpacks. How soon this will take effect depends on whom you ask. “People commonly overestimate in the short term and underestimate in the long term,” said Wade Adams, director of Rice University’s Center for Nanoscale Science. Nanotechnology is the manufacture and manipulation of materials at the atomic scale. Scientists are applying this molecular building process to everything from sunscreen to life-saving medical applications to our entire power infrastructure. However, much is still theoretical. New technology, including nanoscience, rarely lives up to the hype surrounding its inception. However, decades from now, Adams said, nanotechnology may revolutionize the way we use and distribute power. Several universities have large-scale nanoscience research projects underway that may result in even greater applications. The technology—with implications on the electrical industry—has been developing for years. One big discovery occurred when Richard Smalley of Rice University discovered carbon atoms bound in the form of a ball, which won him the 1996 Nobel Prize for chemistry. Why was this such an important finding? For the electrical industry, the benefit of pure carbon is its stability. Unlike diamond or graphite carbon, the pure form with which Smalley worked offers significant benefits. The current electrical grid, composed of copper wires, poses problems for the kind of high-energy transportation that scientists envision is possible. Copper wires lose electrons through resistance and these inefficiencies slow the transportation of power and also limit how far it can go. Single-wall carbon nanotubes—nicknamed buckytubes—offer a solution that amounts to a sheet of pure carbon molecules rolled up into a cylinder 20 microns in diameter. Smalley contended that the resulting quantum “armchair” conduction makes the microscopic carbon tubes the best conductors of electricity ever discovered. Adams agrees. He envisions power traveling thousands of miles without resistance, zipping from carbon nanotube to nanotube in the blink of an eye. But, so far, these tubes are still more theoretical than practical. As the next step, Rice University’s Center for Nanoscale Science has developed a new process for production, basically growing the tubes from seeds. These seeds amount to short lengths of buckytubes with nanocatalyst particles attached to the open ends. The process produces long tubes—clones of the tubes from which the seeds were made. Once cloning is successful, as Smalley reported to Congress before his 2005 death, it should be possible to make pounds of buckytubes and to spin these nanotubes into continuous fibers. They could be used as nanoscale antennae for use in the conversion of sunlight. Rice University doesn’t stop there. With the National Renewable Energy Laboratory and Air Products, scientists are developing these same carbon nanotubes for storage of hydrogen. In this case, they must control the diameter of the tube so that the absorption energy of hydrogen on the outside and inside of the tube is high enough to give the necessary storage capacity, without being too high. These tubes could be used in fuel cells and batteries as well as super capacitors of the electric drive system. Together with low-cost local energy storage and high-speed transfer of electrical power, solar and wind power could become dominant providers, Adams said. It would provide utilities with the ability to transport hundreds of gigawatts of power down a single cable. And to make it work, Adams said, “You don’t have to build a new infrastructure, just rewire it. ” With this system, renewable energy would be enabled, allowing the power that is generated in one area—such as solar in Arizona or wind in the Dakotas—to be transmitted quickly and easily to urban areas where it is needed. “We think this is going to allow a revolution in electricity,” Adams said. “I think we should save oil for high needs such as the military. ” Adams also foresees a time when homes and buildings can install washing-machine-size storage devices for up to 500 kilowatts of energy, courtesy of nanotechnology. Carbon Nanotechnologies Inc. (CNI), Houston, is in the process of commercializing the carbon nanotubes that result from Rice research. Founded by three Rice University professors, CNI focuses on how to synthesize or manufacture grades of single-wall nanotubes. That work includes developing ways to generate armchair quantum wire through the seeds. Ken McElrath, CNI’s vice president for product development, described that process as still at least a decade away. “A lot of our work is evolutionary,” he said, meaning that the company creates products that may improve devices such as hand tools with a harder, stronger and lighter casing. CNI has already produced enough carbon nanotubes to make a paint for plastic that could be used for hand tools, saws or drills, making the tools stronger and reducing the risk of tools building an electrical charge. Although there are tool manufacturers interested in the product, no one is currently making it. In addition, CNI is building reactors that it uses to synthesize the nanotubes at a higher rate. “We’re trying to build larger reactors and make the nanotubes in larger quantities,” McElrath said. “We have reactors in place that could produce tens of pounds a day. ” While these large plans may still be decades ahead, some of the low-hanging fruit is also being picked by solar and nanotechnology companies that can use the atomic-level science to lower costs of solar energy by 10 to 20 percent. Within the electrical industry, some companies have seized on some other immediate applications and are using nanotechnology to improve the effectiveness of solar panels and to offer battery-type power storage. Innovalight, Santa Clara, Calif., is manipulating nanotechnology-based printed solar cells for development of ultra-low cost, lightweight solar cells using a proprietary silicon ink-based technology. This would be an alternative to most solar-energy modules, which are made from crystalline silicon wafers, which are expensive to manufacture and in short supply due to demands from the semiconductor industry. Common construction tools will be commercially available with nanosized particles painted on their surfaces by year’s end. Rutgers University’s Center for Nanomaterials Research, working with NEI Corp., Piscataway, N.J., has established a nanotechnology research program with the International Advanced Research Centre for Powder Metallurgy and New Materials, Hyderabad, India. It is exploring ways to make metals harder, ceramics lighter and stronger, and protective coatings more wear-resistant. These and other nanoparticle-infused materials will be used for machine tools, fuel cells, electronic components, medical devices and automobile finishes. Researchers are developing nanosized powders containing tungsten, cobalt and carbon, that are applied to metals as a coating or an alloy to increase the wear-resistance of drill bits, cutting tools and machine bearings. These researchers are also studying spraying techniques to make nanostructured powders and to apply powders to materials surfaces for protection. NanoDynamics Inc., Buffalo, N.Y., also plans to use the Rutgers technology to prepare fluorescent nanomaterials for high-efficiency light-emitting diode (LED) lighting. The materials used today to make white LEDs emit a great deal of ultraviolet light, reducing the light’s efficiency, said Alan Rae, NanoDynamics vice president of marketing and business development. UV rays have to be filtered out and can have long-term damaging effects to the plastic coating of the lights, shortening their life span. “If you coat the LED with plastic, the UV will degrade the plastic. This is a way to put a nanosized gloss that contains tiny nanocrystals of fluorescent material that changes the UV to visible light so you actually get more efficiency,” Rae said. NanoDynamics is producing the fluorescent material spray that eliminates the UV rays, extending the life of the light as well as making it more efficient. “We’re looking for partners in this,” Rae said. “It’s still very new. It’s a more efficient plasma. The technology is pretty much good to go. ” EC SWEDBERG is a freelance writer based in western Washington. She can be reached at email@example. com.
008_871040
{ "id": "<urn:uuid:16ef0502-5cea-4fc9-96a0-2a044542f279>", "dump": "CC-MAIN-2016-18", "url": "http://www.ecmag.com/section/green-building/small-wonder", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860111455.18/warc/CC-MAIN-20160428161511-00207-ip-10-239-7-51.ec2.internal.warc.gz", "language": "en", "language_score": 0.939953088760376, "token_count": 1883, "score": 3.5625, "int_score": 4, "uid": "008_871040_0" }
Conservations groups are hailing the results of the duck breeding population surveys done in May and early June. The U.S. Fish and Wildlife Service in a report, “2014 Trends in Duck Breeding Populations,” showed an 8 percent increase over the 2013 survey results. Total populations were estimated at 49. 2 million breeding ducks, up from last year’s estimate of 45. 6 million birds, and 43 percent higher than the 1955-2013 average. This continues a three-year trend of exceptional population numbers for many species, due in large part to favorable water conditions in breeding areas. “It looks like another good waterfowl breeding year for a good portion of the prairies and the boreal forest,” Ducks Unlimited chief executive officer Dale Hall said in a news release. Never miss a local story. “Precipitation in the form of snow and rain has provided sufficient water to fill important wetlands in key breeding habitats. We hope this will result in good production and another great flight of birds migrating in the fall. ” The main factor for duck breeding success is wetland and upland habitat conditions in the key breeding landscapes of the prairies and the boreal forest, according to the group’s release. Conditions observed across the U.S. and Canadian survey areas during the count were improved or similar to last year. Total pond counts in the U.S. and Canada showed 7. 2 million ponds, similar to the 2013 estimate and 40 percent above the long-term average, according to the Fish and Wildlife report. There were, however, some areas of concern. There is a need for more moisture in the western boreal forest and in parts of southern Alberta and Saskatchewan, said Paul Schmidt, the group’s chief conservation officer. But, Schmidt pointed out, habitat conditions were rated as excellent in Alaska and good in much of Northwest Territory and Alberta. The survey, done by the U.S. Fish and Wildlife Service and Canadian Wildlife Service, covers more than 2 million square miles of waterfowl habitat across Alaska, north-central and northeastern United States, and south-central, eastern and northern Canada. Of the 10 key species surveyed, only pintail and canvasback populations showed a decline. Pintails dropped by 3 percent to 3. 22 million, while canvasbacks were down 13 percent, at 685,000. These strong numbers and very good water conditions should translate to a good hunting outlook this fall and winter. Still, it is not a guarantee hunters will be shooting their limits, said Frank Rowher, president of Delta Waterfowl. “We know that when breeding duck numbers are high and duck production is strong, hunters shoot more ducks,” Rohwer said in a new release from his group. “However, three other factors are probably as important as the breeding duck count. Weather is most critical, because that drives duck migrations. The site conditions such as food and available water at your honey hole impacts hunting success, as does the amount of hunting pressure. ” State hunting statistics from 2013 help prove Rowher’s point. Despite fairly strong duck numbers in 2013, the total statewide harvest was down 19 percent compared to the 2012 harvest. Much of the decline can be blamed on poor weather conditions during the hunting season and a lack of water in key duck habitat areas. The spring surveys provide the data that will be used to help set hunting season dates and bag limits. Representatives from the four flyway councils – Pacific, Central, Mississippi and Atlantic – and the Fish and Wildlife Service’s regulations committee will meet later this month to recommend the season structure and bag limits for 2014-15. Fish and wildlife agencies in the individual states will set their own specific seasons, using the federal framework of season length, bag limit and dates. Mallards: 10. 9 million, similar to the 2013 estimate and 42 percent above the long-term average. Gadwall: 3. 8 million, similar to 2013 and 102 percent above the long-term average. American wigeon: 3. 1 million, 18 percent above the 2013 estimate and 20 percent above the long-term average. Green-winged teal: 3. 4 million similar to last year’s estimate and 69 percent above the long-term average. Blue-winged teal: 8. 5 million, similar to last year and 75 percent above the long-term average. Northern shovelers: 5. 3 million, similar to 2013 estimate and 114 percent above the long-term average. Northern pintails: 3. 2 million, similar to 2013 and 20 percent below the long-term average. Scaup: 4. 6 million, similar to last year and similar to the long-term average. Learn more: View all the data and get a species-by-species breakdown at ducks. org/DuckNumbers. Jeffrey P. Mayor: 253-597-8640 email@example. com
003_3972265
{ "id": "<urn:uuid:4519ee24-434a-4ba7-a1cc-4dec91a1c2ff>", "dump": "CC-MAIN-2017-51", "url": "http://www.bellinghamherald.com/sports/outdoors/article22237380.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948587496.62/warc/CC-MAIN-20171216084601-20171216110601-00145.warc.gz", "language": "en", "language_score": 0.9272580146789551, "token_count": 1051, "score": 2.859375, "int_score": 3, "uid": "003_3972265_0" }
Baby teeth (or primary teeth) are temporary, so why do we care about them? Many parents overlook the importance of baby teeth and don't realize they serve functions other than biting and chewing. Several important functions include: They reserve space for permanent teeth and help guide them into position. Help make normal speech possible. Aid in normal development of jaw bones and facial muscles. Add to an attractive appearance. They establish good brushing/flossing habits. Baby teeth typically begin to appear when a child is between age six months and one year. The American Dental Association (ADA) recommends that a dentist examine a child within six months after the first tooth comes in and no later than the first birthday. A dental visit at an early age is a “well baby checkup” for the teeth. Besides checking for tooth decay and other problems, the dentist can show you how to clean the child's teeth properly and how to evaluate any potentially bad habits such as thumbsucking. Most children have a full set of 20 baby teeth by the time they are three years old. As soon as teeth appear in the mouth, tooth decay can occur. Therefore, when your child's teeth begin to erupt, brush them gently with a child's size toothbrush and water. Brush the teeth of children over age two with a pea-sized amount of fluoride toothpaste. Be sure they spit out the toothpaste and rinse with water. (Ask your child's dentist or physician if you are considering using fluoride toothpaste before age two. ) Infants should finish their bedtime and naptime bottle before going to bed. If you use a pacifier, use a clean one. Never dip a pacifier in sugar or honey before giving it to a baby. (Ask your child's physician or dentist to recommend a type of pacifier. ) Baby teeth reserve space for permanent teeth and help guide them into position. The teeth next to a missing tooth may drift into the empty space. Because these teeth occupy the space meant for another tooth, their permanent replacements will come in the wrong position. The dentist may provide your child with a space maintainer if a baby tooth is lost too soon. But it is preferable to take early preventive measures so your child can keep all of their baby teeth until they are ready to fall out. Your baby's teeth are a vital aid to speech. Without healthy, reasonably well-aligned teeth, your baby may have difficulty forming words and speaking clearly. Like muscles in other parts of the body, your baby's face and jaw muscles need exercise to help them develop; without well-developed jaw muscles, your baby's jawbones may not develop properly. Sucking provides exercise for your baby's jaw, cheek, and tongue muscles. When your baby is old enough for solid foods, chewing also exercises these muscles. This exercise is necessary for these structures to develop enough for your baby's teeth to come in properly. Your child's baby teeth must last five to 10 years or longer. As a permanent tooth reaches the stage of development when it is ready to erupt (emerge through the gum), the roots of the baby tooth it will replace begin to resorb (break down and dissolve). Gradually, the permanent tooth pushes the baby tooth out and takes its place. If a baby tooth is lost too soon, the permanent tooth has no guide or space to occupy.
