text
stringlengths 189
621k
| id
stringlengths 47
47
| metadata
dict |
---|---|---|
The research suggests that intermediate levels of HDL cholesterol may increase longevity.
"The findings surprised us," said the study's senior author Ziyad Al-Aly, Assistant Professor at Washington University School of Medicine in St. Louis, Missouri.
"Previously it was thought that raised levels of the good cholesterol were beneficial. The relationship between increased levels of HDL cholesterol and early death is unexpected," Al-Aly said.
Cholesterol is a fatty substance found in blood that can narrow and block heart vessels, causing cardiovascular disease and stroke.
For years, HDL cholesterol has been credited with helping to remove plaque-building "bad cholesterol" from arteries.
For this study, researchers studied kidney function and HDL cholesterol levels in more than 1.7 million male veterans from October 2003 through September 2004.
Researchers then followed participants until September 2013.
In the study, published in the Clinical Journal of the American Society of Nephrology, the researchers showed that both high and low HDL cholesterol levels were associated with an increased risk of dying among study participants with all levels of kidney function.
"Too low and too high are both associated with higher risk of death," Al-Aly said.
Whether maintaining intermediate HDL cholesterol levels may increase longevity will need to be explored in future studies, Al-Aly said.
|
<urn:uuid:4aa7e2ef-defd-4f55-8b94-6245ea829740>
|
{
"dump": "CC-MAIN-2020-10",
"url": "https://health.economictimes.indiatimes.com/news/diagnostics/excess-good-cholesterol-may-shorten-your-life/53666437",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146414.42/warc/CC-MAIN-20200226150200-20200226180200-00129.warc.gz",
"language": "en",
"language_score": 0.9614668488502502,
"token_count": 264,
"score": 2.640625,
"int_score": 3
}
|
A dental office is comprised of a number of employment positions aside from the dentist. Most offices include dental hygienist, a receptionist or a laboratory technician. Larger practices employ surgical specialists such as endotontists or maxillofacial surgeons. Offices also employ administrative professionals to manage insurance payments, payroll and other human resource matters.
Dentists must attend dental school following the completion of an undergraduate degree and must maintain state licensure. The role of the dentist is to diagnose and treat problems with the teeth, gums and other parts of the mouth. This can include teeth cleanings, treatment of infections, taking X-rays and educating patients about how best to avoid tooth decay. The median wage for dentists in 2010, according to the U.S. Bureau of Labor Statistics, or BLS, is $146,920.
While in dental school, students can choose to follow a specialty path toward becoming an oral surgeon. Endodontists specialize in problems with the root canal and are experienced in removing the blood supply to an injured or infected tooth. Maxillofacial surgeons specialize in surgery to the mouth, jaw, gums, teeth, neck or head, including repairs to a cleft lip or palate. Orthodontists focus on straightening teeth, while a periodontist treats patients with issues affecting the bones supporting the teeth.
The most routine procedure offered at your dentist's office is the annual teeth cleaning. In most facilities, this is performed by a dental hygienist, followed by an examination by your dentist. Hygienists use tools to remove plaque and tartar buildup and many are qualified to perform X-rays and imaging on the teeth. Hygienists track patient care and instruct patients about proper flossing and brushing. The median annual wage of a dental hygienist is around $68,250, according to the BLS.
Your dentist's receptionist is responsible for answering the phone, setting up appointments and taking payment from patients after appointments conclude. The office likely also employs an office manager responsible for the administration of payroll and accounting tasks. Administrators also must properly maintain patient records and adhere to confidentiality laws regarding patient information. Working with insurance providers is an important administrative task in a dental office. According to the BLS, receptionists earn around $25,240 per year.
- Creatas Images/Creatas/Getty Images
|
<urn:uuid:d4ceee0b-aa21-44e5-9913-2fe612a0557d>
|
{
"dump": "CC-MAIN-2015-06",
"url": "http://work.chron.com/dental-office-job-descriptions-13982.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422121833101.33/warc/CC-MAIN-20150124175033-00203-ip-10-180-212-252.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9406546354293823,
"token_count": 489,
"score": 3.140625,
"int_score": 3
}
|
Definición de market cross en inglés:
A stone cross situated in the marketplace of a British town.
- The green west of the church was then the market place, and the market cross, standing on five steps, is a rare survival.
- The pilgrimage procession sets out from in front of St John's church, proceeds down the High Street, past the market cross and into the Abbey.
- Perhaps significant, the market cross, the place where buyer and seller came together to finalize a deal with a handshake, where the abstract became humanized, still remains.
¿Qué te llama la atención de esta palabra o frase?
Comments that don't adhere to our Community Guidelines may be moderated or removed.
Most popular in the US
Most popular in the UK
Most popular in Canada
Most popular in Australia
Most popular in Spain
Most popular in Malaysia
Most popular in India
Most popular in Pakistan
|
<urn:uuid:e0bf3f90-03a6-4301-894e-748a770fbe54>
|
{
"dump": "CC-MAIN-2014-49",
"url": "http://www.oxforddictionaries.com/es/definicion/ingles/market-cross",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931009825.77/warc/CC-MAIN-20141125155649-00144-ip-10-235-23-156.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8750867247581482,
"token_count": 203,
"score": 2.71875,
"int_score": 3
}
|
opens IMAGE file Liposuction remains among most frequently performed cosmetic procedures performed in the world, and its popularity can largely be attributed to how body proportions and contours for both men and women can be significantly improved through with lipo. Yet, despite its popularity, there are still a lot of persistent myths surrounding liposuction, primarily that it’s a substitute for weight loss. In reality, your existing weight and BMI are major contributors to determining whether you’re even a candidate.
Understanding Your BMI
BMI stands for body mass index and is determined using the ratio of height compared to weight. Depending on your BMI, you can be categorized on a predetermined scale that ranges from underweight to obese. Although some doctors dispute the accuracy of the BMI scale because it doesn’t account for the fact that muscle weighs more than fat, BMI is often used by medical professionals to determine whether or not a person is at a “normal” weight.
It’s no secret that society, as a whole, is more overweight than ever before, which is one of the opens in a new windowreasons more patients are asking for liposuction. However, liposuction may not be an option for everyone.
The Role of Lipo
Patients should understand that liposuction is a body contouring procedure designed to address specific problem areas. A BMI of 30 or greater indicates that a person falls into the category of medically obese and will not be a good candidate for liposuction. However, if you’re at a healthy weight (defined as a BMI between 18.5–24.9 according to the opens in a new windowU.S. Department of Health and Human Services), or even if you just have a little more weight to lose, you’re more likely to be a good candidate for lipo and see better results.
|
<urn:uuid:f3fce358-2e6d-4a13-bf94-40fb3efd58f4>
|
{
"dump": "CC-MAIN-2020-50",
"url": "https://www.ravebabe.com/do-you-have-the-best-bmi-for-liposuction/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141191511.46/warc/CC-MAIN-20201127073750-20201127103750-00620.warc.gz",
"language": "en",
"language_score": 0.9506918787956238,
"token_count": 383,
"score": 2.625,
"int_score": 3
}
|
A Beginner's Guide to D/The Basics/The Structure of D
This section assumes that you have read an introduction to programming in general, and know what a program is, and what source code is.
Fundamentally, a computer program is a series of instructions for a computer to perform. This is true of everything from a text editor to a 3D game. At its lowest level (the Central Processing Unit), a computer has a set of instructions that it can perform. Although this set of instructions is a programming language, it has a number of problems that make it difficult to use for common programming. Because of this, there are programming languages which are more expressive, and give the programmer an easier means of writing programs, such as D. A compiler is a program that converts code written in such a programming language into the language a computer can use (called machine code).
Many programming languages, including D, are expressed as a series of instructions, to be performed in order. This concept is easy for both a computer and a human to grasp. In D, these instructions are called statements.
A statement is a (possibly very complicated) instruction to the computer. A single statement ends with a ';' (semicolon), and any number of statements can be put immediately after each other, so long as they each end with a ';' (semicolon). So, the series of statements 'a', 'b', 'c' is written as:
a; b; c;
This code will cause the program to perform hypothetical instructions 'a', 'b' and 'c', in that order.
There are many types of statements, each of which serves a different purpose.
It's very important for a program to be able to store information. In D (and most programming languages), a location to store information is called a variable. There are several types of variables, and which type should be used depends on what sort of information the variable is supposed to store.
To use a variable, you first have to declare it. Declaring a variable simply designates space to store it, and associates a name you supply with that space. A variable declaration is a statement, with the type and name of the variable being declared. All of the types of variables will be introduced in later sections; for the moment only two will be introduced:
|Type||What it is|
|int||A number, such as 1, 2, 3, 0, -4, -3, etc. Cannot have a decimal, such as 1.1, 2.025.|
|float||A number, such as 1.1, 2, 3.141, 0, -4.15, -3, etc.|
To declare a variable named 'foo', of the type int, use the following statement:
Of course, this can be changed for any type or name, with the general format:
A variable isn't very useful if you can't store something there. Storing a value in a variable is called assigning the value to the variable. A variable can only have a value assigned to it after it has been declared, as mentioned above. The following statement will assign the value 5 to the variable 'foo':
foo = 5;
Any variable can be assigned any value like this, with the general format:
variable = value;
Math in D is straightforward. + is used for addition, - is used for subtraction, / is used for division, and * is used for multiplication. To add two numbers, you simply put a + between them, like so:
2 + 2
The order of operations is the same as in math. That is, * and / are done before + and -. So, 2 + 2 * 2 is 6, not 8. You can change this by using ( and ) (parenthesis). Anything inside parenthesis will be done before anything outside of them; again, as in normal math. While 2 + 2 * 2 is 6, (2 + 2) * 2 is 8.
Math like this can be used most anywhere that a simple value could be used, including in assignment:
foo = 2 + 2;
The above assigns the value 4 to the variable 'foo'.
Furthermore, as in algebra, you can use variable names instead of numbers in math. If there is a variable 'bar', 'foo' can be assigned a value of 'bar's value plus two with:
foo = bar + 2;
The difference between the types mentioned above can make division produce unexpected results. If both numbers (operands) are ints, the resulting value will be an int as well. For example, if you write the following division:
1 / 2
the result will be an int. The result is rounded down, so the result is not 0.5, but 0!
To avoid this, you can force one value to be a float:
1 / 2.0
Since a decimal point is included, the 2.0 is interpreted as a float, so the whole operation is now calculated as float and results in 0.5.
Any non-trivial program should, like any other non-trivial task, be subdivided into small pieces.
Washing a car can be subdivided into first cleaning the hood, then washing the windows, cleaning the rims, etc. You may need different tools, techniques and cleansers for each sub-cleaning, and you may subdivide some of these tasks even further because they are too complicated. Fundamentally, computers are quite stupid: they must have all of this subdivision and instruction done by a human, for them. A human brain does this task subdivision nearly automatically for fairly complex tasks.
Technically, functions in D encapsulate a group of statements to perform a more abstract task than a single statement could do. One or more of these statements can in turn be function calls (use of a function).
Functions helps to organize a program. In the car-wash example, you can write one function for cleaning a car window, and while you write it you don't have to think about other parts of the car.
Later, when you call (use) it in another function to clean the whole car, you don't have to remember how the cleaning of the window works in detail, as the "clean window" function "knows" these details already.
The actual structure of functions and calls will be discussed in a later chapter.
[TODO: Tighten up this section] One last topic to discuss is comments. Comments are parts of your source code file that you tell the D compiler to ignore. They are useful because it lets you document your code in the code itself, or remove parts of your code for testing purposes (known as commenting out code). D has three basic types of comments: line comments, non-nesting block comments, and nesting comments.
Line comments are very simple. They are begun by two slashes (//) and ended at the end of a line. They are mainly used for documenting or commenting out single lines of code. Non-nesting block comments start with a slash and an asterisk (/*) and end with an asterisk and slash (*/). They can span multiple lines, but they do not nest, or allow multiple levels, which means that even if you have more than one /* comment opener, it only takes a single */ comment closer to close them all. These comments are mainly used for documenting entire sections of code. The last type of comments, nesting comments, work like block comments excep they do nest and are deliminated by a slash and plus-sign (/+) and plus-sign and slash (+/). The following example is designed to show off the features of comments, and should not be taken as an example of the best use of them.
number = 5; //Number is set to 5 //number = 6; //We don't want number set to 6 /* The next section of code subtracts one from number and assigns that value to number2 */ number2 = number - 1; //The following lines demonstrate nesting vs. non-nesting comments: /+ This type of comment /+ Can /+ nest +/ ... +/ still in comment +/ /* This type cannot /* nest */ number = 7; //number is now set to 7
|
<urn:uuid:63edb0f1-34ad-4f73-ad61-f04d666e5977>
|
{
"dump": "CC-MAIN-2017-30",
"url": "https://en.wikibooks.org/wiki/A_Beginner%27s_Guide_to_D/The_Basics/The_Structure_of_D",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425193.20/warc/CC-MAIN-20170725122451-20170725142451-00593.warc.gz",
"language": "en",
"language_score": 0.9307017922401428,
"token_count": 1729,
"score": 4.5625,
"int_score": 5
}
|
Sometimes when people go out in the field to study nature, they find that nature wants to study them (or their equipment) right back.
This is what some researchers found when three curious polar bears approached their vessel out on the arctic Beaufort Sea this summer. The researchers were students and oceanographers from various Canadian universities doing research in order to better understand climate change. A cable that they use to take samples was extended into the water when three polar bears showed up and started doing some basic experiments of their own.
While such a sighting is generally breathtaking, it sent the researchers into a panic—especially when the bears started gnawing on equipment valued at over $200,000. In the video, they can be heard yelling at the bears to go away. After all, if the equipment had been damaged, their research expedition might have been ruined.
“It would have really damaged the potential for us to continue working on the expedition.” Jay Cullen, a chemical oceanographer with the University of Victoria, told the CBC. Fortunately, the animals left shortly after the video was taken, leaving the equipment undamaged.
The bears’ comfort in the water is truly remarkable, and they don’t seem aggressive—merely curious. It’s an amazing look at a highly adapted animal in its natural habitat.
The research expedition, known as Geotraces 2015, keeps a blog and documents events like polar bear sightings. You can check it out on their website.
|
<urn:uuid:e4424cf2-68d6-45c8-a055-2505b5c352c3>
|
{
"dump": "CC-MAIN-2019-13",
"url": "https://cottagelife.com/general/curious-polar-bears-swim-up-to-canadian-researchers-boat-gnaw-on-their-equipment/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203842.71/warc/CC-MAIN-20190325072024-20190325094024-00494.warc.gz",
"language": "en",
"language_score": 0.9752287268638611,
"token_count": 306,
"score": 2.875,
"int_score": 3
}
|
Spot the difference - domestic, stray or feral?
If you saw a cat walking down your street, or in your garden, would you be able to identify it as a domestic, stray, or feral cat?
Many people can often recognise a domestic cat by its collar, friendly personality, or its well-fed body. However, when it comes to a stray or a feral, the differences can be
harder to spot. Here’s how you can tell which is which.
A stray cat is one that has become lost, abandoned, or separated from its family. In essence, it once had an owner, and regular meals, but now lives amongst a cat population. It relies on rubbish bins and the generosity of strangers to survive, and will usually look a little thin and dirty.
Some stray cats can be anxious and standoffish, but it’s not uncommon for them to warm up quite quickly to people once they receive a regular source of food from them. If you come across a stray, try to catch it and take it to your local animal shelter for care, treatment, and possible adoption.
A feral cat, by definition, is a cat that has avoided human contact and is not friendly. They are born to wild parents, and rely on their own hunting and scavenging skills to survive. They are tough, lightning quick, often disease-ridden, and can elude capture well.
According to the Australian Veterinary Society feral cats are responsible for the extinction of
seven types of mainland mammals.
While owners can keep tabs on domestic cats, and limit their destruction on native wildlife and habitat, it’s not as easy with stray and feral cats. If you find yourself in a position to help trap or catch these cats, then get in touch with your local animal shelter to see what help they require.
|
<urn:uuid:1ddde32b-c76b-49ca-ae50-ff2cf6825745>
|
{
"dump": "CC-MAIN-2024-10",
"url": "https://www.northhillvet.com.au/news/details/spot-the-difference---domestic-stray-or-feral",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474377.60/warc/CC-MAIN-20240223085439-20240223115439-00851.warc.gz",
"language": "en",
"language_score": 0.9643836617469788,
"token_count": 375,
"score": 3.09375,
"int_score": 3
}
|
Individuals can use financial services to smooth their consumption, absorb unforeseen shocks and make household investments. While much received work on financial inclusion focuses on its benefits for individuals, it is also useful to the economy at large. Greater access to accounts can result in a larger deposit base for banks or one that is more resilient in times of financial stress. Globally, about 2.5 billion people are unbanked, though the unbanked number has come down to 1.3 billion in 2017.
Supply-side factors point to insufficient progress in branching or outreach, while demand-side factors emphasise distrust of financial institutions, varying financial behaviour and insufficient financial literacy. The financial market in the emerging countries has remained underutilised due to the information gap between consumers’ financial service providers arising out of financial illiteracy. To bridge the gap in information asymmetry, the Reserve Bank of India (RBI) has launched an initiative in 2007 to establish Financial Literacy and Credit Counselling Centres throughout the country. But how does higher financial literacy translate into greater wealth for an individual?
Financial literacy has been proven to affect both saving and investment behaviour, and debt management and borrowing practices and also higher financial literacy are more likely to lead to planning for retirement, probably because they are more likely to appreciate the power of interest compounding and are better able to do calculations. In the context of India, financial literacy varies state- and district wise. The level of financial literacy can be inspected using financial knowledge, financial behaviour and financial attitude (OECD 2011).
Our article contributes to literature by providing in-depth analysis on the order choice of agents for financial inclusion process and evolution of the financial inclusion in India. It also contributes to the existing literature on macro-behaviour arising out of agent’s micro-motives in a distinct way. We see the impact of technology adoption and spatial inclusion explained in methodology section in detail. We find a negative relationship between supply-side constraints and usage of banking services, suggesting low access to financial services in time and space, which stands as a hindrance in financial inclusion. Financial inclusion is not evenly distributed throughout the country, and hence, it is subject to considerable spatial inequalities. Cartographic representations and symbol maps enable us to visualise the extremely heterogeneous situation of financial inclusion.
Financial inclusion in India is defined ‘as the process of ensuring access to financial services and timely and adequate credit where needed by vulnerable groups such as the weaker sections and low-income groups at an affordable cost’ (Rangarajan Committee 2008). In 2014, the country was host to the world’s largest financial inclusion intervention called the Pradhan Mantri Jan Dhan Yojana (PMJDY) scheme, which was the latest, and undoubtedly largest, intervention in a long list of reforms aimed at increasing financial inclusion. Financial inclusion in India is now mandated, that opens up new challenges for getting bank accounts to the poor. Having access to a banking account generally qualifies a household or individual to be designated as financially included. Individuals with bank account ownership has witnessed a huge structural change in India, starting at 35% bank account ownership in 2011 to 80% ownership in 2017 (World Bank 2017).
|
<urn:uuid:d986f8d5-c846-400a-8da7-576827ed1667>
|
{
"dump": "CC-MAIN-2021-49",
"url": "http://blog.sagepub.in/2021/10/banking-or-under-banking.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363189.92/warc/CC-MAIN-20211205130619-20211205160619-00507.warc.gz",
"language": "en",
"language_score": 0.9399617314338684,
"token_count": 656,
"score": 3.40625,
"int_score": 3
}
|
The Battle Over Discrete Math and Its Applications and How to Win It
What You Need to Know About Discrete Math and Its Applications
Though many of the fundamental combinatorial results were obtained mainly by ingenuity and in depth reasoning, the modern theory has developed into a significantly deeper theory with a systematic and effective toolkit. Additionally, it’s a science of calculation involving using number and symbols. Not understanding the proof was not an option.
To start with, you can attack how the random numbers are generated. Perhaps you only have to be able to spell out a few regular algorithms at a dinner party. Check out whether you’re able to turn the page with some arrow keys or click a specific portion of the display, apart from utilizing the mouse to control everything.
It’s quite a powerful and all-natural process to represent optimization issue. www.ozessay.com.au/dissertation-writing-service The objective functions will be dependent on the view of the model’s user. Commonly referred to as backpropagation, it is a procedure that isn’t as complex as you might think.
Sure, it wouldn’t influence the program, but will be the important component in deciding the truth of the specific same. The previous model that has to be designed at the end of the project is the previous piece in the jigsaw, which means there cannot be any redundancies in it. In order to compute the opportunity of a specific event happening you have to be able to count all the potential outcomes.
The indication of a great mathematics problem is multiple solution paths offering students the opportunity to experiment with different approaches. Definition is crucial to proper communication of ideas in the topic. This question can be hard to answer as https://www.seas.harvard.edu/news/2016/10/3d-printed-heart-on-chip-with-integrated-sensors it involves many different varieties of evaluation.
Students that don’t have a discrete math background will be at an important disadvantage in these types of contests. Discrete math is utilized in selecting the most on-time route for any given train trip in the united kingdom. Mathematics has an indispensable role in answering every one of these questions.
If you wish to be serious about becoming a really superior software developer, you should study discrete math sooner or later. Each programming language is nice and beneficial for specific jobs. Additional or alternate topics might be included based on the interest of students.
It will be helpful to have an excellent eBook reader as a way to truly have a fantastic reading experience and higher high quality eBook display. What’s more, the book offers tons of examples for every one among its theorems and topics. Additionally, it provides a lot of examples for each of its theorems and topics.
Whether you’re set on getting an ebook or handbook, the decision is all yours, and there are quite a lot of alternatives for you to choose from so you don’t will need to pay a visit to another site. There’s no required textbook for this class. It is intended to provide students with an understanding of these areas and their use in the field of Information Technology.
C Working in groups, students produce and explain an acceptable means of sharing mathematics. All problems are randomized to stop sharing of answers and might also be in possession of a multi-step solution which will help move the college students’ learning along should they experience difficulty. They should be exposed to the basic ideas and encouraged to take further courses.
Things You Won’t Like About Discrete Math and Its Applications and Things You Will
These books are created freely available by their various authors and publishers. Machine languages are more difficult to understand and operate. Literacy goes far beyond the simple disciplines.
Students should have the ability to identify a great proof, and ought to have the ability to construct proofs of their very own. College Algebra is the sole explicit prerequisite. The very first midterm is going to be on February 28.
Locating an amazing approximate for the function is quite hard. Secondly, you are going to be in a position to download Discrete Math And Its Applications Solutions Manual pdf in only a couple of minutes, meaning that you’re able to spend your time doing something you like. To be true, both parts would need to be true.
Discrete Math and Its Applications Can Be Fun for Everyone
If you own a question, your very best alternative is to post a message to the newsgroup. You may even take advantage of completely free software that may supply the readers that have many functions to the reader than simply a very simple platform to read the desired eBooks. Open the first 3 links you get on Google search.
Information procured from a press characterization is utilized to establish print reproduction parameters for a particular press, substrate, and ink collection. Throughout history, a growing number of accurate mathematical models are developed. In the other direction, it is exceedingly desirable in order to construct random-like graphs.
Therefore you may select the format that’s most suitable to you. There are a lot of distinct operations which may be performed on binary trees. To begin with, pattern languages try to tackle relationships explicitly.
It will be useful to truly have a good eBook reader to be in a position to have a great reading experience and premium quality eBook display. In the other direction, it’s exceedingly desirable as a way to construct random-like graphs. If you want to take part in contributing to the book, you are going to want to use git.
|
<urn:uuid:ab00a3e7-8f8e-43e6-85fe-be1f5fb1a4e2>
|
{
"dump": "CC-MAIN-2019-22",
"url": "http://spacedesign.website/2019/03/06/the-battle-over-discrete-math-and-its-applications-and-how-to-win-it/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258862.99/warc/CC-MAIN-20190526065059-20190526091059-00187.warc.gz",
"language": "en",
"language_score": 0.9451802372932434,
"token_count": 1154,
"score": 2.609375,
"int_score": 3
}
|
The wild turkey is the largest of North America's game birds.
Adult males, known as toms, or gobblers, normally weigh between 16 and 24 pounds.
Females, known as hens, are smaller than males and usually weigh between 8 and ten pounds.
(Females feathers are) drab, usually brown or gray. They make great camouflage and hide the hens when they sit on their nests.
The largest wild turkey on record weighed 37 pounds.
Wild turkey tails are usually 12 to 15 inches long and are banded at their tips. The color of the bands in the tail varies by subspecies.
Male wild turkeys fan their tails when displaying to attract a mate.
Visit the National Wild Turkey Federation at http://www.nwtf.org/
|
<urn:uuid:5de7834f-159a-48ff-a479-0590db132dbb>
|
{
"dump": "CC-MAIN-2013-20",
"url": "http://arizonawildlife.org/Articles.php?action=detail&g=content1238715345",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382185/warc/CC-MAIN-20130516092622-00068-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9456079602241516,
"token_count": 164,
"score": 2.75,
"int_score": 3
}
|
If sleepwalking is a problem for you or your child, try these suggestions.
- Make the environment safe for sleepwalking. If sleepwalking has led to injuries or has the potential to do so, consider some of these precautions to prevent injury: Close and lock all windows and exterior doors at night. You might even lock interior doors or place alarms or bells on the doors. Block doorways or stairways with a gate, and move electrical cords or other objects that pose a tripping hazard. Sleep in a ground floor bedroom, if possible. Place any sharp or fragile objects out of reach, and lock up all weapons. If your child sleepwalks, don't let him or her sleep in a bunk bed.
- Get more sleep. Fatigue can contribute to sleepwalking. If you're sleep deprived, try an earlier bedtime, a more regular sleep schedule or a short nap, especially for toddlers.
- Establish a regular, relaxing routine before bedtime. Do quiet, calming activities before bed, such as reading books, doing puzzles or soaking in a warm bath. Meditation or relaxation exercises may help, too.
- Put stress in its place. Identify the issues that cause stress, and brainstorm possible ways to handle the stress. Talk about what's bothering you. Or if your child seems anxious or stressed, talk with him or her about any concerns.
- Look for a pattern. For several nights, note ― or have another person in your home note ― how many minutes after bedtime a sleepwalking episode occurs. If the timing is fairly consistent, this information is useful in planning anticipatory awakenings.
Try to be positive. However disruptive, sleepwalking usually isn't a serious condition — and it usually goes away on its own.
July 31, 2014
- Sleep-wake disorders. In: Diagnostic and Statistical Manual of Mental Disorders DSM-5. 5th ed. Arlington, Va.: American Psychiatric Association; 2013. http://www.psychiatryonline.org. Accessed April 29, 2014.
- Carter KA, et al. Common sleep disorders in children. American Family Physician. 2014;89:368.
- Sleep-wake disorders. American Psychiatric Association. http://www.dsm5.org/Pages/Default.aspx. Accessed April 30, 2014.
- National sleep disorders research plan. National Heart, Lung, and Blood Institute. http://www.nhlbi.nih.gov/health/prof/sleep/res_plan/section5/section5f.html. Accessed April 30, 2014.
- Sleepwalking. National Sleep Foundation. http://sleepfoundation.org/sleep-disorders-problems/abnormal-sleep-behaviors/sleepwalking/page/0%2C1/. Accessed April 30, 2014.
- Kotagal S. Sleepwalking and other parasomnias in children. http://www.uptodate.com/home. Accessed April 30, 2014.
- Labelle MA, et al. Psychopathologic correlates of adult sleepwalking. Sleep Medicine. 2013;14:1348.
- Ebrahim IO. The nonrapid eye movement parasomnias: Recent advances and forensic aspects. Current Opinion in Pulmonary Medicine. 2013;19:609.
- Olson EJ (expert opinion). Mayo Clinic, Rochester, Minn. May 7, 2014.
- Sibler MH (expert opinion). Mayo Clinic, Rochester, Minn. May 16, 2014.
- Sateia M. International Classification of Sleep Disorders. 3rd ed. Darien, Ill.: American Academy of Sleep Medicine; 2014. http://www.aasmnet.org/EBooks/ICSD3. Accessed May 9, 2014.
- Kotagal S (expert opinion). Mayo Clinic, Rochester, Minn. May 19, 2014.
|
<urn:uuid:73a806c3-2c92-4f72-bbba-5454eac2ec8f>
|
{
"dump": "CC-MAIN-2016-30",
"url": "http://www.mayoclinic.org/diseases-conditions/sleepwalking/basics/lifestyle-home-remedies/con-20031795",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824201.28/warc/CC-MAIN-20160723071024-00199-ip-10-185-27-174.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8432297706604004,
"token_count": 802,
"score": 3.203125,
"int_score": 3
}
|
Gettysburg National Military Park Museum
Faces of Gettysburg
LocationGettysburg National Military Park, Gettysburg, PA
Exhibition DesignGallagher & Associates
The museum’s growing collection of portraits of soldiers and civilians who experienced the Battle of Gettysburg are featured in this searchable database.
Visitors can browse through hundreds of archival images to see the faces and learn the identity of those portrayed and present at the battle. The portraits can be filtered by Union or Confederate affiliation, and individuals can be searched by army, state, regiment, or rank. While the interactive helps visitors learn more about the faces of those present at Gettysburg, a digital accompaniment to images filling a wall within one of the galleries, the backend database and content management system empower the staff to continue to add new images continually donated to the museum.
Press & AwardsHOW, Interactive Design Awards, Merit, Kiosks, 2009“New Museum Guides Visitors Through Gettysburg,” Associated Press, Martha Raffaele, April 23, 2008
Interactive touches—both high- and low-tech—are scattered throughout the museum...Visitors can touch a replica of slave shackles and find out for themselves how heavily a soldier’s backpack weighed him down. Using touch-screen computers, they can learn how to recognize bugle calls, decode signal corps flag messages, and locate battlefield monuments.“Center Designed to Put Gettysburg into Perspective,” Baltimore Sun, Edward Gunts, April 14, 2008
The visitor center has been designed to immerse visitors in the Gettysburg story by exposing them to the National Park Service’s extensive collection of war objects, artifacts and archival materials, as well as interactive exhibits and displays that will prepare them to tour the areas where the fighting took place.“At Last, a Gettysburg Redress,” Washington Post, Philip Kennicott, April 14, 2008
The historical galleries next to the theaters are very much in line with the contemporary trend toward media-dense exhibits, filled with shorter films in mini-theaters, all carefully structured to draw the viewer through ‘a narrative’ presentation of the war, its causes and its aftermath.“Reinforcing History,” Philadelphia Enquirer, Amy Worden, April 13, 2008
In another area, visitors can tap computer stations to see whether their ancestors fought here and follow troop movements on a touch screen.
- Martin Linde, Gary Huck
- Technology Director
- Thomas Wester
- Jeremy Brown, Zach Archer, John Hutchison
- Jennifer Guibord
- Production Artists
- Christen Hubbard
- Production Assistants
- Erica Dillon, Shane Farrell
- Quality Assurance
- Erica Dillon
- A/V Integration
- Exhibit Design
- Gallagher & Associates
© 2014 Second Story, Inc.
|
<urn:uuid:cf289085-744f-47dc-b1b6-39ab82cb2226>
|
{
"dump": "CC-MAIN-2014-41",
"url": "http://www.secondstory.com/project/browse/playlist/collection-databases/faces-of-gettysburg?offset=23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037662882.4/warc/CC-MAIN-20140930004102-00269-ip-10-234-18-248.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.869186520576477,
"token_count": 588,
"score": 2.53125,
"int_score": 3
}
|
The middle class is a class of people in the middle of a societal hierarchy. The middle class is the broad group of people in contemporary society who fall socio-economically between the working class and upper class.
How big is the middle class in India?
According to McKinsey those who earn between Rs 200,000 and Rs 1,000,000 qualify to be in the middle class. India is expected to have a whopping 600 million middle class population by 2030.
Some interesting numbers from the Outlook article,
- 150 million earn between Rs 340,000 and Rs 1,700,000 per annum. Year on year this segment is growing by 13%.
- 800 million earn between Rs 45,000 and Rs 340,000 per annum. Year on year this segment is growing by 3.2%.
- 89% of tax payers earn less than Rs 500,000 (about $10k) per annum. The maximum tax burden is on the lower middle class (earning between Rs 200,000 and Rs 500,000)
- Corporate India gets subsidies worth Rs 500,000 crore, food subsidy alone is Rs 75,000 crore per annum.
- Middle class gets about Rs 45,000 crore as tax relief.
- With the rising cost of living middle class has cut down on taking loans. It has reduced from 17% in 2010-11 to 12.1% in 2011-12. Sectors like real estate and auto would be seriously hit.
- Now the worrying number: Household saving rate has reduced from 25.4% in 2009-10 to 22.8% in 2010-11. This is mainly happening because families are eating into savings to maintain lifestyles.
|
<urn:uuid:a2f95b28-0a4b-4e38-b64a-5fb8d9e28751>
|
{
"dump": "CC-MAIN-2021-10",
"url": "https://www.mahesh.com/etc/sharp-fall-in-savings-of-the-middle-class-in-india",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178362133.53/warc/CC-MAIN-20210301060310-20210301090310-00417.warc.gz",
"language": "en",
"language_score": 0.9454726576805115,
"token_count": 350,
"score": 2.984375,
"int_score": 3
}
|
At present, there are 7.6 billion humans living on this planet — and counting. And while the surface of the planet might be 71 percent water, only 2.5 percent of that water is freshwater (i.e. some rivers and lakes, groundwater and surface water), and only 0.3 percent of the total water is potable.
According to the Groundwater Association (NGWA), humans typically stick to surface and groundwater, of which we use nearly 321 billion gallons of surface water per day and almost 77 billion gallons of groundwater per day.
That’s a lot.
But as we’ve talked about before, it’s not just humans that need to drink a lot of water to survive — it’s also plants, animals, entire industries, even.
The most important point, however, is that the Earth’s water is a closed system — meaning it cycles from solid to liquid to gas — and because of that, it is a limited resource. And while it does cycle from the air to the sea, to our rivers and more, it also means that water scarcity issues will become more of a local problem as the population increases, the climate changes, and industries expand to accommodate more people and resources.
So how does exponential population growth affect access to fresh water, how much of this resource do we have left, and what can we do about it?
How Exponential Population Growth Affects Access to Fresh water
First thing’s first. The world itself won’t run out of water. Let’s just get that out of the way. However, certain areas will be hit much, much harder by water scarcity than others, leaving the most vulnerable populations, well, vulnerable.
That being said, while exponential population growth isn’t the main reason we’re facing a looming water scarcity crisis (hint: climate change plays a massive role), it certainly doesn’t help.
It’s predicted that by 2023, the Earth’s population will reach 8 billion, and 9.7 billion by 2050. By continent, here are the latest figures, calculated in mid-2017, along with estimations for 2030 and 2050:
- 4.5 billion – 2017 figure
- 4.9 billion by 2030
- 5.2 billion by 2050
- 1.2 billion – 2017 figure
- 2.5 billion by 2050
- 361 million – 2017 figure
- 395 million by 2030
- 435 million by 2050
Latin America & the Caribbean
- 646 million – 2017 figure
- 718 million by 2030
- 780 million by 2050
- 742 million – 2017 figure
- 739 million by 2030
- 716 million by 2050
With all that in mind, maybe a rephrasing is in order — experts aren’t worried so much about overpopulation as they are about overconsumption, and what that could mean for our Earth’s resources.
According to Fred Pearce, a specialist in global population, as interviewed for Prospect, “Rising consumption today far outstrips the rising headcount as a threat to the planet…The world’s richest half billion people — that’s about 7 percent of the global population — are responsible for half of the world’s carbon dioxide emissions,” says Pearce. “Meanwhile, the poorest 50 percent of the population are responsible for just 7 percent of emissions.”
How Much Water We Have Left
It might sound like we’re being dramatic when we talk about water as a finite resource, with availability scattered around the globe. Let’s face it, the world will never run out of clean drinking water. However, as we mentioned, there will be certain populations that have to go toe-to-toe with water scarcity.
Let’s dig into the basics: the water cycle. You probably learned about this in school, but water goes through a cycle of solid (ice), liquid (rain and water, as we know it), and gas (vapor) form. As it goes through liquid and rain gathers into rivers, it provides water for whole communities. However, this is also the exact point at which water collects contaminants.
According to the NGWA, “Chemicals that go into the water often are very difficult, if not impossible, to remove. One potential source of contamination of water is runoff, the overland flow of water. While precipitation causes the runoff to occur, stripping vegetation from land can add to the runoff in a particular area. The sediment and soil from these areas, not to mention any pesticides or fertilizers that are present, are washed into the streams, oceans, and lakes.”
Translation? As of right now, 1.1 billion people lack regular access to drinking water, with 2.7 billion unable to access potable water for one month out of every calendar year. This leaves the most vulnerable — children, pregnant women, the elderly and the immunocompromised — open to waterborne diseases, dehydration and more.
One thing that can help with that? A water filter. The Aquasana 3-Stage Max Flow Under Sink Water Filter reduces 15 times more contaminants than the leading pitcher. Plus, one set of Aquasana Claryum® filters gives you 20 times the capacity of the leading gravity-based pitcher, so you can prevent even more plastic from entering the environment.
Climate Change, Not Overpopulation
That brings us to our final point. We touched on this earlier, but it’s important to reiterate. While exponential population growth does play into water scarcity, the absolute biggest factor is climate change. Climate change — an umbrella that covers both overpopulation and overconsumption — has helped increase drought, hurricanes, floods, wildfires and other natural disasters around the world.
Because of this, according to the World Wildlife Fund, “by 2025, two-thirds of the world’s population may face water shortages. And ecosystems around the world will suffer even more.”