003_5446009
{ "id": "<urn:uuid:3acab5fe-c2f7-42a5-9200-50a265075872>", "dump": "CC-MAIN-2017-51", "url": "https://www.dentist.net/pages/dn-article141", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948513512.31/warc/CC-MAIN-20171211125234-20171211145234-00300.warc.gz", "language": "en", "language_score": 0.9390156865119934, "token_count": 689, "score": 3.71875, "int_score": 4, "uid": "003_5446009_0" }
Can you imagine entering a three-dimensional online store in the form of an avatar, where you can shop and try on clothes almost like you do in real life? Technological advances are increasingly present in all areas of daily life and are on their way to conquering all digital channels. The Metaverse is one of them and gives users the ability to interact with different spaces through a fusion of so-called virtual reality and augmented reality. Shopping methods are changing and today customers are looking for something different, virtual, but personalized, something that makes a difference. The metaverse brings us a new way of shopping, very close to real life, but completely virtual, where customers can interact in an immersive way with the environment. It is an exceptional tool to generate a good customer experience and stand out from the competition. In this article, we are going to tell you a little about it, its advantages, disadvantages and possibilities in digital marketing. The metaverse, as we have already anticipated, is a space where the real world and the virtual world meet, thanks to the use of virtual reality and augmented reality tools. In this space, of a digital nature, people can interact with other people from the same metaverse or with three-dimensional objects. It is, in short, an extension of real space, but in the virtual domain. To be more precise, users can, through elements such as virtual or augmented reality glasses and applications for devices such as computers or smartphones, enter a virtual world and take part in various experiences. These types of activities, such as playing, shopping, trying on clothes, working, or interacting with other users in the virtual environment, can be performed using an avatar, which is a virtual representation of the user. . A well-known example of a metaverse was recently showcased by Facebook founder Mark Zuckerberg, who showed off a prototype mixed reality headset, as part of his Cambria project. This headset provides an enhanced mixed reality experience by interacting with virtual elements in the real world, such as taking notes, playing with a pet, or taking a gym class. Additionally, there are several video game platforms that started with the concept of mixed reality and are in the process of developing their metaverses, such as Second Life, Fornite, Minecraft, and Roblox. It is important to consider some of the fundamental characteristics that metaverses have or will have. - Of the digital avatars are used to enter each metaverse. These avatars represent the user and will interpret what the user wants to show or do in this metaverse. - It’s about a immersive experiencewhich blurs the boundaries between the physical and digital worlds. - He is collective and collaborativebecause it is shared with other users who are logged in and active in the same metaverse and can perform actions there at the same time. - It has no boundaries or distances, since you can connect without limits to places all over the world. Additionally, you can connect to other metaverses while keeping the same avatar. - He is steady and does not disappear if you log out. You can come back and see how things are going in this metaverse, what’s new, what’s changed, etc. - He has his own economy, based on NFTs and cryptocurrencies. NFTs are unique digital assets that cannot be replaced. That is, a person can convert a digital file to NFT, which would constitute a digital certificate of authenticity. This will allow it to be exchanged online, for example through cryptocurrencies. This asset is widely used for exchanging artwork or other works that require authenticity, and combined with cryptocurrencies, it is very useful in the metaverse. Now that we know the basics of the metaverse, let’s move on to what really matters to us, which is how the metaverse influences and will influence digital marketing. The metaverse will radically change the buying and selling of products and services in cyberspace, providing users with entirely different and personalized digital experiences very similar to those in the real world, and giving businesses greater recognition of their brand. While some metaverse-like concepts exist today, based on virtual reality and augmented reality, merging the two to provide a platform as close to the real world as could be achieved in a metaverse is yet to be developed. So what are the different possibilities that the metaverse brings to digital marketing? - It will be possible to buy digital versions products or services, such as demonstrations or gymnastic exercises performed by an avatar. - It will be possible to buy in 3D virtual shopswhich you can enter by entering a metaverse with your own avatar. - It will be possible to offer a experience different to the customer, totally immersive, where he can obtain the information he wants on the product or service that interests him. In addition, they will also be able to perform actions that are not possible today in a classic virtual shopping experience, such as trying on clothes, trying on the look of furniture in their home or viewing the menu of a restaurant live with the information they think they need. - Unique products can be marketed in the form of NFTsgiving customers a sense of place and exclusivity. - A potential customer can be guest in a metaverse for a remote meeting, but much more personalized and realistic. - Of the product demonstrations can be organized in the metaverse and webinars or courses can be delivered in real time, creating an immersive experience for the customer. - Many other forms of digital advertising can be exploited in the metaverse, as it offers many possibilities and ways to sell a product or service. It will also change the way of advertising a product. Today, the goal is to reach as many people as possible, by sending many emails, inserting advertising in different places. In the metaverse, advertising will be available to all users who log in. - The strategies of content marketing can be improved by generating new virtual content available in the metaverse for everyone who passes through it, as well as positioning with a good strategy influencer marketingwhich will compose their campaigns in the form of avatars. Any technological advancement of course has many advantages, because it is about the future and what is to come, but it also has disadvantages, because it is something new, with little experience and testing. That’s why below we present some of the advantages and disadvantages that we think this new technology can have, not only in digital marketing, but in all the spaces it can reach. Classes will be more dynamic and educational, as students will be able to transport themselves to other places and get to know them for themselves, as well as learning concepts that are much more convenient to visualize in 3D than on a sheet of paper. paper or a computer. The concept of home office will change radically, since it will be possible to access offices and hold meetings in virtual places, where you can meet other people and interact in a virtual environment very similar to the real one. Virtual medical appointments will be far more efficient than current appointments, where patients and their symptoms can be better assessed. This is the most well-known advantage, since they are the pioneers of the metaverse. But the ability to play with people from all over the world in a virtual reality environment is remarkable. The purchase and sale of products and services in the metaverse can be fully personalized and realistic, and the customer experience can be better than in the case of traditional online shopping. This will improve your brand reach. Diversified technology and compatible with different digital formats. Community and cooperative Ability to easily create connected communities at any distance. In some ways, it can reduce pollution because more activities can be carried out remotely, reducing the consumption of unsustainable resources such as transportation. Possibility of connection between the different generations. The high cost of technology will inevitably lead to increased socio-economic inequalities, not only for companies with fewer resources to invest in digital marketing, but also for consumers who do not have easy access to these technologies. Fewer physical relationships between people. Possibility of spending too much time in the virtual world, due to its resemblance to the real world Lack of knowledge or lack of legislation, which can make spaces unsafe for users. Fragility of the protection of personal data and privacy. Insecurity of economic transactions through virtual means of payment such as cryptocurrencies, which makes them a good target for scams. If the metaverse currently seems more oriented and developed for video games, it is clear that the continued growth in the use of augmented reality and virtual reality tools will open up more and more possibilities in the virtual world. This is why many companies are going down this path, to take the next step towards merging realities, which is the metaverse. This will have a direct impact on brands that market their products digitally, as they will need to upgrade if they want to stand out and provide the customer with a fully personalized and realistic experience, where they can get all the product information they need. he wants, when he wants, without having to go to a physical store. Generating a good customer experience is a necessary differentiation strategy for any business and the use of new technologies in digital marketing will be necessary. About the Author Luciana Sanchez is a member of the Habitium.fr and Materialesdefabrica.com team
012_6643126
{ "id": "<urn:uuid:740a1e0d-7a17-458a-9cfb-b20ff64f71a8>", "dump": "CC-MAIN-2022-49", "url": "https://wetdollars.com/2022/07/25/%E2%96%B7-the-metaverse-and-its-potential-in-digital-marketing/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711344.13/warc/CC-MAIN-20221208150643-20221208180643-00790.warc.gz", "language": "en", "language_score": 0.9520341753959656, "token_count": 1986, "score": 2.546875, "int_score": 3, "uid": "012_6643126_0" }
Students all over the world have to pass through various stressful situations as far as their study goes. Students like junk food so much so that they forget about the nutritious value of the fruits and vegetables. According to dieticians belonging to various reputed healthcare centers in India and abroad, relying on seasonal fruits, veggies and salads coupled with different breathing exercise during the course of study helps students to concentrate effectively during their study. We know that majority of students usually study at a stretch of four to five hours. During this period if they follow a healthy diet during their study sessions and exam days they can boost their concentration levels and thus reduce their stress level. According to healthcare dieticians, foods like oats, baby corn, wholegrain bread, cheese contain complex carbohydrates which releases glucose very slowly and provide energy to body over a period of time. If you often crave for midnight snack take some fresh veggies while having sandwich. According to doctors and dieticians children can take walnuts and almonds along with fresh juices when they study. These foods have been found rich in antioxidants and fatty acids like omega6 and omega3 which helps in vitalizing the body by curbing stress level. Moreover children could be given chocolate milk and buttermilk as they provide the required calories. Thus, intake of these foods help in nourishing the body and student do not feel lethargic and face muscles cramps. While studying students should take a break of 15 minutes and stroll in the terrace and balcony. This small exercise will freshen the mind of children and they will be able to tackle fatigue. Students may also turn to yoga for breathing exercise at regular intervals. All these measures will help you a lot but they don’t work if you turn towards junk food often. Talk to your doctor about your diet and you will discover that all aerated drinks, potatoes, fried chicken and cheese will create havoc in your body. Did you know that high sugar content in your diet will affect concentration and excess calories result in lethargy? Avoiding fast foods especially when students prepare for their exams seems injurious to health and thinking power of children. In order to surge ahead it is necessary to involve in bouts of exercise and maintain their fitness level so that muscles recover and shape up the body faster. It is time to turn towards nourishing food instead of junk food to get ahead in exams. Good Luck!
002_5054090
{ "id": "<urn:uuid:89e8d4e2-a0e2-4a45-b4ba-45759daed149>", "dump": "CC-MAIN-2014-41", "url": "http://healthandcare.in/students-who-take-fresh-fruits-and-veggies-get-ahead-in-exams/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657138086.23/warc/CC-MAIN-20140914011218-00034-ip-10-234-18-248.ec2.internal.warc.gz", "language": "en", "language_score": 0.9632064700126648, "token_count": 481, "score": 2.828125, "int_score": 3, "uid": "002_5054090_0" }
You’re probably familiar with mosquito-borne ailments like Zika virus and West Nile, but there’s another not so well-known virus that also poses a threat to your health. The Keystone virus was first discovered in animals and was only recently found to infect a 16-year-old boy living in Florida. But scientists believe that this virus may have been infecting humans for years without us even realizing it. In fact, reports suggest that about 20 percent of people living in the Florida region where the virus was first detected have positive blood test results for the presence of Keystone. Although the boy infected with the Keystone virus went to an urgent care center in August of 2016 with a mild fever and rash, it wasn’t until June of 2018 that scientists published their findings — linking the boy’s condition to this mosquito-borne infection that had never been detected in humans. (1) Now we are left with questions about how long this virus has been affecting humans and what we can do to prevent it. What Is the Keystone Virus? The Keystone virus was first isolated in 1964 from mosquitoes found in Keystone, Florida. Until recently, scientists thought it only infected animals of the coastal regions, stretching from Texas to the Chesapeake Bay. When a teenager living in Florida went to an urgent care center with a rash and fever, doctors thought it may be from another mosquito-borne virus. This was during the well-known Zika virus epidemic that affected Florida and the Caribbean. So when the boy’s lab samples were collected, doctors were surprised to see that all studies for Zika were negative. They finally found the Keystone virus after doing viral cultures from the patient’s samples. Because this is the first known case of Keystone virus in humans, we don’t have a clear idea of how this virus will affect humans. But researchers believe that many people living in the Florida area have already been infected and aren’t experiencing symptoms, which is similar to other mosquito-borne diseases like Zika and West Nile. Scientists also believe that the Keystone virus can infect brain cells, and like West Nile, and may possibly lead to brain disorders like encephalitis. This threat of mosquito-borne diseases continues to rise. According to the CDC, the rates of disease spread by mosquitos, ticks and fleas (referred to as vector-borne diseases) have tripled in the United States from 2004 to 2016. (2) The CDC confirms that “changes in infectious disease transmission patterns are a likely major consequence of climate change. ” Data indicates the health effects of climate change and shows that even small temperature increases can greatly affect the transmission of mosquito-borne diseases. (3) According to research published by the University of California Press Journals, mosquitos may actually benefit from climate change. Researchers indicate that while climate change may mean extinction for many species, it can lead to longer breeding seasons and increased hatch rates of mosquito populations. The enlarged mosquito population will then seek more territory, and the warmer climate will make more territory available, so the cycle can continue and escalate. (4) Keystone Virus vs. Zika vs. West Nile Virus - The Keystone virus is likely transmitted by the Aedes Atlanticus mosquito, a cousin to the mosquito that spreads the Zika virus. - In 1964, the Keystone virus was first isolated in the Tampa Bay region of the U.S. It was initially found in animal populations, but was identified in a human living in Florida in August 2016. - The Keystone virus can spread when an infected mosquito bites a human or animal. - Symptoms of the Keystone virus likely include a rash and mild fever — the two symptoms present in the teenage boy diagnosed. Scientists believe that like the West Nile Virus, Keystone can infect brain cells and may possibly lead to brain disorders like encephalitis. - There’s no treatment or vaccine available for the Keystone virus, but many people are likely infected and show no symptoms. (5) - The Zika virus is transmitted by the Aedes species mosquito. In the U.S., these mosquitos are most common in Florida, Hawaii and along the Gulf Coast. In warmer temperatures, however, they become a threat in areas as far north as Washington, D.C. - The first confirmed Zika case was reported in Brazil in May 2015. By February 2016, the World Health Organization declared Zika virus a “Public Health Emergency of International Concern.” - Zika can spread from mosquito bites (the most common form of transmission), from mother to child during pregnancy, through unprotected sexual contact and through blood transfusion. - Most people with Zika don’t experience symptoms and never know they are infected, but some may experience a rash, red eyes, fever, headaches, joint pain and muscle pain. For women who are pregnant, the Zika virus can cause certain birth defects, including microcephaly and severe fetal brain defects. - There’s no treatment or vaccine for Zika virus. (6) West Nile Virus - The West Nile virus is most commonly spread through the bite of an infected mosquito, especially those from the Culex species. A mosquito is first infected by feeding on an infected bird and then spreads the virus by biting humans or other animals, such as horses. - West Nile virus was first isolated from a patient living in the West Nile part of Northern Uganda in 1937. After that, small and large outbreaks occurred in several areas, including Israel, Egypt and South Africa, Russia, Spain and Romania. In 1999, the virus was first detected in North America, where a total of 62 confirmed cases in Queens, New York, and the surrounding areas. (7) - Most people with West Nile virus don’t develop symptoms. About 1-in-5 people infected with West Nile experience a fever and other symptoms like a rash, headache, body aches, joint pain, diarrhea and vomiting. About 1-in-150 people with West Nile virus develop a severe illness that affects the central nervous system, such as encephalitis (inflammation of the brain) and meningitis (inflammation of membranes surrounding the brain and spinal cord). - There’s no treatment or vaccine for the West Nile virus. (8) Science-Backed Mosquito Repellents Because there’s no treatment or vaccine for viruses spread by mosquitos, the best and only approach is avoiding mosquito bites altogether. According to research published in the Journal of Insect Science, “the use of repellents to alter mosquito host seeking behavior is an effective method for the prevention of mosquito-borne diseases. ” (9) So what are the best home remedies for mosquito bites? Here’s a breakdown of the best science-based mosquito repellents. Some are more chemical-based. I opt for more natural solutions, but I’m listing what the science on all different types of repellents below. 1. DEET: When researchers at New Mexico State University compared the efficacy of insect repellents for the type of mosquito that spreads the Zika virus, they found that products containing DEET were among the most effective. (10) According to the CDC, the concentration of DEET in mosquito repellent products is meant to indicate how long the product will be effective. A higher DEET concentration means that the product will work better for a longer period of time, while products containing lower concentrations of DEET will need to be reapplied. But the CDC also warns that concentrations over 50 percent provide no added protection. One thing to look out for when using DEET is the risk of developing skin reactions, like rashes and blisters. It also shouldn’t be used on infants younger than 2 months. (11) More seriously, other side effects include seizures and Gulf War Syndrome. And this widely used repellent may also harbor carcinogenic properties; it’s turned up in Hodgkin lymphoma and soft tissue sarcomas. (12) 2. Oil of Lemon Eucalyptus: Oil of lemon eucalyptus is registered with the Environmental Protection Agency and is on the list of effective insect repellents. A study conducted in Queensland, Australia, and published in the Journal of the American Mosquito Association compared a mosquito repellent formulation containing 40 percent DEET to a formulation containing 32 percent lemon eucalyptus oil. Researchers found that the DEET formula provided 100 percent protection against mosquitoes for 7 hours, while the oil of lemon eucalyptus formula provided 95 percent protection for three hours. (13) Oil of lemon eucalyptus oil should not be used on young children. Always perform a patch test on a small area of skin before applying it completely to be sure that you don’t have an adverse skin reaction. 3. Citronella Oil: Studies show that citronella oil is an effective alternative mosquito repellent and boosts a repellency percentage of 96. 7, according to research published in Rural and Remote Health. (13) However, some studies show that the protection time of citronella oil is less than that of products containing DEET, with a difference in protection time of up to 253 minutes. Data suggests that citronella oil provides a complete repellency time of at least 3 hours, and may have a longer protection time when combined with vanillin, the primary component of vanilla bean extract. (14) - The Keystone virus was first isolated in 1964 from mosquitoes found in Keystone, Florida. Until recently, it was only known to infect animals of the coastal regions, stretching from Texas to the Chesapeake Bay. - In August of 2016, the virus was detected in a 16-year-old boy living in Florida. He developed a rash and fever, two symptoms that are common among other mosquito-borne diseases, like Zika and West Nile. - There are a few science-backed mosquito repellents that can be used to prevent the spread of Keystone and other mosquito-borne viruses. Science-backed mosquito protection includes DEET, oil of lemon eucalyptus and citronella oil. - The protection times of these repellents vary, and DEET is linked to some serious health concerns. Get FREE Access! Dr. Josh Axe is on a mission to provide you and your family with the highest quality nutrition tips and healthy recipes in the world. . . Sign up to get VIP access to his eBooks and valuable weekly health tips for FREE! Free eBook to boost metabolism & healing 30 Gluten-Free Recipes & detox juicing guide Shopping Guide &
010_6210333
{ "id": "<urn:uuid:4eb16299-b4e5-4533-a806-12debcb12d96>", "dump": "CC-MAIN-2019-26", "url": "https://draxe.com/keystone-virus/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998813.71/warc/CC-MAIN-20190618183446-20190618205446-00541.warc.gz", "language": "en", "language_score": 0.9412398934364319, "token_count": 2192, "score": 3.53125, "int_score": 4, "uid": "010_6210333_0" }
Le Thanh Tong Our editors will review what you’ve submitted and determine whether to revise the article. Join Britannica's Publishing Partner Program and our community of experts to gain a global audience for your work! Le Thanh Tong, also called Le Thanh Ton, or Thuan Hoang De, (died 1497, Dong Kinh [now Hanoi, Vietnam]), the greatest ruler of the Later Le dynasty (q. v.; 1428–1788) in Vietnam. Though the early years of Le Thanh Tong’s reign were marked by a struggle for power, he eventually developed a governmental power base. He established a Chinese-style centralized administration and expanded dynastic control southward, at the expense of the once great kingdom of Champa, located on the southern coast of modern Vietnam. Ascending the throne in 1460, Le Thanh Tong divided the empire into 13 circuits (similar to Chinese provinces), each of which was subdivided into prefectures (phu), districts (huyen), and departments (chau). These were ruled by centrally appointed officials, who were selected on the basis of their performance in the Confucian civil service examinations given every three years. The population was registered; a land tax (based on the nature of the crops and the amount of arable land) was instituted and revised triennially; new penal and civil codes were drawn up utilizing Confucian moral precepts; and, following the practices of the Chinese Ming dynasty (1368–1644), hortatory works of Confucian moral precepts were periodically read in every village in the country. Continuing the southward push of his dynasty down the Vietnamese peninsula, Le Thanh Tong established a series of military colonies in the south. In 1471 he finally defeated Champa, ending the attacks on Vietnam by the Cham people. Champa was reduced to a narrow remnant along the southern edge of the peninsula. Learn More in these related Britannica articles: Vietnam: The Later Le dynasty…1471 under the leadership of Le Thanh Tong (ruled 1460–97). Soldiers in the advancing Vietnamese army settled in newly established villages from Da Nang to the neighbourhood of Nha Trang, in what became the first great Vietnamese push to the south. The elimination of Champa was followed by incursions into… Later Le DynastyIn 1471 Le Thanh Tong, the greatest of the Le rulers, permanently subjugated Champa. Le Thanh Tong divided Vietnam into 13 provinces or circuits, based on the Chinese model, and established a triennial Confucian civil service examination. He also promulgated a new legal code, the Hong Duc… VietnamVietnam, country occupying the eastern portion of mainland Southeast Asia. Tribal Viets inhabiting the Red River delta entered written history when China’s southward expansion reached them in the 3rd century bce. From that time onward, a dominant theme of Vietnam’s history has been interaction with…
006_3753235
{ "id": "<urn:uuid:36b45f07-25f4-4580-93c4-69912913429e>", "dump": "CC-MAIN-2021-17", "url": "https://www.britannica.com/biography/Le-Thanh-Tong", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039568689.89/warc/CC-MAIN-20210423070953-20210423100953-00062.warc.gz", "language": "en", "language_score": 0.9498764276504517, "token_count": 622, "score": 4.15625, "int_score": 4, "uid": "006_3753235_0" }
Retinopathy of prematurity, called ROP in the medical community, affects premature infants and newborns. The disease can be mild or severe. When first diagnosed in the 1940s, the condition was called retrolental fibroplasia. At that time ROP was the number one cause of childhood blindness. With advances in medical technology and treatment, smaller, younger infants are surviving and the rate of ROP is on the rise. How Does Retinopathy of Prematurity Develop? The vessels of the retina develop around the 16th week of gestation. During this time, these vessels grow from the optic disc. By the 32nd week of gestation, development from the ora serrata to the nasal area of the retina is complete. Development continues until the end of pregnancy with the large temporal area developed by the 40th to 42nd week of gestation. Experts believe gap junctions caused by hyperoxic extrauterine conditions may be the cause of ROP. The “gaps” make it difficult, or impossible, for proper vascular growth. It is estimated at up to 50% of infants born weighing less than 2. 75 pounds at birth will develop ROP. ROP often leads to irregular blood vessel growth after birth. Mild Versus Severe Retinopathy of Prematurity There is little known about why some cases of ROP resolve with immediate treatment and other cases advance. Two infants presenting with the same clinical condition can be subject to identical treatments and one patient may resolve while the other develops a more severe condition. Experts suspect genetics play an important part on treatment effect. There are five stages of ROP. Patients are assessed for various factors before the disease is staged. - Stage 1: Mild abnormalities in vessel growth. - Stage 2: Moderate abnormalities in vessel growth. - Stage 3: Severe abnormalities in vessel growth. - Stage 4: Severe abnormalities in vessel growth with partial retina detachment. - Stage 5: Complete retinal detachment. Symptoms of Retinopathy of Prematurity Mild and moderate stages of ROP require an eye exam to diagnose. Typically, eye exams are part of the patient workup if risk factors for ROP exist, including prematurity or very low birth weight. Severe cases may be diagnosed with eye exam are symptoms are recognized. Symptoms may include: - Crossing of the eyes - Nearsightedness (severe) - Irregular eye movements Treatment for Retinopathy of Prematurity The aim of treatment is to stop irregular blood vessel growth. Cryotherapy or laser therapy may be used to stop vessel growth. If the retina has detached, laser therapy is not an option. Doctors may suggest surgery to reattach the retina. About 10% of infants with ROP will develop a more severe stage of the disease. Lasting vision problems and blindness may occur. However, most mild cases resolve with treatment.