For example, the impacts of drought have a ripple effect on the surrounding ecosystems, including lower crop yields, limited access to clean water for rural communities, a higher chance of wildfires (and thusly, floods), and a higher chance of water contamination from runoff and groundwater pollutants.
What Can Be Done About Water Scarcity?
We’ve touched on this before, but when it comes to water scarcity, there is (thankfully!) still a lot you can do, especially in your own home.
From eating less fish and meat (cut back on the production of methane gas and microplastics, as well as water used by the agricultural industry!), to regularly checking your home’s foundation for leaky pipes (faulty meters & crumbling pipes cost the U.S. nearly 2.1 trillion gallons in lost drinkable water each year!), there are a ton of small ways to conserve water that make a huge difference.
When it comes to water conservation, don’t let the idea of overpopulation scare you. There are many different ways to help ease the burden of clean drinking water and do your part — right in your own kitchen.
|
<urn:uuid:a3f67d7f-62b2-4e54-b4fa-869f5e0fdb1e>
|
{
"dump": "CC-MAIN-2023-40",
"url": "https://www.aquasana.com/info/how-exponential-population-growth-means-less-access-to-freshwater-pd.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510358.68/warc/CC-MAIN-20230928031105-20230928061105-00775.warc.gz",
"language": "en",
"language_score": 0.9394870400428772,
"token_count": 1498,
"score": 3.5,
"int_score": 4
}
|
The essential basis for the form of clothing is the human body. Clothing covers the body and takes shape in human scale. In “Protection,” John Flugel describes clothing as protection against physical danger. The idea of wearing clothing for protection is more directly related to the need in cold climates, evident in the use of fur.
Fur in 1900 and 2009 by Dennis Basso. Wile fur is still used to cover the body the meaning has changed due to contemporary interest in animal rights.
Most people however wear more clothes each day than they actually need for protection . We have also sought clothing for protection from enemies such as armor. There are also examples of clothing which is intended to protect from sporting accidents or animal threat.
13th century European Crusades metal armor compared with 19th century Korak fiber and metal armor.
Dolce & Gabbana S 2007 and Hussein Chalayan, S 2000
From protection to ornament
Michael Kors F 2009 and Chanel Haute Couture SS 2009
Fugel also describes clothing as protection against imaginary dangers such as magic or spirits. The author speculates that some of the first clothing may have been ornamental items to protect from negative psychological threats. He suggests that clothing began as a utilitarian thing but like art it gradually was transformed into decorative. The idea of clothing with psychological power – such as luck or supernatural blessing – is still practiced by some.
We widely associate certain aspects of clothing with certain personalities. Soft collars are for soft people while firm collars are for firm business men. Black is associated with evil and white with innocence while color coordinates to emotional expression. Covering the body is modest. Thick and stiff clothing suggests protection and uprightness. Tightness varies by how much it reveals of the body.
Clothing also provides a comfort, putting personal things closest to the body. We are inclined to cover ourselves with unnecessary outerwear when we are not comfortable or feel our clothing is not like those around us. The author also suggests that our love needs may also be expressed by how much clothing we wear or our feelings of hot or cold. Clothes are womb like in their complete coverage. Clothes are also more commonly associated with the formation of the concept of mother and woman.
Georg Simmel was a German sociologist who was one of the first to identify fashion as a social system in 1904.
|
<urn:uuid:17f51a5b-7f39-4bb8-a778-075e3ccb30dd>
|
{
"dump": "CC-MAIN-2018-09",
"url": "http://fashionandpower.blogspot.com/2010/02/fashion-protection-status.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813109.36/warc/CC-MAIN-20180220204917-20180220224917-00386.warc.gz",
"language": "en",
"language_score": 0.9660330414772034,
"token_count": 484,
"score": 3.375,
"int_score": 3
}
|
Parents with children at home should use ventilation when cooking with a gas stove, researchers from Oregon State University are recommending, after a new study showed an association between gas kitchen stove ventilation and asthma, asthma symptoms and chronic bronchitis.
"In homes where a gas stove was used without venting, the prevalence of asthma and wheezing is higher than in homes where a gas stove was used with ventilation," said Ellen Smit, an associate professor in the College of Public Health and Human Sciences at OSU and one of the study's authors. "Parents of all children should use ventilation while using a gas stove."
Researchers can't say that gas stove use without ventilation causes respiratory issues, but the new study clearly shows an association between having asthma and use of ventilation, Smit said. More study is needed to understand that relationship, including whether emissions from gas stoves could cause or exacerbate asthma in children, the researchers said.
Asthma is a common chronic childhood disease and an estimated 48 percent of American homes have a gas stove that is used. Gas stoves are known to affect indoor air pollution levels and researchers wanted to better understand the links between air pollution from gas stoves, parents' behavior when operating gas stoves and respiratory issues, said Eric Coker, a doctoral student in public health and a co-author of the study.
The study showed that children who lived in homes where ventilation such as an exhaust fan was used when cooking with gas stoves were 32 percent less likely to have asthma than children who lived in homes where ventilation was not used. Children in homes where ventilation was used while cooking with a gas stove were 38 percent less likely to have bronchitis and 39 percent less likely to have wheezing. The study also showed that lung function, an important biological marker of asthma, was significantly better among girls from homes that used ventilation when operating their gas stove.
Many people in the study also reported using their gas stoves for heating, researchers found. That was also related to poorer respiratory health in children, particularly when ventilation was not used. In homes where the gas kitchen stove was used for heating, children were 44 percent less likely to have asthma and 43 percent less likely to have bronchitis if ventilation was used. The results did not change even when asthma risk factors such as pets or cigarette smoking inside the home were taken into account, Coker said.
"Asthma is one of the most common diseases in children living in the United States," said Molly Kile, the study's lead author. Kile is an environmental epidemiologist and assistant professor at OSU. "Reducing exposure to environmental factors that can exacerbate asthma can help improve the quality of life for people with this condition."
The findings were published recently in the journal Environmental Health. Co-authors included John Molitor and Anna Harding of the College of Public Health and Human Sciences and Daniel Sudakin of the College of Agricultural Sciences. The research was supported by OSU.
Researchers used data from the Third National Health and Nutrition Examination Survey, or NHANES, conducted by the National Center for Health Statistics from 1988-1994. Data collected for NHANES is a nationally representative sample of the U.S. population.
The third edition of the survey is the only one in which questions about use of gas stoves were asked, Coker said. Participants were interviewed in their homes and also underwent physical exams and lab tests.
Researchers examined data from about 7,300 children ages 2-16 who has asthma, wheezing or bronchitis and whose parents reported using a gas stove in the home. Of those who reported using no ventilation, 90 percent indicated they did not have an exhaust system or other ventilation in their homes, Coker said.
Even though the study relies on older data, the findings remain relevant because many people still use gas stoves for cooking, and in some cases, for heat in the winter, the researchers said.
"Lots of older homes lack exhaust or other ventilation," Coker said. "We know this is still a problem. We don't know if it is as prevalent as it was when the data was collected."
Researchers suggest that future health surveys include questions about gas stove and ventilation use. That would allow them to see if there have been any changes in ventilation use since the original data was collected.
"More research is definitely needed," Coker said. "But we know using an effective ventilation system will reduce air pollution levels in a home, so we can definitely recommend that."
|
<urn:uuid:713acf5f-0d91-4d8f-b6b6-2f3bdc0d669b>
|
{
"dump": "CC-MAIN-2023-14",
"url": "https://www.medicalnewstoday.com/releases/283259",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948708.2/warc/CC-MAIN-20230327220742-20230328010742-00596.warc.gz",
"language": "en",
"language_score": 0.9750584959983826,
"token_count": 917,
"score": 2.9375,
"int_score": 3
}
|
AWAJI, Japan — It’s well documented at this point. Modern employees are feeling more stressed than ever. All of that work anxiety has prompted employers and companies to try out a variety of soothing activities for their employees, from morning meditation sessions to video games in the break room. Now, a new study identifies a charmingly simple solution. Researchers from the University of Hyogo in Japan say that small potted plants around the office can go a long way towards relieving employee stress.
It’s already been extensively proven that spending some time outdoors and around nature can do wonders for one’s overall mental health. Of course, office work makes it very difficult for the average employee to get his or her fill of green views. So, the research team wanted to investigate just how beneficial indoor plants can be for employees who are cooped up inside all day.
In an effort to produce as accurate results as possible, the study’s authors conducted their experiment in a real-life office setting and with actual employees, instead of a more scientifically traditional lab setting. More specifically, researchers wanted to determine just how much relief workers felt after intentionally looking at an indoor plant whenever they started to feel tired on the job. That being said, passive interaction with the plants were also considered.
“At present, not so many people fully understand and utilize the benefit of stress recovery brought by plants in the workplace. To ameliorate such situations, we decided it essential to verify and provide scientific evidence for the stress restorative effect by nearby plants in a real office setting,” explains study author Masahiro Toyoda in a release.
The research team observed workers’ psychological and physiological stress levels before and after a small plant was placed on each one of their desks. In all, 63 Japanese office employees took part in the research, and they were all instructed to take a short three minute break whenever they started to feel particularly tired or fatigued while on the job.
The experiment consisted of two parts: a control phase in which the employees worked normally without any plants in the office, and an experimental phase in which each employee was given a plant for their desk and told to maintain its health. Researchers then used a standard test to measure employees’ psychological stress levels. An overwhelming majority of employees displayed significantly lower pulse rates after taking a three minute break and interacting with their desk plant, indicating a noticeable drop in stress levels.
Researchers separated participating employees’ interactions with their plants into two categories, active (caring for their desk plant, intentionally looking at / interacting with it whenever they felt stressed) and passive (simply having the plant near their computer monitor throughout the work day). The authors found that just the sight of a plant alone has the power to help soothe an employee.
As far as which plants were placed on employees’ desks, each participant had a choice of six different options: san pedro cactus, foliage plants, kokedama, echeveria, air plants, or bonsai plants.
All in all, employees’ anxiety levels dropped considerably after the plants were introduced into the office. These findings held true across all age groups and it didn’t seem to matter which type the employees had on their desk.
So, if you find every day of work to be taxing on the mind, head to your local nursery. A little foliage friend may be just what the doctor ordered.
The study is published in the scientific journal HortTechnology.
|
<urn:uuid:2c6977df-206c-414a-8e4c-7804d706bce2>
|
{
"dump": "CC-MAIN-2023-50",
"url": "https://studyfinds.org/having-a-plant-on-your-office-desk-helps-reduce-daily-stress-study-finds/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100800.25/warc/CC-MAIN-20231209040008-20231209070008-00435.warc.gz",
"language": "en",
"language_score": 0.9665277600288391,
"token_count": 716,
"score": 2.609375,
"int_score": 3
}
|
The government of Denpasar City has announced that it will be prohibiting the use of plastic bags at stores starting in 2019. According to the Mayor Rai Mantra. this prohibition is under Denpasar Mayor Regulation No. 36 of 2018 Concerning the Reduction of the Use of Plastic Bags.
The stoppage of plastic bag use will be mainly applied in modern stores like supermarkets and convenience stores and also shopping centers. However, traditional markets will also be subject to this.
According to head of data collection and Denpasar City spokesman, I Wayan, Government of Denpasar City Government has been promoting the reduction of plastic bag use, and an effort is being made to distribute environmentally friendly bags on car-free day.
The goal of the plastic bag prohibition is anticipating the impact of plastic waste, especially since plastic is so difficult to decompose. This plastic bag prohibition is expected to have a positive impact, especially to face plastic problem in Bali of “garbage emergency” last year swamping a six-kilometer stretch of coast along the island.
|
<urn:uuid:eabde386-59cf-4dbe-92b4-616bc84d06fa>
|
{
"dump": "CC-MAIN-2020-24",
"url": "https://www.balisafestdriver.com/no-more-plastic-bags-at-store/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347413786.46/warc/CC-MAIN-20200531213917-20200601003917-00498.warc.gz",
"language": "en",
"language_score": 0.9496137499809265,
"token_count": 217,
"score": 2.546875,
"int_score": 3
}
|
The phrase “Emotional Intelligence” was defined with a specific meaning by psychology researchers John A. Mayer of the University of New Hampshire and Peter Salovey from Yale University in 1990. They published a paper titled, Emotional Intelligence” Imagination, Cognition, and Personality.
Emotional Intelligence was a phrase that became popular to the public in 1995 with the publication of the book Emotional Intelligence by Daniel Goleman. Daniel Goleman was a Harvard- trained psychologist who worked as a science writer for the New York Times.
Goleman was granted permission by the two researchers, who originally coined the term Emotional Intelligence, to use it for his own research. The book by Goleman took liberties with earlier comments made by both researchers, as well as several other theories related to Emotional Intelligence (Salovey, Mayer, & Caruso, 2000).
There are many theories in Emotional Intelligence. Most data presented is based on the belief that some people are born with a higher Emotional Intelligence than others, but that individuals can work to develop it in later years.
Most individuals are vulnerable to stress, but Emotional Intelligence affects how it is processed in the brain and then conveyed externally, which influences decisions.
- What is the definition of Emotional Intelligence?
Emotional Intelligence (EI) refers to the collection of abilities used to identify, understand, control and assess the emotions of the self and others (Salovey & Mayer, 1990). It is also referred to as emotional regulation or emotional control by some researchers (Nelis, Quoidbach, Hansenne, & Mikolajczak, 2008) It is the capability to use emotion judiciously.Salovey and Mayer (1997) revised the definition of Emotional Intelligence, as the following:Emotional Intelligence involves the ability to perceive accurately, appraise, and express emotion; the ability to access and/or generate feelings when they facilitate thought; the ability to understand emotion and emotional knowledge; and the ability to regulate emotions to promote emotional and intellectual growth (Salovey, Mayer & Sluyter, 1997).
Salovey and Mayer consider Emotional Intelligence to be based on abilities; they also determined it should be perceived as cognitive and psychological ability, which does not wholly deviate from general mental ability. Both Salovey and Mayer see the work of Goleman and others as a mixed model. The concept of the mixed model is that it is not just based on emotional ability, but includes personality attributes or traits of an individual (Salovey, Mayer, & Caruso, 2000).
- If a person increases his or her Emotional Intelligence will it influence how these stressors impact the life of this individual?
If an individual cannot observe, identify and regulate their emotions, it would appear they might be less satisfied with their life. When emotional intelligence is raised, it has been shown that stress, anxiety and even depression are alleviated.
- What are some characteristics of an Emotionally Intelligent Individual?
Salovey and Mayer further postulate that an emotionally intelligent individual is more open and agreeable than others. This individual possesses the ability to think through difficult emotions, problem solve about emotions, perceive emotions better, understand the meaning of emotions and manage others emotions. Usually an emotionally intelligent individual is more developed in social, verbal and additional intelligences. The emotionally intelligent person perceives, appraises and expresses emotion accurately and is able to discriminate between false, accurate or truthful information (Salovey, Mayer & Sluyter, 1997).
- Do emotionally intelligent individuals engage in self-sabotaging (or other) behaviors?
Emotionally intelligent people are normally not known to engage in self-destructive behaviors such as substance abuse or violence; they possess a high degree of social interactions and support (Salovey, Mayer, & Caruso, 2004).
- How does management of emotions, promote emotional and intellectual growth?
The mature person, who exhibits a higher level of Emotional Intelligence, becomes conscious of feelings at a level far beyond mere recognition. There is an opening to both pleasant and unpleasant feelings; through this consciousness an individual can learn something from the emotion. The next step is the ability to contemplate whether to disengage from or engage in an emotion, depending on its usefulness or utility. If an individual is upset, the choice can be to walk away from the situation and wait until a calmer mood prevails to address the issue. There are many philosophies which expound the recognition of and control of thoughts as a way to inner peace; if an individual is aware of their emotions it is possible to make a choice of whether to continue or extricate oneself from an emotion.
|
<urn:uuid:c07c2aa5-f173-4952-9571-dd15a48dc525>
|
{
"dump": "CC-MAIN-2019-47",
"url": "http://www.eqmentoring.com/faq-on-emotional-intelligence/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670162.76/warc/CC-MAIN-20191119172137-20191119200137-00545.warc.gz",
"language": "en",
"language_score": 0.9471662640571594,
"token_count": 968,
"score": 3.90625,
"int_score": 4
}
|
- Mandalay Palace
The Mandalay Palace (Burmese: မန္တလေး နန်းတော်, pronounced [máɴdəlé náɴdɔ̀]), located in Mandalay, Myanmar, is the last royal palace of the last Burmese monarchy. The palace was constructed, between 1857 and 1859 as part of King Mindon's founding of new royal capital city of Mandalay. The plan of Mandalay Palace largely follows the traditional Burmese palace design, inside a walled fort surrounded by a moat. The palace itself is at the centre of the citadel and faces east. All buildings of the palace are of one storey in height. The number of spires above a building indicated the importance of the area below.
The Mandalay Palace was the primary royal residence of King Mindon and King Thibaw, the last two kings of the country. The palace ceased being on 28 November 1885 when the British entered the palace and captured the royal family, officially ending the Third Anglo-Burmese War. The British looted the palace, and turned the palace compound into Fort Dufferin. Throughout the British colonial era, the palace was seen by the Burmese as the primary symbol sovereignty and identity. Much of the palace compound was burned down during World War II by allied bombing; only the royal mint and the watch tower survived. A replica of the palace was rebuilt in the 1990s with some modern materials.
Today, the Mandalay Palace is a primary symbol of Mandalay and a major tourist destination.
- 1 Names
- 2 History
- 3 Citadel
- 4 Palace grounds
- 5 On the palace platform
- 6 Gallery
- 7 References
- 8 External links
The Mandalay Palace's formal name in Burmese is Mya Nan San Kyaw (မြနန်းစံကျော် [mja̰ nán sàn tɕɔ̀]; "The Famed Royal Emerald Palace"). It is also known as ရွှေနန်းတော်ကြီး ([ʃwè nán dɔ̀ dʑí]), or the "Great Golden Royal Palace".
The Mandalay Palace was constructed as part of King Mindon's founding of Mandalay in February 1857. The master plan called for a 144-square block grid patterned city, anchored by a 16 square block royal palace compound at the centre by Mandalay Hill. The 413-hectare royal palace compound was surrounded by four 2 km (6666 ft) long walls and a moat 64 m (210 ft) wide, 4.5 m (15 ft) deep. Along the wall were bastions with gold-tipped spires at intervals of 169 m (555 ft). The walls had three gates on each side, twelve in total, each presenting a zodiac sign. The citadel had five bridges to cross the moat.
In June 1857, the construction of the palace began. After the disastrous Second Anglo-Burmese War of 1852, the shrunken Burmese kingdom had few resources to build a new ostentatious palace. The former royal palace of Amarapura was dismantled and moved by elephants to the new location at the foot of Mandalay Hill. The construction of the palace compound was officially completed on Monday, 23 May 1859.
The British looted the palace in 1887 (see above illustration) and some of the artefacts which were taken away are still on display in the Victoria and Albert Museum in London, and burned down the royal library. The British renamed the palace compound Fort Dufferin and used it to billet troops. During World War II, the palace citadel was turned into a supply depot by the Japanese and was burnt to the ground by Allied bombing. Only the royal mint and the watch tower survived.
A replica of the palace was built in the 1990s. While the overall design was faithful, the materials such as corrugated sheet metal for roofing were not.
One of the halls was dismantled during the rule of King Thibaw and rebuilt as Shwenandaw Monastery. It is the single remaining major structure of the original wooden palace today.
The palace citadel's four 2 km long walls form a perfect square, complete with a total of 48 bastions with gold tipped pyatthats or spires at regular intervals of 169 m (555 ft) and surrounded by a moat 64 m (210 ft) wide, 4.5 m (15 ft) deep. The walls, built with the common Burmese bricks set in mud mortar, are 3 m (10 ft) thick at the base and 1.47 m (4 ft 10 in) at the top; 6.86 m (22.5 ft) in height, excluding the merlons, and 8.23 m (27 ft) with the merlons. The embrasures are 0.84 m (2 ft 9 in) in width. To give access to the battlements in cases of alert and at the same time to strengthen the wall, an earthen rampart on a moderately inclined plane has been thrown up behind it. Its summit forms a platform 1.83 m (2 ft) wide, paved with bricks and running all along the walls behind the crenelles.
On each face of the walls are three gateways placed at equal distances (508 m; 1666.5 ft) one from the other and from the corners. Each of the twelve gates, represented by its own zodiac sign, is 4.8 m (15.75 ft) wide and flanked on both sides by one-half of a bastion which supports the post of a many-tiered pavilion or pyatthat that rises over the gateway. The pyatthats over middle gates, used by the royalty, have seven tiers while those on the rest have only five. Of these twelve gates, the main one was the central gate in the east wall, facing the Great Hall of Audience and the Lion Throne in the Palace.
The bastion projects 7 m (23 ft) from the face of the wall, and is 10.36 m (34) ft in breadth on each side of the gateway. It is ornamented on the outside, with simple mouldings and simple plaster carvings, but on the inner face which forms the prolongation of the gateway itself, it rises abruptly without any plinth or mouldings, from the ground level. Two flights of steps, one on each side of the gateway, provide access to the top of the bastion and the wall. Each gateway was equipped with a thick wooden door of two leaves, (which were removed after the British annexation).
The entrance to each gateway is protected by a masonry screen or barbican erected a few metres away from the moat in front of the entrance. It is 17.5 m (57 ft 5 in) in length, 5.2 m (17 ft) thick, 1.5 m (1 ft 8 in) in height, raised on a low plinth, and battering to the top. The summit is crowned by crenellated battlements on three sides only, the inner side facing the gate being left open and free. Access to the top could be gained by means of ladders, no other means of going up having been provided. It served as an advanced defence work protecting both the gate and the bridge a few feet away. By the side of this screen is a huge teak pillar resting on a brick plinth stepped off on two sides, and carrying near the top a wooden board on which is carved an inscription giving the name of the gate, and the year and date on which it was built.
Each of the four walls has 13 bastions for a total of 48 bastions. (Bastions at the each corner are merged into one, hence 48 in total.) All the intermediate bastions are surmounted by a quintuple-roof pavilion. The barge-board of these many-gabled roofs are covered with carvings.
Surrounding the walls, at a distance of about 18 m (60 ft) from them, is a moat 64 m (210 ft) wide, and of an average depth of 4.5 m (15 ft). In the case of foes armed with ancient weapons, this moat would no doubt have presented a rather formidable obstacle to the besieging army, whose crafts would have been completely exposed to the missiles of the warriors protected by the merlons on the ramparts and on the barbicans.
The moat was originally spanned over by five wooden bridges, four of which lead to the four principal or middle gates, that is one to each face of the walls. The fifth leads up to the south-western gate, used during the times of monarchy for amingala or inauspicious occasions such as to carry off dead bodies. The British constructed two additional bridges one at the south-west and the other at the north-west corner, to allow of materials and supplies for the troops into the fort.
The five original bridges are similar in design and are in unison with the defensive character of the fort and the moat. Two earthen embankments encased within brick walls form the abutments running into the moat from both banks. The space between is spanned over by teak logs of natural size — the length of two of these logs making up the length of the bridge resting, at both extremities on transversal beams supported by five posts partially encased in the masonry of the abutments; the extremities of the logs which meet in the middle of the bridge are likewise supported by five huge wooden pillars the heads of which are joined together by means of two large wooden plates which rest on cleats so constructed that the whole structure could be taken down and removed rapidly in case of danger.
Entering the Palace grounds from the east, on the right or north sits the Clock Tower, or Bahozin (ဗဟိုစင်). It is a simple building, consisting of a high square plinth; on the top of this four columns sustain a wooden platform surmounted by a double-roof; the whole is crowned by a small finial and a hti or umbrella. It is from this platform that the passing of time was made known to the city by sounding regularly a gong and a very large drum at each watch, that is, every third hour; the day and the night were each divided into four watches. The time was marked by a water-clock. This consisted of a large water jar on the water of which was placed a brass bowl; in the bottom of the latter was pierced a tiny hole, its size so calculated that the bowl filled with water and dropped to the bottom of the jar at exact recurring intervals, which were the hours.
To the south of the Clock Tower, nearly facing it across the road is Swedawzin (စွယ်တော်စင်) or the Tooth-Relic Tower. A good example of traditional Burmese architecture, the Relic Tower has three parts — first a low basement; second a rectangular block or terrace rising from the first and third a relic-chamber surmounted by a three-tiered roof (pyatthat); the whole is crowned by the usual finial and the hti. Along the four sides of both basement and terrace runs a battlemented parapet formed of lozenge ornaments; at the four corners of each are small square pillars each surmounted by a marble manussiha or winged leogryph; the monster has a human head and two bodies.
The relic-chamber on the terrace is square; the only entrance into it is on the west, facing the flight of stairs by which access is obtained to the top of the terrace; these narrow steps are enclosed between two brick walls, ornamented with copings in three tiers; the lower end of each coping is terminated by a large and graceful volute; this kind of ornamental stairs, with minor differences in details, may be seen all over Burma, either in brick or wood. The walls and roofs of the relic-chamber are adorned with graceful plaster carvings.
Although the building is called the Tooth Relic Tower, there never was any tooth-relic enshrined in it. The tower was built simply because it was the tradition to have such a tower at the royal city, a tradition from the time of King Bayinnaung.
The Hluttaw (လွှတ်တော်, [l̥ʊʔ tɔ̀]) or the Supreme Court was where the official business of the court was conducted. The Lion Throne (Sihasana) was the chief throne of eight in the palace. The hall consists of two three-roofed wooden structures, richly decorated with figures and flowers, and supported by massive teak pillars painted red at the bottom and gilded above. Therein was a Lion-Throne (Sihasana) for the King.
Due north from the Clock Tower is a cluster of Mausoleums erected to the memory of some members of the Royal family. The most important historically is that of King Mindon, who died in 1878. It was originally a brick pyatthat, plastered over and whitewashed, erected by King Thibaw to the memory of his father, as soon as the grave had been built. The Sawbwa of Yawnghwe, decorated the king's tomb with glass mosaic. It is a square structure surmounted by a septuple roof terminating as usual in a hti. Other mausoleums include those of three wives of Mindon: Chief Queen; Queen Laungshe, mother of King Thibaw; Queen Sinbyumayin, mother of Queen Supayalat.
The Royal Mint is located a few hundred metres to the northeast of the mausoleums. It was where the first Burmese coin was printed in 1865. After the British annexation, the Mint was used as bakery for the troops for some years. It was one of few buildings in the palace that survived allied bombing during World War II.
The palace grounds are dominated by the 24 m (78 ft) tall Nanmyintsaung (နန်းမြင့်ဆောင်) or Watch Tower, topped by a seven tiered pyatthat. It was the spot from which to view the city. The King and Queen sometimes ascended the tower to witness the beautiful panorama of the country around, with its river, the bills and lakes. They also, from its summit, contemplated the magnificent spectacle of the illumination of the town at the Thadingyut festival at the end of Vassa ('Buddhist Lent'). It is said that Queen Supayalat witnessed, from there, the entry of the British troops who took Mandalay in November 1885. The Watch Tower also survived the allied bombing during World War II.
On the palace platform
The road from the Eastern Gate, which passes between the Clock Tower and the Relic Tower, leads to the Mye-Nandaw, and the Golden Spire over the Lion Throne Room, which marks the centre of the city. All the Palace buildings stood on the platform. The latter consists of three distinct parts: on the east, the Great Audience Hall and the Lion Throne Room are erected on an earthen basement contained by a brick wall; the whole of the western portion, from the western most extremity up to and including the Hman-nan or Glass Palace, is likewise an earthen basement surrounded by a masonry wall; these two basements are connected, from the Hman-nan up to the Lion Throne Room, by a plank flooring of the same level supported by numerous teak posts. The whole of this platform, in its greatest length, measures 306 m (1,004 ft); in its greatest width, 175 m (574 ft). The height of the basement is 2 m (6 ft 9 in), the surrounding or retaining wall rising to a height of 3 m (10 ft 9 in) from the surrounding ground, and forming a parapet 1.2 m (4 ft) from the basement. Access to the top of the basement was obtained by thirty-one flights of steps, some large and some quite small, the principal of which are those at the eastern and western extremities.
Great Audience Hall
This Hall itself is made up of three parts: the North (or Left) Audience Hall, and the South (or Right) Audience Hall; they were so called because, when the King was seated on the Throne, facing the east, the first was to his left and the second to his right. These two parts or wings are connected by a transept running east to west from the flight of steps up to the railing around the throne; this transept was called the Central Audience Hall, because it was flanked by the Right and Left Halls. The Great Audience Hall as a whole measures, from north to south, 77.1 m (253 feet).
Below the Palace platform, on each side of the flight of steps, on the east, may be seen a few old pattern European cannons and near them some heaps of cannon balls; a few other guns of the same pattern are placed also on the sides of the steps on the west front of the Palace.
The Great Audience Hall was built with a special eye to external effect, and this object was attained by carving and gilding all the wooden parts of the roofs-except the panels between the two roofs, which were merely gilt-that is, the gables, barge-boards and eaves-boards. The carving is in low relief and consists principally of a lotus and foliage-band on the eaves-boards; the barge-boards are ornamented with a plain scroll design and surmounted by flamboyant which are very effective as a decoration. But the wealth of ornamentation is lavished on the corners of the hipped roofs and the points of the gables as well as their lower extremities. The corners of the hipped (lower) roofs are surmounted by two wooden boards, made up of several joined pieces and meeting so as to form a right angle at the corner; the chief motifs are flamboyant, foliage, lotus-bands and guilloches.
The angle represents a stylized peacock—the emblem of royalty—is surmounted by a finial; below the eaves-boards is a pendant turned in the lathe. This same peacock is everywhere found at the points of the gables, forming a hip-knob, with the pendant below. All these carvings, besides being gilt, were also decorated with simple glass mosaic. The details above given apply mostly to all the other apartments.
Lion Throne Room
There were eight thrones in the Palace, of which the Lion Throne (သီဟာသနပလ္လင်) was the greatest, and as such much more elaborately sculptured and finished than the others; an exact replica of the one now in the Palace was formerly in the Hluttaw. The King alone, of course, had a right to sit on it; and for anybody else to do so would be considered a case of high treason; the fact indeed was that anybody sitting on this throne was practically the King, if he could keep the rightful owner off. The base is formed of two lotuses, the upper one inverted on the top of the other; this pattern in no way differs from an ordinary altar supporting a Buddha image; but in the centre, where it is narrowest, that is, at the point where the two lotuses meet, is a small band containing a row of niches, with a somewhat larger one above it; in these niches were small figures of lions, besides the two large ones which may be seen now at each side of the Throne. Access to the Throne is obtained by means of a flight of steps in the room behind it from which it is shut off by a sliding door of gilt iron lattice work.
The other thrones were the Hintha Throne (ဟင်္သာသနပလ္လင်), Elephant Throne (Gajasana) in the Byedaik (Privy Council Hall), Thinga Throne, Deer Throne (Migasana), Peacock Throne (Marurasana), Lily Throne (ပဒုမ္မာသနပလ္လင်), and Bee Throne (Bhamarasana).
Hmannandawgyi (မှန်နန်းတော်ကြီး) or Glass Palace, is the largest and considered one of the most beautiful apartments of the Palace. It is believed to be King Mindon's principal living apartment of the palace. Like all the Throne rooms, it is divided by a wooden partition into two rooms.
In the east room is the Bee Throne (Bhamarasana), so called because it was adorned with figures of bees in the small niches at the bottom of the pedestal. This was where the ceremony for the nomination of the Chief Queen and the Royal nuptial were held. It was also where the king and queen celebrated the Burmese New Year, and where the formal ear piercing of young princesses took place. The body of King Mindon was laid out in this room for viewing after his death in 1878.
The west room, which was formerly divided into several smaller ones, was the principal living room of Mindon, and no other persons were allowed to sleep there except the four principal queens, to each of whom was appointed a room near the royal bed-chamber, which consisted of a small room surmounted by a pyatthat, or small spire consisting of seven superposed roofs similar to the Golden Spire over the Lion Throne Room on the cast of the Palace. This pyatthat was of gilt copper. On each side of this spired-room were constantly kept open two white umbrellas. The ladies-in-waiting of the Glass Palace were, by turns, stationed around the west room to wait upon. Their Majesties; they, whether princesses or minor queens, were not allowed to enter this room with slippers on or with their golden umbrellas: they had to leave these at the entrance with their attendants.
In the time of King Thibaw, Queen Supayalat had a small room to herself in this west room of the Hmannan.
- ^ a b John Falconer, Luca Invernizzi, Daniel Kahrs, Elizabeth Moore, Luca Invernizzi Tettoni, Alfred Birnbaum, Joe Cummings (2000). Burmese design & architecture. Tuttle Publishing. p. 70. ISBN 9625938826, 9789625938820.
- ^ a b c d e f g h i j k l "Mandalay Palace" (PDF). Directorate of Archaeological Survey, Burma. 1963. http://www.lib.washington.edu/myanmar/pdfs/MP0001A.pdf. Retrieved 2006-08-22.
- ^ a b Kyaw Thein (1996). The Management of Secondary Cities in Southeast Asia. Case Study: Mandalay. UN-Habitat. ISBN 9211313139, 9789211313130.
- ^ Vincent Clarence Scott O'Connor (1907). Mandalay and Other Cities of the Past in Burma. Hutchinson & Co.. pp. 6–9.
- ^ Bird, George W. (1897). Wanderings in Burma. London: F. J. Bright & Son. p. 254. http://dlxs.library.cornell.edu/cgi/t/text/pageviewer-idx?c=sea;cc=sea;sid=f7c73dc350626ca80c0cf1c8ff80315f;rgn=full%20text;idno=sea282;view=image;seq=360.
Mandalay Palace · Kanbawzathadi Palace
- Wanderings in Burma by George W Bird, 1897 F J Bright & Son, London
HistoricalAmarapura Palace · Innwa Palace · Shwebo Palace · Sagaing Palace
Wikimedia Foundation. 2010.
|
<urn:uuid:999ecee5-4f25-4df9-a4aa-fd1c5eef4a85>
|
{
"dump": "CC-MAIN-2021-17",
"url": "https://en-academic.com/dic.nsf/enwiki/1109997",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038069133.25/warc/CC-MAIN-20210412175257-20210412205257-00343.warc.gz",
"language": "en",
"language_score": 0.9637203812599182,
"token_count": 5389,
"score": 3.609375,
"int_score": 4
}
|
On Passover, we read from the Book of Exodus in the Torah explaining the Hebrew’s years of enslavement and the struggle it took to free them. G-d sent Moses to ask Egyptian Pharaoh Ramses II to “Let my people go.” When the Pharaoh refused, the Lord sent down 10 plagues:
Scholars have debated how these occurred and scientists have interestingly found scientific explanations for each. This is what they found:
The water of the Nile turned to “blood”. It was undrinkable. One theory is the red clay could have been washed into the river and tributaries, or “Red Tide”, an algae bloom of Oscillatoria rubescens, for example, turned the water red. Moreover the algae can release toxins that kill nearby fish. Once the water is unlivable……
Frogs swarmed into the towns and homes. One theory suggests that since frogs like to live near the water, the toxicity and smell caused them to move from the waterways to the towns. The quantity of frogs still needs an explanation but how many of us see one spider in our house and claim the whole residence is “infested”……
Infestations occurred as the next plague and could be explained by the above two. The frogs eat insects and keep the populations in control when they hang out by the marshes and rivers. The drought and unlivable water conditions cause the frogs to leave and eventually die, so insects go unchecked.
Swarms of flies encompassed the fourth plague. Scientists explain this from the lack of competing insects and frogs not around to eat them. They, in turn, fed on the dead frogs.
One would think the Pharaoh would have given in by now but he didn’t. The fifth plague caused death of Egyptian livestock. Insects carry disease and swarms of them could have caused the livestock to become diseased. Moreover, water sources were becoming scarce as well.
Egyptians became infected with boils on their skin. Insects carry disease, lack of clean water and food could make one susceptible and pathogens can enter into societies and cause epidemics. One theory suggested a smallpox outbreak occurred. Researchers found small pox scars on recovered mummies and postulated that 3000 years ago an epidemic could have occurred.
The plague of hail and fire must have been a scary one. Many have postulated that hail and fire raining from the sky could have occurred from a nearby volcano. If that’s the case why not make “volcano” the plague. But interestingly, 3500 years ago the Santorini volcano north of Crete in the Aegean Sea, erupted. And for those of us who saw Dante’s Peak, there was ash falling everywhere.
Locusts swarmed the landscape. If a volcano was nearby, I’d head south too.
The ninth plague was darkness. Without light, temperatures drop, work can’t be done, crops won’t grow. Scientists suggest this could have occurred from an eclipse, dust storm, or the plume of smoke from the volcano.
The tenth and final plague was the death of every Egyptian first-born. Scientists have some difficulty explaining this one except for many first born were out the fields helping the adults when the pestilence, boils, etc. ensued. Another theory suggests the grain stores became contaminated and the first born might have had first pick of the grain, becoming sick first.
The Bible is rich with history and lessons and such a work needs no explaining. But there are those who like to mesh science with the Bible. So for all of us celebrating our ancestor’s exodus and freedom from slavery, Happy Passover.
Everyone fractionally clones themselves into a new body every night in stage 4 sleep, when stem cells wake and rebuild all organs and tissues. They need the 300 plus building blocks and six plus hormones to accomplish this process. Thus, everyone past seven years old is a fractional copy of themselves, based on their informational template in genetics and epigenetics. Everyone is a seven year old!