006_492048
{ "id": "<urn:uuid:fd973b45-d0ce-4a34-96b2-7a5ebf9bf28d>", "dump": "CC-MAIN-2021-21", "url": "https://www.babymed.com/baby/retinopathy-prematurity-rop", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991829.45/warc/CC-MAIN-20210514214157-20210515004157-00492.warc.gz", "language": "en", "language_score": 0.9279799461364746, "token_count": 604, "score": 3.1875, "int_score": 3, "uid": "006_492048_0" }
China (officially People's Republic of China), ruled by a communist government, has experienced an abnormal Gross Domestic Product (GDP) growth rate over the past decades. Data from 2018, however, signaled an economic growth slowdown of the Asian giant. But what impact would this have on the U.S. economy and the global economy? To answer this question, you need to first assess the economic position of China within the world economy. The Size of China's Economy China, the most populous country in the world, had the second-largest economy ranked just below the United States with a nominal GDP of $12 trillion in 2018. However, this high GDP did not necessarily indicate the wealth of the country. The country ranked 20 for GDP per capita, which was only $15,308 as of 2017. Many global manufacturing companies attracted by low labor costs and cheap supply materials in China located their manufacturing units in China. This allowed companies to produce goods cheaply, and it explains why many of the products we use in our daily lives are made in China. Relationship With the U.S. Economy China is the third-largest export partner (the first and second being Canada and Mexico, respectively) of the United States, with export goods and services valued at $129. 9 billion in 2017, according to the Office of the United States Trade Representative. That made up about 8. 4% of the total exports of the United States during that time period. - The economies of the United States and China are intricately linked, due to the two nations sharing the second-largest trading partnership of goods and services. - Low production costs and cheap labor are negatively impacting the export market of the United States. - China's impact on oil prices can benefit the United States in the short term, as the States can enjoy decreased oil import prices. - China was the United States' largest creditor in 2018. China is also the United States' largest import partner whose imports were valued at $505. 5 billion as of 2017 or about 21. 6% of the total imports of the United States. Thus, the trade balance of the U.S. with China was negative, and this deficit is financed partly by capital flows from China. China was also the largest creditor of the United States and held the largest part of the U.S. Treasury securities with an amount of $1. 18 trillion as of 2018. According to April 2018 figures from the U.S. Treasury, this was just over 21% of U.S. overseas debt. All of these statistics show the importance of the Chinese economy and why any developments in China, be they negative or positive, can influence the world’s largest economy, the United States. The Chinese Slowdown Source: Trading Economics Concerns raised include the possibility that the slowdown in the economy of China will have negative impacts on the markets that are closely related to this economy, one of them being the United States. GDP = Consumption + Investment + Government expenditure + (Export-Import) With exports decreasing and imports less affected by these negative developments, the deficit in the U.S. balance of trade with China widened further in the short run. Effect on Unemployment Rates U.S. companies that generate an important portion of their revenues from China are likely to be negatively affected by lower domestic demand in China. This is bad news for both shareholders and employees of such companies. When cost-cutting is necessary to remain profitable, layoffs are usually one of the first options to consider, which increases the unemployment rate. The Silver Lining A Chinese economic slowdown had some positive effects on the U.S. economy. One reason oil prices decreased from high levels was pessimistic expectations for the GDP growth rate in China, the biggest oil importer, with imports of around 8. 4 million barrels per day in 2017. One of the biggest beneficiaries of low oil prices is the United States; it was the second-largest oil importer with about 7. 9 million barrels in 2017. Lower oil prices positively affected the U.S. trade balance deficit as the cost of the country’s oil imports decrease. The Bottom Line China, with its giant economy, has a huge influence on world economies, particularly those related to China. A decrease in domestic demand in China can adversely impact the world economy and slow down global economic growth. The United States is one of the countries likely to be affected by a slowdown in the Chinese economy because of the expected decrease in the export of goods and services to China. However, the negative effects of the economic slowdown can be temporarily mitigated from normalized oil prices.
002_3999045
{ "id": "<urn:uuid:56898aa5-7160-4157-82a4-882f26d1e4c8>", "dump": "CC-MAIN-2020-29", "url": "https://www.investopedia.com/articles/investing/072915/impact-chinese-economy-us-economy.asp", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657129517.82/warc/CC-MAIN-20200712015556-20200712045556-00084.warc.gz", "language": "en", "language_score": 0.9597927927970886, "token_count": 952, "score": 3.140625, "int_score": 3, "uid": "002_3999045_0" }
The Cloud, Internet of Things (IoT), streaming video, 5G, and more force data centers to scale exponentially. Service providers need to increase the bandwidth of existing fiber lines in data center interconnects (DCIs) to support the increasing network traffic these technologies generate. Chip and board manufacturers need to face the reality that Moore’s Law – the expectation that the number of transistors that can be placed onto silicon chips within integrated circuits doubles every two years – has reached its limit. All these factors are a tipping point for silicon photonics, a technology that promises a new wave of chips, systems, and optical components to address the growing need for faster and more data. Three key trends highlighted in this paper: - Silicon photonics increase capacity and save energy - Moore’s Law and photonic integrated circuits - Integrated photonics introduce new test challenges
002_3275344
{ "id": "<urn:uuid:6e073586-9fec-4044-9b87-d26caa085167>", "dump": "CC-MAIN-2020-29", "url": "https://www.datacenterdynamics.com/en/whitepapers/integrated-photonics-revolutionize-data-center-interconnects/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657143365.88/warc/CC-MAIN-20200713100145-20200713130145-00032.warc.gz", "language": "en", "language_score": 0.8824282288551331, "token_count": 179, "score": 2.65625, "int_score": 3, "uid": "002_3275344_0" }
- 28 NOV 2016 Gender and Child Affairs The mandate of the Gender Affairs Division is to effectively promote Gender Equity and Gender Justice through the process of Gender mainstreaming in all Government Policies, Programmes and Projects. The Gender Affairs strategic objectives are: - To improve the quality of life of men and women and boys and girls, at all levels of society through the promotion of gender equity and equality; - Research and disseminate information on gender specific issues; - Promote change in gender discriminatory social consciousness and traditions; - Build consultative mechanisms within government, international and regional agencies, academia, NGOs and private sector partners in advancing gender equality; - Develop gender policies to promote the equitable advancement of women and men, and boys and girls in all spheres of development and - Prevent, punish and eradicate gender based violence. Similarly, the Child Affairs Division is responsible for several duties including the: - Implementation of strategies of the UNICEF Convention on the Rights of the Child at a national level; - Provision of guidance to transitioning State Homes; - Provision of a secure and nurturing environment for all children; and - Development of comprehensive, coherent & harmonized initiatives to promote, protect & respect child rights For more information on the Gender and Child Affairs Division, visit their website: http://www.opm-gca.gov.tt/
011_394697
{ "id": "<urn:uuid:b3485384-9454-44e1-9785-0d4c4bb7283a>", "dump": "CC-MAIN-2022-40", "url": "https://www.opm.gov.tt/faq/gender-and-child-affairs/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.37/warc/CC-MAIN-20220930212504-20221001002504-00473.warc.gz", "language": "en", "language_score": 0.8636114001274109, "token_count": 280, "score": 2.765625, "int_score": 3, "uid": "011_394697_0" }
How to Calculate Return on Assets (ROA) When it comes to investing, it is important to learn how to calculate a financial ratio known as return on assets (ROA). As you continue to improve your investing skills and become a more experienced analyst, you'll find that ROA is an important measurement because it gives you an idea about the underlying nature of the business or enterprise you are studying in a way that is different from return on equity (ROE). This is especially true for certain sectors and industries, and not always in the way you might think. What Is Return on Assets and Why Is It Important for Investors to Understand? Whereas asset turnover tells an investor the total sales for each $1 of assets on the balance sheet, ROA tells an investor how much after-tax profit a company generated for each $1 in assets. In other words, ROA measures a company’s net earnings in relation to all of the resources it had at its disposal—the shareholders’ capital plus short and long-term borrowed funds. Thus, return on assets is the most stringent test of return to shareholders. If a company has no debt, the return on assets and return on equity figures will be the same. Two Methods of Calculation There are two acceptable ways to calculate ROA - Method 1: Net profit margin x Asset turnover = Return on assets - Method 2: Net income ÷ Average assets for the period = Return on assets Example Calculations Using Both Methods Method 1. As described above, Method 1 requires that you calculate net profit margin and asset turnover first before you can calculate ROA. In most of your analyses, you will have already calculated these figures by the time you get around to ROA. For illustrative purposes, this example will go through the entire process using Johnson Controls as the sample business. This example uses the data from 2001's Johnson Controls Form 10-K and annual report, shown below. Measuring the ROA a company produces over a multiyear period and watch for changes. From time to time, this can let you know something is happening in the business that could be a harbinger of future prosperity or a Cassandra warning of coming doom. The first step is to calculate the net profit margin. To do this, divide $469,500,000 (the net income) by the total revenue of $18,427,200,000. You'll come up with 0. 025 (or 2. 5 percent). You now need to calculate asset turnover. You average the $9,911,500,000 total assets from 2001 and $9,428,000,000 total assets from 2000 together and come up with $9,669,750,000 average assets for the one-year period you are studying. Divide the total revenue of $18,427,200,000 by the average assets of $9,660,750,000. The answer, 1. 90, is the total number of asset turns. You now have both of the components of the equation to calculate return on assets: . 025 (net profit margin) x 1. 90 (asset turn) = 0. 0475, or 4. 75 percent return on assets Method 2. The second method for calculating ROA is much shorter. Simply take the net income of $469,500,000 divided by the average assets for the period of $9,660,750,000. You should come out with 0. 04859, or 4. 85 percent. You may wonder why the ROA is different depending on which of the two equations you used. The first, longer option came out to 4. 75 percent, while the second was 4. 85 percent. The difference is due to the imprecision of the calculation. Specifically, the decimal places were truncated; e. g., you came up with asset turns of 1. 90 when in reality, the asset turns were 1. 905654231. If you opt to use the first example, it is good practice to carry out the decimal as far as possible. Is a 4. 75 percent ROA good for Johnson Controls? A little research shows that the average ROA for Johnson’s industry is 1. 5 percent. It appears Johnson’s management is doing a much better job than its competitors. This should be welcome news to investors. Is ROA an Accurate Measure of How "Good" a Business Is? The return on assets figure is also a sure-fire way to gauge the asset intensity of a business. The lower the profit per dollar of assets, the more asset-intensive a business is. The higher the profit per dollar of assets, the less asset-intensive a business is. All things being equal, the more asset-intensive a business, the more money must be reinvested into it to continue generating earnings. This is a bad thing. If a company has an ROA of 20 percent, it means that the company earned $0. 20 for each $1 in assets. As a general rule, anything below 5 percent is very asset-intensive while anything above 20 percent is asset-light. Companies such as telecommunication providers, car manufacturers, airlines, and railroads are very asset-intensive, meaning they require big, expensive machinery or equipment in order to generate a profit. Advertising agencies and software companies, on the other hand, are generally very asset-light. Think about what happens once a software program has been developed. It is downloaded through websites or app stores. Apart from ongoing updates, each subsequent unit doesn't require a comparable amount of labor. That is, the business model is scalable. A widget factory, in contrast, has to do the same amount of work to produce each widget. The result is that a single major hit can transform a relatively small software firm into a titan in a short period of time. |Johnson Controls2017 Income Statement Excerpt| |Period Ending||Sep 30, 2017||Sep 30, 2016||Sep 30, 2015| |Cost of Revenue||$478,300,000||$472,400,000||$419,600,000| |Preferred Stock and Other Adjustments||($8,800,000)||($9,800,000)||($13,000,000)| |Net Income Applicable to Common Shares||$469,500,000||$462,600,000||$406,600,000| |Johnson Controls2017 Balance Sheet Excerpt| |Long Term Assets| |Long Term Investments||$300,500,000||$254,700,000||$254,700,000| |Property, Plant and Equipment||$2,379,800,000||$2,305,000,000||$1,996,000,000| |Deferred Long Term Asset Charges||N/A||N/A||N/A| |Total Stockholders' Equity||$2,985,400,000||$2,576,100,000||$2,270,000,000| |Net Tangible Assets||$738,100,000||$442,800,000||$173,100,000|