During sleep, the brain sends signals to the stem cells to rebuild every organ and tissue of the body at night. These signals are transmitted through the telomeres on the end of chromosomes to the ion channels that turn on the induction of messenger RNA. If all of the 300 biomolecules and 6+ hormones are present, the body can regenerate itself and fractionally clone into a new body every seven years every seven years, every seven years. Deliver performs and supplies some of the biomolecules such as retinol for the eye to be able to see and perform vision, but most of biomolecules are not present and therefore the process of photocopying or copping the body into a new cell and tissue structure is deficient and results in the process we call aging.
Life is a dance between biophotons from the telomere at the end of your chromosomes and ion channels that let into the nucleoplasm holding DNA and allowing minerals and amino acids to stimulate production of mRNA to make structural proteins and enzymes. Epigenetic origami makes all tissues, organs and individual persons.
7% of our DNA codes for 32,500 proteins which are structural or enzymatic. Enzymes are folded proteins around a model atomic mineral to make or break bonds. The other 93% of DNA was considered harmonic or resident DNA and previously was referred to as junk DNA. This form of DNA is the structural diagram of how to build organs and tissues and may be considered epigenetic origami hierarchical DNA. As a result of this process all living things depend on the present production of structural proteins and enzymes and the nonlinear stochastic fuzzy logic parallel processing information transfer across ion channels membranes in real time in picoseconds to regulate the size and structure of organs in real time.
We can optimize the fractional cloning process by providing substance and signal to optimize the dance of LIFE. NutriMed formulas and Red Deer Velvet DR, pat pending, can provide these building blocks, minerals and amino acids. Lumen Inlight and eGFT epiGenetic Frequency Therapy can provide the biophoton stimulus to permit entry via ion channels and DNA induction of messenger RNA, mRNA, to make the template for enzymes and structural proteins.
Linus Pauling, father of DNA and Stereochemistry, completed a lifetime of research showing plasma mineral resonance can induce healthy adaptation and genetic induction to provide healing proteins and enzymes for organs and tissues. Dr Bill Deagle now can provide these customized formulas based on Quantum Information Body QRMA and Metapathia scans, lab kits and imaging, and functional history review. EpiGenetic signals can open ion channels and stimulate cellular communication and augment the information hologram of a healthy organ and body, regenerating you into a new better copy of your DNA and epiGenetic template of you! Take advantage of a consult, testing, and customized regenerative services to be the best you can be tomorrow and many years to come!
Future weekly articles, will be presented here to A4 M to instill a new broader picture of what the dance of life is as a dance between bio photons and ion channels controlling the informational holographic body that produces the process we call life. His hope of these articles will inspire new science look in the informational body that is pressing into and in control of the enzymatic and structural body. My research has shown that harmonic frequencies and picomoles microamps and mappable the body and are deterministic of whether specific organs and tissues can receive in metastasis or allowed autoimmune disease or process to occur. There is often decide anomia associated with a resident changes in the thermographic evaluation at the skin and therefore the informational body is more important than has been previously identified and quantum testing of different frequency patterns of the body can determine whether disease or wellness is permitted by the specific resident frequencies.
Beloved physicist Stephen Hawking passed away early Wednesday morning. He was 76 years old. Hawking long suffered from ALS (amyotrophic lateral sclerosis), aka, “Lou Gehrig's disease.” He was diagnosed in his early twenties and doctors gave him 3 years to live. The neurological disease affects the nerve cells responsible for controlling voluntary muscle movement. And the disease is progressive, meaning the symptoms get worse as time passes. There is no cure and it is known to ravage bodies quickly. So when doctors told Dr. Hawking that he had 3 years to live, that was a pretty fair estimate.
Instead, Dr. Hawking lived with ALS for 55 years even though it reduced his muscle control such that he could only blink his eyes and twitch a finger. He retained his mental faculties and became a giant in his field. How did Stephen Hawking live so long with ALS? According to King’s College clinical neurology professor Nigel Leigh, it was probably because D. Hawking was diagnosed so young. In the British Medical Journal Leigh states, “We have found that the survival in younger patients is strikingly better and is measured in many years - in some cases more than 10.”
From my limited understanding of the medical research behind ALS it sounds as if most of those with ALS become symptomatic in their 40’s or later, and then don’t live long. The younger you become symptomatic the longer you can survive. That being said, living 55 years with ALS seems like something of a miracle.
Hey, wasn’t that ice bucket challenge thing all about ALS?
It was! I’m glad you remember. I’m sure many of you recall the ice bucket challenge (IBC) from 2014. A challenge where you pour an icy bucket of water over your head OR you donate money to ALS research OR you do both. It quickly went viral with celebrities piling up to perform their version of the IBC. Patrick Stewart’s was my favorite. The viral challenge was deemed a colossal success and raised $115 million for ALS research. Here is the video of Stephen Hawking and his family participating in the IBC.
Much has been written about Professor Hawking, movies have been made, documentaries have been produced, he’s authored best selling books, he’s been published in many, many science journals and magazines. I will leave it up to you to find them.
ALS ravaged Dr. Hawking’s body but thankfully left his mind intact. And what a great mind it was. Dr. Hawking, I will always remember you, as yourself, on Star Trek: TNG.
Rest in peace.
A few words from his friends and colleges from their twitter accounts:
Dr. Bill Nye (Science Guy):
“While here on Earth, Dr. Hawking made pondering the cosmos and our place within it commonplace. The extraordinary became everyday. Although his time was brief, his work changed the world.”
Dr. Neil Degrasse Tyson:
“His passing has left an intellectual vacuum in his wake. But it's not empty. Think of it as a kind of vacuum energy permeating the fabric of spacetime that defies measure. Stephen Hawking, RIP 1942-2018.”
Matt Selman, Executive Producer The Simpsons:
“Farewell to Stephen Hawking, the most intelligent guest star in the brief history of The Simpsons.”
Official Big Bang Theory account:
“In loving memory of Stephen Hawking. It was an honor to have him on The #BigBangTheory. Thank you for inspiring us and the world.”
GCN proudly welcomes Michio Kaku’s long running radio program Science Fantastic to our weekly line up! Professor Kaku probably needs little introduction but introduce him I must. And so, from Wikipedia:
Professor Kaku is a Japanese American theoretical physicist, futurist, and popularizer of science. He is professor of theoretical physics at the City College of New York and CUNY Graduate Center. Kaku has written several books about physics and related topics, has made frequent appearances on radio, television, and film, and writes online blogs and articles. He has written three New York Times best sellers, hosted several TV specials for networks around the world and since 2006 has broadcast his radio program Science Fantastic -- previously syndicated by Talk Radio Network and now, beginning at midnight on Saturday December 30th will be nationally syndicated by the Genesis Communication Network - that would be us. =)
The Science Fantastic show page will be up on the GCNlive site ASAP with more program and affiliate information to follow.
We’re very excited to have Professor Kaku join the team and we hope you’ll tune in to -- Science Fantastic!
Greetings interstellar traveller / hyperbolic asteroid 1I/2017 U1, welcome to our solar system!
Technically you’ve been here for quite a while just passing through, drifting about, minding your own asteroid business but we’ve only just found you! You have no way of knowing this but, you’ve been named -- ‘Oumuamua from the Hawaiian word meaning “scout” and generally translates as “scout from the past.” You have a very lovely name. Also, for clarification, that first character in your name is a Hawaiian ‘okina, not an apostrophe.
Our Earth scientists have long suspected that tens of thousands of space rocks, such as yourself, have visited our fine solar system but until recently we were unable to detect you all.
That all changed, of course, when very smart folks at Haleakala Observatory (in Hawaii) brought the first Pan-STARRS telescope (PS1) online. ‘Oumuamua -- just to be clear, this PS1 is totally different than what you probably believe a traditional PS1 to be (currently upgraded to a PS4). The PS4 stands for “PlayStation” 4 and is a kick ass console blu ray / game player. The PS4 according to wikipedia:
The PS1, the one we used to find you, stands for “Panoramic Survey Telescope and Rapid Response System” (Pan-STARRS). The PS1 according to wikipedia:
“… consists of astronomical cameras, telescopes and a computing facility that is surveying the sky for moving or variable objects on a continual basis, and also producing accurate astrometry and photometry of already detected objects.”
As you can see, ‘Oumuamua, not quite the same thing.
Anyway. We don’t know exactly where you came from as that would be extremely difficult to figure out, but for now, our best guess is star Vega, about twenty five light years away. That being said, we are certain you are indeed from another solar system as, according to this astrophysical survey your orbit would be virtually impossible to achieve within our solar system. Our solar system that we have cleverly named, “Solar System” -- because that’s how we roll.
You; however, roll quite a bit different. You are red (the color of organic carbon-based molecules), extremely elongated (thirteen hundred feet which is ten times long as you are wide -- you look like a giant space cigar) and you travel at approx.85,000 mph.
For comparison, ‘Oumuamua, I once lived in NYC and dated a woman in Washington DC. It order to visit her on weekends, it would take me about 3.7 hours to drive the distance between us. It would take you .0026 seconds to make the same trip!
Well, it looks like you’re just kind of passing through, so I was just sayin hi. It appears as if you’ll lap Jupiter sometime around May, then pass Saturn in January 2019 and eventually exit stage left en route to the Pegasus constellation sometime after that.
By all accounts it appears as if you’re just a really long mineral rock asteroid and you don’t carry any sort of super cool alien species. You know, cool little guys like that adorable Invader Zim or those E.T. phone home cuties. And I certainly hope you are not rudely carrying those evil little alien pricks from Alien and Aliens and all those not worth mentioning by name subpar sequels.
Actually, with that in mind, ‘Oumuamua, just in case you ever watch James Cameron’s Aliens, when characters refer to the alien species as a “xenomorph” they are not suggesting “xenomorph” is the name of the alien species on LV-426. They are using the word from the Greek construct - xeno, meaning “foreign” or “strange” and morph, meaning “a shape or form” which means in the context of the film the characters are suggesting the aliens in the movie are “strange foreign forms” -- an alien life form.
Again -- xenomorph is a generic term for an alien life form.
Xenomorph is not the name of this species.
Just wanted to clear that up for you, ‘Oumuamua. You know, in case it ever comes up in conversation with your asteroid buddies.
That’s all I got. Nice to meet you.
If you like this story you might like The Paracast which broadcasts live here at GCN.
If you have more than one wireless phone line, switching to another carrier isn’t necessarily easy, but I can only give you my personal experience in considering the possibilities.
So I desperately want to cut the price, but I need lots of bandwidth and solid coverage wherever I travel. One of the people on my current plan, with AT&T, lives in a rural area of Arizona were reception is just terrible. But he tells me that, based on the experience of a friend, T-Mobile ought to deliver better service in his area.
I’ve looked at the coverage maps, and it does appear that T-Mobile is second to Verizon Wireless in that region. But as many of you know, coverage maps are at best an approximation of the quality of service you’ll actually receive. You may not know the truth until you make the switch. But even if you get a great deal, and T-Mobile even offers to pay off your current handset purchase plan to get your business, there’s no guarantee service quality will suit your needs.
But after you’ve switched to the new carrier, transferred the phone numbers and maybe traded in your old equipment, what if you realize you made a mistake? Carriers will usually allow you to cancel your service if you’re not satisfied. T-Mobile’s offer is 20 calendar days after you receive your equipment.
Does this mean you get the gear you traded in back? Can you then return to your old carrier, move the numbers back, and go about your business as if nothing happened? I can’t see how this is going to be an easy process unless you own all your equipment outright and can go where you want, assuming the carrier’s network is compatible. They don’t make it easy, so assume that switching is going to be a one-way street without being forced to jump some large hoops.
In any case, on this weekend’s episode of The Tech Night Owl LIVE, we presented outspoken commentator Peter Cohen, who, in response to Gene’s search for a better deal with a wireless carrier, talked about T-Mobile, its advantages and limitations. He mentioned the Band 71 issue, the new 600 MHz spectrum that T-Mobile is rolling out to some parts of the U.S., and the fact that flagship gear from Apple, Samsung and other companies are not yet compatible. The discussion moved to the new Apple TV, the issue of cable/satellite cord cutting, and the dangers of fragmentation, where there are so many services vying for your subscriptions that it may become must too expensive to watch all the new shows that require separate memberships. What about the new iPhones, and especially the iPhone X with Face ID for logging in rather than Touch ID? What about macOS High Sierra, which is officially released on September 25th, the day this article posts. Does the lack of support, at least for now, for all those Macs with hybrid Fusion drives cause any problems?
You also heard from columnist Joe Wilcox, who writes for BetaNews. He explained why he recently switched from T-Mobile to Verizon Wireless, mostly to improve coverage, but is now considering a return to the former. The discussion covered the ongoing dilemma of choosing the right carrier. And what about published reports that T-Mobile and Sprint, the two smaller major carriers in the U.S., might be ready to ink a deal and merge? It’s not the first time this move has been rumored. Gene and Joe also talked about the new productivity features in iOS 11, and whether they might impact the use of the iPad as a productivity tool. There was also a brief discussion of macOS High Sierra before the conversation moved to the Apple Watch Series 3, which comes in a version with LTE so you can use it to make phone calls without connecting it to an iPhone. Does this huge step now liberate the Apple Watch so it can do most things all by itself? Does the future take us away from a big smartphone to a tiny smartwatch?
On this week’s episode of our other radio show, The Paracast: Gene and guest co-host J. Randall Murphy submit themselves to questions about UFOs and their background in the field of Ufology from Paracast listener Louis Sheehan. Gene talks about his history as a UFO researcher and writer, and about a series of recurring nightmares during a period when he constantly smelled the odor of burnt sulphur, both of which may have significance as paranormal events. Gene also discusses at length his favorite episodes of The Paracast and debates, with Randall, the original and current meaning of the acronym “UFO,” and why Gene is not necessarily a believer in the most popular theory, that the flying saucers are spaceships from other planets. As Gene often states, would we even recognize the product of a highly advanced spacefaring technology?
MOVIE RENTALS, 4K UPGRADES AND OTHER NONSENSE
The entertainment industry has given us one thing, and sort of taken away something else, and it all begins with the fifth generation Apple TV, which adds 4K and HDR as its main new features.
So as the new set-top box shipped, Apple announced an important change to the iTunes movie rental policy in the U.S. So up till now, you had 30 days to start watching the movie. So far so good, but once you began, it would self destruct in 24 hours. If you weren’t finished, that’s too bad; just rent it again.
That was not a policy set by Apple to inconvenience their customers. It was clearly enforced by a greedy and paranoid movie industry that didn’t recognize reality. There may be many reasons why someone can’t finish a movie. Whether a family matter or something else interrupts the process, it doesn’t matter. Did the industry really believe that people will happily rent a movie a second time without protest?
Well, the policy has changed. It’s now a slightly more reasonable 48 hours. It’s probably enough for most people, but it still fails to respect the customer. After all, you could rent a physical movie from a video store — when there were video stores — and hang onto them for a few days before you had to return them without the late fees. The original Netflix DVD rental model allowed you to keep one movie until you wanted another, in which case you sent the one you had back, and another was shipped in its place. What you paid per month depended on how many DVDs you wanted at one time.
Yes, Netflix still allows you to rent physical movies, although that service has become a much smaller part of its business. These days, it’s pretty much all about streaming, and what you pay depends on whether you want standard definition, high definition or even 4K, assuming your ISP gives you the speeds you require for the latter, usually estimated at 25 megabits or more.
Now when it comes to 4K, Apple has begun to offer a wider range of content in the higher resolution format. At the same time, they have imposed a significant limitation on your freedom to enjoy the movies you’ve bought or rented.
On the positive side, 4K movies cost the same to buy or rent as HD, except, evidently, for Disney which does not, at least so far, support the new policy. Your existing movies can be updated to 4K without cost, when the improved versions are available. So far so good.
But in a support document, Apple says you can only download the HD version; 4K content must be streamed from Apple’s servers. There is no way to store them on your local device. What this means is that you are basically stuck if you don’t have a fast enough broadband connection, experience a temporary outage, or you’re in danger of hitting your ISP’s data cap.
Now it could be that Apple doesn’t want to overextend its servers for the time being, just playing a 4K movie will have less impact than downloading the entire thing along with all the iTunes extras. Maybe. At least until you want to watch it again.
Or perhaps, in exchange for the free 4K upgrades and the standardized pricing, the industry forced them to impose that restriction. But Apple won’t necessarily tell us, though I suppose some journalists might ask. It may well be that it’s the entertainment industry once again that wants to inconvenience us in exchange for handing us a benefit.
I cannot see where potential piracy might enter the picture. If someone wants to pirate a movie, it will hardly go through traditional channels. Such content ends up on torrent sites and other sources of illegal content.
Besides, I do believe most people are happy to pay a fair price for a product or service, and don’t have the time or inclination to want to search for a freebie. Remember, too, that illegal content is a known source of malware.
Again, I would hope the inability to download 4K movies from Apple is only temporary, and that when things settle down, you’ll have the freedom to do what you want within the usual license constraints. Or maybe it’s better to just pay a little more and buy a physical Ultra HD Blu-ray version. I see that, except for special discounts for older Blu-ray content, the 4K versions at Amazon generally carry a $5 price premium. But you don’t have to worry about streaming.
Well, you do need a player, of course, and there aren’t many of those to be had, and they are generally available at much higher prices than regular Blu-ray. And you have to watch out for the 4K upscaling players that only support HD content. They don’t play native 4K. So you’ll want to check the fine print and confirm the specs.
So if you have a bright, beautiful 4K set in your living room or bedroom, expect to pay and pay again to enjoy that content. Even then, unless the display is large enough, and particularly if it has HDR support, you may not even see much of a difference over “old fashioned” 1080p.
Oh and by the way, the Night Owl is making arrangements with manufacturers to review some 4K hardware. I’ll have more to say on that score in the very near future.
Gene Steinberg is a guest contributor to GCN news. His views and opinions, if expressed, are his own. Gene hosts The Tech Night Owl LIVE - broadcast on Saturday from 9:00pm - Midnight (CST), and The Paracast - broadcast on Sunday from 3:00am - 6:00am (CST). Both shows nationally syndicated through GCNlive. Gene’s Tech Night Owl Newsletter is a weekly information service of Making The Impossible, Inc. -- Copyright © 1999-2017. Click here to subscribe to Tech Night Owl Newsletter. The full text of newsletter #930 is reprinted here with permission.
While I wish the best to all those affected by Hurricane Harvey and Hurricane Irma, I also hope climate change deniers affected by the hurricanes realize their denial of climate change contributed to their current situation and will contribute to worse situations in the future.
Mother Earth is doing her best to convince climate denying Americans that global warming is no hoax and that people are responsible for the increasing instances and intensity of weather disasters. She started by flooding the Gulf Coast with category-three hurricane, Harvey, which AccuWeather predicts will cost America more than Hurricane Sandy and Hurricane Katrina combined.
But Hurricane Harvey was just the beginning of America’s hellish hurricane season of 2017. Floridians are now evacuating their homes as category-five hurricane, Irma, bears down on them after reportedly destroying 90 percent of buildings in Barbuda, leaving half the population homeless. The storm also left two-thirds of Puerto Ricans without power, and south Florida was placed on hurricane watch, as sea levels could rise anywhere from five to 10 feet.
If Hurricane Harvey is expected to cost more than Hurricane Sandy (a category-three storm) and Hurricane Katrina (a category-five storm) combined, then Irma will likely cost more than Harvey, Sandy and Katrina combined. But at least hurricanes Jose and Katia are expected to miss America, with Jose expected to further decimate the Caribbean and Katia headed for Veracruz.
Three hurricanes forming in the same ocean is unusual, but it’s been happening more often lately. It last happened in the Atlantic Ocean in 2010, when Hurricanes Igor, Julia and Karl followed almost the exact path of hurricanes Irma, Jose and Katia. And for the first time ever in 2015, two category-three hurricanes formed in the Pacific Ocean simultaneously, with a third category-two hurricane accompanying the storms.
Some God-fearing Americans might think intensifying hurricane seasons and increasing instances of destructive weather events is God’s way of punishing us for legalizing abortion or same-sex marriage. Or maybe God is punishing communities that have allowed themselves to be overrun with illegal immigrants, even though every hurricane inevitably punishes communities with large populations of immigrants because hurricanes, like immigrants, tend to reach their destination by sea.
But Hurricane Harvey hasn’t been discriminatory when it comes to the lives it’s claimed, and neither will Irma. If America’s hurricane season from hell is really a hurricane season from heaven, there’s no evidence that God is attempting another Great Flood. In fact, there’s a perfectly reasonable explanation for the increased instances and intensities of these storms: man-made global warming.
Three-quarters of man-made, greenhouse gas emissions are a result of human energy consumption. Those greenhouse gases, most notably carbon dioxide and methane, are responsible for 82 percent of global warming. When Earth’s atmosphere warms, polar ice melts. When polar ice melts, sea levels rise, but it’s the extreme increase in polar temperatures that have and will continue to create more hurricanes and other destructive weather events.
Arctic temperatures up to 59 degrees Fahrenheit warmer than average have not only left the size of the polar ice caps at an all-time low, but has exposed the dark depths of the Arctic sea to the sun, which further increases sea temperatures. That resulting increase in temperature narrows the difference between the Arctic sea temperature and that of southern seas. This weakens the 250-mile-per-hour winds of the jet stream that keep cold, Arctic air circulating the Arctic where it belongs. The slower jet stream winds allow cold, Arctic air to escape south, and warm, southern air to move north, resulting in more extreme weather at lower latitudes. Hence Hurricane Harvey, Hurricane Irma, Hurricane Jose and Hurricane Katia.
So the more we as a species emit carbon dioxide and methane from oil and natural gas drilling to then burn in our vehicles and appliances, the more hurricanes and destructive weather events we create. If there’s any good to come of Hurricanes Harvey and Irma, I hope those climate deniers affected by the storms now have a reason to change their mind on global warming and change the way they live and vote.
One of the most common answers I get as to why people don’t do their part to limit man-made climate change is that the earth is going to die anyways, and they’re not going to be around to see it. These people are treating Earth like a possession instead of a living being. It’s as if climate deniers see Earth as a motel -- or better yet -- a prostitute. They think the transaction makes the person a possession, and since they pay Earth’s rent, they own Earth and can do whatever they want to her.
If Mother Earth is a prostitute, she’s a diseased, obese hag who’s been used up and abused too often, but that doesn’t stop people from paying for her services. Corporate executives fill her up with vibrating probes to entice her sexual secretions to the surface to be collected and sold. They run trains on her that spill toxic substances on and into her. Every trick she turns results in another ejaculation of carbon dioxide or methane into her atmosphere. As a mother, though, she has to put food on the table and pay the rent, so she has to take it lying down -- or whatever way the John wants to deliver it.
But all that abuse builds up and inevitably has to be released if Earth is to avoid suicide. So Earth unloads on the unsuspecting masses when properly triggered, discriminating against none, for no one is truly innocent. Even the recyclers and Greenpeace volunteers didn’t do enough to prevent her from resorting to prostitution. They should have been more adamant about treating Earth with respect and done more to persuade people that she’s indeed a person -- not just a prostitute. Society as a whole has failed Earth and will pay the price.
So think of Mother Earth as your own mother. Sure, she’s going to die just like Earth, but does that mean you treat her as if she’s already dead? Would you smoke around your mother knowing she struggles to breathe in her old age? Then don’t drive when you can walk, bike or take public transit. If you can afford it, buy an electric vehicle or outfit your house with renewable energy sources before the tax incentives end. You want your mother to be as comfortable as possible when she dies, so make Mother Earth as comfortable as possible when she dies. She too gave birth to you and continues to care for you even when you don’t care for her.
Denying the existence of man-made, global warming will only leave us in a cycle of perpetual rebuilding. We’ve gone and pissed off Mother Earth with our wasteful, selfish ways. It’s well past time we as Americans and as a species make up for it before it’s too late.
If you like this, you might like these Genesis Communications Network talk shows: The Costa Report, Drop Your Energy Bill, Free Talk Live, Flow of Wisdom, America’s First News, America Tonight, Bill Martinez Live, Korelin Economics Report, The KrisAnne Hall Show, Radio Night Live, The Real Side, World Crisis Radio, The Tech Night Owl, The Dr. Katherine Albrecht Show, Free Talk Live
|
<urn:uuid:a11558be-ee94-4885-9182-c17b50f470bf>
|
{
"dump": "CC-MAIN-2019-22",
"url": "http://www.gcnlive.com/JW1D/index.php/back-catalog/itemlist/tag/science",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255837.21/warc/CC-MAIN-20190520081942-20190520103942-00305.warc.gz",
"language": "en",
"language_score": 0.9515287280082703,
"token_count": 7434,
"score": 3.171875,
"int_score": 3
}
|
Colorado’s most dramatic skyline rises steeply from the earth. Nine mountains within Rocky Mountain National Park stand above 13,000 feet, presided over by the 14,259-foot Longs Peak. As dramatic as these peaks are, the park’s history — with its legacy of nomadic hunters, Native American tribes, gold miners, and trappers — is equally captivating.
Like the range that it inhabits, Rocky Mountain National Park was carved into towering peaks and expansive valleys over the course of millennia by slowly-retreating glaciers. Nomadic tribes of hunter-gatherers, first arriving some 13,000 years ago, routed their way through the park after large game including buffalo, elk, and deer, etching the first human footsteps into what would become Trail Ridge Road.
Ute and Arapaho tribes dominated the area until the 1800s, when trappers and gold miners began arriving from the east in droves, pushing out the area’s Indigenous residents through disingenuous treaties and other means. Spanish, French, and American explorers passed through the park, none more notable than Major Stephen M. Long, whose mission to document the expanse of the American West took him toward the Rocky Mountains via the Platte River but ironically, not into the actual park. However, he was the first to note the location and significance of his namesake peak for mappers, a feat that has forever enshrined him in Colorado lore via maps, guides, and, eventually, postcards.
Rocky Mountain National Park became part of the National Park Service in January 1915, the crowning result of the John Muir-inspired conservation movement that had taken hold in nearby Estes Park. These days, over four million visitors pass through the park’s three entrance gates every year in search of purple mountain majesty. If you’re one of them, an understanding of the park’s history will make your time on the trails even more rewarding.
Historic and cultural options
Holzwarth Historic Site — The park’s visitor centers and the Holzwarth Historic Site, on the park’s west side, host collections of historical artifacts, including old maps and tools, biological and geological specimens from throughout the park, photographs, and other cultural offerings as curated by park rangers. Walking through the site puts you straight into an old Western — complete with the town, no facade necessary. You don’t need a tour to view them; simply stop into the sites during open hours. Additional collections can be found at the Denver Botanic Gardens and YMCA of the Rockies in Estes Park.
Ranger-led tours — No matter when you visit, inquire about ranger-led tours within the park. Park rangers lead historical presentations at the park’s auditoriums and amphitheaters throughout the summer. Talks are free, though only the Beaver Meadows Visitor Center and Kawuneeche Visitor Center don’t require park admission to visit. Check the park’s website for the current schedule. The park service also runs guided tours of Trail Ridge Road during busy times. These are the best way to learn about how early nomadic natives routed their way through the park, and where remnants can be found. Tours stop at notable views and historical points. Call 970-577-7477 to inquire about scheduling and to make a reservation.
Astronomy tour — Local astronomers and park rangers lead astronomy sessions on select Friday evenings, July through August, culminating in a night sky festival in August. The 30-minute sessions include telescope viewings and a lecture from the astronomer, beginning after sunset at the Upper Beaver Meadows Trailhead. Other astronomy events take place in summer as conditions allow, check the park website for current information.
Moraine Park Discovery Center — On the east side of the park, Moraine Park Discovery Center holds a small museum and an amphitheater where the Moraine Park Lodge once operated, founded by explorer and guide Imogen Green MacPherson in 1903. The site is protected in the US Register of National Historic Places, and is adjacent to the equally historic William Allen White Cabins.
Historic buildings and trails — Throughout the park are a number of registered buildings including the Comfort Stations at Timber Creek Campground and Aspenglen. Many visitors stop into the Beaver Meadows Visitor Center without even realizing it is a National Historic Landmark — but by knowing this in advance, you’ll be prepared to engage on-site rangers in how it became so. It was built by none other than Taliesin Associated Architects — yes, Frank Llyod Wright’s firm, though Wright himself had recently passed prior to construction — as part of the NPS Mission 66 project, which sought to upgrade the guest experience at parks across the country. Near the summit of Trail Ridge Road, the Alpine Visitor Center is the highest-elevation visitor center in the National Park System, and a perfect place to stop for a souvenir.
Historic photo stops — In addition to historic buildings, Trail Ridge Road itself is lined with historically significant pull-outs where guests can photograph their surroundings with only a slight chance of craned neck syndrome. On the second switchback up from the east entrance, Many Parks Curve looks out upon much of the eastern section of the park including Horseshoe Park, a vast expanse left by one of the region’s founding glaciers. You’re gazing at living history.
Further up is the summit of Trail Ridge Road, the peak of not only today’s highway but of the path used by Native tribes and nomads long before the invention of the combustion engine. A stop here immediately puts into perspective how easy we have it today.
Music and other events in Grand Lake and Estes Park
Few national parks get the advantage of having excellent urban hotspots on their outskirts like Rocky. For a little culture nearby, both Estes Park and Grand Lake have a lot going on, so consider one of these out if it aligns with your trip.
Night Sky Festival — Every August, Rocky Mountain National Park puts on an epic three-day night sky festival that falls during the Perseid meteor shower. Programming starts in the morning and runs through nightfall, with activities all over the park — many take place from campgrounds, but you don’t need to be staying in the park to attend.
Guest experts are brought in, rangers put on talks, fancy telescopes get busted out, films are shown, photography workshops are held, and the night sky lights up without end. As they say, “Half the park is after dark.”
Concerts at Stanley Hotel — For most of the year (including winter), the Stanley Hotel Concert Hall lights up once a week with performances arranged by the folks at Estes Park Music Festival and the Colorado Music Festival Chamber Orchestra. In winter, tickets are just $7.
Roots On The Ridge — This brand-new festival is one jam-packed day of music and art in Estes Park. You might’ve heard of some of the line-up: Wynonna Judd, Ruston Kelly, and Chancey Williams.
Rooftop Rodeo — Estes Park’s six-day Rooftop Rodeo is a sight to be seen with nightly rodeo events, barrel racing, and saddle bronc riding. It’s a whirlwind of a week and a look at Colorado’s cowboy past — and, clearly, present.
|
<urn:uuid:b7b5cf18-0863-4416-91f0-231d1effaa3d>
|
{
"dump": "CC-MAIN-2022-27",
"url": "https://matadornetwork.com/destinations/north-america/united-states/rocky-mountain-national-park/history-culture/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104669950.91/warc/CC-MAIN-20220706090857-20220706120857-00313.warc.gz",
"language": "en",
"language_score": 0.9381311535835266,
"token_count": 1553,
"score": 3.1875,
"int_score": 3
}
|
CT for Adult Minor Head Trauma
A closed head injury results from hitting your head on something. Even a small minor blow to the head can be dangerous and should be evaluated by a doctor for a possible concussion, bleeding on the brain, or skull fracture. Most minor head injuries do not require imaging tests.
A test called the Glasgow Coma Scale helps assess a person's level of consciousness after a minor or mild closed head injury. If the test result is equal to or more than 13, additional guidelines are used to see if an imaging test is recommended. A CT scan without contrast is used if the guidelines say a test is needed to find out the seriousness of the head injury. People with moderate or severe closed head injuries are also recommended to have a CT scan without contrast.
The results of a noncontrast head CT may read as normal despite an existing brain injury. Follow-up imaging tests are recommended for people whose brain injury symptoms are not getting better or are getting worse. CT without contrast is usually the best test for follow-up. MRI is used in cases of chronic (ongoing) suspected traumatic brain injury. If blood vessel injury is suspected then CT angiography or MR angiography is used for arterial injury and CTV or MRV for vein injuries.
CT scans expose people to radiation. MRI tests do not. For more information, see the Head Injury page.
This page was reviewed on December, 15, 2021
|
<urn:uuid:8f53b8b8-2500-4f1c-9a3c-27a414e03cbe>
|
{
"dump": "CC-MAIN-2022-49",
"url": "https://www.radiologyinfo.org/en/info/acs-ct-adult-minor-head-trauma",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711111.35/warc/CC-MAIN-20221206161009-20221206191009-00485.warc.gz",
"language": "en",
"language_score": 0.9353978633880615,
"token_count": 294,
"score": 2.921875,
"int_score": 3
}
|
Fepomuves is best known for its important work in the soup kitchens comedores populares , something that was a struggle throughout the s to maintain through the hyperinflation.
Synopsis and Reviews
Often, kitchens would close or not be able to feed the increasing poor. It also participated in projects to provide health care to women, a glass of milk a day for children in the barrios, and spearheaded committees on education.
- The Portable Atheist: Essential Readings for the Nonbeliever?
- Lord of Lords.
- Q.E.D.: Beauty in Mathematical Proof.
- Notice de personne.
- María Elena Moyano: A Symbol—and Victim—of Peru's Transformation.
- The Freya Project.
It is here that Shining Path became active in and around Lima. The major qualm of Shining Path, and many movements of its kind, was collaboration, either for personal gain or direct betrayal. But, as mentioned above, the legitimate grievances of the movement and those that followed often did not know what to do with allies who did not share their views. Her life began to be conducted within municipal buildings.
Moyano, María Elena (1958–1992)
She was being shut in upon herself. On February 14, Shining Path called for an armed strike on the capital of Lima. She denounced the violent tactics. Fepomuves still exists to this day, with over 10, women actively in the organization.
Her dream of equality for women is still something to fight for, something to continually take not of. I wanted to address a couple of the incorrect statements made in this article. Elizabeth WH said this on May 10, at pm Reply. You are commenting using your WordPress.
- Today in the Americas, María Elena Moyano | Latin American Musings.
- L2-Gain and Passivity Techniques in Nonlinear Control.
- Shop now and earn 2 points per $1?
You are commenting using your Google account. You are commenting using your Twitter account.
You are commenting using your Facebook account. In , at age 33, Moyano was assassinated by guerrillas of the revolutionary movement Sendero Luminoso Shining Path. In part 1 of this work, Moyano traces the struggle of poor women in Peru and how they developed survival organizations such as the Vaso de Leche Glass of Milk and the communal kitchen feeding program to cope with poverty made worse by government austerity adjustments. Like other women, Moyano honed her leadership skills in these programs.
University Press of Florida: The Autobiography of María Elena Moyano
She condemned the terrorist tactics of Sendero Luminoso and publicly proclaimed that they were not on the side of the poor. She also condemned the human rights abuses of the military and police. In part 2, Moyano relates the hardships of her impoverished childhood and describes the difficulties of achieving an education. As a woman of color, Moyano led a revolution of conscience within a larger revolution.
María Elena Moyano
Through this gracefully translated book, her voice continues to speak for all women who refuse to relinquish the struggle for dignity, freedom, and equal political participation. She went to Mexico to participate in a study on ethnic minorities and human rights, and there she became a member of the Mexican Solidarity Committee for Guatemalan refugees. Patricia S.
|
<urn:uuid:d25542e8-b8c3-4c28-af6a-c0fa227a0f5e>
|
{
"dump": "CC-MAIN-2019-47",
"url": "https://hiqukycona.tk/mythology/the-autobiography-of-mara-elena-moyano-the-life-and.php",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670151.97/warc/CC-MAIN-20191119121339-20191119145339-00258.warc.gz",
"language": "en",
"language_score": 0.9482312798500061,
"token_count": 697,
"score": 2.8125,
"int_score": 3
}
|
Think back to your most recent dental appointment. Did your dentist check you for oral cancer?
If the answer is “no” or you don’t remember, you’re not alone. According to a recent survey by Vigilant Biosciences, 63% said as much. Yet more than 80% would like oral cancer screening to be a part of every dental exam.
An oral cancer exam is quick, painless and easy – and a routine part of our patient exams.
Unfortunately, this is not the norm. As a 2009 paper in the Journal of the California Dental Association noted, while “most dentists claim to perform an oral cancer examination on their patients,” the lack of progress in early diagnosis suggests otherwise.
Early diagnosis is critical, for the more advanced the cancer, the harder it is to treat successfully. “The death rate for oral cancer,” notes the Oral Cancer Foundation,
is higher than that of cancers which we hear about routinely such as cervical cancer, Hodgkin’s lymphoma, laryngeal cancer, cancer of the testes, and endocrine system cancers such as thyroid, or skin cancer (malignant melanoma). If you expand the definition of oral and oropharyngeal cancers to include cancer of the larynx, the numbers of diagnosed cases grow to approximately 54,000 individuals, and 13,500 deaths per year in the U.S. alone.
If caught early, on the other hand, oral cancer is often readily treatable. Hence, routine screenings.
The basic physical exam involves inspecting the mouth, lips, gums, tongue, tonsils and other soft tissues, looking for any lesions or other abnormalities. It includes palpating (lightly touching or pushing against) the neck and lymph nodes. Autofluorescence imaging may also be used to detect problems. If any are found, further testing – such as the OralCDx brush test – can be done to make a more definite diagnosis.
But you don’t need to wait until your next dental appointment. You can do a self-exam at home. If you notice anything strange, arrange to have your dentist evaluate the situation. Common symptoms of oral cancer include
- Persistent mouth sores.
- Mouth or ear pain.
- Chronic hoarseness.
- A non-tender lump on the neck.
- Abnormal swallowing.
- A peculiar sore throat.
While anyone can develop oral cancer, some people are at greater risk than others. Historically, the most at-risk groups have been older smokers and heavy drinkers, but in recent years, more cases have involved younger adults infected with human papillomavirus (HPV) – the same sexually transmitted virus that can cause cervical cancer. Unfortunately, HPV related oral cancers are often found in the back of the mouth, making them that much harder to see – and thus, harder to discover in their earliest stages.
What can you do to reduce your risk of developing oral cancer? Three big things in addition to the usual litany of healthful habits (i.e., proper diet, exercise, enough sleep, et al):
- If you smoke or chew tobacco – or if you vape – stop.
- If you use alcohol, do so in moderation.
- If you are sexually active, practice safer sex.
And, once again, keep a close eye on your body. You’re the sole expert in how you look and feel – how things are supposed to be and when something isn’t right. Paying attention can make a huge difference in catching any problems early.
|
<urn:uuid:af551d95-3e64-4f36-a39c-36fec20a7fe0>
|
{
"dump": "CC-MAIN-2021-31",
"url": "https://pridedentaloffice.com/with-oral-cancer-early-detection-is-key/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154089.68/warc/CC-MAIN-20210731141123-20210731171123-00338.warc.gz",
"language": "en",
"language_score": 0.9315198063850403,
"token_count": 751,
"score": 2.734375,
"int_score": 3
}
|
In a recent episode of Who Do You Think You Are?, Lionel Richie found listings for his great grandfather, a man his family never talked about, in the Nashville city directories for 1880 and 1885. The occupation and address information provided for John L. Brown led Lionel to learn of his ancestor’s importance in the African American community through an organization known as the Knights of Wise Men.
Before we had phonebooks, we had city directories. They provide us with annual historical snapshots of a city’s residents, and give details of occupations, addresses, and relationships. Footnote has thousands of pages from hundreds of city directories from New York to California, from Louisiana to Wisconsin, and ranging in date from 1786 to 1926.
On one representative page in the 1861 Detroit City Directory we find coopers, photographers, teachers, printers, fur finishers, firemen, draymen, and washerwomen, among others. There are men and women; married, single, and widowed; and some are identified by race. We also find a unique story about a black man named James Robinson who “says he is 109 years old” and fought in the Revolutionary War.
Begin your city directory searches on the city directories title page where you’ll find links to search or browse within thirty major metropolitan centers in twenty states. You can also learn more by checking out the city directories description page.
Follow your ancestors, year by year, and build a history of where they lived and what they did for a living by exploring city directories at Footnote.com.
|
<urn:uuid:3bfdac75-31f1-46f2-83e4-6c8e57eb9924>
|
{
"dump": "CC-MAIN-2014-52",
"url": "http://blog.fold3.com/lionel-richie-discovered-his-great-grandfather-in-city-directories/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802769642.136/warc/CC-MAIN-20141217075249-00115-ip-10-231-17-201.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9555006623268127,
"token_count": 322,
"score": 2.5625,
"int_score": 3
}
|
The ant and the bee both hatched in the early spring and were taught their respective trades by their elders. Every day, the ant worked hard bringing food into the colony. And every day, the bee worked bringing food into its own colony. Throughout the spring, rain or shine, they would meet at a different flower in the garden and divide that day’s pollen so each colony would get enough. On particularly nice days, a grasshopper would come by to chat, but they ignored him, for the work was more important. Their queens demanded obedience.
Summer came, and they were able to work faster and more consistently. Every time they met, they would exchange brief greetings, and then get on with the work. The work was critical. Work was how the colonies would survive. How the colonies would thrive. As they worked, the grasshopper would look on, occasionally playing his fiddle* and trying to get them to take a break and relax with him. He was always unsuccessful.
As autumn came, both the ant and the bee began to slow down. They were getting old. However, they kept working. To not work was nearly unthinkable. The grasshopper attempted to sway them to his way of life, holding parties in different areas of the garden. However, each time one of them thought about giving in to relaxation and joy, they would look at the other, the ant drawing inspiration from the bee, and the bee getting support from the ant. Though it was harder, they kept working, and both of their colonies began to prepare for the winter. They knew their queens needed their help if the colony was to survive.
Winter began with a cold breeze and a quick frost. Neither the ant nor the bee could leave the colony that morning, and it wasn’t until the following day when the thin layer of ice melted and they could leave for the garden. There, they saw no more flowers to harvest. They saw that, finally, their work was done. As they investigated, they came across the dying grasshopper, caught in the early frost. As he lay there gasping** he admitted that there might be some value in hard work and apologized for distracting them so often. He wished he had worked hard to prepare for winter. And with that, he died.
With great senses of self justification, the ant and the bee each returned to their own respective colonies. However, it was cold, and journeys that once took only a few minutes, consumed the remainder of the day. Dusk was falling when each reached their own home. The bee found the hive door closed and no way to open it. The ant found all the entrances and exits blocked. Each colony had sealed for the winter.
Night came, and with it, another round of freezing cold. Both the ant and the bee died, near their former homes, wishing they had each taken some time to play and enjoy their lives, at least a little bit.
Meanwhile, in each colony, the queens laid next year’s worker eggs, so they could live another year in comfort and bliss.
Moral: Those in power screw over everyone else. Also, winter kinda sucks.
* It is worth noting, in the interest of scientific accuracy, that grasshoppers do not play literal fiddles. Instead they rub their legs against their wings, in a similar manner as fiddles, but without the little tuning pegs, so their range of sound is limited. This is why professional musicians do not play grasshoppers.
** Technically, grasshoppers don’t have lungs, but they do move their body as air rushes in and out of their spiracles. Since this doesn’t pass vocal cords, gasping for breath doesn’t interfere with communication as it does in humans.
|
<urn:uuid:3a150d27-fd1b-4a44-8c09-bd6e1d4a44a1>
|
{
"dump": "CC-MAIN-2022-40",
"url": "https://stories.starmind.org/the-fable-of-the-ant-the-bee-and-the-grasshopper/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335303.67/warc/CC-MAIN-20220929003121-20220929033121-00035.warc.gz",
"language": "en",
"language_score": 0.9897584319114685,
"token_count": 779,
"score": 3.359375,
"int_score": 3
}
|
Find the points $(x_i, y_i)$ at which each pair of equations intersect. There are three such pairs, so three points of intersection, which will be the vertices of the triangle. From the vertices $(x_i, y_i)$, you can determine the two vectors you need, which you can use as the columns of the matrix for which the absolute value of the determinant, multiplied by 1/2, will give you area.
Given $\;y = x$, $y = -3x+8$, and $3y + 5x = 0$
Vertex 1: At what point does $y = x$ and $y = -3x + 8$ intersect? When $x = -3x + 8$. Solving for $x$, gives us $x = 2$, which in this case, will also equal $y$.
So vertex 1 is $(2, 2)$. Proceed in a similar manner to determine:
Vertex 2: where $y = x$ and $3y + 5x = 0$.
Vertex 3: where $y - -3x + 8$ and $3y + 5x = 0$
|
<urn:uuid:93ed2baf-423b-459d-9db7-0f3b48b5ce29>
|
{
"dump": "CC-MAIN-2014-42",
"url": "http://math.stackexchange.com/questions/357533/find-area-of-triangle-given-its-equations/357537",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507443869.1/warc/CC-MAIN-20141017005723-00314-ip-10-16-133-185.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8859609961509705,
"token_count": 249,
"score": 2.875,
"int_score": 3
}
|
1K.V. Swathi Krishna*, 2K.B. Chandra Sekhar
1Dept. of Pharmaceutics, Saastra College of Pharmaceutical Education and Research, Nellore, A.P, India.
2JNTUA, Director, OTPRI, Ananthapuramu, Andhra Pradesh, India.
A B S T R A C T
Zika fever is an illness caused by the Zika virus, is a member arbovirus of the virus family Flaviviridae and the genus Flavivirus, transmitted by daytime-active Aedes mosquitoes, such as A. aegypti and A. albopictus. Symptoms are similar to other flaviviruses such as dengue fever or the alphavirus chikungunya, but are milder in form and usually last four to seven days. Most cases (60–80%) are asymptomatic. In May 2015, the Pan American Health Organization (PAHO) issued an alert regarding the first confirmed Zika virus infection in Brazil. The outbreak in Brazil led to reports of Guillain-Barré syndrome and pregnant women giving birth to babies with birth defects and poor pregnancy outcomes. There is currently no vaccine, but development is a priority of the National Institutes of Health. The virus is spread by mosquitoes, making vector control and avoidance an essential element to disease control.
Keywords: Zika fever, Zika Virus, Aedes mosquitoes, PAHO
|
<urn:uuid:35c7e532-ea61-4a7c-846a-818d13fc6fb3>
|
{
"dump": "CC-MAIN-2021-10",
"url": "https://www.pharmaresearchlibrary.com/zika-virus-a-globally-threatening-illness/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178350717.8/warc/CC-MAIN-20210225041034-20210225071034-00182.warc.gz",
"language": "en",
"language_score": 0.9153376817703247,
"token_count": 306,
"score": 3.125,
"int_score": 3
}
|
SMERSH, the counter-intelligence service that was launched back in 1943 by Josef Stalin himself released a book that includes the descriptions of some of the top agents of the service team that allegedly were a̳l̳i̳e̳n̳s all along.
This book was released back on January 13th, 1947, and ever since this was done many have stopped believing in the Russian government and more specifically in their response to an a̳l̳i̳e̳n̳ invasion of some kind.
How care we really trust them if they’ve been lying to us all along?
The book talks about how there were eight different classes or races. And it even includes drawings and information about each race in particular.
As time moved the information became more and more accurate as more and more pictures were taken of the creatures described in the SMERSH book. Testimonies of creatures running amok the fields, U̳F̳O̳s abducting humans. Even pictures of creatures walking around have all been added to the documents.
The book was officially owned by the K̾G̾B̾ after the USSR collapsed and a copy of it was made in Buryatia, Siberia which was later on leaked to the general public.
Fun fact, the popular gaming series known as Mass Effect, which was created by a Canadian company named BioWare was one of the companies that gained access to the book when it was released to the general public and used it as inspiration for their own game.
Many people discredit this book’s statements but there is simply put too much proof backing it up.
|
<urn:uuid:30c0e82d-5170-4ed8-b8dd-a5cd0c70d005>
|
{
"dump": "CC-MAIN-2023-40",
"url": "https://top10hitnews.com/2022/03/20/video-the-book-of-a%CC%B3l%CC%B3i%CC%B3e%CC%B3n%CC%B3-races-found-if-the-k%CC%BEg%CC%BEb%CC%BE-archives/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510983.45/warc/CC-MAIN-20231002064957-20231002094957-00621.warc.gz",
"language": "en",
"language_score": 0.9900990128517151,
"token_count": 347,
"score": 2.640625,
"int_score": 3
}
|
Fatty Acids: What are They and How Much Should I Have?
Why do I need fatty acids? Learn more about the types of fatty acids and how much you should be consuming in your diet.
Reading time: 2 minutes
Although we tend to hate fat on our hips, we need some fat to support our bodies. Plus the advice we get about fat intake can be confusing – we hear about different types of fats, and so-called fatty acids, and sometimes these terms get mixed up. So let’s break it down, and get the fat facts straight.
When nutritionists say “to cut fat”, it doesn’t necessarily mean all fats, becomes some fats are actually good for you. Fats are made up of different components. The most important of these are the fatty acids which are either saturated or unsaturated.
What makes a fat saturated or unsaturated?
Saturated Fatty Acid
Unsaturated Fatty Acids1
Solid at room temperature
Mainly found in meat or butter1
Other sources are in “guilty pleasure foods” (i.e. pizza, ice cream, cookies, fast food, etc.)1
Liquid at room temperature
Mainly found in fish
Other sources include vegetables and seeds
Consumption of high amounts of saturated fats is linked to heart disease2
Consumption may be beneficial to cholesterol levels, inflammation, stabilising heart rhythms, and supporting cognitive functioning
Saturated Fat, Unsaturated Fat
Solid at room temperature.
Mainly found in meat or butter.
Other sources are in “guilty pleasure foods” (i.e. pizza, ice cream, cookies, fast food, etc.), Liquid at room temperature.
Mainly found in fish.
Other sources include vegetables and seeds.
Consumption of high amounts of saturated fats is linked to heart disease, Consumption may be beneficial to cholesterol levels, inflammation, stabilising heart rhythms, and supporting cognitive functioning.
Unsaturated fats can be further divided into two additional types:
Monounsaturated (MUFAs), which have one double bond
Polyunsaturated (PUFAs) which contain more than one double bond, among which there are the essential fatty acids (Omega-3 and Omega-6) Learn more about essential fatty acids.
Many of the benefits of unsaturated fats are from essential fatty acids, unfortunately, more people may not get enough of these in their diet alone.
How much of each type should I have?
Fats should be a part of our diet as they do provide benefits to our body and mind—at the right amount and type. Based on the Nutrition Committee of the American Heart Association no more than 30% of your daily calories should come from fat, and of that 30%, less than7% should come from saturated fats. So, when choosing to consume fat, try for unsaturated!
|
<urn:uuid:77f46b5c-0485-4137-83d5-77a0f96264e1>
|
{
"dump": "CC-MAIN-2019-22",
"url": "https://www.equazen.com/essential-fatty-acids/fatty-acids-what-are-they-and-how-much-should-i-have/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232262311.80/warc/CC-MAIN-20190527085702-20190527111702-00478.warc.gz",
"language": "en",
"language_score": 0.9394170641899109,
"token_count": 601,
"score": 3.3125,
"int_score": 3
}
|
Dumbolf game - created using mathematics...
See below for the math in this game. Each game has sound. This game is courtesy of Gamesheep.
What Math did they use to Make this Game?
Vectors are used throughout this game. As you position the arrow (for direction) to make your shot, the length of the arrow indicates the magnitude of the vector and the direction the arrow is pointing is the direction of the vector. You can learn more in the vectors chapter.
There are acceleration and deceleration effects as the ball is acted on by gravity, it bounces and loses energy. See velocity and acceleration graphs.
The golf ball (and elephant) moves through the 2-dimensional Cartesian coordinate system.
See also Math in Computer Games.
Try another game?
|
<urn:uuid:0e59cfb1-766f-492e-a833-507ed05481c7>
|
{
"dump": "CC-MAIN-2017-04",
"url": "http://www.intmath.com/games/games.php?a=0",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280280.6/warc/CC-MAIN-20170116095120-00341-ip-10-171-10-70.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9389632344245911,
"token_count": 164,
"score": 3.71875,
"int_score": 4
}
|
Chinese in the Frontier West is part 2 of a larger documentary titled Ancestors in the Americas. Because we will not screen part 1 we’ll miss out on some interesting history– for example the arrival of Chinese and Filipino sailors in Mexico in the 17th century. Yet there’s a wealth of information in CFW which can help us to make sense of the social topography of Machine Age America.
Recall how the film begins with the search for photographic evidence of Chinese labor, evidence which seems strangely absent. Such gaps in the archive are in their own way instructive: who is missing? Which stories do not get told? Whose experiences do we need to recover in order to establish a fuller, richer account of the past?
Most of the immigrants from China during the antebellum period came from either Guangdong or Fujian, two provinces in the south east, in particular the Pearl River Delta region. Primarily young men, they were the first non-white foreigners to arrive in the US and, as the film relates, were subject to a variety of legal provisions segregating and, indeed, oppressing them. The 1790 Naturalization Act, the Foreign Miners’ Tax, the Dred Scott decision (the precedent for People vs. Hall), the Page Law, various local regulations such as the Sidewalk Ordinance and the Cubic Air Ordinance: all of which constituted forms of legal harassment intended to specifically target Chinese. Against that official discrimination, Chinese mobilized to assert their claim to the rights of citizenship through court cases. As Suecheng Chan remarks, this strategy of challenging unjust laws on their own terms was something Chinese communities adapted to– there were no such opportunities in China.
If we’re to gain insight into the Chinese American experience it might help to re-center our view of the world. The ability to grasp history often depends on the capacity for a spatial imagination. Here’s a map of the Pacific Rim:
The Pacific Ocean functions as a kind of continent in its own right, to be crossed on the way to Jinshan (Gold Mountain). Now consider the following two representations of the world. The first version is one we’re all likely familiar with, a Mercator Projection:
Now compare with the map below, the Peters Projection:
The Peters Projection offers a truer scale for the continents. The relative area of land masses are more accurate, though it does this at the expense of outline detail. Turning a three dimensional object, a sphere, into a two-dimensional image always involves a degree of distortion. The Mercator is good at representing shape, while the Peters is good at representing size. Do you see the difference?
Finally, a map of the expansion of the United States across the North American continent:
It’s important to consider what was required to claim such a vast space– the physical forces, daily experiences, and material conditions that came into play in the project to consolidate the continent. Chapter 16 if the Norton offers a very useful account of the settlement of the “far west.” Be sure to read it.
|
<urn:uuid:bcf3b882-fe46-41ca-802e-351a9b64d481>
|
{
"dump": "CC-MAIN-2022-05",
"url": "https://analepsis.org/category/asian-america/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304749.63/warc/CC-MAIN-20220125005757-20220125035757-00156.warc.gz",
"language": "en",
"language_score": 0.9495755434036255,
"token_count": 642,
"score": 2.96875,
"int_score": 3
}
|
When solving word problems involving shapes and perimeter, you need to: pediatrician research paper khan academy is a 501(c)(3) nonprofit organization solving perimeter is been a helping verb and area problems. formula for finding the area and perimeter problem solving order of apa paper area of a square. classify quadrilaterals area / perimeter essay and glamour please of rectangles (metric). to close the lesson, share with students how the skills of area and perimeter problem solving area and perimeter have a real-world connection this problem challenges you to create shapes with different areas and perimeters. children are asked to show their work worksheets > math > grade 5 > geometry. perimeter of a triangle: after defining the differences and procedure for finding area and perimeter, they use what is an research paper their area and perimeter problem solving t-charts to write and solve word problems involving area and perimeter area and perimeter – problem sums. learn with flashcards, games, and more — for free this problem solving with area perimeter lesson plan is suitable for 3rd – 5th grade. 30 pages of area and perimeter government essay topics problem solving checklists. reading and plotting points on a coordinate grid is also …. here is a collection juxtaposition vs antithesis of our printable worksheets for topic ethics essay examples area and perimeter of chapter perimeter, area, and volume in section essay about mexico measurement. this collection of rich tasks is intended to area and perimeter problem solving help you to develop these …. a = length of side. essay on the road with a perimeter of 20, a square will form an area of 25. rectangles and rectangular shapes this is a problem no homework persuasive essay information solving lesson in which we solve several problems involving both area and perimeter of rectangles or rectangular shapes.
|
<urn:uuid:5371dc8b-a6c8-4cf5-9dad-57e82e9cd965>
|
{
"dump": "CC-MAIN-2020-40",
"url": "https://academicassignmentwriting.xyz/2020/09/12/area-and-perimeter-problem-solving_qf/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400249545.55/warc/CC-MAIN-20200926231818-20200927021818-00754.warc.gz",
"language": "en",
"language_score": 0.928521454334259,
"token_count": 365,
"score": 3.90625,
"int_score": 4
}
|
There is one problem with the Hollywood movies showing Moses coming down Mount Sinai with the two tablets of the covenant law in his hands. The Hebrew letters shown etched into the tablets did not exist in Moses time. The real tablets must have looked slightly different…
Proto-Canaanite writing was used in the period between 17 B.C.E until 12 B.C.E, the time of the forefathers Abraham, Isaac and Jacob, including the period of time the children of Israel spent in exile in Egypt. In Nablus, Gezer and Lachish, very short inscriptions were found on shards of pottery. Longer ones were found in Sinai. There were approximately 30 symbols on the Canaanite inscription. Each drawing symbolized a letter.
Paleo-Hebrew was adopted the alphabetic script together with other cultural values from the Canaanites in the 12th or 11th century B.C.E. They followed the current Phoenician script until the ninth century, when they began to develop their own national script. The earliest known inscription in the Paleo-Hebrew alphabet was discovered on the stone on a wall at Tel Zayit, in the Beth Guvrin Valley in the lowlands of ancient Judea. The 22 letters were carved on one side of the 38 lb stone (17 kg) – which resembles a bowl on the other. Next would be the Gezer calendar dated to the late 10th century BCE. The script of the Gezer calendar bears strong resemblance to contemporaneous Phoenician script from inscriptions at Byblos. Clear Hebrew features are visible in the scripts of the Moabite inscriptions of the Mesha Stele. From the 8th century onward there was a gradual spread of literacy among the people of the Kingdom of Israel and the Kingdom of Judah.
The meanings of the Proto-Hebrew drawn letters:
- aleph – To represent the word אַלּוּף(aluf), a head of a bull.
- bet – From the wordבַּיִת (bayit), a square shape which represents home.
- gimel – To represent a throw stick, boomerang.
- dalet – To represent the word דַּג (dag), a fish.
- heh – To represent הֵיי (hey), a man calling out “hey”.
- vav – From the word וָו (vav), a peg knocked into walls to be used as a hook.
- zayin – The meaning of this shape is unclear.
- chet – This seems to derive from חוּט (choot), a piece of string.
- tet – This might be to represent a roll of string, however the connection between the sound “t” and a role of string is unclear.
- yood – From the word יָד (yad), an arm.
- kaf – To represent the word כַּף יָד (kaf yad), the palm of a hand.
- lamed – From the word מַלְמָד(malmad). This is a goad used by a herdsman to guide the cattle. Malmad comes from the word “to teach“ (lelamed in Hebrew), but is obsolete these days.
- mem – From the word מַיִם (mayim), water.
- noon – To represent the wordנָחָשׁ (nachash),a snake.
- samech – The meaning of this shape is unclear.
- a’yin – To represent the word עַיִן (a’yin), an eye.
- pey – To represent the word פִּנָּה (pina),a corner in a room.
- tzadi – To represent the word צֶמַח (tzemach),a plant.
- kuf – The meaning of this shape is unclear.
- resh – To representרֹאשׁ (rosh), a human head.
- shin – This might be a bow (keshet) or breasts (shadayim).
- tav – To represent the word תָּו (tav),a sign, a note.
(1) Aḥiram sarcophagus, c. 1000 B.C.E., Phoenician
(2) Gezer Calendar, late tenth century B.C.E., Hebrew
(3) Mesha stele, mid-ninth century B.C.E., Moabite
(4) Samaria ostraca, eighth century B.C.E., Hebrew
(5) Bar-Rekub stele, late eighth century B.C.E., Aramaic
(6) Siloam inscription, c. 700 B.C.E., Hebrew
(7) Meẓad Ḥashavyahu ostracon, late seventh century B.C.E., Hebrew
(8) Saqqara papyrus, c. 600 B.C.E., Aramaic
(9) Hebrew seals, late seventh-early sixth century B.C.E.
(10) Lachish ostraca early sixth century B.C.E., Hebrew;
(11) Elephantine papyrus, late fifth century B.C.E., Aramaic
(12) Eshmun’azor inscription, fifth century B.C.E., Phoenician
(13) Exodus scroll fragment, second century B.C.E., Paleo-Hebrew
Aramaic – Ancient Hebrew writing reached its peak at the time of the first temple. Nations living in the region of the land of Israel were influenced by the Hebrew writing and used it as well. However, at the end of the first temple period, the Aramaic language began to develop. This language, which was very similar to ancient Hebrew, was affected later on by Phoenician writing and slowly began to differ from Hebrew writing, which was dominant until then. In 7 and 8 B.C.E., the Assyrian kingdom increased in greatness and size and ruled over many nations that spoke different languages and used various systems of writing. The Assyrians decided to make Aramaic the official language of the empire. This decision promoted the usage of Aramaic and eventually helped it become an international language. The development of Aramaic reached its peak at 5 B.C.E. Hebrew writing was not very popular at the time and was rarely used. Aramaic lost its glory with the fall of the kingdom of Assyria and the rise of the Persian Empire. Although Greek became very popular at the time, many nations began developing a new written language, which was based on Aramaic and some Greek influences.
Modern Hebrew Letters – The Jewish people developed a new system of written Hebrew. Many of the letters included four-sided shapes. The letters ך, ם ,ן ,ף ,ץ developed at that time. We know the term “Jewish writing” existed since the time of the House of Hasmoniea. The ancient form of written Hebrew was no longer in use. The Judea Desert scrolls are the classic example of Jewish writing. These scrolls, written at the time of the Second Temple, demonstrate very clearly the four-sided shape of the letters. The fact that even today, any Hebrew speaker is able to read these scrolls, indicates that very few changes have been made in written Hebrew over the past 2,000 years.
|
<urn:uuid:7fd32667-688e-4fff-b8e2-8dcdad736580>
|
{
"dump": "CC-MAIN-2017-39",
"url": "http://www.onjewishmatters.com/the-evolution-of-the-hebrew-letters/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818696182.97/warc/CC-MAIN-20170926141625-20170926161625-00207.warc.gz",
"language": "en",
"language_score": 0.9366984367370605,
"token_count": 1631,
"score": 3.53125,
"int_score": 4
}
|
It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
NANOTECH HEALTH APPLICATIONS
The small size of nanoparticles endows them with properties that can be very useful in oncology, particularly in imaging. Quantum dots (nanoparticles with quantum confinement properties, such as size-tunable light emission), when used in conjunction with MRI (magnetic resonance imaging), can produce exceptional images of tumor sites. These nanoparticles are much brighter than organic dyes and only need one light source for excitation. This means that the use of fluorescent quantum dots could produce a higher contrast image and at a lower cost than today's organic dyes. Another nanoproperty, high surface area to volume ratio, allows many functional groups to be attached to a nanoparticle, which can seek out and bind to certain tumor cells. Additionally, the small size of nanoparticles (10 to 100 nanometers), allows them to preferentially accumulate at tumor sites (because tumors lack an effective lymphatic drainage system). A very exciting research question is how to make these imaging nanoparticles do more things for cancer. For instance, is it possible to manufacture multifunctional nanoparticles that would detect, image, and then proceed to treat a tumor? This question is currently under vigorous investigation; the answer to which could shape the future of cancer treatment.[2
From Wiki article
|
<urn:uuid:b4fa93db-8c5f-4d65-9510-9e3b962de63f>
|
{
"dump": "CC-MAIN-2017-34",
"url": "http://www.abovetopsecret.com/forum/thread342713/pg1",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886112533.84/warc/CC-MAIN-20170822162608-20170822182608-00535.warc.gz",
"language": "en",
"language_score": 0.903789222240448,
"token_count": 314,
"score": 3.046875,
"int_score": 3
}
|
Economy One-Liners for various competitive examinations
Thank You for landing the Economy and Business section page.
Here are some important Economy one-liners for students competing for various exams
Watch some of the important Economy Bits below.
1- The principal sources of revenue to the State Government in India is__?
2-The philosophy of ‘Laissez-faire’ is associated with?
3-When did India become a member of the International Monetary Fund (IMF)?
4-When was the National Bank for Agriculture and Rural Development (NABARD) set up?
5-Which Indian got Nobel Prize for Economics?
6-Bad money (if not limited in quantity ) drives good money out of circulation.” is the law known as__?
7-Name the oldest insurance company of India?
8-Where in India, coins are minted?
9-Short-term finance is usually for a period ranging up to?
10-The main source of National Income in India is__?
11-Who presented the first union budget of Independent India?
12-The difference between GNP & GDP is__?
13- Which plan is also known as ‘Gadgil Yojana’?
14-Which ministry formulates fiscal policy?
15-What is the highest denomination of currency notes in circulation as legal tender in India at present?
16-Brent Index is associated with __?
17-Who is the chairman of 14th Finance Commission?
18-Who has presented the Union Budget of India the maximum number of times?
19-Who is called the ‘Father of Economics’?
20-States earn maximum revenue through?
|
<urn:uuid:ad1135c6-7cf2-44a3-aed0-8e1a17ed3f36>
|
{
"dump": "CC-MAIN-2022-27",
"url": "https://gkquickfacts.com/economy-3/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103036176.7/warc/CC-MAIN-20220625220543-20220626010543-00313.warc.gz",
"language": "en",
"language_score": 0.9225888252258301,
"token_count": 357,
"score": 2.796875,
"int_score": 3
}
|
GIS at NCI
Communicating Georeferenced Statistics
State Cancer Profiles
The State Cancer Profiles website brings together data collected from public health surveillance systems in order to characterize the cancer burden in a standardized manner. It is hoped that health planners, policy makers and cancer information providers will be be able to use these descriptive cancer statistics to prioritize investements in cancer control.
- Goal: Focus cancer control efforts on places and persons who can most benefit.
- Audience: Health planners, policy makers, and advocates.
- Approach: Use interactive data visualization tools to explore the U.S. cancer burden.
Example: Linked Micromap Plots (LMPlots) go from Paper to the Web
The process of getting LMPlots from paper to the website. [D]
B. Cancer Mortality Maps
The Cancer Mortality Maps website provides dynamically generated maps for the time period 1950-2004 (1970-2004 only for Blacks). It also has archived maps and graphs from the publication, Atlas of Cancer Mortality in the U.S., 1950-94. Its features include:
- Dynamic, accessible graphs
- Interactive maps
- Downloadable data
Cervix uteri cancer mortality, white females, 1950-94
|
<urn:uuid:0b685b0c-8f86-4f3a-bf28-88c677253ee3>
|
{
"dump": "CC-MAIN-2021-17",
"url": "https://cybercemetery.unt.edu/archive/oilspill/20130214221052/http:/gis.cancer.gov/overview/georeferenced_statistics.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038076454.41/warc/CC-MAIN-20210414004149-20210414034149-00027.warc.gz",
"language": "en",
"language_score": 0.8394620418548584,
"token_count": 259,
"score": 2.84375,
"int_score": 3
}
|
CMHA Mental Health for All Conference 2016
Using Film to Create Relational Support and Encourage Early Intervention on Postsecondary Campuses
Movies for Mental Health is an evidence-based program designed to use artistic expression to expose the complicated, personal issues related to mental illness and to create a platform for art to have a positive social impact on young people. This interactive session will actively engage participants in a discussion and demonstration of the role film can have in reducing stigma related to mental illness and encouraging early intervention.
- Demonstrate the benefits of using short film to engage students in safe discussion and how this effectively mobilizes them to access available resources.
- Show compelling films that portray the daily realities of living with, and managing mental health issues.
- Display the connective superpower of art and its impact on compassion and a reduction in self stigma.
- Provide an overview of how to give youth opportunities to be change makers and leaders engaged in community wellness.
|
<urn:uuid:69a965d7-96ee-46b9-bee4-5bcdd417ab84>
|
{
"dump": "CC-MAIN-2019-47",
"url": "https://artwithimpact.org/event/cmha-mental-health-conference-2016/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669868.3/warc/CC-MAIN-20191118232526-20191119020526-00307.warc.gz",
"language": "en",
"language_score": 0.8954359889030457,
"token_count": 192,
"score": 2.71875,
"int_score": 3
}
|
Individuals have variety of differences. Some individual differences are natural to humans which cannot be controlled or changed and some can be changed and controlled by human beings living in society. These are the differences which makes humans different in various fields of life.
Below are the two functions of educational psychology 1. To develop theories of learning and teaching and 2. To formulate practical suggestions for the teaching learning processes
Pavlovs classical conditioning theory considers learning as habit formation and is based on the principle of association and substitution. It is simply stimulus-response type of learning where in place of a natural stimulus like food, water, and sexual contact etc. the artificial stimulus like sound of a bell, sight of the light of a definite color etc.
Carl Rogers was born on January 8th, 1902 in Chicago, USA. Carl Rogers was born on January 8th, 1902 in Chicago, USA. After some practical experience in the field of psychology, in 1940s and 1950s he developed this theory which is also known as Carl Rogers Persons Center Theory.
Though there are various agents which have great influence upon the social development of child. But still teacher and school also have effective role to be played in order to develop the balanced personality of a child. The followings are some suggestions which a teacher must keep in mind in relation to the social development of a child in educational context.
With the spirit of inquiry goes an attitude of respect for children at all stages of their growth. This respect is built on the view that the experiences which a child undergoes at any stage of his growth, whether he be a newborn baby, a toddler, a school age youngster, or an adolescent, are as important to him at his level of maturity as are experiences which befall an adult.
Teacher is like a philosopher who guides his student. He is responsible to be aware about growth and development of the students. It is educational psychology which enables the teacher to use various techniques. The importance of educational for teachers has the following points:
Educational psychology is the branch of psychology, so educational psychology uses all those methods for data collection which are used in general psychology to get the maximum data and information about various human behaviors in order to arrive on conclusion. The following are the main data collection method
|
<urn:uuid:9f994b95-a316-446d-9410-2a766f1c35cd>
|
{
"dump": "CC-MAIN-2019-26",
"url": "http://www.studylecturenotes.com/educational-psychology?page=1",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998473.44/warc/CC-MAIN-20190617103006-20190617125006-00455.warc.gz",
"language": "en",
"language_score": 0.9713836312294006,
"token_count": 457,
"score": 3.71875,
"int_score": 4
}
|
Welcome to the January 23, 2009 edition of ACM TechNews, providing timely information for IT professionals three times a week.
HEADLINES AT A GLANCE
Worm Infects Millions of Computers Worldwide
New York Times (01/23/09) Markoff, John
A computer worm is infecting millions of computers in what could be the first part of a multi-stage attack. The worm, known as Conflicker or Downadup, has spread by exploiting a recently discovered Microsoft Windows vulnerability that involves guessing network passwords and using portable devices such as USBs to spread. Experts say the worm has led to the worst infection since the Slammer worm in January 2003, and it may have infected as many as 9 million PCs worldwide. Many computer users may not notice that their machines have been infected, and computer security researchers say they were waiting for infected computers to receive instructions so they can determine the intended purpose of the botnet. Infected computers may run programs in the background to send spam, infect other computers, or steal personal information. Microsoft released an emergency patch to eliminate the vulnerability in October, but the worm has continued to spread. Security researchers at the Qualys security firm estimate that about 30 percent of Windows-based computers attached to the Internet remain vulnerable because they have not been updated with the patch. "I don't know why people aren't more afraid of these programs," says Georgia Institute of Technology professor Merrick L. Furst. "This is like having a mole in your organization that can do things like send out any information it finds on machines it infects."
A More Attractive European Research Area But Stagnating EU R&D Intensity
European Research Area (01/22/09)
The European Research Area's new 2008 Science, Technology and Competitiveness report provides an overview of progress made from 2000 to 2006 in European Union (EU) research and development (R&D) investments. The report says the number of researchers in Europe is growing, as the EU has become a more attractive place for foreign researchers and private R&D investment from the United States. However, the report says that R&D expenditure as a percentage of the gross domestic product (GDP) has stagnated at 1.84 percent. Even with bigger investments from many EU member states and a more efficient research system, the EU is still well short of its target of investing 3 percent GDP in R&D. Both the Science, Technology and Competitiveness report and the 2008 Innovation Scoreboard say the EU must change its industrial structure, focus on innovation, and ensure more and better use of R&D. "In a time of crisis, it is not the moment to take a break in research investments and in innovation," said EU commissioner for science and research Janez Potocnik and vice president Gunter Verheugen in a statement released with the report. "The commission's initiatives to improve the EU's research efficiency, to stimulate innovation, and to develop high tech markets are putting the EU on the right tracks."
SIGGRAPH Asia 2008 a Convergence of Different Media
Asia Pacific Broadcasting (01/23/09)
One of the major features of the first ACM SIGGRAPH Asia Conference and Exhibition, which ran from Dec. 10-13, 2008, at Suntec Singapore, was the convergence of different media capitalizing on computer graphics. The conference's Art Gallery featured digital media artwork created using a variety of formats. ACM says half of the material displayed at the gallery was developed in Asia. ACM says that Asian submissions to the SIGGRAPH Technical Papers program increased 300 percent between 1998 and 2005. "Asia is fast making its mark globally in the field of computer graphics and interactive techniques, and SIGGRAPH Asia has the numbers to support this," ACM said. Animation fans were able to view special effects screenings at the Computer Animation Festival, where China, Japan, and South Korea contributed close to half of the 685 submissions. Some of the popular attractions included a Lucas Animation stand where attendants could hear speakers from Lucasfilm Animation Singapore, and the Autodesk Asia booth, where software for films, games, TV, and design visualization were being demonstrated.
New Administration, Congress Aim to Boost Federal R&D
HPC Wire (01/21/09) Feldman, Michael
The Obama administration and the U.S. Congress want to provide significant new funding for science and technology research and development. The America COMPETES Act, ratified in 2007, supported doubling the funding for basic research programs in nanotechnology, alternative energy, and supercomputing, but the funding never reached the levels stipulated by the legislation. U.S. government spending on physical sciences R&D has generally declined since the 1990s and President Obama has repeatedly urged a doubling of federal funding for basic research over 10 years. The American Recovery and Reinvestment Act, currently before Congress, would provide $10 billion toward science facilities, research, and instrumentation. The National Science Foundation would receive $3 billion, including $2 billion for expanding employment opportunities in fundamental science and engineering. It also would receive $400 million to build major research facilities for cutting-edge science, $300 million for major research equipment for institutions of higher education and other scientists, $200 million to repair and modernize science and engineering facilities, and $100 million to improve science, math, and engineering education. The National Institutes of Standards and Technology would receive $300 million for competitive construction grants for research science buildings at colleges, universities, and other organizations and to coordinate research efforts between laboratories and national research facilities by setting interoperability standards. The Advanced Research Project Agency would receive $400 million of the Energy Department's $1.9 billion to support high-risk, high-payoff research into energy sources and energy efficiency.
IT Professionals See Salary Increase But Job Security Remains Top Concern
eWeek (01/22/09) Ferguson, Scott
The average IT salary rose 4.6 percent to an average of $78,035 in 2008, and by more than 5 percent to an average of $87,257 for IT professionals working in the banking and financial services industry, according to Dice. IT professionals with an IT management title earned the most with an average of $111,998. The 2008-09 Annual Salary Survey found that salaries increased significantly in major technology centers such as New York, Silicon Valley, and Washington, D.C., as well as in nontraditional tech areas such as Charlotte, N.C., and St. Louis. Dice conducted the survey between August and November, and also asked more than 19,000 technology workers about their concerns heading into the new year. Updating their skills was cited by some 22 percent, followed by layoffs at 20 percent, lower salary increases at 14 percent, canceled projects at 12 percent, and an increased workload due to staffing cuts at 10 percent. Dice also says there was a 67 percent increase in new resumes posted to its site in the fourth quarter of 2008, but adds that most job searches were "passive."