010_5502033
{ "id": "<urn:uuid:33f66612-9c6b-48a0-9204-f90c5906ba54>", "dump": "CC-MAIN-2019-26", "url": "https://www.thebalance.com/return-on-assets-roa-357592?utm_source=emailshare&utm_medium=social&utm_campaign=shareurlbuttons", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999482.38/warc/CC-MAIN-20190624104413-20190624130413-00423.warc.gz", "language": "en", "language_score": 0.9185578227043152, "token_count": 1491, "score": 2.65625, "int_score": 3, "uid": "010_5502033_0" }
John Rogers, a native of Salem, MA, first turned his hand to sculpture in the late 1840s, when he began experimenting with clay modeling. He soon developed a distinctive style with great public appeal. His figures ranged in height from 8” to 48” on a variety of subjects, but his most prolific pieces were figure groups about 24” in height which depicted tableaux from contemporary life and famous literary works. Rogers modeled his groups in clay and then mass-produced them in plaster castings, which made them affordable for middle-class households and contributed to their popular appeal. By 1880, the unveiling of a new John Rogers group was an event covered by national newspapers. While many Rogers groups depict gentle scenes from everyday life, such as Weighing the Baby and Going for the Cows, the series for which Rogers won his greatest critical acclaim addressed the social issues arising from the Civil War. In particular, Rogers’ depiction of slave life was unique among the artwork of his contemporaries. Indeed, the grouping which first drew the attention of the public was his 1860 The Slave Auction, displayed in New York, which illustrated an anguished slave family facing separation before the auction block: a helplessly angry father with arms crossed, and a mother clinging anxiously to her two tiny children. Some other groupings in Rogers’ Civil War series which depict African-Americans include The Wounded Scout: A Friend in the Swamp, which depicts a raggedly dressed African American man – perhaps an escaped slave – supporting a weary and wounded soldier as the two make their way through a swamp. The Fugitive’s Story depicts an African American woman, a child in her arms, standing before a desk and being scrutinized by three well-dressed white men, two standing, one seated behind the desk. In Camp Fire: Making Friends with the Cook, a white soldier warms himself by a campfire as an African American cook tends the soup-pot. Taking the Oath and Drawing Rations depicts a soldier who holds out a Bible while a woman rests her right hand upon it. A small boy clings to the woman’s skirts, while an African American youth in tattered clothing, holding a basket, leans on a barrel. In addition to the groupings which made him famous, John Rogers also sculpted several monuments, the most well-known of which is the sculpture of General John F. Reynolds (1884) in front of City Hall in Philadelphia.
004_6461537
{ "id": "<urn:uuid:d232a9a4-99f8-4fb2-b474-a541e366428b>", "dump": "CC-MAIN-2020-50", "url": "https://conserve-art.com/rogers-groups/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141732835.81/warc/CC-MAIN-20201203220448-20201204010448-00147.warc.gz", "language": "en", "language_score": 0.9755319356918335, "token_count": 504, "score": 3.328125, "int_score": 3, "uid": "004_6461537_0" }
It seems like the Cube House of Rotterdam is stranded above roads and stuck next to the harbor by the strong wind that blows from the sea. But this popular tourist attraction is also a bizarre architectural experiment and this is the main reason why we decided to spend some time there during a cold January afternoon. The Cube House of Rotterdam is known, in Dutch, as Kubuswoningen and you can find them at the Oude Haven, the historical section of the city port. The area is a mixture of architectural styles and buildings, but it looks impressive when you think about the fact that the area was destroyed during the Second World War. When it came to the time to redevelop the area, architect Piet Blom was asked to redevelop the area with something special, a kind of architecture of character. Something that would stand out, and this is how we decided to further explore some cube housing idea he already used in Helmond before. This time, in a more urban context. A little bit of the history behind the Cube House of Rotterdam Not much survived the bombing of the Oude Haven during the Second World War, and it took a while for the city of Rotterdam to start a project of urban regeneration in the area. But, in 1974, as a result of a change in the local government, housing and urban development became one of the top priorities. One of the local politicians believes that the functional architecture that was being developed at the time was lifeless and that Rotterdam needed a type of architecture that would shine some life in the city. The people responsible for this redevelopment project in Rotterdam knew about what Piet Blom had designed before in Helmond and invited him to do this work in the Oude Haven area. But the importance and the scale of the project was a little overwhelming to the architect who had to rethink his objectives and create something different. Piet Blom came up with an idea: he would build something that it wouldn’t look like it was designed by an architect. Based on this, they split the housing development into three different and distinct projects. One of them is called Blaaktoren and its a 13 story high apartment tower that resembles the shape of a pencil based on its hexagonal structure. Another project was the Spaanse Kade that is a series of terraced buildings that surround an inner courtyard. And, finally, the Kubuswoningen that is an exploration of cube houses in an urban grid. The architect responsible for the Cube House believed that urban communities should feel like villages. With the Kubuswoningen he had in mind the experience of living in trees. Each elevated cube represented a tree and, collectively, they represented a forest. Which is something that kept popping in my head while I walked around and took pictures of the buildings in Rotterdam. The Cube House of Rotterdam is made of 38 regular cube units. And two larger cubes that were developed as an architecture school, and the other one was never entirely finished. Each slanted cubic residence is held in place but pillars that are located over a pedestrian bridge over one of the busiest streets in Rotterdam. Now that you know the history behind these odd-looking houses, you might be thinking about how it is to live in them. And, according to some of the articles I read online, it seems to be quite an awkward experience. Even though the cube house is big, due to the sharp angles of its architecture, almost half of the space is not usable. And to make things even worse, the area is spread around 4 different floors. When you entered a cube house, you must take a narrow staircase to reach the first floor where there is a triangle-shaped room with a living room and a kitchen. On the next level, there are two bedrooms and a bathroom, and the top floor consists of a small free space that is typically used as a garden. If you want to learn more about the Cube House of Rotterdam and the architectural work of Piet Blom, you should visit this gorgeous Dutch city and see it with your own eyes. When you arrive there, the Cube House Show Cube has a museum that is open to the public every day, and that shares the story of these odd-looking houses. Cube House of Rotterdam Hostel Ani & Haakie Also, if you need a place to stay in Rotterdam, we wrote an article about our experience in the lovely Hostel Ani & Haakie. And if you’re a fan of burgers, there is a place in town called Hamburg that has some of the best burgers I have ever eaten. You should know that. A Visit to the Cube House of Rotterdam Overblaak 70, 3011 MH Rotterdam – Netherlands
004_7199474
{ "id": "<urn:uuid:56c67336-c57e-40ff-8a6a-8dbaef4b2a4a>", "dump": "CC-MAIN-2020-50", "url": "https://fotostrasse.com/cube-house/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141177607.13/warc/CC-MAIN-20201124224124-20201125014124-00028.warc.gz", "language": "en", "language_score": 0.974312424659729, "token_count": 991, "score": 2.625, "int_score": 3, "uid": "004_7199474_0" }
To Strike or Not to Strike in 1830s Lowell: A Role Play In this activity students perform a role play of a talk show between Lowell workers and factory owners. To research their characters, students analyze primary sources. This activity is used to teach with the film Daughters of Free Men, but can be completed without the film. Students will analyze how changing working conditions and decreasing pay led to strikes in the 1830s. Students will dramatize the conflict between factory owners and factory workers over changing working conditions and pay. Step 1: Divide the group into four equal groups: one group to play the factory owner, one group to play a girl who wants to go on strike, one group to play a girl who does not want to go on strike, and one group to play the talk show host. Pass out copies of the To Strike or Not to Strike worksheet describing the situation and go over the parts of the role play carefully. Step 2: Pass out copies of the character planning worksheets to every student, as well as the primary and secondary documents. In their character groups, students review the readings and select evidence and information they wish to include in the talk show role play. Students should consider the arguments and evidence the character would use, and how he/she would counter the arguments of the other characters. The talk show host groups should also plan for what kinds of questions they will ask the other characters. Step 3: Each group should choose one member to perform the role play for the class. Pass out copies of the Scene Assessment Rubric to the non-performing members of the class and go over directions for completing it as they actively listen to the role play; as students watch the talk show, they should take notes about the main points of each character and the sources the actors used to create their dialogue. The designated characters present the role play to the class. Step 4: After concluding the role play, lead discussion of following points: How did factory work benefit the girls? (got them off the farm, gave them autonomy, positive supervision of boardinghouses, own wages, education, cultural opportunities with other workers) In what ways was factory work not a benefit to the girls? (wage cuts, boardinghouse rent raises, strict schedule and rules, loss of independence--being "a slave", danger/discomfort of factory work) A group of Boston capitalists built a major textile manufacturing center in Lowell, Massachusetts beginning in the 1820s. The first factories recruited women from rural New England as their labor force. These young women, far from home, lived in rows of boardinghouses adjacent to the growing number of mills. The industrial production of textiles was highly profitable, and the number of factories in Lowell and other mill towns increased. More mils, however, led to overproduction, which led to a drop in prices and profits. Mill owners reduced wages and speeded up the pace of work. They also raised the rent for their boardinghouses. The young female operates organized to protest these wage cuts in 1834 and 1836. Creator | American Social History Project/Center for Media and Learning Rights | Copyright American Social History Project/Center for Media and Learning This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3. 0 Unported License. Item Type | Teaching Activity Cite This document | American Social History Project/Center for Media and Learning, “To Strike or Not to Strike in 1830s Lowell: A Role Play,” SHEC: Resources for Teachers, accessed October 24, 2020, https://herb.ashp.cuny.edu/items/show/1808.