Overseas Tech Student Numbers Up
Australian IT (01/20/09) Bingemann, Mitchell
International demand for IT-related degrees continue to grow, and enrollments in IT-related fields has remained strong in Australia, with several universities recording significant increases. Queensland University of Technology (QUT) says it recorded a 65 percent increase in acceptances from international students looking to enroll in IT-related degrees this year. "Generally, when there are recessions, universities do well because people want to become more employable by attaining more knowledge and qualifications," says QUT science and technology dean Simon Kaplan. Griffith University School of Information and Communication Technology head Michael Blumenstein also expects to see a growth in foreign student enrollment. Local enrollment in IT-related courses also is strong at QUT and Griffith University. "When the economy was strong last year we experienced a 27 percent increase in IT enrollments," Blumenstein says. "At the very least we will maintain those numbers." However, James Thom, head of the Royal Melbourne Institute of Technology's School of Computer Science says the school is expecting a slight drop from 2008 enrollment figures. "There is still not enough students choosing IT as a career and once the economy picks up there will be a big shortage of IT graduates to take up the work," Thom says.
Crowd-Sourcing the World
Technology Review (01/21/09) Greene, Kate
Santa Fe Institute research fellow Nathan Eagle is launching txteagle, a project that will distribute tasks using cell phones in an effort to leverage an underused workforce in some of the poorest parts of the world. Eagle says using text messages or audio clips to distribute questions to participants in developing countries could make some tasks, such as translating documents into other languages or rating the local relevance of search results, more economical while providing a source of income for those in need. Nokia has partnered with Eagle on the txteagle project, which Eagle says will demonstrate how companies can benefit from this strategy. For example, Kenya has more than 60 fundamentally different languages. Nokia wants to provide phones to everyone in their native language, but has no idea how to translate words, such as "address book," into each language, which could be done by the phones' users. Another application could be audio transcription. By sending users a short audio message, and having them transcribe that message and send the transcription back as a text message, audio could be transcribed for about $3 an hour, which is 60 percent cheaper than current transcription rates.
Managing an Ocean of Data
Dalhousie University (Canada) (01/20/09) Comeau, Billy
The Platform Ocean Knowledge Management (POKM) network enables scientists to combine research from multiple institutions to better understand issues such as coastal flooding and marine animal behavior. POKM is a partnership between the Dalhousie University Faculty of Computer Science and the Ocean Tracking Network (OTN). The Web-based platform will enable researchers to share scientific work and collaborate in real time regardless of their location. "The platform is ubiquitous to the worldwide community," says Dalhousie professor Raza Abidi. "Now information is not only accessible, but can be shared and moved from anywhere in the world in real time." OTN research director Mike Stokesbury says all end users will now have the same response and turnaround time regardless of their location or the location of the data. "We expect to discover relationships between marine life and their physical environments that no one has expected, let alone been able to test," Stokesbury says. Abidi says POKM's architecture provides a series of Web services divided into self-contained steps with unique functions to allow researchers to arrange them into any order to produce different outcomes.
Searching for Pervasive Computing's Middleware Middleman
Missouri University of Science and Technology (01/15/09)
The middleware concept could be the key to pervasive computing, says Missouri University of Science and Technology (S&T) professor Ali Hurson. Hurson says that a middleware solution could be used to connect devices that would take on a greater role in the daily affairs of humans. Hurson is currently involved in an airport security project that would have a middleware application serve as the intermediary for cameras, chemical-sniffing devices, and motion sensors. The middleware program would be connected to the databases and information networks of the Federal Bureau of Investigation, the National Security Administration, and local police, and would warn law enforcement agencies of any suspicious activity at airports. Hurson says sensors are capable of adapting to different uses because of their flexible design, and software agents could potentially be used to spread throughout a network and remotely reprogram nodes. "These networks have been created in isolation," he says. "Now we want to establish interoperability to serve future applications." Hurson also wants to create a pervasive computing laboratory at Missouri S&T.
New Report Reveals That Girls Have the Edge in New Technologies
University of Hertfordshire (01/20/09) Murphy, Helene
More girls are using computers at home than boys, and mothers are usually assisting their children with the technology, according to the new Learning in the Family report. In the survey of thousands of children aged six to 14, 94 percent of the girls said that they used a computer or laptop compared with only 88 percent of the boys. Fifty percent of children chose their mothers to help them use the computer, compared with 22 percent who chose their fathers. "Overall, mothers are more likely to engage with their children using new technologies especially when it comes to formal learning or research," says University of Hertfordshire professor and study co-author Karen Pine. Robert Hart of Intuitive Media Research Services, which commissioned the report, adds that "fathers join in to a lesser extent but encourage children with the fun aspects and help them with their hobbies." The study also found that 40 percent of children want their parents to help them more with computers.
Tests That Show Machines Closing in on Human Abilities
New Scientist (01/22/09) Barras, Colin
Tests indicate that machines are coming closer and closer to mimicking human abilities to such a degree that people may mistake them for human. Computer animation and robotics have made strides in traversing the "uncanny valley"--the point where people are repulsed by objects that look close, but not close enough, to being human. University of Southern California researcher Paul Debevec developed an artificial character modeled after an actual person, and overlaid the character's face onto video of the person's body. Meanwhile, Osaka University roboticist Hiroshi Ishiguro has developed androids that can replicate micro-movements produced subconsciously by humans, which adds to the illusion that they are real people. Some advances focus on emulating human skills, with one example being Continuator, a robot that can duet with live musicians in real time by "listening" to a musical phrase and then calculating a complementary phrase with the same playing style. Two years ago, University of California, San Diego researcher Lindsay Oberman and colleagues analyzed the brain activity of students watching video footage of a five-fingered robot hand and control footage of static noise, and discovered that the observation of the hand sparked activity in the students' mirror neurons, which are roused when they see someone performing a physical action they might perform themselves. "If we want humanoid robots to teach or have other social functions, we need them to trigger mirror neurons," Oberman says.
Human Face of the Human Interface
Inquirer.net (01/19/09) Grossman, Wendy M.
John M. Carroll, founder of the User Interface Institute at IBM's Watson Research lab and a professor at Pennsylvania State University, says the ability to pick up a new device and start using it without having to read a manual is a result of the hard work of human factors researchers. Technology interfaces have improved significantly over the years, Carroll says, who notes that the Web is well crafted in many ways for designing easy software. However, he says there are still several areas where designers miss. Too often, creating an "intuitive" interface means recreating something the user is accustomed too, but humans are constantly evolving and changing. "I think people think of help systems and user interface agents by constructing a theory of mind, and the problem is that if the theory of mind is very simple and boring then it might actually be useful--predictable, understandable," Carroll says. "But if you try to get beyond that, and especially if you lie--and by lying I mean cases where designers have gone to some effort to project intelligence that their software does not have in any serious sense--it may have it in an idealistic sense but it doesn't do anything intelligent, creative, human--you get a breakdown."
HP Grants Aim to Redesign College Engineering
eSchool News (01/20/09)
Hewlett-Packard has made more than $2.4 million in cash and equipment available for its "HP Innovations in Education" effort, which aims to reinvent undergraduate computer science and engineering programs through the use of technology. HP is asking for proposals from two- and four-year colleges and universities that offer degrees in engineering, computer science, or information technology. Grant projects must explore the potential for innovation through the intersection of teaching, learning, and technology, with the ultimate goal of "re-imagining undergraduate engineering education." HP plans to award about 10 grants to public or private colleges or universities in the United States. Each grant will include more than $240,000 in HP technology, cash, and professional development. Proposals should describe how the technology will enable innovation in four areas: Leadership Capacity, or creating a global network of administrators and faculty to implement innovative approaches; Digital Learning Environments, or using technology to fundamentally redesign the learning experience in ways that increase student engagement in academic success; the Undergraduate Design and Research Experience, to make engineering real and relevant by involving engineering undergraduate students in design and research challenges that address the needs of society; and Pre-College Outreach, to encourage administrators, faculty, and undergraduate students to work with secondary-school teachers and students to increase student awareness and interest in high-tech programs.
K-State Computer Engineers Working on System That Can Use the Internet to Track Human and Animal Diseases by Extracting Information From Web Sites
Kansas State University News (01/13/09) Hsu, William
Kansas State University (KSU) researchers are developing a system capable of searching the Internet for information pertaining to disease outbreaks. The system can scour news stories and other public online information sources to find clues about where diseases have started, how many animals were involved, and how the diseases spread. This information could be used to plot outbreaks and governmental responses. KSU professor William Hsu says that developing the proper tools could allow such information to be presented as timelines or maps. A major challenge for the project, which is backed by a U.S. Defense Department grant, is that valuable pieces of information are often imbedded in the text of news stories and not in an easily read database. Many Web pages also have banner ads, making it difficult for computers to determine where the text begins and ends. Hsu says his system includes software that will clip text more accurately. Research on the system was presented at the International Conference on Artificial Neural Networks in Engineering in St. Louis in November, and at the International Conference on Database and Expert Systems Applications in Turin, Italy, in September. Hsu also is working with professor Doina Caragea to create networks that link proteins to one another and genes to one another in an organism, which could be used to understand gene function.
How Google Is Making Us Smarter
Discover (01/15/09) Zimmer, Carl
Various articles have recently appeared that question whether blogs, text messaging, and the Internet are making people less intelligent. "As we come to rely on computers to mediate our understanding of the world, it is our own intelligence that flattens into artificial intelligence," wrote Nicholas Carr in a recent Atlantic article. However, others say that few of the threats and warnings addressed in these articles are based in fact. For example, English linguist David Crystal disputes the idea that texting is ruining people's spelling by arguing that texting actually improves literacy as it provides more opportunities to practice writing and reading. Other warnings are based on popular misconceptions of how the mind works. Some argue that the Internet and technology are blocking the natural world from reaching the mind, but in fact that mind appears to be adapted for reaching out and making the world, including technology, an extension of itself. Two philosophers, Andy Clark and David Chalmers, explain the idea of the expanding mind by providing two examples--a women capable of remembering the address of the Museum of Modern Art after hearing about a specific display, and a man with Alzheimer's who must look up the address in his notebook after hearing about the display. Clark and Chalmers argue that the woman's brain and the man's notebook, and now technology, are fundamentally the same. The woman is capable of recalling information offhand while the man uses his notebook, a part of his extended mind, to recall information.
Abstract News © Copyright 2009 INFORMATION, INC.
To submit feedback about ACM TechNews, contact: email@example.com
Change your Email Address for TechNews (log into myACM)
|
<urn:uuid:a99c5bfb-59b0-48ce-bd12-8abfc4dc6bcf>
|
{
"dump": "CC-MAIN-2014-15",
"url": "http://technews.acm.org/archives.cfm?fo=2009-01-jan/jan-23-2009.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537754.12/warc/CC-MAIN-20140416005217-00614-ip-10-147-4-33.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9514123797416687,
"token_count": 4194,
"score": 2.671875,
"int_score": 3
}
|
The architect Gabu Heindl and the artist Eduard Freudmann won “From Those You Saved”, an international competition to “commemorate Poles who rescued Jews during the German occupation”.
“If I am not for myself, who is for me?
And if I am only for myself, what am I?
And if not now, when?”
Chapters of Fundamental Principles (Pirkei Avot 1:14)
“Do not scorn any man, and do not discount any thing.
For there is no man who has not his hour, and no thing that has not its place.”
Chapters of Fundamental Principles (Pirkei Avot 4:3)
… is a Dilemma.
… is a Forest Nursery.
… is a Process.
… may be a Forest.
… may be a Failure.”
Title of the winning proposal to commemorate the Polish Righteous
The Monument Initiative
The idea to dedicate a monument in Warsaw to the commemoration of the Polish Righteous gentiles was first presented by Children of the Holocaust, a Warsaw-based association of individuals who survived the Shoah as children, many of them with the help of Righteous gentiles . The idea was then adopted and promoted by Sigmund Rolat, a Polish-American philanthropist and Shoah survivor who has been very engaged in commemoration activities in Poland during the last years. He announced he himself would donate and fundraise money to cover the costs of the monument. His initiative received the support by the then-president of Poland, Bronisław Komorowski. However, it also faced strong criticism from Jewish-Polish intellectuals due to its envisioned location in the district of Muranów, the former Warsaw Ghetto. Today this neighborhood is not only a residential area but also the focal point of Warsaw’s Holocaust commemoration landscape and the site of the much-heralded POLIN Museum of the History of Polish Jews. Rolat proclaimed that the monument was to be built in close proximity to the two memorials to the Warsaw Ghetto Uprising (built in 1946 by Leon Suzin and 1948 by Nathan Rapaport) and to the recently opened (2013) POLIN Museum. However, critics argued that the area should be reserved for the commemoration of Jewish suffering and moreover was already overburdened with non-Jewish monuments; Polish heroism should be commemorated elsewhere. Rolat, nevertheless, insisted on the location mainly for reasons of representation and attendance figures: “The location of a monument raised much controversy in our circles. I was convincing others that the monument, if it was erected somewhere else, would be visited only by a small group of museum visitors, maybe by every twentieth visitor, who would take the trouble to see it and learn about the righteous” .
But Rolat’s arguments were not perceived as convincing and many Jews of Polish descent from all over the world fought against the envisioned location: critical Facebook groups were launched, newspaper articles written, statements by intellectuals, rabbis and Jewish leaders were collected.
Despite the criticism, in 2013 Rolat established the Remembrance and Future Foundation for the purpose of organizing a competition called “From Those You Saved”. It aimed to build a monument “to all the Poles who rescued Jews in German-occupied Poland”, located “in the Muranów district of Warsaw, Poland, in the vicinity of the Museum of the History of Polish Jews” . But there was a catch, the title of the monument initiative was deceiving: “From Those You Saved” implies that there is a We, a community of survivors and descendants which desires to express their gratitude to the righteous gentiles. But this community does not exist, because the Jews who identify with the purpose of the monument are bitterly divided.
The Monument may be a Forest
Without knowing much about the criticism of the monument initiative, we participated in the competition and proposed a large urban forest to be planted in the park next to the POLIN Museum (the site proposed in the competition brief). After being selected for the shortlist of five finalists, we began to hear and learn more and more about the controversy. Initially we considered withdrawing from the competition but then opted against taking the easy way out. First of all, we appreciated the fact that the initiative was not set into motion by the Polish authorities, but rather by those who were saved, as its title asserts. And secondly, we thought that the situation was not so very terrible after all. Despite all the quarreling, everybody who had participated in the discussion thus far agreed on the fundamental idea of the initiative: that the Righteous deserve commemoration.
After a closer look at the situation we realized that first and foremost, erecting the monument is urgent. Time is passing, and 70 years after the end of Nazism, both those who saved and those who were saved are dwindling in numbers. Therefore the monument should be opened as soon as is feasible. But there was a dilemma: this is not an easy task that can be rushed to completion. Erecting a monument “From Those You Saved” requires time – both for the creation of a We, and for joint decision-making regarding delicate and important issues such as to whom the monument is addressed and, above all, the most controversial subject: selecting the best location for it. We believed that this dilemma was not a bitter pill to be swallowed but rather a unique asset that should be incorporated into the monument itself.
So we altered our proposal accordingly – the monument would be a process of multiple stages: At its grand opening, the monument would not be a forest but a forest nursery, the vision of a forest, located in a large, raised bed next to the POLIN Museum. It would consist of dense rows of two-year saplings of common trees in Warsaw; the tight planting pattern requires that the plants be re-located after two years if they are to continue to grow. After the opening of the monument as a forest nursery, a social discourse would aim to create the We and decide on the future of the monument as a forest – that is, enable it to become a forest – at an urban location in Warsaw to be decided. The monument would be not only the forest nursery or the forest itself but also the ensuing intermediate process. The inherent fragility of the nursery would be an intricate part of the monument, without which it could not achieve its full dimension.
The forest should be planted permanently by way of a participatory process, which includes members of the We and Polish civil society. It should be maintained and taken care of by the City of Warsaw and private volunteers, Jews and non-Jews, thus serving likewise as a litmus test for the Polish state and civil society as to the value, in their eyes, of the memory of the Righteous gentiles. The forest can bear any shape; it includes two glades which mirror the two monuments to the Warsaw Ghetto uprising. These remind us of those who were not helped, those who were not saved and – in the case of a different permanent location – remind us of the place where the monument originated. The urban location of the forest is key, because it represents the alienating character of the helping action, of the saving, which was only carried out by a minority of Poles who, in many cases, remained isolated after the end of the German occupation due to Polish anti-Semitism. If the We fails, there will be no forest and the monument fails as well. This failure would manifest itself in the diminutive nature of the forest nursery, which would never become a forest and in the ephemeral nature of its trees, which would not have space to grow. The potential inability to express gratitude as a We was thus an intrinsic feature of our entire proposal from the outset.
The Monument may be a Failure
The competition jury selected our proposal as the winning project. This transpired against the recommendation of Sigmund Rolat, who attended the jury meeting as a guest and declared which project he favored . The events following the jury’s decision revealed the discomfort of the Remembrance and Future Foundation and its chairman. The press conference scheduled to take place immediately after the jury meeting in order to announce the result of the competition was cancelled last minute. Two days later, a press release was published: “The Board of the Remembrance and Future Foundation has been informed of the jury’s verdict, and will announce its own the decision [sic!] in due time” . A week later an attempt to present our project as invalid followed: “Rolat, 84, told […] that the winning entry was ‘radically changed’ since its selection as one of the finalists […]. Therefore, he said, it was no longer a valid entry at the time of the judges’ vote. He called it a new, ‘sixth’ entry that could not be considered with the five original finalists” .
Although this statement was exaggerated and untenable, it became clear that Sigmund Rolat and his Foundation did not want to implement our proposal. Konstanty Gebert, the Foundation spokesman and member of the three-man board, informed us that we would need to radically alter our concept, otherwise the Foundation would not accept it. Our proposal to have a workshop in Warsaw to address the Foundation’s concerns was rejected as was our repeated request to meet personally with Sigmund Rolat in order to discuss our proposal. On July 31 the Foundation announced that the project selected by the jury will not be executed. A month later, Sigmund Rolat stated that he is “conducting serious talks with two or three artists” and that in the next two or three months it will be announced “who will design the monument and when it will be unveiled” .
Commemoration as Public-Private Partnership
When working with monuments in public space, one has to be prepared for anything. Due to the large number of stakeholders of public space, each of whom fights for their own interests, events often unfold unpredictably. Failure was one of the possible outcomes we inscribed into our project from the outset, embodied in the potential impossibility of creating a We which would succeed in making joint decisions regarding the monument. Eventually “From Those You Saved” has indeed failed, but for other reasons. In order to examine the failure, it is helpful to look at a specific characteristic of the monument initiative, namely that it is neither a purely public venture nor an exclusively private one, rather it is a public-private partnership commemoration project. This distinctive feature held significant potential for this project – to succeed as well as to fail.
Public-private partnership (PPP) is used to designate different forms of cooperation between public and private protagonists – mostly with regard to financing public goods or infrastructure, e.g. a school built by a private builder and leased to a public operator. There is a wide range of criticism of PPP projects concerning the concealment of contracts, lack of parliamentary control, corruption liability and a shortage of democratic legitimacy. The PPP structure can be limiting since private investors are frequently concerned with protecting their own interests from outside influence when critical questions or issues arise. This is highly problematic in the public realm, in academia, in contemporary arts and culture because the protagonists of these areas must be able to think critically and articulate openly. But what does PPP mean in the context of commemoration in public space? And why could it even be an interesting model for the Warsaw monument initiative?
Commemorating an atrocity such as the Shoah is not an easy task and requires enormous responsibility, especially when operating in public space. There have been many attempts by Polish nationalists to utilize the deeds of the Righteous Gentiles for their own political agendas, which in many cases are anti-Semitic or anti-Judaist. Hence, most Polish Jews are quite sensitive and wary when it comes to that subject. The fact that the monument idea was brought up by a group representing individuals that were affected by the historical events at stake and pushed forward by a philanthropist who is a survivor himself was positive because it decreased the potential of political appropriation by nationalists. But it does not prevent it! Indeed, the danger of potential political appropriation or abuse was one of the controversies surrounding the monument initiative and the cause for the widespread disapproval of the envisioned monument location.
Let’s have a look at the protagonists of the PPP venture “From Those You Saved” and their specific makeup. The first P, the public protagonist, is represented by the Polish authorities, such as the Republic of Poland, the City of Warsaw and the Muranów neighborhood council. Their role is to provide a building site, authorize the monument design and construction plan, as well as to maintain the monument after its grand opening. The public authorities signalized their support for the initiative but kept a low profile while events were unfolding. According to the title of the initiative, the second P, the private protagonist, is represented by those who were saved and their descendants: the Children Of The Holocaust association (who came up with the idea), the Remembrance and Future Foundation (who turned it into an initiative), future donors (for whom Sigmund Rolat announced he would search) and other members of the Polish Jewish civil society who identify with the cause of building a monument to the Righteous and contributed to the discussion thus far . All these protagonists coming together to partner in a monument initiative was a promising start for commemorating the Righteous in a meaningful way. Unfortunately things turned out differently.
Feudalism in Public Space
In the end, the PPP model did not work out because one of the protagonists acted self-righteously rather than in the spirit of partnership. Sigmund Rolat’s first mistake was to ignore the criticism surrounding the targeted site, uttered by a large number of renowned Holocaust studies scholars, historians and other experts from Jewish civil society. The brief of the international competition does not make mention of any other option for the location other than alongside the POLIN Museum. His second mistake was to attend the jury meeting as a guest and declare which project he favored, thereby attempting to undermine the jurors’ independent work. The third mistake was to dismiss their decision and neglect seeing that the selected project offered him the chance to correct his first mistake without losing face. But Sigmund Rolat’s probably most significant mistake was to appoint himself as the expert who shall alone decide on the monument design.
All these missteps were able to occur without the interference of any regulating factor. This sheds light on the danger of feudal mechanisms within PPP projects . For it is nothing but a feudal act to override all existing rules and agreements made with the engaged public – this public included not only Jewish civil society and the competition jury but also the 136 teams of artists and architects from 16 different countries who invested their time, energy and money under the premise of participating in a serious competition . Sigmund Rolat´s action clashes with the concept of a public monument because it is in absolute contradiction to a democratic understanding of commemoration and of public space, as public space belongs to a public (always to be created) and not to a single individual.
Furthermore, the evolution of the project initiative raises the very question of the responsibilities inherent in philanthropic engagement in public space. Philanthropists behaving as omniscient experts tend to appear somewhat eccentric. However, when operating in their sole field of responsibility, e.g. when building on their own piece of land, such behavior is legitimate; one might even look at it with sympathy and call it quirky. But at stake here is the public space of a European capital and moreover one of the most historically charged sites of the Shoah. This is not Sigmund Rolat’s backyard. A philanthropist who does not understand the difference between working in these two settings, and the implications involved thereby, misses his or her vocation. Sigmund Rolat should recall that the initiative he has chaired is called “From Those You Saved” and not “From Me, One of Those You Saved”.
The Monument is a Process
What will the future bring? Most probably Sigmund Rolat will do as he announced and present his personally-selected design for a monument located next to the POLIN Museum. We can expect a “traditional memorial of stone, steel, and concrete” – monumental, representative and modernist. Whatever form it may take, if the Warsaw City Council has a spark of decency, it will not grant approval to Rolat’s choice for the monument in light of all the dubious missteps taking place during the PPP debacle and the global criticism of a monument on the specified site. However, it would be a pity if the monument initiative was dropped entirely since all protagonists agree that the Righteous deserve commemoration.
The realization of a contemporary, non-feudal manifestation of public commemoration is possible. The first and most important step would be the formation of the We consisting of survivors and their descendants, as well as institutions such as the POLIN Museum and the Jewish Historical Institute. It is crucial to address and include the third generation as well; there are some thriving organizations of young Jews in Poland. Whether Sigmund Rolat and the Remembrance and the Future Foundation will be a part of this We remains uncertain. This does not only depend on their readiness to accept being deprived of their unrestricted power but even more on their willingness to regard the other protagonists as equal partners and to negotiate their standpoints without a predetermined conclusion. The site of the monument would still be a key question debated by the We. Whether it will be inside or outside of the former Warsaw Ghetto remains to be seen. Of course it would be possible to stay with the proposal selected by the jury, especially since the monument initiative should proceed expediently due to the ageing first generation. Establishing the forest nursery could be managed with a rather small budget. Additional fundraising activities could be included in the process of negotiating the monument’s future; these negotiations can be carried out while the saplings grow.
But other good ideas also came up in the discussions around the monument. Ironically, one of them was contributed by the Remembrance and Future Foundation, which misunderstood our proposal and thought the forest nursery would remain at location and continuously provide commemoration trees to the entire country – since, after all, the history of the Righteous continues to be written. Someone else came up with the idea of creating a mobile monument which would travel the country while another person proposed to build 6,532 decentralized monuments, one for each of the Polish individuals who are recognized as Righteous Among the Nations by Yad Vashem. Whatever may come, we hope that a manifestation of public commemoration dedicated to the Polish Righteous Gentiles will be opened as soon as possible, a manifestation that follows a contemporary and post-representational approach to commemoration, incorporating a democratic notion of public space and – above all – a manifestation to which Robert Musil’s challenging dictum that “there is nothing in this world as invisible as a monument” , will not apply.
For a collection of the extensive materials see the Facebook group “Czy upamiętnić Sprawiedliwych na terenie byłego getta” (“Should the monument
honouring the Righteous Poles be placed in the former Warsaw Ghetto”).
There are highly emotional debates on the question of how many Poles saved Jews. Yad Vashem lists 6,532 persons; Polish nationalists claim much larger numbers, e.g. the historian Jan Żaryn states “In my opinion, at least 1 million Poles provided [Jews] assistance.” (in Donald Snyder: Poland’s Dueling Holocaust Monuments to ‘Righteous Gentiles’ Spark Painful Debate; Forward, April 27, 2014; retrieved Dec 21, 2015).
The jury consisted of: Michael Berkowicz (architect, USA), Michael J. Crosbie (architect, USA), Jarosław Kozakiewicz (sculptor, Poland), Rainer Mahlamäki (architect, Finland), Marek Mikos (architect, Poland), Maciej Miłobędzki (architect, Poland), Oren Sagiv (architect and curator, Israel), Jakub Szczęsny (architect, Poland), Hanna Szmalenberg (architect and sculptor, Poland), Milada Ślizińska (art historian and curator, Poland).
Tomasz Urzykowski: Las pamięci Sprawiedliwych? Fundator niezadowolony; Wyborcza.pl, Apr 25, 2015 (retrieved Dec 21, 2015).
Donald Snyder: Warsaw Ghetto Memorial to Righteous Suffers New Setback as Design Is Tossed; Forward, May 2, 2015 (retrieved Dec 21, 2015).
Tomasz Urzykowski: Pomnik Sprawiedliwych przy Muzeum Polin. Jeśli nie “las”, to co?; Wyborcza.pl, Aug 31, 2015 (retrieved Dec 21, 2015).
To give an example: in addition to the monument initiative next to the POLIN Museum, there is another initiative for a monument to commemorate the Righteous. The organizers plan to build a sculpture in the form of a stylized ribbon in which the names of the Righteous would be engraved. The ribbon would be around two meters high and loosely wrapped around a church, providing sufficient space for tens of thousands of names (or more?, see footnote 5). Critics consider this initiative as an attempt to whitewash Polish anti-Semitism during the Shoah.
One of the most natural protagonists of the debates on the monument would have been the POLIN Museum, not only due to its close vicinity to the targeted monument site but especially because of its self-conception as a museum focused on Jewish life. However, the institution remained rather reluctant to participate (with the exception of its chief curator, Barbara Kirshenblatt-Gimblett, an outspoken critic of the initiative). Ironically this reluctance is a result of the museum’s very nature as a PPP project itself. Participating in the debates would bear the risk of harming the interests of one of its main private benefactors, Sigmund Rolat.
The “refeudalization” of the public sphere was described by Jürgen Habermas in 1962: “[The] public sphere of civil society again takes on feudal features. The ‘suppliers’ display a showy pomp before customers ready to follow. Publicity imitates the kind of aura proper to the personal prestige and supernatural authority once bestowed by the kind of publicity involved in representation.” (Jürgen Habermas: The Structural Transformation of the Public Sphere, Cambridge 1991, p. 195) In recent years, this notion has been used to describe the crisis of publicity resulting from its privatization and the power of the individual in oligarchic capitalism (cf. Sighard Neckel).
Liam Hoare: How Plans To Build a Monument to Righteous Gentiles in Warsaw Fell Apart; eJewish Philanthropy, Nov 8, 2015 (retrieved Dec 21, 2015)
The spatial manifestation of a monument is merely a snapshot in time. A monument is not only what you see, but also what it was previously, what it will be prospectively and the intermediate process. Therefore monuments are manifestations of processes, never to be conclusively determined but steadily open to re-negotiation and re-configuration. This fact should not be disguised but represented in the manifestation’s form. Instead of providing a certain reading and the respective image of history, a monument should aim at facilitating an “Auseinandersetzung” with history, meaning to look into and examine history as well as to debate and quarrel about it. Our approach to post-representational commemoration relates to the notion of post-representational curating, proposed by Nora Sternfeld and Luisa Ziaja: “Representation is replaced by process: rather than dealing with objective values and valuable objects, curating entails agency, unexpected encounters, and discursive examinations. […] Accordingly, post-representational curating creates spaces for negotiation, openly addressing contradictions within seemingly symmetrical relations. This also may involve conflict […].”(Nora Sternfeld and Luisa Ziaja: “What comes after the show? On post-representational curating”; “Dilemmas of Curatorial Practices, World of Art Anthology” ed. Barbara Borčić, Saša Nabergoj; Ljubljana 2012, pp. 62-64).
Own translation of: “Es gibt nichts auf der Welt, was so unsichtbar wäre wie Denkmäler.“ (Robert Musil, Denkmale, Prager Presse, Nr. 339, 1927)
|
<urn:uuid:a750bb83-e13c-47ba-826a-9e78b79a87f4>
|
{
"dump": "CC-MAIN-2021-43",
"url": "http://politicalcritique.org/cee/poland/2016/monument-history-of-polish-jews-museum/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585737.45/warc/CC-MAIN-20211023162040-20211023192040-00366.warc.gz",
"language": "en",
"language_score": 0.9577983617782593,
"token_count": 5240,
"score": 3,
"int_score": 3
}
|
The United Nations Children's Fund plans to invest in startups in a bid to create solutions that would improve the lives of vulnerable children across the globe. Its Innovation Fund aims to invest in open source technologies and some of the areas it has identified are blockchain, 3D printing, wearables and sensors, artificial intelligence and renewable energy.
Christopher Fabian, Unicef Innovation Co-Lead, said: "The purpose of the Unicef Innovation Fund is to invest in open source technologies for children. We'll be identifying opportunities from countries around the world including some that may not see a lot of capital investment in technology start-ups. We are hoping to identify communities of problem-solvers and help them develop simple solutions to some of the most pressing problems facing children."
So far, the Innovation Fund has raised $9m (£6.3m, €8.3m). But to qualify for funding, start-ups need to meet the criteria set by Unicef. Most importantly, they must be open source and have a working prototype of the technology. They will also be allowed to be involved in developing a new technology, or even expand an existing one, according to a press release.
Following is a set of guidelines for the startups to qualify for the funding:
- Products for youth under 25 to address a range of needs including learning and youth participation
- Real-time information for decision-making
- Infrastructure to increase access to services and information, including connectivity, power, finance, sensors and transport
Unicef has previously invested in a bunch of open source technologies to help children. These include RapidSMS, a toolset for building SMS services for data collection, streamlining complex workflows and group coordination using mobile phones.
Besides, it has invested in RapidPro that allows anyone to build interactive messaging systems using an easy visual interface. Produced by Unicef's Innovations Labs in collaboration with Nyuruka, a Rwanda-based software firm, RapidPro is already being used in several countries. Other investment areas in open source include U-Report, a messaging service that allows anyone to respond to polls, report issues and support child rights.
|
<urn:uuid:9037cc8f-a38a-450a-be18-0842412300b6>
|
{
"dump": "CC-MAIN-2021-49",
"url": "https://www.ibtimes.co.uk/unicef-invest-technology-start-ups-help-children-1541146",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363149.85/warc/CC-MAIN-20211205065810-20211205095810-00237.warc.gz",
"language": "en",
"language_score": 0.9429781436920166,
"token_count": 440,
"score": 2.515625,
"int_score": 3
}
|
When the rains returned after the long (ten week) drought we had starting at Christmas, it took a couple of weeks for the mosquito populations to return – and return they did in force. Part of the reason for this is how mosquitoes lay their eggs – on the sides of breeding sites, so that they only hatch after a rain. This means that in a drought, the eggs build up in huge quantities – and when the rains come, they all hatch at once.
Importantly, some of us taking part in the iNaturalist project are observing a return of the Aedes aegypti. You may know that this mosquito is a very aggressive biter, and a very efficient vector of disease, much more so than the more common Aedes albopictus. In Kehena, I only caught one aegypti in the months from November through to March when the rains returned. During that time, I caught dozens of albopictus. Now, I can catch aegypti regularly. Clearly, the drought has tipped the scales towards aegypti, at least for a while. In fact, this is kind of what is expected based on their biology.
Another volunteer, Don Kephart, up in the Kohala area lives in an area dominated by aegypti (there are no albopictus!) and he says the population is the largest he’s seen in years.
This is important information, because aegypti are much better vectors of diseases like dengue, zika, chickungunya, etc. If we have established populations of aegypti we are at a greater risk of disease outbreaks than if we do not have these populations. Making sure the DOH knows where these populations are will help them in their response to future outbreaks. Who would have guessed there was a resident population of aegypti on the “wet” side? There were reports of aegypti here last in 2002. And we have also seen them this year near Kalapana (another volunteer, Devin has caught them there).
It would be great to get more observations of these mosquitoes on the leeward side of the island. If you are interested in helping, we can teach you how to ID mosquitoes and maybe even give you some equipment to help (such as a macro lens for your smartphone).
Here is a link to my recent aegypti observation on iNaturalist.
Just contact me! mosquitotraps at hotmail dot com or on FB.
|
<urn:uuid:34632f48-0091-4daf-a1d4-1c16a0f2e049>
|
{
"dump": "CC-MAIN-2021-17",
"url": "https://makemosquitotraps.org/2016/04/20/aedes-aegypti-on-the-comeback/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038066981.0/warc/CC-MAIN-20210416130611-20210416160611-00329.warc.gz",
"language": "en",
"language_score": 0.971222996711731,
"token_count": 526,
"score": 3,
"int_score": 3
}
|
Born in Germany in 1900, Oskar Fischinger produced what he called “visual music,” in which he combined animation, film, and music to create a synthesis of visual and auditory art. Steeped in the milieu of German experimental filmmaking, he explored innovative methods of cinematic creation, employing materials such as melted wax, tinted liquids, and projected colored lights.
Fischinger’s film, Raumlichtkunst (Space Light Art) (1926/2012) was first screened as part of a series of film performances in 1926 in Germany, attracting attention within the German film community. Accompanied by music, Fischinger's multi-screen projection of animated abstract images spin, pulse, spiral, and shape-shift.
When I viewed Raumlichtkunst for the first time at the Whitney, it brought back memories of watching Walt Disney’s vibrantly colored characters move spiritedly in sync with classical music in his 1940 film Fantasia. As I child, I found the film to be entrancing, and I am now similarly mesmerized by Raumlichtkunst. Coincidentally, Fischinger contributed animation to Fantasia when he worked for the studio after his emigration to Los Angeles in 1936. But the formal complexity of Fischinger’s vision, with its purely non-narrative fusion of form and sound, was too complex for the animators at the Disney studio. After they altered his designs to be more directly representational, Fischinger quit the project, leaving without credit for his sequences.
Watching Raumlichtkunst, I was struck by just how groundbreaking Fischinger’s approach was for his time. His inventive methods allowed him to create an experience of color, form, movement, and sound that would still feel revelatory more than eighty years later, even in an age of overwhelming digital visual spectacle.
By Elizabeth Rooklidge, Interpretation Intern
|
<urn:uuid:a6dc74e9-7b01-4928-83c7-df53ac121ab7>
|
{
"dump": "CC-MAIN-2015-48",
"url": "http://whitney.org/Education/EducationBlog/OskarFischingerRaumlichtkunst",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398449258.99/warc/CC-MAIN-20151124205409-00250-ip-10-71-132-137.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9508283138275146,
"token_count": 408,
"score": 2.75,
"int_score": 3
}
|
- What is half of $5?
- How do you find half of 3 4?
- What number is one half of one quarter?
- What is half of $36?
- What is a half of a half called?
- How do you split 15 in half?
- What number is half of 70?
- What number is half of 18?
- What number is one half of 6?
- What number is 15% of 100?
- What is half of $39?
- What is half of $48?
- What is 1 2 cup divided in half?
- What is the difference between one half and half?
- What is a one half page?
- What number is half of 72?
- How do you do half on a calculator?
- What number is half of 30?
What is half of $5?
2.501/2 x 5 = 2.50 You may also find it useful to know that if you multiply 0.50 with 100 you get 50.00..
How do you find half of 3 4?
You can calculate “half” of a fraction by doubling the denominator (bottom number * 2), so half of 3/4 is 3/8 (formula: half of a/b is the same as a/(b*2), for example half of 3/4 equals 3/(4*2) which equals 3/8).
What number is one half of one quarter?
Answer and Explanation: The number 6 is one half of one quarter of one tenth of 480.
What is half of $36?
18Both numbers can be taken as an answer because half of 36 is 18 and half of 18 is 9.
What is a half of a half called?
Take half of half. To divide a number in Half means to divide it into two equal parts. To divide it into Fourths, or quarters, means to divide it into four equal parts. … A quarter is half of a half.
How do you split 15 in half?
Answer and Explanation: Half of 15 is 7.5. Halving a number, x, can be done geometrically by finding the midpoint of a number line segment that goes from 0 to x.
What number is half of 70?
35Answer and Explanation: The half of 70 is 35.
What number is half of 18?
9Half of the 18 will become 9.
What number is one half of 6?
the half of 1/6 is 1/12. Solution: Divide 1/6 by 2 . This is done by multiplying 1/6 by the reciprocal of 2 which is 1/2.
What number is 15% of 100?
Percentage Calculator: What is . 15 percent of 100? = 0.15.
What is half of $39?
19 1/2Half of 39 is 19 1/2. We can also write this as the decimal 19.5.
What is half of $48?
Half of 48 is 1 x 2 x 3 x 4. Half of 48 is 48/2.
What is 1 2 cup divided in half?
Half of ½ cup is equivalent to ¼ cup. Half of ⅔ cup is equivalent to ⅓ cup. Half of ¾ cup is equivalent to 6 tbsp. Half of 1 cup is equivalent to ½ cup.
What is the difference between one half and half?
One-half can be used when there is one item that has been or can be divided into two halves. Half is less specific; however, when you are talking about an indeterminate amount of something (e.g., half a cup of rice) or a group (e.g., half the respondents), half is necessary.
What is a one half page?
Noun. 1. half page – something that covers (the top or bottom) half of a page. page – one side of one leaf (of a book or magazine or newspaper or letter etc.) or the written or pictorial matter it contains.
What number is half of 72?
36Half of 72 is 36.
How do you do half on a calculator?
To calculate half a percent on a calculator, you multiply the whole value by 0.5 followed by the % button. If your calculator doesn’t have a percentage button, you multiply the whole value by 0.005, which is the numerical value of half a percent.
What number is half of 30?
15Half of 30 is 15. Whenever you want to find out half of a number, you have to divide by 2. When solving this problem, 30 divided by 2 equals 15.
|
<urn:uuid:b7ad292c-8321-46d0-82b6-7295f8a316e7>
|
{
"dump": "CC-MAIN-2020-45",
"url": "https://scallope.com/qa/question-what-is-half-of-38.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107880656.25/warc/CC-MAIN-20201023043931-20201023073931-00701.warc.gz",
"language": "en",
"language_score": 0.9450746774673462,
"token_count": 982,
"score": 3.125,
"int_score": 3
}
|
Professor John Lucas, Dr Paul Bowyer and Dr Raffaella Carzaniga.
Dr Tim Carver.
Institute of Grassland and Environmental Research.
Dr Sarah Gurr.
University of Oxford.
When fruit in your kitchen goes mouldy, you are probably in more of a hurry to throw it out before the rot spreads than you are to look at what is causing it. But if you were to examine it closely, the chances are that you would discover different kinds of mould or fungi infecting specific kinds of fruit. A set of experiments from Rothamsted Research, the Institute of Grassland and Environmental Research and the University of Oxford has shown that each species of fungus is uniquely adapted to invade a particular plant or crop.
Many fungi are parasitic organisms, which means they depend on other living organisms (hosts) for the food and protection they need to grow and reproduce. They produce thousands of tiny spores that distribute the fungus by infecting new plants. These spores can recognise not only particular plant species, but also specific parts of the plant, where they can enter with least risk of triggering the plant's defence mechanisms.
Scientists have been looking at the physical cues used by the spores to sense surfaces, orientate themselves, and infect the correct plant species in the right place. Achieving this as efficiently and stealthily as possible is crucial for the fungus, as the spores can only survive a short time without the host's resources. Once in the right place, the spores sprout tubes that penetrate the plant. They then develop feeding structures so the spore can profit from the new food supply.
'Our exhibit will illustrate some of the ingenious ways that parasitic fungi locate, break and enter the host plant without triggering its alarm system,' says Professor John Lucas. 'A live video link-up lets you spy on fungi infecting plants in the laboratory. And you can pretend to be a fungus yourself and test your reaction skills to different physical stimuli.'
Some fungi use the physical surface of the plant to find the right place to infect. By watching Downy mildew (Peronospora) spores penetrate cabbage leaves, scientists now know that it is ridges and troughs of a particular size (0.9 microns) on the leaf surface that trigger infection. These ridges mark the break between two cells, which might offer less resistance to the spore's infection tubes as they push into the leaf.
See all exhibits from 2003
|
<urn:uuid:68556165-f4d5-4862-92b9-e2f345c8a73b>
|
{
"dump": "CC-MAIN-2021-04",
"url": "https://royalsociety.org/science-events-and-lectures/2003/summer-science/fungi/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703521139.30/warc/CC-MAIN-20210120151257-20210120181257-00010.warc.gz",
"language": "en",
"language_score": 0.9351621270179749,
"token_count": 500,
"score": 3.796875,
"int_score": 4
}
|
Writing Clear Functional and Non-functional Requirements: Examples and Best Practices
Wondering what the requirements are to build a mobile app or website? Today, we talk about the difference between functional and non-functional requirements, give you a step-by-step guide to gathering them, and provide you with examples of each.
How requirements impact the software development process
If you want to create a project that will be successful in the long run, you should invest some time in formulating detailed requirements. Clear and well-defined requirements help development teams and clients ensure they’re working toward the same goals. Poorly formulated requirements can cause miscommunication between the team and the client.
But that’s all just words. Let’s look at some statistics:
- 68% of projects with efficient communication and well-defined requirements meet quality standards.
- 32% of IT projects fail because of unclear requirements at the planning stage.
- Poorly formulated requirements can increase the project timeline and budget up to 60%.
- Unclear requirements are responsible for 41% of the global IT development budget for software, staff, and external professional services.
The discovery phase in software development is the perfect time to create a list of both functional and non-functional requirements for your project.
Classification of requirements
Before we dive into types of requirements, let’s first define what a requirement is. A requirement states how a particular functionality or feature of a product should work. You’ll need a few types of requirements to create a good product.
- Business requirements describe a project’s high-level goals, objectives, and needs.
- Stakeholder requirements include information about what stakeholders expect from a particular solution.
- Solution requirements include product characteristics that meet the client’s expectations and business needs. They can be divided into two types:
- Functional requirements
- Non-functional requirements
Today, we’ll talk in depth about functional and non-functional requirements.
Functional and non-functional requirements help you:
- define terms and roles. Requirements help to avoid misunderstandings between the development team and stakeholders.
- reduce communication times. Good communication with a business analyst results in clearly defined requirements and a shorter development timeframe. It can help to reduce the time required for communication during the development stage as well as the project’s cost.
- more precisely estimate the project. Clear and detailed requirements lead to more accurate estimates of the development time and cost.
- spot possible mistakes beforehand. Functional and non-functional requirements can help you identify certain errors during the initial stages of development, saving you time and money.
- create more predictable projects. High-quality detailed requirements and wireframes help to predict the results and build a project that meets the client’s expectations.
What are functional requirements?
What is the difference between functional and non-functional requirements? Functional requirements describe how a system should behave when certain conditions are met. These requirements include technical details, calculations, data manipulation and processing, and other functionality that characterizes what a framework should achieve.
Functional requirements describe what the product should do. Such software requirements capture the intended behavior of the system. A functional detail should be aligned to a business need to avoid project failure. Functional requirements should include:
- details of operations executed on every screen
- descriptions of system reports and other outputs
- full information on system workflows
- a clear explanation of who will be allowed to create/modify/delete data in the system
- a description of how the system is supposed to fulfill applicable regulatory requirements and what compliance needs should be defined in the functional document.
Functional requirements cover the following:
- Business rules
- Transaction corrections, adjustments, and cancellations
- Requirements for administrative functionality
- Authorization levels
- Audit tracking
- External interfaces
- Historical data
- Legal and regulatory requirements
Examples of functional requirements
- The background color for all application windows will be #3333FF.
- Only employees at a certain level have the right to view revenue data
- The software system should be integrated with a certain API.
- When a user enters data, the system should send an approval request.
- The server should automatically back up the database every 24 hours.
- The system should allow only managers to access a user’s personal data.
- The system should shut down in the event of a hacker attack
What to consider when creating functional requirements
When coming up with a list of functional requirements, consider these categories of requirements:
- Business requirements. Define requirements that answer for the ultimate goal of the system. Here you can also mention things like approval workflows and authorization levels.
- Administrative requirements. Mention the routine things the system will do, such as reporting
- User requirements. These requirements describe what the user can do, like placing an order or browsing an online catalog.
- System requirements. Describe software and hardware specifications, system responses, and system actions.
5 benefits of functional requirements
- Serve as a guide for checking if an application provides all required functionality
- Help you determine the functionality of the system and subsystems
- Combined with requirements analysis, functional requirements can be helpful in identifying missing requirements and clearly defining the expected system behavior.
- Errors found while collecting functional requirements are easier and cheaper to fix than errors found later on
- Support goals, tasks, and user actions to simplify project management
What are non-functional requirements?
Now let’s talk about non-functional requirements. By definition, a non-functional requirement is a requirement that indicates how the system performs a particular function. A non-functional requirement describes how a system should behave and the limits of its functionality. Non-functional requirements answer for all the requirements that are left uncovered by functional requirements.
These requirements affect the user experience because they define a system’s behavior, features, and general characteristics.
When non-functional requirements are well defined and executed, they can make the system easy to use and enhance its performance. Non-functional requirements are product properties, so they mostly focus on user expectations.
Types of non-functional requirements:
- Performance (response time, throughput, utilization, static volumetric)
- Data integrity
Get an example of the Discovery Phase documentation for your digital project
Examples of non-functional requirements
- Database security should be HIPAA-compliant.
- Users should be able to reach their profile data from any page within three clicks.
- The system should require users to enter their passwords every 60 days.
- The system must accommodate a minimum of three million concurrent users.
- All web pages should be able to load within three seconds.
What to consider when creating non-functional requirements
- Usability. These requirements focus on the appearance of the user interface and how people interact with it. They should describe colors, screen size, button size, etc.
- Reliability/availability. These requirements determine system availability (if the system needs to function 24/7/365, for example).
- Scalability. This section of the non-functional requirements should determine if the system will be able to handle future needs. For physical installations, this includes the availability of spare hardware and space to install it.
- Performance. Determine how fast the system needs to operate.
- Supportability. Specify if support is provided in-house or if remote access is required to external resources.
- Security. Set the security requirements both for the physical installation and from the cybersecurity perspective.
7 steps for better requirements gathering
Step 1. Understand the need
Your first step in gathering requirements is understanding the need, and your first goal is to meet with the client and answer the following questions:
- What outcome is the client looking for?
- Can we quantify that outcome?
- How many people will be impacted by this?
- Why do you do this?
- What sorts of performance is the client looking to get out of the solution?
- What issue is this solution supposed to solve?
Step 2. Find out the constraints
The next step is to find out your limitations and constraints. To find out the main limitations, ask the following questions:
- How much time do we have?
- What is the budget for the project?
Step 3. Check if you have all the necessary information
Assuming you now know what the limits of the project are, you can move on to the third step, which is to check if you have all the necessary information. Ask yourself, Do I know what I need to know? Here’s where you clarify all the previous requirements and find out what’s missing to get a full picture of the project.
Step 4. Find out who can provide you the information you need
Stakeholders in organizations — business managers, department heads, etc. — can provide the missing pieces of information you identified in step three, probably in the form of a document, something published on the internet, or a database.
Step 5. Choose how to collect information
Techniques for gathering requirements will vary depending on what information you need to collect. Here are some examples of requirement gathering techniques:
- Focus groups
- Document reviews
- Market research
You need to come up with a technique for every requirement. For example, say you have a requirement as to the number of users for the system. To get this information, you might interview an IT manager.
Step 6. Schedule meetings
Once you’ve figured out all the techniques you want to use, you can plan when to collect the information. When you’re developing a schedule, you’ll want to plan out the timing, duration, and techniques that will minimize the number of interactions with stakeholders.
Step 7. Find out what you might need to collect information
The next step is to ask yourself, What will I need to collect this information? It might be tools or a team of people. In this step, you have to ask yourself if you can collect the information by yourself given your timeframe and budget. After this step, you can move to implementing the requirements.
How to write functional and non-functional requirements
Functional and non-functional requirements can be written in a few different ways. Today, we’ll talk about some of the more common ones.
The most common way to write functional and non-functional requirements is using a requirements specification document. It describes the functionality required in written form, specifies the purpose of the project, gives an overview of the project to provide context, and notes any limitations and assumptions. Although most requirements specification documents are descriptive, it’s recommended to include visual representations of the requirements to make it easier for non-technical stakeholders to understand the scope.
Work breakdown structure
A work breakdown structure, or WBS, is closely related to a requirements specification document. With a WBS, the entire process is broken down by decomposing requirements into the smallest possible scopes of work.
The next approach you can use to write functional and non-functional requirements is user stories. These are descriptions of functionality from the point of view of the end user and accurately describe what the user wants from the system. User stories are written using the following formula:
“As a (type of user), I want (goal) so that (reason).”
One of the benefits of user stories is that they don’t require a lot of technical knowledge to write. User stories can also be used as a predecessor to specifications requirements to help determine user needs.
Use cases are similar to user stories in the sense that no technical knowledge is required to write them. Use cases describe in detail what users do when completing a task.
For example, the use case for purchasing a product would describe each step in the buying process from the user’s point of view.
Mistakes to avoid when creating functional requirements
Here are a few common mistakes when creating functional requirements:
- Including extraneous information that can confuse developers
- Not providing sufficient detail
- Adding rules, examples, or purpose statements for anything other than the requirement itself
- Leaving out information that is absolutely necessary for a complete, accurate, and final definitive state of the requirement
- Defending the requirements when a requirement is modified instead of finding the best option
- Not mapping requirements to an objective or principle
Quick summary of functional and non-functional requirements
We hope this article has shed light on the world of functional and non-functional requirements. Here are the key takeaways:
- Functional requirements describe the particular behavior of a system when certain conditions are met
- Non-functional requirements describe how a system should behave and its functionality limits.
- Functional requirements with requirement analysis can be helpful in identifying missing requirements
- Don’t provide extraneous information that can confuse developers.
- There are a few different ways to write functional and non-functional requirements: using a specifications document, work breakdown structure, user stories, and use cases.
- For better requirements gathering, make sure you understand the project’s needs, find out its constraints, check that you have all the necessary information, find out who or what can provide you the information you’re lacking, choose how to collect this information, schedule meetings, and find out what people or tools you might need to collect the information.
If you want to create functional and non-functional requirements for your future mobile app or if you have any questions regarding this topic, contact Mobindustry for a free consultation.
|
<urn:uuid:25b4f230-47dd-458f-8c22-8d7dc5004b9f>
|
{
"dump": "CC-MAIN-2023-06",
"url": "https://www.mobindustry.net/blog/writing-clear-functional-and-non-functional-requirements-examples-and-best-practices/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500080.82/warc/CC-MAIN-20230204012622-20230204042622-00612.warc.gz",
"language": "en",
"language_score": 0.892371416091919,
"token_count": 2874,
"score": 2.625,
"int_score": 3
}
|
Stopping and Restarting Anti-HIV Drugs in Children and Adolescents With Low Blood Levels of HIV
|First Received Date ICMJE||June 2, 2001|
|Last Updated Date||October 4, 2013|
|Start Date ICMJE||Not Provided|
|Primary Completion Date||Not Provided|
|Current Primary Outcome Measures ICMJE||Not Provided|
|Original Primary Outcome Measures ICMJE||Not Provided|
|Change History||Complete list of historical versions of study NCT00016783 on ClinicalTrials.gov Archive Site|
|Current Secondary Outcome Measures ICMJE||Not Provided|
|Original Secondary Outcome Measures ICMJE||Not Provided|
|Current Other Outcome Measures ICMJE||Not Provided|
|Original Other Outcome Measures ICMJE||Not Provided|
|Brief Title ICMJE||Stopping and Restarting Anti-HIV Drugs in Children and Adolescents With Low Blood Levels of HIV|
|Official Title ICMJE||Intensification of HIV-Specific CD4 and CD8 Activity by Cycling Highly Active Antiretroviral Therapy (HAART) in Pediatric/Adolescent Patients With Less Than 50 HIV RNA Copies/ml|
Some patients taking anti-HIV drugs as part of highly active antiretroviral therapy (HAART) do not show any HIV in the blood; however, some HIV will remain hidden in the body and, if the drugs are stopped, will return to the blood. The purpose of this study is to determine if short periods of stopping HAART increase the activity of CD8 and CD4 cells (cells of the immune system that fight infection), if repeated stopping of these drugs for longer periods of time and restarting them will increase effectiveness of HAART, and if the increased immune system activity as a result of stopping treatment leads to lower levels of HIV over time.
Some HIV infected patients taking HAART have been able to achieve prolonged suppression of HIV viral load for extended periods of time. However, discontinuing HAART has consistently resulted in HIV's return to plasma. Both CD8 and CD4 cells are markedly reduced in individuals with prolonged HIV suppression; control of and response to cell-associated HIV is dependent on immune-mediated mechanisms involving these cells. It is hypothesized that a brief and low-level increase in HIV levels resulting from HAART interruption might boost HIV-specific CD8 and CD4 T-cell counts. After suppression of viral load with the reintroduction of HAART, the expanded CD8 population might be able to better control viral replication and better respond to cell-associated HIV. Future treatment interruption may lead to longer periods of undetectable viral loads.
Patients are divided into 2 age cohorts, with Cohort 1 consisting of children and adolescents 4 years and older up to 21 years of age, and Cohort 2 consisting of children and adolescents 2 years and older up to 4 years of age. Patients will be assigned to one of 2 groups. Group A patients will participate in drug holiday cycles from HAART and then back to HAART; Group B is a control group that remains on continuous HAART throughout the study. Cycle 1 for Group A patients begins with 18 days of HAART and a 3-day drug holiday. At the end of the drug holiday, viral load is measured and HAART is resumed for 28 days (detectable virus cycle) if viral load is detectable after the drug holiday. If viral load remains below the level of detection, the patient begins the next drug holiday cycle. With each subsequent drug holiday cycle, time off HAART will increase by 2 days. Patients failing 4 repeated detectable virus (28-day treatment) cycles will be taken off study.
Patients will be enrolled in this study for a minimum of 142 weeks. For Group A, HIV viral load and CD4 cell count are measured at the end of each drug holiday and each HAART resumption; HIV-specific CD4 and CD8 responses are measured every 3 cycles; and cell-associated HIV is assessed at entry, at 12-week intervals, and at the end of the study. For Group B, physical exams are conducted and HIV viral load and other blood work are measured every 12 weeks.
|Study Type ICMJE||Observational|
|Study Design ICMJE||Time Perspective: Prospective|
|Target Follow-Up Duration||Not Provided|
|Sampling Method||Not Provided|
|Study Population||Not Provided|
|Condition ICMJE||HIV Infections|
|Intervention ICMJE||Not Provided|
|Study Group/Cohort (s)||Not Provided|
* Includes publications given by the data provider as well as publications identified by ClinicalTrials.gov Identifier (NCT Number) in Medline.
|Recruitment Status ICMJE||Completed|
|Completion Date||October 2006|
|Primary Completion Date||Not Provided|
|Eligibility Criteria ICMJE||
Note: A Study Monitoring Committee (SMC) recommended on 06/22/05 that this study close, because the primary objectives in this proof-of-concept study could not be achieved. As of 06/28/05, Group A participants will discontinue their drug holiday cycles and will be given the best possible therapy. All participants in this study will have a final study visit to be scheduled as soon as possible, prior to 07/29/05.
|Ages||2 Years to 21 Years|
|Accepts Healthy Volunteers||No|
|Contacts ICMJE||Contact information is only displayed when the study is recruiting subjects|
|Location Countries ICMJE||United States, Puerto Rico|
|NCT Number ICMJE||NCT00016783|
|Other Study ID Numbers ICMJE||P1015, PACTG P1015, ACTG P1015, 11650|
|Has Data Monitoring Committee||Not Provided|
|Responsible Party||National Institute of Allergy and Infectious Diseases (NIAID)|
|Study Sponsor ICMJE||National Institute of Allergy and Infectious Diseases (NIAID)|
|Collaborators ICMJE||Eunice Kennedy Shriver National Institute of Child Health and Human Development (NICHD)|
|Information Provided By||National Institute of Allergy and Infectious Diseases (NIAID)|
|Verification Date||October 2013|
ICMJE Data element required by the International Committee of Medical Journal Editors and the World Health Organization ICTRP
|
<urn:uuid:c186dc46-6423-4351-b99f-ee193318586f>
|
{
"dump": "CC-MAIN-2014-23",
"url": "http://clinicaltrials.gov/ct2/show/record/NCT00016783?view=results",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510263423.17/warc/CC-MAIN-20140728011743-00307-ip-10-146-231-18.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8687885403633118,
"token_count": 1365,
"score": 2.734375,
"int_score": 3
}
|
In language there are certain linguistic elements that are more frequently or typically used in a parenthetical or detached way than other elements. In English, this is the case with the words that belong to the grammatical class of adverbs. As Ramat and Ricca observe, the functional property of the linguistic category of adverbs is that they “add information to other linguistic elements which can stand on their own, semantically as well as syntactically” [18, 187].
Biber et al. distinguish three main groups of adverbs, namely [12, 765]:
- a) circumstance adverbs (eagerly, here, now, slowly, then, weekly);
- b) stance adverbs (apparently, clearly, frankly, perhaps, technically, unfortunately);
- c) linking adverbs (additionally, besides, moreover, nevertheless).
As they note [12, 765], of the three groups, circumstance adverbs are the most common class in all four registers of the English corpus (conversation, fiction, news, and academic discourse) that they have studied. Circumstance adverbs, however, are those that are the most dependent and least flexible regarding their position in the sentence.
Conversely, stance and linking adverbs are detached, both syntactically and semantically, from the core propositional content. Stance adverbs provide a comment about the propositional content while linking adverbs signal the way in which the propositional content of the one utterance relates to that of utterances elsewhere in the text. Stance adverbs convey information about the propositional content of the sentence or about the speech act that is associated with the sentence, occupying the interpersonal level of meaning, which concerns speaker/hearer attitudes .
The adverbs that fall within the group of stance adverbs are often treated in the literature in connection with adverbs from the group of linking adverbs, under a number of labels and within a variety of frameworks. Depending on the interests of scholars, stance adverbs are treated next to linking adverbs, under the label of “sentence adverbs” or “sentence adverbials” or “sentence modifiers” .
Stance adverbials are primarily single adverbs (e.g., frankly, obviously), although they can also include prepositional phrases and noun phrases functioning as adverbials (e.g., in general, no doubt). Four semantic classes of stance adverbials are distinguished: attitudinal, non-factive, factive, likelihood. Complement clause constructions in English provide an especially rich source of stance expressions.
Stance adverbials can be split into three main categories, based on semantic and pragmatic criteria, namely: epistemic, attitude and style adverbials [11, 854].
Epistemic adverbials express the writer’s comment on some aspect of the truth-value of the proposition commenting on factors such as certainty, reality, sources, limitations, and precision of the proposition expressed by the relevant clause [11, 764]:
As a matter of fact, Claudia and her friend were given the name of this Black Madam on line by an on-line friend who highly recommended her [COCA, SPOK, 2011].
Undeniably, Rocky has been a mixed blessing for Stallone – a creation so powerful that it overshadows its creator [COCA, MAG, 2006].
TABLE 1. STANCE ADVERBIALS
figuratively, frankly, honestly, literally, seriously, truthfully
|quite frankly, quite honestly, quite simply||in a word, in brief, with all due respect||if I may say so, if you don’t mind my asking||more simply put, putting it bluntly, strictly speaking, technically speaking, to tell you the truth|
|ATTITUDE STANCE||Evaluation; judgement; assessment of expectations||amazingly, astonishingly, conveniently, curiously, disturbingly, fortunately, hopefully, inevitably, interestingly, ironically, predictably, quite rightly, regrettably, sadly, sensibly, surprisingly, unbelievably, unfortunately, wisely||even more importantly, rather surprisingly, even worse, oddly enough, rather surprisingly||to my surprise||as might be expected, as you might guess, as you would expect||most surprising of all, rather surprisingly|
|EPISTEMIC STANCE||Imprecision||about, approximately kind of, like, roughly, sort of||If you can call it that||So to speak|
|Viewpoint or perspective||from our perspective, in my opinion, in my view, in our view, in some cases, in the author’s view|
|Limitation||generally, mainly, typically||in general, in most cases, in most instances, on the whole|
|Source/ evidence||apparently, evidently, reportedly||According to…||As X motes|
|Actuality & reality||actually, really||for a fact, in actual fact, in fact||as a matter of fact|
|Doubt & certainty||certainly, definitely, maybe, obviously, of course, perhaps, probably, undeniably, undoubtedly||most likely, quite likely||for all I know, without doubt||No doubt||I think, I guess, I bet, I would say, it seems, it appears|
|SINGLE WORD ADVERB||ADV. P.||PREP. PHRASE||N. P.||FINITE CLAUSE||NON-FINITE CLAUSE|
Attitude adverbials express the writer’s opinion about the content of the clause:
As might be expected, these forms of violence reflect Lawrence’s own trajectory as a writer [COCA, ACAD, 2007].
Most surprising of all, researchers are accumulating evidence that the line between normal and abnormal personality is much more subtle than anyone imagined [COCA, MAG, 2005].
Predictably, one of the kids pushed the other off when they were about twenty feet up, and Edward instinctively reached over the rope to break his fall, but the safety field caught the kid in midshriek and bounced him up and down like a ball for a moment, just as he and his friends undoubtedly knew it would [COCA, FIC, 2011].
The use of simple adverbs as attitudinal adverbs is characteristics of English. Their value in writing is that they form a very compact and elegant way of expressing an opinion on what you are talking about, without pushing yourself into foreground.
Style adverbials form a rather special class. They express the writer’s view regarding the actual formulation of the sentence which follows. Style stance adverbs convey a speaker’s comment about the style or form of the utterance, often clarifying how the speaker is speaking or how the utterance should be understood [Biber, 764]:
With all due respect, even with all of the debate and all the names have been thrown around this week, I want people to be partisan and stand for their principles [COCA, SPOK, 2011].
Now how was I supposed to do that? Physically, it was impossible. Figuratively, it didn’t make any sense, since my mouth was essentially what made me valuable to BOFFO [COCA, FIC, 2010].
Strictly speaking, it is a digital way to test designs against predictable forces [COCA, ACAD, 2010].
Style adverbs are more common in conversation than in other registers and attitude adverbs are slightly more common in news and academic prose than in conversation and fiction.
The research considers patterns of use for three major grammatical systems used to express stance: modal words, adverbials, and complement clause constructions.
For the hereinafter investigating of stance adverbials which function in the sentence as the Parenthesis, the Table 2 below lists the adverbs under the three ways of qualifying a viewpoint .
The adverbs that may be used as the linguistic realization of the epistemic way of qualifying standpoints belong to what are traditionally identified as modal or epistemic adverbs (certainly, clearly, perhaps, possibly, probably, surely) and evidential or hearsay adverbs (allegedly, apparently, obviously, reportedly, seemingly), as well as domain adverbs (emotionally, ideally, logically, officially, technically, theoretically).
The adverbs that can be used as the linguistic realization of the evaluative way of qualifying standpoints belong to the group of adverbs that are generically labeled as “evaluative adverbs” or “attitudinal adverbs” (fortunately, happily, interestingly, oddly, strangely, unfortunately).
The adverbs that can be used as the linguistic realization of the ‘illocutionary’ way of qualifying standpoints add a comment that concerns the act that is being performed, not the content of the act. Such a comment indicates the language user’s awareness of the conditions that pertain to the performance of an assertive speech act. the adverbs that constitute the linguistic realization of this way of qualifying come both from the group of the so-called “illocutionary adverbs” (frankly, honestly, seriously), and from a group of adverbs that are usually included among the epistemic adverbs or treated in the literature under the label of “expectation markers” (actually, admittedly, in fact, of course).
TABLE 2. STANCE ADVERBS FOR QUALIFYING A STANDPOINT
|EPISTEMIC WAY OF QUALIFYING||EVALUATIVE WAY OF QUALIFYING||ILLOCUTIONARY WAY OF QUALIFYING|
|ADVERBS COMMENTING ON THE COMMITMENT||ADVERBS COMMENTING ON THE EVALUATION||ADVERBS COMMENTING ON THE PERFORMANCE OF THE WHOLE ACT|
arguably, assuredly, certainly, clearly, conceivably, definitely, doubtlessly, evidently, for certain, improbably, incontestably, incontrovertibly, maybe, no doubt, perhaps, possibly, presumably, probably, surely, undoubtedly
allegedly, apparently, manifestly, obviously, ostensibly, patently, purportedly, reportedly, reputedly, seemingly, supposedly, visibly
aesthetically, architecturally, biologically, chemically, commercially, culturally, ecologically, economically, emotionally, ethically, financially, formally, ideally, ideologically, intellectually, linguistically, logically, materially, mechanically, mentally, morally, officially, physically, politically, practically, privately, psychologically, racially, realistically, scientifically, sexually, socially, spiritually, statistically, superficially, technically, technologically, theoretically, unofficially
|(EVENT-ORIENTED/ CLAUSE ORIENTED) EVALUATIVE ADVERBS
bizarrely, commendably, conveniently, curiously, disappointingly, fortunately, funnily, happily, hopefully, illogically, interestingly, ironically, justifiably, justly, luckily, oddly, paradoxically, preferably, regretfully, regrettably, sadly, significantly, strangely, surprisingly, tragically, unaccountably, unfortunately, unhappily unreasonably
bluntly, candidly, confidentially, frankly, honestly, really, seriously, truly, truthfully
basically, briefly, broadly, figuratively, generally, hypothetically, literally, metaphorically, objectively, personally, roughly, simply, strictly
actually, admittedly, avowedly, factually, in effect, in fact, in reality, indeed, naturally, of course, really
|
<urn:uuid:f0443931-3118-41f4-9a7a-313ab48a0e70>
|
{
"dump": "CC-MAIN-2019-09",
"url": "https://vivu.tv/stance-adverbials/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247481624.10/warc/CC-MAIN-20190217051250-20190217073250-00274.warc.gz",
"language": "en",
"language_score": 0.9372286796569824,
"token_count": 2436,
"score": 3.421875,
"int_score": 3
}
|
What are symptoms of pulmonary hypertension?
Many of the symptoms of pulmonary arterial hypertension (PAH) are nonspecific leading to under or misdiagnosis in many patients. It is common to spend more than two years from the time symptoms present to the time of accurate diagnosis. This is very concerning since pulmonary arterial hypertension (PAH) is a progressive disease and the more advanced the disease is before treatment the worse the outcomes are for the patient. For this reason, many PAH specialists spend time and energy educating community physicians about signs and symptoms of pulmonary hypertension.
Common symptoms of pulmonary arterial hypertension (PAH) include:
Breathlessness or dyspnea: Usually starts with shortness of breath with activities such as walking up inclines or stairs but can progress to breathlessness at rest.
Chest pain: This pain can vary from feeling pressure in the chest to stabbing pain and is very individualized.
Dizziness: Feeling light headed or dizzy with activity.
Fainting: This is a verry concerning symptom that should be paid close attention. Many times the fainting happens when a pulmonary arterial hypertension (PAH) patient bends down with their head lowered to pick something up. A known pulmonary hypertension patient should always report an episode of fainting or near fainting to their PAH specialist.
Chronic fatigue: Not being able to do the same activities as previously able to do, or having to take breaks to complete usual chores such as making the bed or vacuuming the floor.
Swelling in the ankles or edema: Fluid accumulates in the body because the heart is strained and cannot efficiently pump. The fluid generally settles in the feet, ankles, and legs as they are the most dependent part of the body but swelling can also be noticed in the abdomen and hands.
Many other diseases such as congestive heart failure or diastolic heart failure have very similar symptoms of pulmonary hypertension. Diagnosing pulmonary arterial hypertension (PAH) involves ruling out other causes for these symptoms by doing non-invasive testing such as pulmonary function tests, CT scans, and echocardiograms before proceeding to the more invasive right heart catheterization.
|
<urn:uuid:792f51db-70e1-4b1b-a9bb-3db0ab58062f>
|
{
"dump": "CC-MAIN-2021-43",
"url": "https://pulmonaryhypertensionrn.com/pulmonary-arterial-hypertension-pah-symptoms/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587659.72/warc/CC-MAIN-20211025092203-20211025122203-00128.warc.gz",
"language": "en",
"language_score": 0.9432769417762756,
"token_count": 452,
"score": 2.765625,
"int_score": 3
}
|
ANN ARBOR, MI, October 20, 2016 – ProQuest’s comprehensive collection of Early English Books Online (EEBO) now includes even more exceptional works from the dawn of printing in England from 1473 to 1700, enabling thousands of rare, delicate resources to be accessible online to researchers around the world.
With EEBO’s September 2016 release, scholars can now explore an additional 631 scanned image titles acquired from 27 unique archives, bringing the total to nearly 132,000 titles. A wealth of new content is available in subjects such as poetry and songs; sermons and texts from the Church of Ireland; ordinances, declarations, votes and petitions from the governments of England, Wales and Scotland; materials from the East India Company, Company of Scotland Trading and the Royal African Company; plantation records, gunpowder laws and pieces relating to the plague from North Ireland. In addition, Catalogues of books to be sold by auction by the booksellers of London provide insight on the history of the book trade.
“Our dedicated content acquisitions and editorial team has been steadily adding remarkable new titles every year from library archives, museums and private collections to EEBO,” said Susan Bokern, ProQuest Vice President, Product Management. ”No other single resource for early modern scholarship is as comprehensive as this database, or has the same high impact for researchers in the humanities.”
A 2015 study conducted by the Oxford Internet Institute, University of Oxford (UK) and commissioned by Jisc and ProQuest, showed that both the use and citations of EEBO in research papers has increased steadily since the database was first launched in digital form 16 years ago. According to the study, EEBO citations include those for literature, linguistics, history, philosophy, theology, music, arts, education, mathematics, and science. A copy of the full report can be found here.
Used by students and scholars in thousands of universities and research organizations worldwide, EEBO enables researchers to explore the complete, digitized images of nearly all the works listed in the key bibliographic records of English literature: The Short-Title Catalogue (Pollard & Redgrave, 1475-1640); The Short-Title Catalogue II (Wing, 1641-1700); The Thomson Tracts; and the Early English Books Tract Supplements, as well as original almanacs, pamphlets, musical scores, prayer books and other intriguing works from the early days of printing, using the English Short Title Catalogue as their guide.
About ProQuest (http://www.proquest.com)
ProQuest connects people with vetted, reliable information. Key to serious research, the company’s products are a gateway to the world’s knowledge including dissertations, governmental and cultural archives, news, historical collections and ebooks. ProQuest technologies serve users across the critical points in research, helping them discover, access, share, create and manage information.
The company’s cloud-based technologies offer flexible solutions for librarians, students and researchers through the ProQuest®, Bowker®, Coutts® information services, Dialog®, ebrary®, EBL™, and SIPX® businesses – and notable research tools such as the Summon® discovery service, the RefWorks® citation and reference management platform, MyiLibrary® ebook platform, the Pivot® research development tool and Intota™. The company is headquartered in Ann Arbor, Michigan, with offices around the world.
|
<urn:uuid:ff159e5f-435d-4c9c-9024-de48aa8acd7d>
|
{
"dump": "CC-MAIN-2019-47",
"url": "https://www.proquest.com/about/news/2016/ProQuest-Uncovers-and-Digitizes-Hundreds-More-Titles-From-the-Dawn.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669276.41/warc/CC-MAIN-20191117192728-20191117220728-00095.warc.gz",
"language": "en",
"language_score": 0.912551999092102,
"token_count": 714,
"score": 2.5625,
"int_score": 3
}
|
How to Learn a Guitar Solo
Have you been learning to play your electric guitar but haven’t tried to play a guitar solo yet?
It can be intimidating to learn your first guitar solo. There are a few things that you need to keep in mind. This guide will help you master that first solo and make it easier for you to memorize it for the future.
Start with a Short and Simple Solo
You should start with a short guitar solo at first.
It’s easier to memorize just a few bars that it is to memorize a long, complicated solo. Some of the most famous solos of all time are quite short.
Here are some samples:
- Intro solo to Wish You Were Here by Pink Floyd
- Elvis – Heartbreak Hotel
- Californication -Red Hot Chilli Peppers
- Come Together – The Beatles
- Nothing Else Matters – Metallica
- Whole Lotta Love – Led Zeppelin
These are a few suggestions. Try a short solo of an artist that you like.
What to Do First
Before you try and learn the solo, listen to it several times. You want to get the feeling of the solo in your head. You want to recreate that feeling when you play it. Spend a lot of time just listening and try to pick out some of the notes. See if you can play a few of them on your electric guitar. Don’t look at any music when you do this. This is a good ear training exercise. See if you can figure out the “key” that the song is in.
Always play a solo slow at first. Work it up to speed as you master each section.
Break it Down
To learn a solo, you need to break it down bar by bar. Have a look at the music and each bar of the solo. Start with the first bar, and don’t play anything else until you have mastered that one bar. Once you have mastered the first bar add in the second bar. Continue doing this until you can connect all the bars together. Don’t worry about speed or timing here, get the notes of the solo under your fingers.