003_7188058
{ "id": "<urn:uuid:5cd9316b-ed4f-4a2a-9c43-ebee2fc4a646>", "dump": "CC-MAIN-2020-45", "url": "https://herb.ashp.cuny.edu/items/show/1808", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107884755.46/warc/CC-MAIN-20201024194049-20201024224049-00315.warc.gz", "language": "en", "language_score": 0.9498867392539978, "token_count": 754, "score": 4.375, "int_score": 4, "uid": "003_7188058_0" }
Last updated on September 30th, 2023 at 11:28 am Definition of Tie-Dye The results of tie dyeing are sometimes similar in appearance to batik, but the designs are made differently. The dye is resisted by knots that are tied in the cloth before it is immersed in the dye bath. The outside of the knotted portion is dyed, but the inside is not penetrated if the knot is firmly tied. Partial penetration occurs when the knot is not tight, causing gradations and irregularities of color that produce indistinct but attractive designs. The process is repeated as many times as desired by making new knots in other parts of the cloth and immersing the fabric in additional dye baths. This gives a characteristic blurred or mottled effect, the result of the dyes running into each other. Like other hand methods, tie dye is expensive. Because the method creates interesting designs, the patterns are imitated in roller printing. The fabric is tied and dyed keeping in mind the design which is to be created during the making of a saree. The various designs are obtained by the following methods – - Fabric is picked up from various places and tied with a thread. Later, it is dipped into various colors, first the lighter and then the darker one. - Grains are tied at various places and the fabric is dyed. - The design is traced and then tacking is done on the outline of the design. The thread of the tacking is pulled and tied. It is then dyed. - The material is folded and wrapped into wax. It is then tied diagonally and dyed. - Patterns used for tie and dye are circles, diamonds, rectangles, stripes and small spots all over the field. - Nails are fixed at equal distances on a wooden block. Fabric put on it is raised at the places on nails. The raised part is dyed to get different designs. - Bright colors like red, yellow, green, purple, magenta, orange and black are used for dyeing.
002_6484868
{ "id": "<urn:uuid:b52d1c7f-8808-4b39-a0ff-81d1258dc3ef>", "dump": "CC-MAIN-2023-50", "url": "https://textileapex.com/what-is-tie-dye-industrial-tie-dye-process-video/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100551.17/warc/CC-MAIN-20231205105136-20231205135136-00459.warc.gz", "language": "en", "language_score": 0.9648987054824829, "token_count": 416, "score": 3.796875, "int_score": 4, "uid": "002_6484868_0" }
Intel's Nehalem processor has several features aimed at better management of the processor cores. The Nehalem has four cores, each of which is capable of running two threads simultaneously, using a technology known as symmetrical multithreading (SMT). Depending on whether SMT is enabled, a processor can therefore run either four or eight threads. SMT is generally configured in the BIOS and can be changed at boot time. Because SMT on the Nehalem processor shares some of the core's resources between threads, turning on SMT does not double processor performance or throughput. Whether your applications run better with SMT turned on or not needs to be determined with specific testing of your applications. [ See the results of InfoWorld's multithreading tests of Windows 7, Vista, and Windows XP in "New multithreading in Windows 7: How much faster? " ] For this discussion of how threads work, I'll limit myself to four cores running one thread each -- that is, with SMT disabled. Note that this is the configuration with which Nehalem PCs are generally shipped by vendors. Intel's Nehalem architecture pays close attention to which cores are actively running code. When a core remains inactive for a determined period of time, the processor turns off the transistors that drive that core. This feature is designed primarily as an energy savings step. The processor can also increase the frequency of the active cores to enable increased performance. This option is known as Turbo Mode; on some systems, Turbo Mode needs to be specifically enabled. For all this magic to happen, though, operating systems need to cooperate. The key is that a core must remain inactive long enough for the processor to shut off its transistors. This was difficult to achieve prior to Windows 7. Although applications create the threads, it's the operating system's task to schedule them for execution and to assign them to an execution pipeline, such as a core. Applications have no control over the scheduling, and they have limited control over which pipeline is used. Prior to Windows 7, the Windows kernel would schedule a thread to run on any available core without regard to where the thread had executed previously. (If no cores were available, the thread scheduler in Windows would choose one running thread to shut down and swap in the waiting thread. The decision about which thread to preempt is controlled by numerous factors. ) Developers could exert some level of control over the selection of the execution core by using a technique called processor affinity. This capability allows the developer to specify a core for the thread to run on. Most operating systems, including Windows, treat processor affinity as a request rather than a command, so they accept the affinity only if it fits within their scheduling constraints (in practice, they mostly fulfill the request). However, this programming approach is generally discouraged, as it tends to make the scheduler work less efficiently. In almost all cases, the scheduler has far better algorithms for deciding what to run when and where than does the programmer at code-writing time. Because previous Windows schedulers were indiscriminate about where they scheduled threads, an application using three threads might see those threads constantly rotated through all four Nehalem cores. The result is that the power-savings feature and Turbo Mode would suffer, as no core would remain inactive for very long. Windows 7, however, tends to schedule the threads to run on the same cores, rather than having them hop about; a three-thread application typically uses only three cores and lets Nehalem turn off the fourth core. This behavior clearly reduces power needs, and it can improve performance in two ways: via Turbo Mode, as described earlier, and via marginally better cache usage. As we see from the benchmarks, however, the difference in performance is marginal when four or more threads are running. The real win is the power savings. On desktop systems, the power savings might not appear terribly important, but they can be very significant on servers and on mobile devices. Mobile users, in particular, will enjoy longer battery life when the Nehalem mobile processors begin appearing in consumer devices. See additional InfoWorld articles on Intel's Nehalem: - Last of the red hot Sun servers - IBM BladeCenter delivers speed, power savings - Windows 7 Ultimate on Nehalem Mac Pro - Nehalem workstations: A new era in performance - MacBook Pro soars to new heights - Exclusive review: HP BladeSystem Matrix - Apple's Nehalem Xserve serves the need for speed - Mac Pro: The perfect workstation - Intel's Nehalem simply sizzles This story, "How Intel Nehalem processors and Windows 7 work together," was originally published at InfoWorld. com. Follow the latest developments in Windows, Windows 7, and Intel Nehalem on InfoWorld. com.
012_3760154
{ "id": "<urn:uuid:8a2cb6dc-63f9-416c-aa9e-158a73954346>", "dump": "CC-MAIN-2017-13", "url": "http://www.infoworld.com/article/2630294/microsoft-windows/how-intel-nehalem-processors-and-windows-7-work-together.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188926.39/warc/CC-MAIN-20170322212948-00588-ip-10-233-31-227.ec2.internal.warc.gz", "language": "en", "language_score": 0.947282612323761, "token_count": 989, "score": 3.15625, "int_score": 3, "uid": "012_3760154_0" }
Choosing a location to purchase properties for sale is a process and a discerning buyer would wisely consider all options available in the market before investing in that perfect urban sanctuary. Important factors to consider are accessibility and convenience – is it accessible to public transportation? Is the community safe? Is it near schools or the work place, and travel spots that the family can visit? But aside from a conducive and secure community to live in, there are also other reasons that a buyer should look in when deciding which property to buy— population density. Population density, as defined by the Merriam-Webster dictionary, is the number of people living in each unit of area. It is calculated by dividing the size of the population by the size of the area or Number of People / Land Area = Population Density. It is important to study the population density of a specific place to determine how the population is distributed. In sociology, determining the population density would decide how the government should allocate the distribution of resources in areas with different population density. Cebu is the center of trade, commerce, commercial, and business in the Visayas region. According to the 2015 Census conducted by the Philippines Statistics Authority, the city of Cebu has a total population of 922,611 and a total land area of 315 square kilometer. In comparison with Manila, which already has a total population of 1,780,148 on its land area of 42. 88 square kilometer, Cebu city has lesser population density. Manila is currently considered as the city with the highest population density in the world. It is important to consider population density in choosing for a property for sale to purchase especially if you intend to reside in it. - High population creates the problem of unemployment. If you are looking for a job in a location with high population density, chances are you will have a hard time landing one since there are other several individuals who are on the same quest. - Traffic congestion may also be a problem since there are more people using the public roads than intended. - High population density is often associated with poor hygiene and pollution. - High population density also creates food problem since there are more mouths to consume the food stock. This could lead to food shortage which could cause undernourishment. - High population density is also a problem in setting the allocation of government projects. Since the population is young, most of the government budget is allocated to health and education than infrastructure or other projects. While factoring in population density in choosing a property to invest in seems to make the task more complicated, it will save you from unwanted dilemmas that may spring from making rash decisions.
006_5882027
{ "id": "<urn:uuid:6d5c59e9-95c1-4790-ab78-26043f823056>", "dump": "CC-MAIN-2018-30", "url": "http://propertyinput.com/population-density-and-how-it-can-affect-your-decision-on-which-property-to-buy/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589536.40/warc/CC-MAIN-20180716232549-20180717012549-00561.warc.gz", "language": "en", "language_score": 0.9550074338912964, "token_count": 546, "score": 2.578125, "int_score": 3, "uid": "006_5882027_0" }
Three Language Learning Activities for the Italian Classroom How to Introduce the Italian Language Both children and adults enjoy stories and pictures. Introduce students to the Italian language by showing them a map of Italy followed by pictures of scenes and important tourist attractions in Italy. Use as many visual aids as possible at the beginning of the course and throughout. Speak a little about the history of the country and move gradually into the sounds of the language and the Italian alphabet. Give students the good news that Italian vocabulary is very interesting and easy to learn, because there are many words which are similar in meaning and spelling to English with only a difference in pronunciation. If there are students whose native language is Spanish, they will find the Italian vocabulary even more to their advantage. Practicing the Alphabet Following the teaching of the alphabet, do reinforce knowledge and memory of it by bringing it to life. Ask students to spell their names using the Italian alphabet. Once this is satisfactorily accomplished, encourage them to pronounce words by interacting in a possible real life situation. Here you may introduce real Italian names and have students act roles of meeting and greeting each other. In addition to practicing pronunciation, students will also learn some basic phrases of greeting. Here are some typical names and example of a group activity involving this idea. Some Italian Names Francesco De Ferrari Introducing Italian Vocabulary Assign a name to each student. Tell them that they are guests at a reception party. Allow some of them to be seated at a table, while others are guests who now arriving. For those arriving, give them a slip of paper with the name of the person they are supposed to be seated next to. Each student in turn approaches guests around the table, introduces himself and asks the person’s name. Once the arriving guest finds the person with the name corresponding to that on the slip of paper, he seats himself. Example of a dialogue: Francesco – Buona sera signora. Mi chiamo Francesco. Lei, come si chiama? Donatella – Mi chiamo Donatella. Francesco – Scusi (he approaches another female student). Francesco – Buona sera signora. Io sono Francesco. Lei è Cristina? Cristina – Sì, sono Cristina. Francesco – Grazie (he sits down, shakes Cristina’s hand and says) Piacere. Cristina – Piacere. F – Good evening Madam. My name is Francesco. What is your name? D – My name is Donatella. F – I’m sorry. F – Good evening Madam. I am Francesco. Are you Cristina? C – Yes, I am Cristina F – Thank you. Pleased to meet you. Encourage variety of language with answers like: Sì, sono io – Yes I am No, non sono – No, I am not Buongiorno – good morning signore – sir (as appropriate) Activities Using Numbers The second lesson in the Italian classroom should begin with a review of the first lesson. Once the teacher is satisfied that students know the alphabet and remember how to spell names, students can now move on to the learning of numbers and practicing their use. Playing a game of Bingo will involve both the use of the alphabet and the numbers. Play mini games with numbers from one to 25 at first and work right up to 100 in batches of 25 in succeeding lessons. A Bingo game will also introduce new vocabulary as the teacher calls different everyday words to represent the letters in the word Bingo. For example: B nove (B 9) B as in Buona notte, banca, banana (Good night, bank, banana) I dieci (I 10) I as in Italiano, importante, inverno (Italian, important, winter) N quattordici (N 14) N as in nonno, Natale, notte (grandfather, Christmas, night) G diciannove (G 19) G as in grazie, grande, giorno (thanks, big, day) O ventidue (O 22) O as in ottobre, opera, oceano (October, opera, ocean). Telling the time in Italian is another activity that involves using numbers. Use Che ora è? / Che ore sono? – What time is it? A che ora? A che ora? – At what time? with just the basic on the hour times. Add minutes after and before in later lessons. For example: È l'una – It's 1:00 all'una at 1:00 Sono le due – 2:00 A Lesson on Colors An activity for a third lesson can be that of teaching colors. Here, students can work in pairs or groups after learning the colors, to color various objects on paper or in sketch pads. Once familiar with the names of the colors, they may take turns at describing the color of each others clothes or eyes for example, using: Di che colore è il tuo vestito? What color is your dress…? Di che colore sono? What color are your eyes? A Sense of Achievement The classroom activities for Italian language lessons provide an interesting way to begin instruction in the Italian classroom. The teacher may have other ideas to add or enhance those mentioned. For example, in a more advanced lesson on the alphabet, after students have learned more vocabulary, have them fill in the missing letters in words by calling them out in Italian. Give points or a small prize to the individual winner who spells the most words correctly. The game may also be played with pairs or groups competing to complete the words. Do monitor the activities closely to encourage good pronunciation. Praise students often so that they maintain confidence, and use good judgment in correcting mistakes. When you do correct, do so constructively as well as tactfully. At the end of the activities, praise students again on a sense of achievement and reflect on additional vocabulary. Reinforce the lesson by discussing common mistakes. Students would most certainly display a great deal of satisfaction with these activities.