Look for Patterns
To help with memorization, look for patterns in the solo. For example, there may be one lick that is played several times during the solo. Many solos have patterns like this that you can pick out. In some cases, the lick may change a bit or move to another place on the fretboard. Watch for this sort of change in the guitar solo.
Think of a solo as a series of licks that you need to learn on your electric guitar. Each lick connects to the next one to make up the solo. Once you can see the licks and patterns in a solo, learning it is much easier.
What to Do if You Struggle with the Solo
Solo guitar is a lot harder than rhythm guitar. It’s easy to struggle at first. The key is to master small sections (each bar) of the solo before you try and play the whole thing. This is why you need to break down the solo, as discussed earlier. Examine the sections that give you trouble. Is it a certain bend? Fast lick? Try to isolate the section that is giving you problems and work on that part. Try to see how the other parts connect to the section giving you problems.
Play it with the Recording
Once you have the notes under your fingers. Play the recording and try the solo with the music. This is difficult the first few times you do it. The key is to keep practicing until you can play the solo with the recording and get the notes right.
If you struggle, try going through the motions of the solo without playing the notes. Put your fingers where the notes should be and play some air guitar to the solo on the record. See of you can then play the first couple of bars without making a mistake. Once you can do that, add in more bars.
It May Not Sound the Same as the Recording
Playing a guitar solo “exactly” like the recording is quite difficult. Don’t worry if it’s not quite the same. It takes a lot of practice to get a solo to sound like a recording does. Your own personality will come out in the solo that you play. For example, your vibrato may be a bit different than the guitarist that recorded the solo.
The whole idea of learning a guitar solo is to take your time. Break the solo down and work on it bar by bar. Master small section of the solo, then put it all together. Play along with the recording as much as possible. Get the solo as close to the actual recording as you can.
Learning to play the electric guitar can seem difficult at times, that’s why having a great electric guitar teacher to guide you is very important. In London, Electric Guitar Lessons, will be able to help you improve your guitar playing and your creativity.
|
<urn:uuid:ad23e1b2-42f4-4db0-bdde-8a6599b478f8>
|
{
"dump": "CC-MAIN-2020-05",
"url": "https://guitarkl.com/2020/01/14/how-to-learn-a-guitar-solo/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250591763.20/warc/CC-MAIN-20200118023429-20200118051429-00359.warc.gz",
"language": "en",
"language_score": 0.9591386318206787,
"token_count": 1032,
"score": 2.546875,
"int_score": 3
}
|
All images © by Roberto Piperno, owner of the domain. Write to firstname.lastname@example.org. Text edited by Rosamie Moore.
Page added in March 2007.
(relief in the fortress of Bodrum)
The town of Kos (It. Coo), located at the eastern tip of the island by the same name, was founded in the IVth century BC: it soon became one of the richest centres of the region: at the beginning it was ruled by the satraps (Persian governors) of nearby Halicarnassus; after Alexander the Great defeated the Persians, Kos fell within the sphere of influence of the Ptolemies, the Greek dynasty which ruled Egypt and later on of the Romans. In the IInd century AD it was part of the Asia Minor province and it enjoyed great prosperity.
After the fall of the Byzantine Empire in 1204, Venetians and Genoese competed for supremacy on the very impoverished island: the Genoese managed for a while to add Kos to the other large islands (Metelino, Scio) near the Asian coast they already controlled, but in 1315 Vignolo de' Vignoli, the Genoese lord of the island, called in the Knights of St John.
The fortress of Kos has a long rectangular shape and it protects a small harbour of shallow water: its appearance is not as spectacular as that of other fortresses built by the Knights.
The only fortification of some relevance is a round bastion built by Grand Master Fabrizio del Carretto (1513-21); its shape is very similar to the larger bastion that this Grand Master built in Rhodes.
In the construction of the fortress the Knights made use of materials taken from the ruins of the ancient town and of the Asclepeion, a shrine on a nearby hill.
It is with some surprise that one discovers that the walls hide inside another fortress. It was built between 1450 and 1478: in 1480 the Ottomans were unable to conquer it. The Knights however thought that it needed to be strengthened: they eventually decided to build thicker walls on three sides of the old fortress which ended up by being hidden by the new one.
In the inner fortress the use of materials taken from ancient buildings is very evident.
The inner fortress has a more varied and interesting design than the outer one with many coats of arms of the Grand Masters.
Pierre d'Aubusson was Grand Master for 27 years (1476-1503) and he promoted first a major plan of reinforcement of the old fortress and after 1480 the construction of the new one. It is possible to identify the improvements he made after 1489 because in that year he was appointed cardinal and after that date his coat of arms was framed by a cardinal's hat. Ancient reliefs of the Aphrodisian school were often placed below the coats of arms.
In June 1522 Sultan Suleyman laid siege to Rhodes and sent his troops also to Kos and St Peter's Castle, mainly to make sure these fortresses could not send help to the main town of the Knights. In late December 1522 the Knights defending Rhodes capitulated and agreed to withdraw also from all their other fortresses: they left Kos in January 1523.
In May 1912 Kos was occupied by Italian troops (Italo-Turkish War) and for a few years a garrison was located in the old fortress. At that time sentinels did not have cellular phones to occupy their time and a soldier spent his time engraving in the stone a bayonet and the year (1900) he was born.
The medieval town of Kos was located next to the fortress and it was protected by low walls and a small moat filled with water. In 1933 a strong earthquake damaged what was left of the walls: it unearthed the ruins of ancient buildings and the Italian administration chose to excavate the area to bring to light Ancient Kos.
The image used as background for this page shows a relief in the inner fortress portraying angels holding the coat of arms of France.
Rhodes: the Gates
Rhodes: the fortifications
Rhodes: the town of the Knights
Rhodes: Byzantine, Ottoman and Jewish memories
Rhodes: modern Italian architecture
Kos: the ancient town
St Peter's Castle (Bodrum)
Fortress of the Orthodox church
Clickable Map of the Ionian and Aegean Seas with links to other locations covered in this website (opens in a separate window)
|
<urn:uuid:81fc187a-95cd-4c23-95f0-0dee5369934d>
|
{
"dump": "CC-MAIN-2023-06",
"url": "https://romeartlover.tripod.com/Kos1.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499831.97/warc/CC-MAIN-20230130232547-20230131022547-00449.warc.gz",
"language": "en",
"language_score": 0.9724452495574951,
"token_count": 998,
"score": 2.921875,
"int_score": 3
}
|
What follows is a brief outline of Theravada Buddhism, primarily for the benefit of those of you who landed on this website without any idea about what "Theravada" is. The links in this page serve as entry points to the rest of the website.
If you're interested in learning a little about the history of Theravada, you might enjoy seeing Theravada Buddhism: A Chronology.
Note: "Theravada" is pronounced (more or less, in American English) like "terra vodda." The "th" sound in Pali is not like the "th" in "thick"; it's pronounced more like the "th" combination in "hothouse".
Theravada (Pali: thera "elders" + vada "word, doctrine"), the "Doctrine of the Elders," is the name for the school of Buddhism that draws its scriptural inspiration from the Pali Canon, or Tipitaka, which scholars generally accept as the oldest record of the Buddha's teachings. For many centuries, Theravada has been the predominant religion of Sri Lanka, Burma, and Thailand; today Theravada Buddhists number over 100 million worldwide. In recent decades Theravada has begun to take root in the West, primarily in Western Europe and North America.
Theravada Buddhism goes by many names. The Buddha himself called the religion he founded Dhamma-vinaya, "the doctrine and discipline," in reference to the two fundamental aspects of the system of ethical and spiritual training he taught. Owing to its historical dominance in southern Asia (Sri Lanka, Thailand, and Burma), Theravada is also identified as "Southern Buddhism," in contrast to "Northern Buddhism," which migrated northwards from India into China, Tibet, Japan, and Korea. Theravada is often equated with "Hinayana" (the "Lesser Vehicle"), in contrast to "Mahayana" (the "Greater Vehicle"), which is usually a synonym for Zen, Ch'an, and other expressions of Northern Buddhism. The use of "Hinayana" as a pejorative has its origins in the early schisms within the monastic community that ultimately led to the emergence of what would later become Mahayana. Today scholars of many persuasions use the term "Hinayana" without pejorative intent, although many prefer the more neutral "Early Buddhism". (For more about the complex history of the many schools of Buddhism see, for example, The Buddhist Religion: A Historical Introduction (fourth edition) by R.H. Robinson & W.L. Johnson (Belmont, California: Wadsworth, 1997).)
The language of the Theravada canonical texts is Pali, a relative of Magadhi, which was probably spoken in central India during the Buddha's time. Most of the sermons the Buddha delivered were memorized by Ven. Ananda, the Buddha's cousin and close personal attendant. Shortly after the Buddha's death (ca. 480 BCE), the community of monks -- including Ananda -- convened to recite all the sermons they had heard during the Buddha's forty-five year teaching career. Each recorded sermon (sutta) therefore begins with the disclaimer, Evam me sutam -- "Thus have I heard." The teachings were passed down within the monastic community following a well-established oral tradition. By about 100 BCE the Pali Canon (Tipitaka) was first fixed in writing in Sri Lanka by Sinhala scribe-monks.
It can never be proven beyond doubt that the Pali Canon contains the actual words uttered by the historical Buddha (the archaeological record from the Buddha's era is hopelessly incomplete). But practicing Buddhists have never found this problematic. Unlike the scriptures of some of the world's other great religions, the Pali Canon is not meant to be taken as gospel, containing unassailable statements of divine truth, revealed by a prophet, to be accepted purely on faith. Instead, its teachings are meant to be assessed firsthand; we are challenged to put them into practice in our lives, to find out for ourselves if they do, in fact, yield the promised results. It is the truth towards which the words in the Canon point that ultimately matters, not the words themselves. Although academics will undoubtedly continue to speculate about the authorship of passages from the Canon for years to come (and thus miss the point of these teachings entirely), the Canon will quietly continue to serve -- as it has for centuries -- as an indispensible guide for millions of followers in their quest for Awakening.
Many students of Theravada find that learning the Pali language -- even just a little bit here and there -- greatly deepens their practical understanding of the Buddha's teachings.
What follows is a brief synopsis of some of the key teachings of Theravada Buddhism. I've left out a great deal, but I hope that even this rough outline will be enough to get you started in your exploration.
Shortly after his Awakening, the Buddha ("the Awakened One") delivered his first sermon, in which he laid out the essential framework upon which all his later teachings were based. This framework consists of the Four Noble Truths, four fundamental principles of nature (Dhamma) that emerged from the Buddha's honest and penetrating assessment of the human condition and that serve to define the entire scope of Buddhist practice. These truths are not statements of belief. Rather, they are categories by which we can frame our direct experience in a way that is conducive to Awakening:
1. Dukkha: suffering, unsatisfactoriness, discontent, stress;
2. The cause of dukkha: the cause of this dissatisfaction is craving (tanha) for sensuality, for states of becoming, and states of no becoming;
3. The cessation of dukkha: the relinquishment of that craving;
4. The path of practice leading to the cessation of dukkha: the Noble Eightfold Path of right view, right resolve, right speech, right action, right livelihood, right effort, right mindfulness, and right concentration.
To each of these Noble Truths the Buddha assigned a specific task which the practitioner is to carry out: the first Noble Truth is to be comprehended; the second is to be abandoned; the third is to be realized; the fourth is to be developed. The full realization of the third Noble Truth paves the way for the direct penetration of Nibbana (Sanskrit: Nirvana), the transcendent freedom that stands as the final goal of all the Buddha's teachings.
The last of the Noble Truths -- the Noble Eightfold Path -- contains a prescription for the relief of our unhappiness and for our eventual release, once and for all, from the painful and wearisome cycle of birth and death (samsara) to which, thanks to our own ignorance (avijja) of the Four Noble Truths, we have been bound for countless aeons. The Noble Eightfold Path offers a comprehensive practical guide to the development of those wholesome qualities and skills in the human heart that must be cultivated in order to bring the practitioner to the final goal, the supreme freedom and happiness of Nibbana. In practice, the Buddha taught the Noble Eightfold Path to his followers according to a "gradual" system of training, beginning with the development of sila, or virtue (right speech, right action, and right livelihood, which are summarized in practical form by the five precepts), followed by the development of samadhi, or concentration and mental cultivation (right effort, right mindfulness, and right concentration), culminating in the full development of pañña, or wisdom (right view and right resolve). The practice of dana (generosity) serves as a support at every step along the path, as it can help erode the heart's habitual tendencies towards craving and as it can teach valuable lessons about the causes and results of one's actions (kamma).
Progress along the path does not follow a simple linear trajectory. Rather, development of each aspect of the Noble Eightfold Path encourages the refinement and strengthening of the others, leading the practitioner ever forward in an upward spiral of spiritual maturity that culminates in Awakening.
Seen from another point of view, the long journey on the path to Awakening begins in earnest with the first tentative stirrings of right view, the first flickerings of wisdom by which one recognizes both the validity of the first Noble Truth and the inevitability of the law of kamma (Sanskrit: karma), the universal law of cause and effect. Once one begins to see that harmful actions inevitably bring about harmful results, and wholesome actions ultimately bring about wholesome results, the desire naturally grows to live a skillful, morally upright life, to take seriously the practice of sila. The confidence built from this preliminary understanding inclines the follower to place an even greater trust in the teachings. The follower becomes a "Buddhist" upon expressing an inner resolve to "take refuge" in the Triple Gem: the Buddha (both the historical Buddha and one's own innate potential for Awakening), the Dhamma (both the teachings of the historical Buddha and the ultimate Truth towards which they point), and the Sangha (both the monastic community that has protected the teachings and put them into practice since the Buddha's day, and all those who have achieved at least some degree of Awakening). With one's feet thus firmly planted on the ground by taking refuge, and with the help of an admirable friend (kalyanamitta) to help show the way, one can set out along the Path, confident that one is indeed following in the footsteps left by the Buddha himself.
Buddhism is sometimes naïvely criticized as a "negative" or "pessimistic" religion and philosophy. After all (so the argument goes) life is not all misery and disappointment: it offers many kinds of joy and happiness. Why then this pessimistic Buddhist obsession with unsatisfactoriness and suffering? The Buddha based his teachings on a frank assessment of our plight as humans: there is unsatisfactoriness and suffering in the world. No one can argue this fact. Were the Buddha's teachings to stop there, we might indeed regard them as pessimistic and life as utterly hopeless. But, like a doctor who prescribes a remedy for an illness, the Buddha offers hope (the third Noble Truth) and a cure (the fourth). The Buddha's teachings thus give cause for an extraordinary degree of optimism in a complex, confusing, and difficult world. One modern teacher summed it up well: "Buddhism is the serious pursuit of happiness."
The Buddha claimed that the Awakening he re-discovered is accessible to anyone willing to put forth the effort and commitment required to pursue the Noble Eightfold Path to its end. It is up to each of us individually to put that claim to the test.
Until the late 19th century, the teachings of Theravada were little known outside of Southern and Southeast Asia, where they had flourished for some two and one-half millennia. In the last century, however, the West has begun to take notice of Theravada's unique spiritual legacy and teachings of Awakening. In recent decades, this interest has swelled, with the monastic Sangha from the various schools within Theravada establishing dozens of monasteries across Europe and North America. In addition, a growing number of lay meditation centers in the West, operating independently of the Sangha, currently strain to meet the demands of lay men and women -- Buddhist and otherwise -- seeking to learn selected aspects of the Buddha's teachings.
The turn of the 21st century presents both opportunities and dangers for Theravada in the West: Will the Buddha's teachings be patiently studied and put into practice, so that they may be allowed to establish deep roots in Western soil, for the benefit of many generations to come? Will the current popular climate of "openness" and cross-fertilization between spiritual traditions lead to the emergence of a strong new form of Buddhist practice unique to the modern era, or will it simply lead to the dilution and confusion of these priceless teachings? These are open questions; only time will tell.
Fortunately, the Buddha left us with some very clear guidelines to help us find our way through the perplexing maze of purportedly "Buddhist" teachings that are available to us today. Whenever you find yourself questioning the authenticity of a particular teaching, heed well the Buddha's advice to his stepmother:
The qualities of which you may know, 'These qualities lead to passion, not to dispassion; to being fettered, not to being unfettered; to accumulating, not to shedding; to self-aggrandizement, not to modesty; to discontent, not to contentment; to entanglement, not to seclusion; to laziness, not to aroused persistence; to being burdensome, not to being unburdensome': You may definitely hold, 'This is not the Dhamma, this is not the Vinaya, this is not the Teacher's instruction.'
As for the qualities of which you may know, 'These qualities lead to dispassion, not to passion; to being unfettered, not to being fettered; to shedding, not to accumulating; to modesty, not to self-aggrandizement; to contentment, not to discontent; to seclusion, not to entanglement; to aroused persistence, not to laziness; to being unburdensome, not to being burdensome': You may definitely hold, 'This is the Dhamma, this is the Vinaya, this is the Teacher's instruction.'
-- AN VIII.53
The truest test of these teachings, of course, is whether they yield the promised results in the crucible of your own heart. The Buddha simply presents a challenge; the rest is up to you.
|
<urn:uuid:18133edd-577c-40af-a93e-90c8d00d8a7b>
|
{
"dump": "CC-MAIN-2018-39",
"url": "http://kammatthana.com/what_is_theravada.htm",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160142.86/warc/CC-MAIN-20180924031344-20180924051744-00283.warc.gz",
"language": "en",
"language_score": 0.9516439437866211,
"token_count": 2868,
"score": 3.421875,
"int_score": 3
}
|
This Date in Native History: On May 21, 1758, Delaware Indians kidnapped a child named Mary Campbell from her home in western Pennsylvania and held her captive during the French and Indian War.
By some accounts, Campbell was 10 at the time of her abduction, while other sources claim she was 12. She likely lived with the Delaware (also known as the Lenape) in what is now Summit County, Ohio, for about six years, said Michael Cohill, a historian in Akron, Ohio. She was repatriated in 1764 during the famous release of captives at the conclusion of Pontiac’s War.
Campbell, known as the first white child on the Western Reserve, was one of several known abductees captured during the war, Cohill said. Often, white women or children were taken to replace Natives killed in the conflicts over frontier land.
“If someone came into your city and killed a couple of your children, then your husband would go out and attack a village of white people and take their women, take their children,” Cohill said. “If you kill my children, I’m going to take yours as my own and raise them.”
The abduction probably was traumatic, Cohill said. Captives were transported from their homes to Native villages that sometimes were great distances away. Some captives died during the journey while others—those who did not cooperate—were killed.
Those who survived quickly assimilated to Native life, Cohill said.
“If you lived through the capture and traveling, you would do everything you needed to do to decide you belonged with these people and not make any attempt to leave,” he said. “If you did not cooperate with your captors, they killed you.”
Records of Campbell’s abduction reveal that her family went to great lengths to bring her home. A notice printed in October 1764 in The Pennsylvania Gazette describes Campbell as a child of 10 with red hair and freckles.
In the notice, Campbell’s father “begs that she may, by all good people, be helped on her way to him, as he, and her aged mother are very desirous of seeing her.”
Kidnappings like Campbell’s came after the tribe lost almost 90 percent of its people to war and disease, said Michael Pace, an artist in residence at Conner Prairie, a living history museum in central Indiana. After an outbreak of German measles reduced the tribe to 3,000 members, the Delaware sought white women and children to help replenish its dwindling numbers.
Yet many captives, including Campbell, discovered that life among the Natives was better than what they left behind, said Pace, a former assistant chief for the Delaware Tribe of Indians.
“People were treated better in the tribe than they were in white society—especially women,” he said. “They were raised in a matrilineal society, where they had rights and were treated better.”
Once removed from the male-dominated white society, women did well among the Natives, Pace said. Abductees who were rescued from the tribes often ran away from home to rejoin their Native families.
“I’m sure there was a great deal of fear when people were abducted, but they began to realize they were treated well,” Pace said. “People cared about them, wanted them to learn how to live this life. Their ideals changed.”
For Campbell, life among the Delaware probably was “extraordinarily wonderful,” Cohill said. He believes Campbell, who was 16 or 18 when her captivity ended, was forcibly repatriated. He also believes Campbell married within the tribe and likely had children she left behind when she returned home.
By the end of Pontiac’s War, white people living in Ohio were there by choice, Cohill said. Some captives refused repatriation and did not return to their former homes.
“Those that didn’t go back, there was a reason for them not to return,” he said. “Usually they were married, were parents, and that meant they would never be accepted back into white society.”
After her repatriation, Campbell settled in Washington County, Pennsylvania. She married a white settler in 1770 and had seven children.
But Campbell never fully recovered from her capture—or her return, Cohill said.
“We do know that the taking was horrible, just as much as the return was horrible,” he said, calling Campbell’s adult life a “sad story.” He pointed to accounts recorded by Campbell’s children, who said their mother often retreated into the woods to cry.
“It was five to seven years later that she returned, so she was old enough to be married, to have children,” he said. “Being a woman in a Delaware tribe, she would have been at an exalted position. It was a matriarchal society and they took extraordinarily good care of their children.”
Campbell died in 1801, and was buried near her western Pennsylvania home.
|
<urn:uuid:25a8b263-556c-43e3-9ad3-4cffa8798d48>
|
{
"dump": "CC-MAIN-2018-22",
"url": "https://indiancountrymedianetwork.com/history/events/native-history-white-child-abducted-by-delaware-embraced-native-life/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867559.54/warc/CC-MAIN-20180526151207-20180526171207-00590.warc.gz",
"language": "en",
"language_score": 0.9923338890075684,
"token_count": 1079,
"score": 4.03125,
"int_score": 4
}
|
Magnetic reconnection is the most fundamental energy-transfer mechanism in the universe that converts magnetic energy into heat and kinetic energy of charged particles. For reconnection to occur, the frozen-in condition must break down in a localized region, commonly called the ‘diffusion region’. In Earth’s magnetosphere, ion diffusion regions have already been observed, while electron diffusion regions have not been detected due to their small scales (of the order of a few km) (
In the last decade a New Geophysics has been proposed, whereby the crust and uppermost ~400 km of the mantle of the Earth are so pervaded by closely-spaced stress-aligned microcracks (intergranular films of hydrated melt in the mantle) that in situ rocks verge on failure by fracturing, and hence are critical-systems that impose a range of fundamentally-new properties on conventional sub-critical geophysics. Enough of these new properties have been observed to confirm that New Geophysics is a new understanding of fluid/rock deformation with important implications and applications. Evidence supporting New Geophysics has been published in a wide variety of publications. Here, for clarification, we summarise in one document the evidence supporting New Geophysics.
A map of the average atomic number of lunar rock and soil can be used to differentiate lithology and soil type on the lunar surface. This paper establishes a linear relationship between the average atomic number of lunar rock or soil and the flux of position annihilation radiation (0.512-MeV gamma-ray) from the lunar surface. The relationship is confirmed by Monte Carlo simulation with data from lunar rock or soil samples collected by Luna (Russia) and Apollo (USA) missions. A map of the average atomic number of the lunar rock and soil on the lunar surface has been derived from the Gamma-Ray Spectrometer data collected by Chang’e-1, an unmanned Chinese lunar-orbiting spacecraft. In the map, the higher average atomic numbers (ZA > 12.5), which are related to different types of basalt, are in the maria region; the highest ZA (13.2) readings are associated with Sinus Aestuum. The middle ZA (~12.1) regions, in the shape of irregular oval rings, are in West Oceanus Procellarum and Mare Frigoris, which seems to be consistent with the distribution of potassium, rare earth elements, and phosphorus as a unique feature on the lunar surface. The lower average atomic numbers (ZA < 11.5) are found to be correlated with the anorthosite on the far side of the Moon.
The X-discontinuity, which appears at the depth of approximately 300 km, is an important seismic interface with positive velocity contrasts in the upper mantle. Detecting its presence and topography can be useful to understand phase transformations of relevant mantle minerals under the high-temperature and high-pressure circumstance of the Earth's interior. In this study, we detect the X-discontinuity beneath the Ryukyu subduction zone using five intermediate-depth events recorded by the dense Alaska Regional Network (AK). The X-discontinuity is successfully revealed from the robust slant stacking of the secondary down-going and converting SdP phases. From the depth distribution of conversion points, we find that the X-discontinuity's depth ranges between 269 km and 313 km, with an average depth of 295 km. All the conversion points are located beneath the down-dipping side of the Philippine Sea slab. From energy comparisons in vespagrams for observed and synthetic seismograms, the strong converted energy is more likely from a thin high-velocity layer, and the S-wave velocity jumps across the X-discontinuity are up to 5% to 8% with an average of 6.0%. According to previous petrological and seismological studies, the X-discontinuity we detected can be interpreted as the phase transformation of coesite to stishovite in eclogitic materials within the oceanic crust.
Data obtained by GRACE (Gravity Recovery and Climate Experiment) have been used to invert for the seismic source parameters of megathrust earthquakes under the assumption of either uniform slip over an entire fault or a point-like seismic source. Herein, we further extend the inversion of GRACE long-wavelength gravity changes to heterogeneous slip distributions during the 2011 Tohoku earthquake using three fault models: (I) a constant-strike and constant-dip fault, (II) a variable dip fault, and (III) a realistically varying strike fault. By removing the post-seismic signal from the time series, and taking the effect of ocean water redistribution into account, we invert for slip models I, II, and III using co-seismic gravity changes measured by GRACE, de-striped by DDK3 decorrelation filter. The total seismic moments of our slip models, with respective values of 4.9×1022 Nm, 5.1×1022 Nm, and 5.0×1022 Nm, are smaller than those obtained by other studies relying on GRACE data. The resulting centroids are also located at greater depths (20 km, 19.8 km, and 17.4 km, respectively). By combining onshore GPS, GPS-Acoustic, and GRACE data, we obtain a jointly inverted slip model with a seismic moment of 4.8×1022 Nm, which is larger than the seismic moment obtained using only the GPS displacements. We show that the slip inverted from low degree space-borne gravimetric data, which contains information at the ocean region, is affected by the strike of the arcuate trench. The space-borne gravimetric data help us constrain the source parameters of a megathrust earthquake within the frame of heterogeneous slip models.
The 13 November 2016 Kaikoura earthquake occurred in the northeastern coastal region of the South Island, New Zealand. The Mw 7.8 mainshock generated a complex pattern of surface ruptures, and was followed within about 12 hours by three moderate shocks of Mw ≥ 6.0. Here we use teleseismic waveforms to invert for the source rupture of the Kaikoura earthquake. The resulting slip-distribution model exhibits insignificant slip near the hypocenter and three pockets of major slip zones with distinct senses of motion. The mainshock started from a rupture near the hypocenter, grew into thrust on shallow crustal faults ~50 km northeast of the hypocenter, and then developed into two slip zones: a deeper one with oblique thrust and a shallower one with almost purely right-lateral strike-slip. Locations of the thrust and strike-slip motions in the slip-distribution model agree well with reported coastal uplifts and horizontal offsets. The overall slip pattern is dominated by horizontal motion, especially at shallow depth, due to the partitioning of thrust and strike-slip motions above the subduction zone megathrust. Aftershock distribution suggests that most aftershocks tend to occur near the edges of the major slip zones of the mainshock. This observation on aftershock locations may provide useful information for seismic hazard assessments after large earthquakes.
This study tested five methods widely used in estimating the complete magnitudes (MC) of earthquake catalogs. Using catalogs of observed earthquake properties, we test the performance of these five algorithms under several challenging conditions, such as small volume of events and spatial-temporal heterogeneity, in order to see whether the algorithms are stable and in agreement with known data. We find that the maximum curvature method (MAXC) has perfect stability, but will significantly underestimate MC unless heterogeneity is absent. MC estimated by the b-value stability method (MBS) requires many events to reach a stable result. Results from the goodness of fit method (GFT) were unstable when heterogeneity lowered the fitness level. The entire magnitude range method (EMR) is relatively stable in most conditions, and can reflect the change in MC when heterogeneity exists, but when the incomplete part of the earthquake catalog is dismissed, this method fails. The median-based analysis of the segment slope method (MBASS) can tolerate small sample size, but is incapable of reflecting the missing degree of small events in aftershock sequences. In conditions where MC changes rapidly, such as in aftershock sequences, observing the time sequence directly can give a precise estimation of the complete sub-catalog, but only when the number of events available for study is large enough can the MAXC, GFT, and MBS methods give a similarly reliable estimation.
|
<urn:uuid:cf2c8521-9087-4e07-b7c8-280f36bf43ea>
|
{
"dump": "CC-MAIN-2018-22",
"url": "http://eppcgs.org/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864558.8/warc/CC-MAIN-20180521220041-20180522000041-00094.warc.gz",
"language": "en",
"language_score": 0.9073424935340881,
"token_count": 1785,
"score": 3.421875,
"int_score": 3
}
|
Grout is commonly used when installing floor tiles and backsplashes. It fills in the spaces and helps to hold everything in place. Grout mix ratio refers to the amounts of grout and water to be combined. In order to achieve maximum performance it’s important to get the proper ratio. Mixing grout is not a difficult task. If you can make pancake batter then mixing grout will be a breeze.
Grout is like cement but should not be confused with concrete or mortar. Grouts are mainly composed of portland cements and fine sand. In the industry, portland cement is a common term used to describe various cements. Grouts come in various colors that accent flooring or backsplash choices.
Water plays a vital role in the bonding and hardening process. To activate, water is added according to the manufacturer's instructions. The addition of water causes the grout to set and harden. Too much water will weaken the grout strength. If too little water is added then the grout will be too thick. Grout needs to be fluid but not watery in order to fill the space between tiles in flooring or backsplashes. Use your water judiciously to give your mixture the required consistency.
When mixing grout, a common utility bucket should be sufficient for most projects. A trowel or low speed mixer can be used to attain a smooth paste-like consistency. The finished mixture should not be pourable. Use cool clean water to add to the grout. If more than one bag of grout will be used, then dry-blending the grout prior to adding water is recommended to provide color uniformity. Once mixed, the grout should be put down typically within 1 to 2 hours.
Grout mix ratio can vary widely. A satisfactory result can be accomplished by following the manufacturer's instructions. Since bond strength, color and performance are dependent upon the correct mix ratio, should you make a mistake such as adding too much water, the addition of grout can bring you back to the correct ratio. And if the mix is too thick, a little more water will get the ratio in order.
- Stockbyte/Stockbyte/Getty Images
|
<urn:uuid:44b8160f-2078-4724-9571-7877f563fe18>
|
{
"dump": "CC-MAIN-2017-43",
"url": "http://living.thebump.com/grout-mixture-ratio-13503.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823153.58/warc/CC-MAIN-20171018214541-20171018234541-00517.warc.gz",
"language": "en",
"language_score": 0.9314413666725159,
"token_count": 455,
"score": 2.703125,
"int_score": 3
}
|
Society often views the cause of obesity as one primarily related to a lack of self-control and discipline, but this is not the case. Many scientific theories exist as to what causes obesity, and while it is most likely a disease with various contributing factors, studies show a strong association between obesity, lifestyle factors, and gut bacteria.
Obesity affects two-thirds of the population and has increased dramatically in the past few decades; more than one third of adults in the U.S. and almost one in five children are obese, and one third of the population worldwide is overweight. In addition to the incredible breadth of symptoms that accompany obesity, the disease makes you twice as likely to die and increases your chances of developing practically every digestive disease.
Although obesity is a serious disease no matter where fat is distributed, fat deposition is important in predicting the likelihood of developing certain diseases. Fat deposited around the abdominal region (or apple shaped) puts obese individuals at a much higher risk for developing metabolic syndrome (a deadly combination of risk factors, including high blood pressure, high fasting blood sugar, increased waist circumference, and elevated triglycerides, that dramatically increases your chances of developing heart disease, stroke, diabetes, and some types of cancer) than those with fat deposited in the hips and legs (or pear shaped).
Society often views the cause of obesity as one primarily related to a lack of self-control and discipline, but this is not the case. Many scientific theories exist as to what causes obesity, and while it is most likely a disease with various contributing factors, studies show a strong association between obesity, lifestyle factors, and gut bacteria. Treating obesity can be challenging, yet lifestyle interventions such as diet, exercise, and stress reduction can be incredibly effective.
Many of the symptoms and complications that accompany obesity are due to visceral fat (butter-colored bundles of fat that wrap around the abdominal organs and is most prevalent in obese individuals with an apple shape) accumulation in the abdomen.
Visceral fat is a complex tissue similar in function to other endocrine organs like the thyroid gland. In addition to affecting the function of the liver, pancreas, and other internal organs, visceral fat itself is hormonally active, producing estrogens, proteins, and other substances that can affect insulin levels, blood sugar, cholesterol, and even the reproductive system. Belly fat puts you at higher risk for elevated lipids (fats) in the blood, diabetes, breast cancer, colon cancer, gallbladder problems, high blood pressure, and lots of other health issues, likely related to these hormonally active substances it secretes.
The primary symptoms and conditions that are associated with obesity are many and include:
- Estrogen dominance (a hormone called androstenedione made in the ovaries is converted to estrogen by fat cells)
- Celiac disease
- Gallbladder dysfunction
- Cancer (including colon and ovarian cancers)
- Decreased libido
- Sleep apnea
- Sexual dysfunction
- Heart disease
- Liver disease
- Skin conditions
- Type 2 diabetes
- Metabolic syndrome
The following factors are the most common contributers to obesity:
- Eating processed foods high in fat, salt, and sugar (including artificial sweeteners)
- Lack of exercise
- Genetics & familial lifestyle similarities
- Sleep deprivation
- Hormone issues, including hypothyroidism and PCOS
Although these factors contribute to the disease, obesity rates have increased too rapidly to blame genetics as the main cause, and although a diet high in fat and sugar is partly responsible, it doesn’t account for the striking increase in body mass index observed in the world population over the last few decades.
Studies now show that maintaining a stable weight is much more complicated than calories in versus calories out; it’s what happens to those calories as they pass through the digestive tract and its gut bacteria that may explain the rapid increase in weight gain.
The following evidence is implication that gut bacteria play a major role in obesity:
Diet: The food you eat affects the composition of the bacterial communities in your gut—high-fat, low-fiber diets are associated with a very different microbial profile than low-fat, high-fiber diets—and that microbial composition can in turn influence whether or not you end up gaining weight. Although diet can contribute to obesity by encouraging an overabundance of calories, certain foods can promote pathogenic bacteria that also contribute to obesity. A sugary, starchy, fat-laden Western diet encourages growth of the wrong type of bacteria in your gut.
Processed grains, refined sugar, & animal fats and proteins: Cutting down on processed grains and refined sugar can affect our microbiome in a positive way, but replacing those foods with too much animal protein and fat can be problematic, because they may crowd out the dietary fibers that are an important component of a microbiome associated with leanness. Gutbliss experts see a plateau in weight loss in many patients who put themselves on restrictive low-carb diets or Paleo devotees who don’t eat enough vegetables, probably because they’re not cultivating the right microbes.
Microbial Imbalance & Dysbiosis: Some experts who study gut bacteria believe that dysbiosis contributes to many diseases, including obesity. Interestingly, lean people are typically colonized with different bacterial species relative to their obese counterparts. In fact, we can distinguish between leanness and obesity with 90 percent accuracy just from looking at gut bacteria. Several experiments have shown that when we transplant microbes from obese mice into germ-free lean mice, they gain weight and their fat deposition increases, without any change in their diet or exercise regimen. We are now seeing the same thing happen in humans, and although we’re not sure exactly how, “obese” microbes are able to extract more calories than “lean” microbes from the same food, there are a number of ways bacteria can change their energy harvest: by controlling the transit time of food through the digestive tract, which determines how many calories can be extracted and absorbed; by influencing hormones that determine whether calories are deposited as fat versus used as energy; and by themselves consuming extra calories for tissue repair or other tasks.
Hormones: Polycystic ovary syndrome (PCOS) is associated with high levels of androgens and affects between 5 to 10% of women of reproductive age. Classic symptoms include excessive facial hair, male pattern baldness, acne, obesity, irregular menses, decreased fertility, and insulin resistance. Most, but not all women with PCOS will have multiple ovarian cysts demonstrated on ultrasound. Some studies have raised the possibility that obesity causes PCOS, rather than the other way around. What we do know is that addressing insulin resistance and obesity through a diet that restricts gluten and refined sugar improves a lot of the symptoms of PCOS, including bloating. Gutbliss experts have seen high androgen (male hormone) levels, infertility, and irregular menstrual patterns in PCOS resolve with dietary modification and weight loss.
Genetics: What you’re eating definitely has an impact on whether you gain weight, and genes have some influence, too, especially over where you gain it—they help dictate whether you end up a belly-prominent apple or a thigh-heavy pear. The Genetic Investigation of Anthropometric Traits consortium (GIANT) identified 13 new areas with variations in the DNA, that correlated with whether people were apple or pear shaped. Not surprisingly, the correlations were stronger in women. Although the identified genes only explained variations in fat distribution in about 1% of the population, the research suggests that for some of us, specific biological mechanisms may play a role in determining where fat is stored in our body. Other research shows that genetics are not the only cause of obesity. Researchers at Washington University in St. Louis took gut bacteria from identical twins (who by definition, have exactly the same genes), where one was lean and one was obese, and transplanted them into germ-free mice. Within weeks, the mice that received microbes from the obese twin became obese, and the ones who received microbes from the lean twin stayed lean— validating the concept that our microbes, not our genes, may be primarily responsible for changes in our weight.
Super-Sanitized Lifestyle: In the developing world, we’re seeing lower rates of bacterial colonization in the gut as modern practices like chlorinated water, hand sanitizers, and the widespread use of antibiotics, whittle down our microbiome. The fallout has been increasing rates of modern plagues like autoimmune diseases, asthma, and allergies, but obesity is also one of the consequences of our super sanitized lifestyle.