004_367639
{ "id": "<urn:uuid:d08ca99b-ccf4-43a8-90ee-189ec39516ef>", "dump": "CC-MAIN-2014-52", "url": "http://m.brighthubeducation.com/italian-lesson-plans/123154-three-beginner-learning-activities/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802765722.114/warc/CC-MAIN-20141217075245-00144-ip-10-231-17-201.ec2.internal.warc.gz", "language": "en", "language_score": 0.914248526096344, "token_count": 1323, "score": 4.15625, "int_score": 4, "uid": "004_367639_0" }
Maria Anna Mozart, beloved nicknamed Nannerl, was the elder and only sister of Wolfgang Amadeus Mozart. As children, both were considered gifted musical prodigies and their father, Leopold, arranged tours to display their talents to the masses in the grandest capitals of Europe. Both children could play the most challenging pieces and could compose into notes any song they heard. They enjoyed a pleasant childhood, indulging their musical creativity and creating their own childish kingdom. As Nannerl and Wolfgang’s musical genius progressed into composition, her adoring younger brother greatly praised and encouraged her work. At a concert, when he announces that the piece he has just played was written by his sister, Leopold is incensed. He orders Nannerl to never compose music again because in the 18th century, women did not become composers. Thereafter, Leopold focused all his attentions on Mozart, not Nannerl. He refused to allow her to study the violin and composition. Leopold announces Nannerl must remain at home when he takes Wolfgang on tour and obliges her to give piano lessons to wealthy students to finance her brother’s Italian tour. Her dreams shattered, Nannerl complies, but falls into a deep depression. Victoria, one of her students, becomes her protégé. Through Victoria, Nannerl’s passion for music is re-awakened. When Victoria’s father becomes interested in her, he rekindles her spirit. Her relationship with Mozart, however, is plagued by years of separation and the preference of their father for his son and not his daughter. Nannerl struggles not only with the loss of her hopes and dreams, but also with the ever-growing estrangement with her brother and her father who refuses to recognize her talents because of the laws of society which will not allow a woman to enter the wold of musical composition. Even her choice of suiters were one-by-one turned away by Leopold. In 1784, she married the magistrate Johann Baptist Franz von Berchtold zu Sonnenburg (1736-1801) and moved to St. Gilgen. Nannerl returned to Salzburg to give birth to her first son and left the newborn there in Leopold's care. Nannerl grew ever more distant from Wolfgang, especially after his marriage to Constanze Weber. They resumed corresponding briefly after the death of their father, but by then, their affection for each other had all but disappeared and Mozart's brief letters to her dealt almost exclusively with the disposition of their father's estate. When Wolfgang dies, Nannerl re-awakens to life and makes it her purpose to honor her brother by collecting and assembling all his compositions and erecting monuments to honor his life. After her huband’s death, Maria Anna returned to Salzburg and supported herself once again by giving piano lessons. She died on October 29, 1829, and was buried in St. Peter’s cemetary. Mozart’s Sister by Rita Charbonnier is a heartwrenching tale of great genius denied. It tells of great triumph and equally great descent and the strength of one woman, Nannerl, to overcome the pain of living her life in the shadow of her brother. Rita Charbonnier brings to life the brilliance of the 18th century with its tight social expectations, sex scandals, and brilliant personages. Her well honed theatrical and musical background is evident in the spectacular descriptions of the music and composition characteristic of Wolfgang Mozart. It is a compelling read, not only for those who love classical music, but for those who love sweeping historical tales of strong women. Brava Rita! Encore! Encore!
002_97786
{ "id": "<urn:uuid:6d1fdcce-be1b-42ba-9d9c-fd3e9474f2d5>", "dump": "CC-MAIN-2020-24", "url": "https://www.e-telescope.gr/en/arts/mozarts-sister-genius-denied", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348526471.98/warc/CC-MAIN-20200607075929-20200607105929-00455.warc.gz", "language": "en", "language_score": 0.9654296636581421, "token_count": 794, "score": 2.78125, "int_score": 3, "uid": "002_97786_0" }
Teacher's Report Form - Parallel/Alternate Forms - Translation Quality - Population Information - Pros & Cons/References Achenbach, T.M. & Rescorla, L.A. (2001). Manual for the ASEBA School-Age Forms & Profiles. Burlington, VT: University of Vermont, Research Center for Children, Youth, & Families. Go to publisher's website: www. aseba. org/ordering The 2001 Teacher’s Report Form (TRF) is a teacher-report measure that assesses problem behavior and can identify 8 syndromes. It also assesses academic performance and adaptive functioning. One or more teachers, or other school personnel, who have known the child in the school setting for more than 2 months, can complete the measure independently. The TRF is a parallel form to the Child Behavior Checklist (CBCL), completed by the caretaker, and the Youth Self-Report (YSR), completed by youths. It is designed for use in conjunction with these measures to give an overall understanding of the child’s functioning in multiple environments. Cross-informant reports are available. Consists of 2 response formats: 1) 3-point Likert-type scale: 0=Not True, 1=Somewhat or Sometimes True, and 2=Very True or Often True 2) Fill-in-the-blank questions |Competence||Academic Competence||How hard is he/she working? | |Competence||Social Problems||Too dependent| |Competence||Thought Problems||Hears things| |Internalizing||Anxious/depressed||Hurt when criticized| FORM FOR DIFFERENT AGES The Caregiver-Teacher Report Form is completed by teachers for children aged 1½-5. The Child Behavior Checklist for Ages 6-18 (CBCL 6-18) is completed by parents, and the Youth Self-Report (YSR) is completed by the child. The normative sample for the 2001 TRF revision consisted of 4,437 youth ages 6 to 18. There were 976 newcomers. The sample was augmented with data from previous versions of the TRF of the statistical analysis, showing that there was no statistical difference in the groups. The sample included children who were not considered to have “serious behavioral/emotional problems” within the previous 12 months. The normative sample included the following demographic characteristics: 48% boys and 52% girls SES: 38% upper-class, 46% middle-class, 16% lower-class Ethnicity: 72% non-Latino White, 14% African American, 7% Latino, 7% Mixed or Other Region: 19% Northeast, 23% Midwest, 36% South, and 23% West |Internal Consistency||Acceptable||Chronbach's alpha||0. 72||0. 97| All reliability was reported for Scaled Scores. Inter-Rater scores reflect ratings between teachers. Extensive literature searches were conducted, mental health professionals and educators were consulted, and pilot tests were run in creating this measure. The current TRF measure has been refined after years of use. Old items that failed to discriminate significantly have been replaced, and slight changes were made in the wording of various items to make them clearer. Currently, all the items discriminate between referred and nonreferred demographically similar children (p<. 01). |Validity Type||Not known||Not found||Nonclincal Samples||Clinical Samples||Diverse Samples| |Sensitive to Change||Yes||Yes| |Sensitive to Theoretically Distinct Groups||Yes| |Not Known||Not Found||Nonclinical Samples||Clinical Samples||Diverse Samples| ASEBA does not report positive or negative power because the results are confounded with the cut points and sample characteristics. Psychometrics for this study are very good. |Language:||Translated||Back Translated||Reliable||Good Psychometrics||Similar Factor Structure||Norms Available||Measure Developed for this Group| |1. Spanish Castilian/Latino||Yes||Yes| |2. French (Canadian/Parisian)||Yes| |6. American Sign Langugage||Yes| The 1986 original sample used to develop the measure comprised 1,700 students receiving mental health or special education services in diverse settings. The sample was ethnically and socioeconomically diverse. Detailed demographic information is provided in the 1986 Manual, pp. 12-14. |Population Type:||Measure Used with Members of this Group||Members of this Group Studied in Peer-Reviewed Journals||Reliable||Good Psychometrics||Norms Available||Measure Developed for this Group| |1. Developmental Disability||Yes||Yes| |3. Lower socio-economic status||Yes||Yes||Yes||Yes||Yes| |4. Rural populations||Yes||Yes||Yes||Yes||Yes| |5. Child Abuse||Yes||Yes||Yes| Pros & Cons/References 1. Well researched and widely used. 2. Newly revised measure. 3. DSM-IV oriented. 4. Provides information on strengths of the child. 5. Inexpensive to administer and score. 6. Computer-generated reports are available with clinician-friendly feedback. 7. Parallel forms are available. Can use up to 8 various parallel forms per child. 8. A computer utility called “A2S” is available from ASEBA to easily export data to SPSS. 1. Can be a time-consuming measure to complete. 2. Potential for self-report bias. 3. No assessment of profile validity. To obtain a full list of references, please see the following or contact ASEBA: Bérubé, R.L., & Achenbach, T.M. (2005). Bibliography of published studies using ASEBA instruments: 2005 edition. Burlington, VT: University of Vermont, Research Center for Children, Youth, & Families Numbers provided are based on the manual and the author. A Psych Info search (5/05) for “Teacher Report Form” or “TRF” anywhere revealed that the measure has been referenced in 836 peer-reviewed journal articles. Below is a sampling: 1. Achenbach, T.M., Howell, C., McConaughy, S.H., & Stanger, C. (1995). Six-year predictors of problems in a national sample of children and youth: I. Cross-informant syndromes. Journal of the American Academy of Child & Adolescent Psychiatry, 34, 336-347. 2. Achenbach, T.M., & Rescorla, L.A. (2001). Manual for the ASEBA School-Age Forms & Profiles. Burlington, VT: University of Vermont, Research Center for Children, Youth, & Families. 3. Erol, N., Simsek, Z., Oner, O., & Munir, K. (2005). Effects of internal displacement and resettlement on the mental health of Turkish children and adolescents. European Psychiatry, 20(2):152-7. 4. Descheemaeker, M.J., Ghesquiere, P., Symons, H., Fryns, J.P., & Legius, E. (2005). Behavioural, academic and neuropsychological profile of normally gifted Neurofibromatosis type 1 children. Journal of Intellectual Disability Research, 49(Pt 1):33-46. 5. Backman, M.L., Santavuori, P.R., Aberg, L.E., & Aronen, E.T. (2005). Psychiatric symptoms of children and adolescents with juvenile neuronal ceroid lipofuscinosis. Journal of Intellectual Disability Research, 49(Pt 1):25-32. 6. Deng, S., Liu, X., & Roosa, M.W. (2004). Agreement between parent and teacher reports on behavioral problems among Chinese children. Journal of Developmental and Behavioral Pediatrics, 25(6):407-7). 7. Oncu, B., Oner, O., Oner, P., Erol, N., Aysev, A., & Canat, S. (2004). Symptoms defined by parents' and teachers' ratings in attention-deficit hyperactivity disorder: Changes with age. Canadian Journal of Psychiatry, 49(7):487-91.
001_3909094
{ "id": "<urn:uuid:f2a1964b-7cda-4228-bb56-089a63ae351a>", "dump": "CC-MAIN-2014-15", "url": "http://www.nctsn.org/content/teachers-report-form", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609526102.3/warc/CC-MAIN-20140416005206-00462-ip-10-147-4-33.ec2.internal.warc.gz", "language": "en", "language_score": 0.8135413527488708, "token_count": 1815, "score": 2.71875, "int_score": 3, "uid": "001_3909094_0" }
A white paper is a preliminary paper, a sample paper, and a place to tryout ideas. It’s the collection of purposeful summaries. My habit is being eradicated. Our work in progress is being graded which means I cannot sit down and have one 10 hour writing session. The white paper is a place that sources can be places as soon as their found. It gives us an opportunity to talk our way through the source and to discover how useful the source really is. It allows us to own our own language of the source. A white paper is not intended to be polished. Thing will be erased, scratched, added, and replaced. Eliminating useless information would be helpful in showing the true size of the paper. The goal is truly focused 3000 word paper. With that goal, the white paper should be 4000 or 5000 words so the best information can be taken and trimmed down. When we have to explain our thoughts, it helps us understand them and understand the level that we know them. While reading about sources, we should write about them. While we think about a source, all we do is argue with the text draining ourselves. We learn nothing and only have a paper about why someone else is wrong. So writing about sources while reading is the alternative. Write before examining the order. Following the 7 step process could prevent us from writing until the last week. If writing about sources while they are read, the writing starts at step 2. Cutting, not writing, is the final step! ! ! Try different introductions to further the paper. The most outrageous opening that can be proved is the best bet. Have someone read the opening and look for a thesis. Practice practice practice. Keep throwing out ideas and testing new openings. This will help lay out all of the options. “Myself to myself as to what the article has provided me. ” Can go back at anytime to reference material that will help with the paper. Nothing in particular to prove. A source is just explained/summarized and works as a good reference while writing a paper. RESEARCH CHALLENGE: WHY DO ADULTS HAVE “BETTER LUCK,” SO TO SAY, WITH POLIO? Purposeful summary after purposeful summary. Quote collection and summaries all together. 5 different attempts to launch a paper. This generation has the strength and determination to eradicate polio. In 1977, the world came together to eliminate the threat of smallpox with great success. With the United States having a grim reminder of the dangers of declining vaccines as a result of the Disneyland epidemic in 2015, the eyes of the world have been opened. As a first world country with top of the line healthcare, the revival of the once presumed dead disease was just enough to show the world that no one is safe. Even the most sophisticated of countries must vaccinate against the wide array of diseases that threaten the world. With this mindset, those from around the world can see the benefit of vaccination and how dangerous it is to neglect from receiving them.
006_2087638
{ "id": "<urn:uuid:5d530cd0-fa3b-43a7-9e66-a0daf2b45028>", "dump": "CC-MAIN-2018-34", "url": "https://rowancomp2.com/2017/02/21/polionotes-thecommonblackhawk/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211146.17/warc/CC-MAIN-20180816171947-20180816191947-00574.warc.gz", "language": "en", "language_score": 0.9477252960205078, "token_count": 624, "score": 2.984375, "int_score": 3, "uid": "006_2087638_0" }
In what is being hailed as a scientific breakthrough that could help preserve an endangered species, two Israeli Griffon vultures with crippled wings have successfully mated and hatched a fledgling. Scientists had previously believed that vultures that are unable to fly could not mate because they cannot balance properly, according to Yonit Sela, an Israeli ornithologist involved in a project to revive Israel’s dwindling Griffon vulture population. The program, Spreading Wings, works to resuscitate the vulture population and has set up 20 feeding and nesting stations around the country. In addition, Sela and her colleagues have worked over a period of time to provide five crippled vultures optimal mating conditions. They met with success when they discovered an egg in a nest two of them had built. To ensure the egg would hatch, it was placed in an incubator at the Jerusalem Biblical Zoo, and a fake plaster replacement put in the nest, Sela said. Fifty-seven days later, the egg hatched. The ornithologists were concerned the parents would not accept their offspring because the hatching had not taken place in the nest, but were surprised; within five minutes of the young male being returned to the nest, the mother had brought him food. “He was welcomed in exceptional way,” Sela told Israel’s Army Radio. Griffon vultures, once a common sight in the Mideast, have nearly disappeared. In the past, the vultures were an integral part of the natural landscape of the country. Israel’s Griffon vultures are the only large vultures that are pale colored. They live in mountainous areas, nesting on cliff ledges. With a wingspan of up to seven feet, they soar to great heights looking for food. When food is located, a large noisy group forms, and what seems like fighting, is in fact, each vulture helping the other to tear loose strips of meat. It was estimated that in the late 1880s, Griffon vultures numbered in the thousands. In the mid-1950s, there were still approximately 1000 couples. Today there are only 70 breeding pairs in the country, a drop of 95%. In whole areas of the country, vultures have totally disappeared. The reasons for the disappearance include the use of pesticides and toxic ecological pollution, the destruction of breeding sites or disturbances by man, a drop in the availability of food sources due to changes in agricultural markets and farming methods. The Nature Reserves Authority, the Israel Electric Company, and the leading zoos in the country are all working return the vultures to Israel, from which they have almost disappeared. In this project all the vultures have been marked and their mates have been identified. Breeding cages have been built, like the large predatory bird cage at the Jerusalem Biblical Zoo. Their genetic profile has been checked, and new methods of treating the eggs and chicks have been developed. Since 1989, over 60 chicks have been raised in Israel and 43 have been released. The Biblical Zoo in Jerusalem has been a part of this project since 1994, when a large breeding aviary was built. Israel is not alone in the effort. Across Asia, bird-conservation groups, in cooperation with government officials, are racing to establish captive-breeding facilities in a final bid to rescue the vultures from the brink of extinction, by encouraging the birds to breed and raise young. In India, organizations such as the Royal Society for the Protection of Birds is working in India with the Bombay Natural History are working to save various breeds of vulture by setting up such centers, which are also designed to look after sick and injured birds. The effort is being fueled by the impact of the vulture decline, which is already being felt throughout Asia. Rotting carcasses left uneaten by vultures pose a health hazard. Such carcasses are linked to the spread of diseases such as anthrax, according to the conservationists. Other animals, such as rats, cats, and dogs, are filling the niche once filled by vultures. Wild dog populations in particular have increased substantially, leading to an increase in the spread of rabies and physical attacks on people. The breeding of the vultures with broken wings is not the first breakthrough that Israel has had in the world effort to save the vultures – including an exercise in same-sex housekeeping. Five years ago, zoo keepers at the Jerusalem Biblical zoo noticed that Dashik and Yahuda, two male vultures had built a nest together and were mating. So they decided to give the couple an artificial egg to see what would happen, and the two males took to the egg, incubating it perfectly as a team. The next step was giving them a child to raise. And indeed, the same-sex couple managed to raise a number of babies, exceeding expectations. Since that time, they have “divorced” and gone on to form male/female pairs, and both are producing eggs and chicks with their new mates on a regular basis. There was a reason beyond mere curiosity for seeking parenting help from the pair of cohabitating male vultures. Normally, female Griffon vultures lay only one egg a year. But if the egg is taken from the mother, she will lay a second egg. By providing suitable surrogate parents for the eggs that are taken, bird keepers can increase the number of vultures that are bred. The enclosure at the Jerusalem Biblical Zoo operates in close conjunction with all the authorities throughout the country that are participating in the Spreading Wings program to save the vultures. The Israel Raptor Breeding Center operates behind the scenes in the program, by taking the eggs of rare species such as the Griffon vultures for the purpose of incubation. Eventually, the chicks are either returned to their biological parents or deposited with adoptive parents.
006_2023558
{ "id": "<urn:uuid:fcf4020a-06cd-4876-b73f-2665b7d8b8c2>", "dump": "CC-MAIN-2015-32", "url": "http://www.israel21c.org/israeli-scientists-help-vultures-spread-their-wings/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042986423.95/warc/CC-MAIN-20150728002306-00276-ip-10-236-191-2.ec2.internal.warc.gz", "language": "en", "language_score": 0.972812294960022, "token_count": 1225, "score": 3.40625, "int_score": 3, "uid": "006_2023558_0" }
POR 381 • History and Textuality in Colonial Brazilian Letters 1:00 PM-4:00 PM This course is designed to provide a basic set of concepts and literary analytical skills so that students are able to critically read and understand Brazilian Colonial Literature and its cultural background. The classes will focus on the Brazilian Letters of the 16th -18th centuries. The primary texts will be read in relation to their European counterparts and in their Brazilian contexts as well. Thus, not only will the major writers be examined, but also their relations with other artistic discourses such as architecture, painting, music, and sculpture. The course will try to reconstruct the historical frame in which the artistic texts were produced, highlighting the significant political events, dates and historical figures. The course will also examine the changes imposed on the Portuguese language in order to portray Brazilian reality, as understood in its symbolic forms. The connections between the literary text and the fine arts will also be examined, and the the traditional concepts of classicism, mannerism, baroque and neoclassicism will be considered and discussed. Grades will be based on: active class participation, including individual presentation and class discussion (30%); three 2-3 pp. essays (30%); and a final paper (40%). REQUIRED READINGS ANCHIETA, José de. Auto das Onze Mil Virgens (c. 1554-1597) ANCHIETA, José de. No Santíssimo Sacramento (c. 1554-1597) CANDIDO, Antonio. Formação da Literatura Brasileira, 1959. TEIXEIRA, Bento. Prosopopéia, (1601) MATOS, Gregório de. Crônica do Viver Baiano Seiscentista (c. 1681-1695), selections OLIVEIRA, Botelho. Música do Parnaso (1705), selections COSTA, Cláudio Manuel da. Obras Poéticas (1769), selections GAMA, Basílio da. O Uraguai, (1769) GONZAGA, Tomás Antônio. Marília de Dirceu (1792-1812), selections The instructor will provide a course packet with all the primary works required for the course as well as critical précis on each of them, along with a specialized bibliography. THEORETICAL SUPPORT ARISTOTLE. Poetics. Trans. S. H. Butcher, with an Introduction by Francis Fergusson. New York: Hill and Wang, 1961. BRESSLER, Charles. Literary Criticism: An Introduction to Theory and Practice. Fourth Edition. Upper Saddle River, New Jersey, Prentice Hall, 2007. CULLER, Jonatham. Literary Theory. Oxford, Oxford University Press, 1997. LENTRICHIA, Frank & McLaughlin. Critical Terms for Literary Study. Second Edition. Chicago & London, The University of Chicago Press, 1995. TEIXEIRA, Ivan. Anatomia do Crítico & Fortuna Crítica (A sequence of 7 articles). Cult, Revista Brasileira de Literatura, from issue 11 to 17. São Paulo, Lemos Editorial, 1998. "Poética Cultural: Literatura & História". Politéia: História e Sociedade. Revista do Departamento de História da Universidade Estadual da Bahia, Vitória da Conquista, vol. 6, n. 1, 2006, pp. 31-56. Hermenêutica, Retórica e Poética nas Letras da América Portuguesa. Revista USP, n. 57, São Paulo, Coordenadoria de Comunicação Social da Universidade de São Paulo, março-maio 2003, PP. 138-159.
002_3154167
{ "id": "<urn:uuid:16e5f03f-09f4-4c03-89ea-3e78bf418096>", "dump": "CC-MAIN-2014-35", "url": "http://www.utexas.edu/cola/depts/spanish/courses/archive/28192", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500832738.80/warc/CC-MAIN-20140820021352-00461-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.7297966480255127, "token_count": 835, "score": 2.515625, "int_score": 3, "uid": "002_3154167_0" }