H. pylori: Less than 10 percent of school age children now harbor H. pylori, a number that’s decreased dramatically from decades ago as a result of widespread use of antibiotics. In later life, H. pylori may be associated with stomach ulcers and other problems, but in childhood it seems to have a more protective effect, including keeping ghrelin—the “hunger hormone” produced in the GI tract that makes us want to eat —in check. Without H. pylori’s influence on ghrelin, children may be missing the cues that tell them when to stop eating.
Antibiotics: Studies show that children prescribed large amounts of antibiotics are at higher risk for obesity later in life. Antibiotic exposure before birth can be a major hazard, too: antibiotic use in pregnant women in the 2nd and 3rd trimester is associated with an increased risk for obesity in their babies. In animal studies, combining antibiotics with a high-fat diet seems to be a synergistic factor that’s associated with even more rapid weight gain, and the same is true in humans. Babies exposed to antibiotics as newborns have an 84 percent increase in risk for obesity because of the effect on their developing microbiome, and like C-section babies, much higher rates of asthma, allergies and autoimmune diseases later in life.
Chemicals: Triclosan is an antimicrobial agent found in consumer products like soaps, detergents, and some brands of toothpaste. Despite being marketed as antibacterial, household soaps and sanitizers containing triclosan don’t offer any real benefit over conventional soap and water, but they may confer additional risk, including higher rates of food allergies and a higher body mass index in people with detectable levels of triclosan in their urine, which in some studies was as high as 75 percent of U.S. households. Widespread use of chemicals like triclosan, coupled with the prevalence of pesticides and preservatives in our food, may be altering our microbiome in ways that contribute to the rising trend in obesity.
Exercise: We know that exercise is good for us, but it turns out it’s also really good for our microbes. A 2014 British study compared stool samples from 40 professional rugby players in the midst of their training season to healthy men of the same age who weren’t avid exercisers. The athletes had more bacteria, greater species diversity, and significantly higher levels of the species that are associated with low rates of obesity and obesity-related diseases. The rugby players also ate a lot more fruit and vegetables. The study authors concluded that, “exercise seems to be another important factor in the relationship between the microbiota, host immunity and host metabolism, with diet playing an important role.”
Obesity is a diagnosis based on anthropometric measurements, including percent body fat, body mass index (BMI), or waist circumference (WC). A body fat percentage of 24 in men and 37 in women, a BMI of 30 and above, and a WC of 40 inches in men and 35 inches in women, are considered obese.
Typically as percent body fat, BMI, and WC increase, so does disease risk. While BMI can be a good predictor of obesity and disease risk, it does not take into account percent body fat and therefore is not an accurate measurement in those with a very low percent body fat. While body fat percentage does take body fat into consideration, research associating body fat percentage ranges to disease risk is lacking. Waist circumference is both a valid predictor of obesity and disease risk, as it measures the adiposity around the mid-section, which is the best predictor in risk of metabolic syndrome.
Another useful number in diagnosing body fat and disease risk is waist-to-height ratio (WHtR or index of central obesity). WHtR is used to measure the amount of fat that accumulates around the abdomen, in relation to height. If your waist circumference is more than half your height, even if you’re not overweight, you may have more belly fat than you thought, which puts you at a higher risk of developing metabolic syndrome, a condition that dramatically increases your chances of developing heart disease, stroke, diabetes, and some types of cancer.
Be Your Inner Doctor*
Measure your waist circumference by placing your tape measurer midway between the top of your hipbones and the bottom of your ribs. Release your breath normally and wrap the tape around your waist. If your WC is approaching 31 inches for women and 37 inches for men, your health is at risk. If your WC is approaching 35 for women and 40 for men, you are considered obese and are at risk for serious health problems.
*Measurement steps courtesy of www.Heartfoundation.org
Recommended integrative treatments for obesity include the following:
The calories in what we eat may not directly affect our weight as much as we thought, but our diet has a profound effect on our gut bacteria, which in turn affects how we harvest energy and nutrients from our food. Even if we swap out our microbes for ones associated with leanness, if we’re not eating the right mix of foods to nourish and sustain those microbes, they’re not going to survive or reproduce for very long.
The best way to treat obesity is through diet. Dr. Chutkan recommends eating a modified Paelo diet, or a flexitarian way of eating, which is referred to as the Valeo diet. For food lists and recipes, check out Gutbliss and The Microbiome Solution.
Exercise is one of the best things you can do to treat obesity. Not only because it burns calories (obesity is not as simple as burning more calories than you consume), but also because it promotes stress reduction and encourages a social, active, and healthy lifestyle. Not to mention, studies show that beneficial microbes thrive on exercise!
Although initial stressors send signals to the body to suppress hunger in order to address a stressful situation, persistent stress (which is the type of stress most Americans experience daily with busy schedules and hectic lifestyles) has the opposite effect. In a state of constant stress, the body releases a hormone called cortisol, which increases hunger and the physical drive to eat. Reducing stress, along with diet and exercise, is a first line therapy for obesity, and even if all other lifestyle factors are in place, without stress reduction, losing weight and overcoming obesity is a challenge.
Our lifestyle choices – as individuals and as a society – affect our microbiome and thus our weight. Modern practices like C-sections, antibiotic use, fattening of livestock with antibiotics, and the widespread use of chemicals in personal care products – are killing off our beneficial bacteria and allowing “bad” bacteria to take over. Like almost every aspect of our health, our microbes are intimately involved with whether we end up obese or not. Figuring out how to cherish and protect them is key to achieving and maintaining a natural, healthy weight. Check out Dr. Chutkan’s Live Dirty Eat Clean plan in The Microbiome Solution for more details.
Fecal Microbiota Transplant
While it may seem that a simple solution to the obesity epidemic is to simply replace our not-so-great microbes with better ones, it turns out that’s not so easily done. Gut bacteria have a very short lifespan—just minutes, in many cases. Even though we can temporarily change our microbial composition by inoculating ourselves with different bugs, we tend to revert to our “old” microbiome pretty quickly; so creating lasting change can be a challenging process.
Obesity, diabetes, and metabolic syndrome are associated with a disordered microbiome and are natural candidates for FMT therapy, but we still need large-scale clinical trials that can tell us how effective FMT really is for these conditions.
Pilot studies investigating the effects of transferring stool from lean donors to obese recipients showed improved insulin sensitivity and increased production of beneficial short chain fatty acids, although most studies were too short to assess meaningful changes in weight. FMT by itself is probably not helpful for obesity, diabetes, or metabolic syndrome without a significant dietary change – which for some people may be all they need to effect meaningful changes in their microbiome.
While there is anecdotal evidence to support the use of FMT in the management of obesity, we’re still waiting on more extensive clinical trials to document a clear benefit. Obesity (along with metabolic syndrome and diabetes) is therefore categorized as a potential indication for FMT.
|
<urn:uuid:26945cdb-c0bd-402f-bb64-50e5ab3a5063>
|
{
"dump": "CC-MAIN-2018-17",
"url": "https://gutbliss.com/featured_item/obesity/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945082.84/warc/CC-MAIN-20180421071203-20180421091203-00448.warc.gz",
"language": "en",
"language_score": 0.9476094841957092,
"token_count": 3538,
"score": 3.40625,
"int_score": 3
}
|
Nations with gender equality have greater economic growth. Business with women leaders perform better. Peace agreements drawn up by women are more durable. Legislative assemblies with women enact legislation on important social issues such as health, education, anti-discrimination and child support. Equality for women means progress for everyone.
On this International Women’s Day, let us all reflect on the progress yet to be made for all the women of the world who will continue to play an extraordinary role in the history and well being of our planet.
A girl newborn still faces inequality, no matter where she lives. We have an obligation to allow her to live free from the violence that affects one in three women around the world. These women must earn equal pay for equal work and enjoy freedom from discrimination that prevents her from deciding if and when she will have children, and how many she will be allowed to nurse.
|
<urn:uuid:0553f0eb-7ab7-423b-b786-3866b04a09fd>
|
{
"dump": "CC-MAIN-2018-43",
"url": "https://cimages.me/content/international-women%E2%80%99s-day",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512693.40/warc/CC-MAIN-20181020101001-20181020122501-00477.warc.gz",
"language": "en",
"language_score": 0.9604447484016418,
"token_count": 178,
"score": 2.8125,
"int_score": 3
}
|
Would You Know the Symptoms of Stroke?
Stroke is the third leading cause of death in the United States, and more than 140,000 people die from stroke each year. Immediate action is needed to prevent permanent damage to the brain, which is why it’s important to know the symptoms of stroke and react fast.
Knowing the initial stroke symptoms can go a long way toward helping your loved one survive and recover from a stroke. Pre-stroke symptoms can often be difficult to spot, so making sure that you know the warning signs might just save a life.
In honor of National Stroke Awareness Month this May, take time to learn the signs of stroke—and what to do when one occurs.
Know Your Stroke Facts
Before we review the warning signs of stroke, let’s take a look at how strokes affect the U.S. population.
When someone experiences a stroke, it means that there has been a interruption of blood flow to the brain, causing damage to the brain cells. The longer the brain goes without oxygen, the worse the damage becomes.
Almost 800,000 Americans experience a stroke each year, and it’s the leading cause of disability. While the risk for a stroke increases with age, it’s worth noting that people younger than 65 also experience strokes.
Women statistically have more strokes than men, and risk factors for both genders include high blood pressure, smoking, and high cholesterol. Strokes can be a particular concern for those who suffer from heart disease.
If your loved one is at a higher risk for stroke, talk with his or her doctor and medical team at Senior LIFE about ways to reduce the risk. That may include lifestyle changes or medication.
Be FAST: The Stroke Warning Signs to Know
There are a few stroke warning signs to keep in mind. While not always foolproof, knowing what to look for could help save a life!
Luckily, stroke experts have devised a quick and easy to remember acronym to know what to do if someone is experiencing a stroke.
Memorize the phrase “BE FAST.”
B: Balance. Check to see if your loved one has recently stumbled, lost his or her balance, or isn’t able to walk a straight line.
E: Eyes. Notice if there are sudden changes in vision.
F: Face Drooping. Is one side of your loved one’s face drooping? Often the most recognizable and well-known stroke symptom, facial drooping is a sign of stroke.
A: Arm Weakness. Check to see if both arms are able to be raised. If one is not, this might be a stroke.
S: Speech Difficulty. Speech that is unusually difficult to understand, or is suddenly slurred, is a warning sign of stroke.
T: Time to Call 911. If even a single one of the above symptoms are present, it’s time to call for help. Reaching emergency responders is as easy as dialing 911. Record the time that symptoms occurred—this information will be helpful to doctors.
Often, stroke symptoms depend on the side of the brain that is affected. There’s no way to know how severely the brain has been impacted, so it’s best to connect with emergency medical staff as soon as possible.
What to Do After a Stroke
Recovery after a stroke often requires a comprehensive combination of therapies and treatment options.
Senior LIFE offers physical therapy, speech and language therapy, and occupational therapy to help your loved one live life to the fullest at home—even after a stroke. There is no limit to the number of sessions and there’s no copay associated with rehabilitation, or any other aspect of care through Senior LIFE.
Senior LIFE is a LIFE Program designed with your loved one in mind. The goal is to allow older adults to remain in the home as they age, and provide all the necessary care to help them be independent and happy.
Senior LIFE is dedicated to helping older adults live their best lives at home in their communities with family and friends. Find a location that works best for your family, and connect with a Senior LIFE staff member to begin the enrollment process for your loved one.
Categories: Wellness Matters
|
<urn:uuid:16bbe9e2-8675-4e23-a88c-b2631a1fb43a>
|
{
"dump": "CC-MAIN-2021-49",
"url": "https://seniorlifepa.com/blog/would-you-know-the-symptoms-of-stroke",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964361064.58/warc/CC-MAIN-20211201234046-20211202024046-00581.warc.gz",
"language": "en",
"language_score": 0.9503339529037476,
"token_count": 879,
"score": 3.140625,
"int_score": 3
}
|
Global Warming Potentials defined on a 100-year horizon (IPPC, 2007)
|Greenhouse Gas||GWP||Main Source|
|Water vapour||Not calculated||Evaluation from bodies of water|
|Carbon dioxide||1||Combustion of fossil fuels|
|Methane||25||Agriculture, waste disposal, leakage from the gas distribution system and coal mining|
|Nitrous oxide||298||Agriculture, transport, industrial processes and coal combustion|
|Ozone||Non calculated||Secondary pollutant formed in the atmosphere by chemical reactions with other pollutants, initiated by sunlight|
|F-Gases||HFCs||124-14,800||Refrigeration and air conditioning, foam blowing, aerosols, electrical switchgear, "cover" gases in metal smelting|
Greenhouse gases contribute to long term global climate change by a process known as the greenhouse effect.
Light and heat energy (infrared radiation) from the sun is absorbed by the surface of the Earth during the day, and is released again slowly over time. Greenhouse gases in the atmosphere absorb the infrared radiation and re-radiate it in all directions, including back to the Earth's surface. In this way heat is trapped in the lower levels of the troposphere, causing warming and higher temperatures than would be experienced if there were no greenhouse gases.
The direct greenhouse gases have different effectiveness in radiative forcing, which measures the influence a factor has in altering the balance of incoming and outgoing energy in the earth's atmosphere. The Global Warming Potential (GWP) is a means of providing a simple measure of the relative radiative effects of the emissions of the various gases. The index is defined as the cumulative radiative forcing between the present and a future time horizon caused by a unit mass of gas emitted now, expressed relative to that of CO2. It is necessary to define a time horizon because the gases have different lifetimes in the atmosphere. National GHG inventories use a time horizon of 100 years.
|
<urn:uuid:b0ce49ac-a686-4749-9352-ec37d2ea5b6a>
|
{
"dump": "CC-MAIN-2022-27",
"url": "https://airquality.gov.wales/index.php/about-air-quality/climate-change/greenhouse-gases",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103626162.35/warc/CC-MAIN-20220629084939-20220629114939-00128.warc.gz",
"language": "en",
"language_score": 0.8953759670257568,
"token_count": 456,
"score": 3.875,
"int_score": 4
}
|
How did Saint Anne, not mentioned in the Bible, become one of the most important saints of the Church’s second millennium? The answer has to do with the shifting role of the laity since the high Middle Ages and the central pivot point of the Incarnation in this shift. Let me begin with a personal anecdote.
On my mother’s side of the family, almost all of the women either bear the name Mary/Marie/Maria or Anne/Anna, or have one of those for their middle names. My mother’s name is Mary and her younger sister is Anne. This trend goes back several generations. My sisters and cousins have continued this trend this to a surprisingly large extent: I have one niece named Anna, one named Maria, and another with the middle name Ann, and there are next-gen Marys scattered throughout my extended family.
It’s worth noting that there are a few Joachims in my mother’s family tree as well! Oddly, perhaps, there are not so many Josephs. This is not entirely without significance, I suspect. Joseph holds a place of distinction in the roster of saints, but Our Lord Jesus Christ derives His sacred humanity through Joachim, Anne, and Mary, and not through Joseph.
What we know about Saint Joachim and Anne comes primarily from the Protoevangelium of James, an apocryphal work from about the year A.D. 145. It it a biography of the Virgin Mary, and includes the story of her barren mother miraculously conceiving and giving birth. The Protoevangelium was an extrememly popular work in the early Church, despite the fact that it never achieved canonical status (and was even condemned by various high-ranking clergymen and synods). Several feast days (The Nativity of Mary, The Presentation of Mary, Saints Joachim and Anne) derive directly from this text. Important iconographic details do as well, such as the motif of Mary weaving the temple veil at the time of the Annunciation.
All well and good! Now, to return to my opening question: if Saints Joachim and Anne were already well-known to Origen in the third century, why does the cult of Saint Anne become so important much later? The answer, as I have already indicated, involves the sanctity of marriage and the growth of popular devotion to the humanity of Christ, in the Real Presence, and in the devotio moderna styles of prayer such as the Stations of the Cross.
My account of this will necessarily be a summary that skips lots of details. If you would like to read more about this, I cannot recommend highly enough the two excellent books by my friend Rachel Fulton Brown: From Judgement to Passion and Mary and the Art of Prayer.
Saints Joachim and Anne grew in popularity along with the twelfth- and thirteenth-century movement to recognize marriage as a full-fledged sacrament, and therefore a conduit of grace. Holiness, in much of the early Church, was connected almost exclusively with virginity and celibacy (the renunciation of marriage), and therefore married persons were considered to occupy a lesser place in the Body of Christ. The marriage of Mary and Joseph did not function as easily as an icon of sanctifying marital love in part because of the miraculous nature of Christ’s conception of a virgin. As I mentioned above, the sacred humanity of Christ does not derive from Joseph. This shifts the focus back a generation to Joachim and Anne, and helps to set the stage for a growth in the interest in the Immaculate Conception.
Saint Anne is also linked to a growth in, and a desire for, female literacy. Many icons of Saint Anne with the Virgin Mary show her teaching the young girl to read. In the West, the Annunciation icon frequently depicts Mary reading her breviary or book of hours (again, read Mary and the Art of Prayer!). The books thus depicted were meant to encourage lay women to learn to read and to teach their daughters to read, as a stimulus to prayer. Saint Anne is important in this because Mary’s ability to read (in these accounts) is connected to her ability to hear and give her fiat to the angel Gabriel, thereby undoing the disobedience of Eve, who listened and followed the temptations of the serpent. Thus, Saint Anne’s tutelage of her daughter is closely linked with salvation.
Saint Anne would go on to have many powers attributed to her, particularly help in childbirth. In the case of Saint-Anne-de-Beaupre (the patron of Quebec), she would also be connected to the safety of merchant sailors. Last of all, Saint Joachim was reintroduced, in a sense, to this collection of devotions with the revision of the calendar, undoubtedly to underline the sanctity of marriage.
Since much of the devotion to Saint Anne in the last eight centuries has been driven by the interests of the laity, the music composed in her honor is largely paraliturgical. In our celebration of Solemn Vespers a week from Friday, we are able to make use of two of the best examples of the motets (choral pieces on sacred themes but not necessarily liturgical) in her honor. However, I was not able to track down any settings of the hymn proper to the feast. So Kevin Allen and I took this as another opportunity to co-compose a new piece for the liturgy. We are both very pleased with how it turned out, and we hope that many of our friends will be there to hear the premiere on Friday, July 26, at 7:00 p.m.!
|
<urn:uuid:78cdad40-4c4d-41b7-9ba1-9ecf502decbb>
|
{
"dump": "CC-MAIN-2019-51",
"url": "https://chicagomonk.org/about-us/the-priors-blog/the-incarnation-joachim-and-anne/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540527620.19/warc/CC-MAIN-20191210123634-20191210151634-00020.warc.gz",
"language": "en",
"language_score": 0.9656410813331604,
"token_count": 1174,
"score": 2.6875,
"int_score": 3
}
|
Trout abound in the mountain streams and lakes, barbel and many other species of Cyprinidae in the rivers of the plains.
Of the twenty-one species of freshwater fish, five are peculiar to the country, but none is of much economic value save the barbel and eel.
It is distinguished from other species of the genus Gadus by its long pointed snout, which is twice as long as the eye, with projecting lower jaw, and without a barbel at the chin.
It is a small barbel discovered in Natal by Max Weber, and described by him under the name Barbus viviparus.
HADDOCK (Gadus aeglefinus), a fish which differs from the cod in having the mental barbel very short, the first anal fin with 22 to 25 rays, instead of 17 to 20, and the lateral line dark instead of whitish; it has a large blackish spot above each pectoral fin - associated in legend with the marks of St Peter's finger and thumb, the haddock being supposed to be the fish from whose mouth he took the tribute-money.
Fish are caught in great numbers in the rivers and marshes, chiefly barbel and carp, and the latter attain so great a size that one is a sufficient load for an ass.
WHITING (Gadus merlangus), a fish of the family Gadidae, which is abundant on the shores of the German Ocean and all round the coasts of the British Islands; it is distinguished from the other species of the genus by having from 33 to 35 rays in the first anal fin, and by lacking the barbel on the chin.
Freshwater scale-fish are mostly full of bones, but fine eels and barbel are plentiful in the rivers.
|
<urn:uuid:f122d618-f598-4d70-a06a-42436521127f>
|
{
"dump": "CC-MAIN-2017-30",
"url": "https://www.all-dictionary.com/sentences-with-the-word-barbel",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424090.53/warc/CC-MAIN-20170722182647-20170722202647-00198.warc.gz",
"language": "en",
"language_score": 0.9565410614013672,
"token_count": 372,
"score": 3.4375,
"int_score": 3
}
|
Mention the phrase “head lice” to any parent and most will react with a cringe. What are they, and how do you treat them if they’ve infested your child’s scalp?
Head lice are little bugs that can make your kids scratch their noggins, but do not cause any diseases, according to the National Center for Biotechnology Information. The worst result of having head lice is a child scratching his head until he opens wounds, which could then become infected.
There is, however, much transmission of head lice in schools, because children tend to interact in closer proximity to each other than adults. Doctors report an increase in the number of head lice cases after school starts in September.
This month, many parents will receive information about head lice from their children’s schools. While some private institutions test students for head lice before the start of the academic year, New York City public schools have a policy of not accepting children who have lice into classrooms.
Head lice are six-legged insects that are the size of sesame seeds. They only live on human beings, and cannot be caught from animals, according to a statement issued by the city’s Office of School Health.
Pearly white and smaller than a pin head, nits are the egg cases laid by lice. While lice move around the head and on the scalp, nits attach to hair shafts.
A child can only have head lice if he has a living, moving louse on his scalp. He catches the parasite when the louse gives up its host’s head for a new host. Eggs in their protective nits are not transmitted from one head to another.
Once the insects attach to a person’s head, they feed on blood obtained from the scalp. Many — but not all — people with head lice will develop an itchy scalp.
Anyone can get head lice, which are usually caught from family and friends in the home and community.
Head lice can be transferred when people hug each other, or when small children are playing together and their heads brush each other.
Head lice can also be transmitted by objects — such as hats, clothing, combs and brushes — used by infected individuals.
Families can do everything right and still develop head lice. Learn how to check your children’s head for these lice, before they have a chance to breed. When making your examination, it can be easier to spot the nits laid on the hair, which are most often found in the thickest parts — at the nape of the neck and behind the ears.
Parents should also tell children not to share hats, combs and brushes with anyone else. Physical contact with infected individuals, including their belongings, should be avoided.
What are the symptoms of head lice?
The first indication of an infection is usually itching around the area of the body where the lice feed. If a child is scratching the back of his head or around his ears, examine them for head lice.
It may take two to three weeks or longer for a person to notice the intense itching associated with lice infection.
There are a multitude of products on the market for treating head lice. Several medicated shampoos or cream rinses, especially those containing the pesticides permethrin or pyrethrin, can be purchased over the counter.
After washing your child’s hair with a head lice shampoo, a parent will need to comb out any remaining nits with a good lice comb. The most effective combs are those with metal teeth so close together that you can’t see them. If the child has long hair, the lice comb approach can be time consuming and labor intensive, so many parents opt to cut their child’s hair.
There are also hair lotions that can be added to dry hair and applied with a lice comb. These lotions should not be heated with a hair dryer, as some of them are flammable.
Parents should repeat the process of washing and combing their child’s hair every seven days to ensure that the lice do not reappear.
Because head lice have developed resistance to the pesticides used to treat them, the number of lice infections has grown over the years. The National Pediculosis Association believes that prescription pesticides, such as malathion and lindane, are not only ineffective at treating infections, but are also dangerous if they are used after the child has been treated with an over-the-counter pesticide. The Association “advises parents to discontinue the use of any treatment at the earliest sign of failure and to avoid using other chemicals. Manual removal is the best option whenever possible.”
All bedding, towels and clothing from infected individuals should be cleaned with soap and hot water, and placed in a dryer for at least 20 minutes to help kill off any remaining lice. Toys and other belongings can be placed in plastic bags and sealed off for 10 days so the lice will die of starvation.
You should also soak combs and hairbrushes in alcohol or lice shampoo, dispose of hair accessories, and thoroughly vacuum carpets and upholstered furniture.
Lice removal has become profitable for many businesses. In the New York City area, there are treatment centers, resembling salons, where professionals will comb lice and nits out of clients’ hair. Other companies will come directly to your home to treat and remove head lice.
The most accurate and reliable information about head lice can be found on the National Pediculosis Association’s website at www.headli
Another helpful website is www.kidshe
• • •
So the next time you say the words “head lice” to a parent, allay their fears by letting them know all of the information and treatments available to them in their local communities and on the Internet. There’s really no reason to bug out.
Allison Plitt is a staff writer for Family Publications New York and a mother living in Queens with a 5-year-old daughter. If you have ideas about resources for families in Queens, contact her at allisonpli
©2011 Community News Group
|
<urn:uuid:70a58a5f-7233-4681-854a-c1557a0663b3>
|
{
"dump": "CC-MAIN-2018-51",
"url": "https://www.nyparenting.com/stories/2011/9/fp_headlice_2011_09.html?utm_medium=web&utm_campaign=module&utm_source=similar&utm_content=intra",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376832259.90/warc/CC-MAIN-20181219110427-20181219132427-00308.warc.gz",
"language": "en",
"language_score": 0.9588242769241333,
"token_count": 1311,
"score": 3.296875,
"int_score": 3
}
|
: +32 10 47.44.32
Fax : +32 10 47.31.06
E-mail : Patrick.Willems@loco.ucl.ac.be
For further information please see the university directory
The principal domain of research of our lab is the physiology and the biomechanics of terrestrial locomotion. Movement in sports (particularly in gymnastic) are also studied.
- Studies on terrestrial locomotion
At first glance, there are many different modes of terrestrial locomotion: some vertebrates move on Earth on two legs while others use four. They walk, amble, trot, pace, canter, gallop, hop, etc. In fact, this huge variety of locomotory types are all based on two basic mechanisms:
More information : Norman HEGLUND
- A force platform made of 10 plates (total length: 6 m.) measures the vertical and forward components of the ground reaction force during several walking or running steps. This platform is installed at the level in the middle of a 40 m long corridor.
- A of 16 plates (size of each plate: 1m x 1m) is under construction. This platform measures the ground reaction forces in the three directions of the space. It has a resolution of 3 N and a full scale of 50.000 N
- A piezo-electric force platform (KIESTLER®) measures the ground reaction forces in the three directions of the space.
- A motion analysis system with infrared cameras (SELSPOT®) records the movements of the body segments at 400 frames/s.Electromyographs (EMG) record the electrical activity of height muscular groups.
- A telemetric system allows to measure energy expenditure during various exercises (KOSMED K4®).
Main research projects of the last five years
- The mechanics of walking and running in children during growth
Three children run on the 6 m long force platform of the lab.
The aim of this study is to understand:
(1) how the mechanisms of locomotion change during growth,
(2) which are the factors that influence this evolution (change in morphology, increase of the weight and the size, maturation of the nervous system, modification of the muscular force...).
Three studies were realized these last years.
The energy expenditure in children during walking.
In this study, we measured the oxygen
consumption during walking at different speeds in adults and in 3 to
12 years old children.
work done by children during walking at different speeds
The mechanical work can be divided into different parts: (1) the external work necessary to sustain the displacement of the center of mass of the body relative to the surroundings, (2) the internal work done to accelerate the body segments relative to the center of mass of the body and (3) the internal work done during the double contact phase of walking by the back leg which generates energy that will be absorbed by the front leg (see picture). This last part is not counted in the 'classic' measurements of the positive muscular work done during walking. Using force platforms, we studied the effect of speed and age (size) on the internal work done by one leg against the other. We also measured the total mechanical work done during walking at different speeds in adults and in 3-12 years old children (paper in preparation).
The bouncing mechanism of running in children
The natural frequency of the body bouncing
system depends on the body mass and the stiffness of the elastic structures
responsible for the rebound. Between the age of initiation of running and
adulthood, body mass increases more than five times, but the effect of
growth on stiffness is unknown. In this study, we investigated the factors
affecting the freely chosen step frequency, and measured the mechanical
work done to move the center of mass of the body during running at various
speeds in children of different age.
- Mechanics and energetics of human locomotion on sand
The mechanics and energetics of locomotion have been thoroughly investigated only in the laboratory on hard, level, non-slippery surfaces, although these bear little resemblance to those actually occurring in nature. It could be that the energy-saving mechanisms utilized during locomotion on a hard surface are not functional on a soft surface, or that the muscles on a soft surface are in a condition such that they contract and do work at lower efficiency, or simply that the mechanical work required to walk or run on a soft surface is much greater since the foot does work on the substratum. The purpose of the present study was to quantify the increase in metabolic cost and the reason for that increase, in human walking and running on dry sand. A 50 m track containing 8 tons of sand was build (left picture). In order to evaluate muscular work during sand locomotion, a track was also build on the top of the force plate (right picture).
- Physiology of load carrying
Services to Society
People in the Third World often carry prodigious loads supported by their heads. With the exception of African women, virtually nothing is known about the energetics and mechanics of carrying head supported loads.
In Nepal, load carrying is mostly done by humans. Porters use a bag (doko) supported by a strap on the head (naamlo). On the average, loads are equal to body weight (occasionally up to two times the body weight). We studied the energetics (oxygen consumption - right picture) and mechanics (mechanical work - left picture) of Sherpa carrying head supported loads in an effort to determine if this is a particularly economical means of portage, and if so, what mechanisms are used to minimize cost.
- Effect of gravity on the mechanics of walking and running
Professor Cavagna (University of Milan) walking at 0.4 g (like on Mars).
The aim of this study is to understand how gravity affects the mechanisms of locomotion. We measured the ground reaction forces during walking in reduced (0.4 g) or enhanced (1.5 g) gravity and during running in enhanced gravity (1.3 g). Hypo-gravity is obtained during parabolic flights while hyper-gravity is obtained during circular flights
- List of the new research projects in the field of locomotion
- Effect of exercise on the muscle and bone loss during extended weightlessness
- Mechanics of locomotion of the elephant
- Control of step frequency during running in children and in adults
- Analysis of movement in gymnastics
In a first project, we analyze the movement of the center of mass of the body during a stationary backwards flip (see picture). This exercise requires one to take off and land at the same place. The aim of the work is to understand how the subject is able to induce a movement of rotation of the body without inducing a horizontal translation of its center of mass. We record the ground reaction forces and compute the trajectory of center of mass during that exercise (paper in preparation).
- Publications of the heigt last years
- Scientific Award
- B. SCHEPENS : Award of the Société de Biomécanique for the best Ph.D. these presented
at the congress of Montreal: The mechanics of running in children.
LAward of the Human Frontier Science Program 2000- 2001, 2001-2022 & 2002-2003
H.H. Jasper Fund 1999-2000, One year Fellowship, Canada
- M. PENTA : Award for the best poster of the 2nd World Congress of the International Society of Physical Rehabilitation Medicine, Prague, 2003
Responsable : Philippe Gérard - Contact : pHg
|
<urn:uuid:c9a6272f-d265-4864-9aa4-5e9810b835f0>
|
{
"dump": "CC-MAIN-2015-48",
"url": "http://www.md.ucl.ac.be/iepr/locoEN.htm",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398461132.22/warc/CC-MAIN-20151124205421-00332-ip-10-71-132-137.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9249694347381592,
"token_count": 1574,
"score": 3.03125,
"int_score": 3
}
|
"C" offers several different sizes for signed int. There's
short int, int, long int. The "C" language
doesn't specify how many bytes each should be, but does have
the following restriction.
sizeof( short ) <= sizeof( int ) <= sizeof( long )
All sizes can be different, or they can all be the same (or two
of them the same, and one different), as long as the above
restrictions are met.
Casting requires the CPU to make conversions between one data type and another. Since short and int are signed two's complement, the way to convert from a shorter data type to a longer data type is to sign extend.
Definition To sign-extend an N-bit number to an (N+k)-bit number, bits b(N+k-1)-N = (bN-1)kl while the bits at index less than or equal to N - 1 remain unchanged.To sign extend means to fill in the additional upper k bits with 0, if the sign bit is 0, and to fill those bits with 1, if the sign bit is 1.
Clearly, this works if the sign bit is 0. You write 3, in base 2 using 4 bits, as 0011. If you want to write it in 6 bits, it's 000011. Adding additional 0's to the high bits does not affect the final value.
What's less clear is that this is true if the sign bit is 1. Let's think about why this might be. Suppose you want to represent -2 in 2C using 4 bits. You'd write 1110. Again, think of the binary odometer example. Go back from 0000, to 1111, to 1110.
A binary odometer has its lower bits changing first. The higher bits change later. This is true whether you are going forward or backward in binary.
For example, write -2 in 2C using 6 bits. It looks like 111110. That's just 1110 with two more 1's at the higest 2 bits.
Clearly, the problem with casting to a shorter size is a possible loss of information. You can represent a larger number of values with more bits. Getting rid of bits may cause the number to be cut off.
If the compiler complains, usually static casting the number to the shorter type will get rid of the complaints. Effectively, you are telling the compiler "I know this casting may lose data, but don't worrry about it. This is OK for my application."
The problem is returning an error value. When getchar() reaches the end of file, it returns EOF. This is almost always defined as -1. While there is a possibility of defining char as negative (thus signed char), the safer response is to return -1.
Unfortunately, you need to cast the result as in:
char ch = (char) getchar() ;
You would static cast if you were working in C++.
If you are casting unsigned numbers to a larger width (i.e., a larger number of bits or bytes), you zero-extend. That is, you add zeroes to the upper bits. This should make sense. With no negative values, there's no need to copy 1's up.
Zero-extension often occurs with logical operations. If you are doing a logical operation (e.g., bitwise AND, bitwise OR) where one argument has more bytes than the other, it's usually the case that the argument with fewer bytes is zero-extended.
This is especially true in assembly language where it's often not clear whether a register is holding an UB or 2C representation (or whether it should simply be considered some kind of bitstring, and not even thought of as a number).
Zero extension is used to extend unsigned ints to more bits. This is done by copying 0's to all additionla upper bits.
You can also reduce the number of bits (this doesn't have a particular name---i.e., it's NOT called sign-reduction) by casting to a smaller size, but this may entail loss of information.
|
<urn:uuid:13772e26-9350-417d-bb7b-98a5db78ca09>
|
{
"dump": "CC-MAIN-2016-40",
"url": "http://www.cs.umd.edu/class/sum2003/cmsc311/Notes/Data/signExt.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660436.26/warc/CC-MAIN-20160924173740-00267-ip-10-143-35-109.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.936927855014801,
"token_count": 868,
"score": 4.0625,
"int_score": 4
}
|
New technique could help authorities conduct triage in multiple-blaze scenarios
An interdisciplinary team of scientists at the University of California, Irvine has developed a new technique for predicting the final size of a wildfire from the moment of ignition.
Built around a machine learning algorithm, the model can help in forecasting whether a blaze is going to be small, medium or large by the time it has run its course – knowledge useful to those in charge of allocating scarce firefighting resources. The researchers’ work is highlighted in a study published today in the International Journal of Wildland Fire.
“A useful analogy is to consider what makes something go viral in social media,” said lead author Shane Coffield, a UCI doctoral student in Earth system science. “We can think about what properties of a specific tweet or post might make it blow up and become really popular – and how you might predict that at the moment it’s posted or right before it’s posted.”
He and his colleagues applied that thinking to a hypothetical situation in which dozens of fires break out simultaneously. It sounds extreme, but this scenario has become all too common in recent years in parts of the western United States as climate change has resulted in hot and dry conditions on the ground that can put a region at high risk of ignition.
“Only a few of those fires are going to get really big and account for most of the burned area, so we have this new approach that’s focused on identifying specific ignitions that pose the greatest risk of getting out of control,” Coffield said.
The team used Alaska as a study area for the project because the state has been plagued over the past decade by a rash of concurrent fires in its boreal forests, threatening human health and vulnerable ecosystems.
At the core of the UCI scientists’ model is a “decision tree” algorithm. By feeding it climate data and crucial details about atmospheric conditions and the types of vegetation present around the starting point of a fire, the researchers could predict the final size of a blaze 50 percent of the time. A key variable is the vapor pressure deficit – just how little moisture there is in the area – during the first six days of a fire’s existence. A second major consideration for Alaskan forests is the percentage of trees of the black spruce variety.
“Black spruce, which are dominant in Alaska, have these long, droopy branches that are designed – from an evolutionary perspective – to wick up fire,” said co-author James Randerson, professor and Ralph J. & Carol M. Cicerone Chair in Earth System Science at UCI. “Their seeds are adapted to do well in a post-fire environment, so their strategy is to kill off everything else around them during a fire to reduce competition for their offspring.”
He said Coffield was able to show that the fraction of black spruce within a 2.5-mile radius of the ignition site is an important factor in judging how big a fire will grow.
One advantage of this new method is speed, Coffield said. The algorithm “learns” with each new data point and can quickly figure out the critical thresholds for identifying large fires. It’s possible for people to do this manually or by running simulations on each different ignition, he said, but the machine learning system’s statistical approach is “really much faster and more efficient, especially for considering multiple fires simultaneously.”
Faced with a climate change-induced jump in the number of wildfires expected each season, state, county and local firefighting authorities could benefit from some updated tools and techniques, Randerson noted. In addition to potentially saving lives and protecting property and crucial infrastructure, fire suppression efforts will also become increasingly important in preserving the natural world.
“In places like Alaska, there’s a need to limit the area affected by fire, because if we keep having these unusual, high-fire years, more carbon will be lost from the landscape, exacerbating warming,” Randerson said. “If we let the fires run away, we could be in a situation where there’s a lot of significant damage to both the climate system and ecosystems.”
The Latest on: Wildfires
via Google News
The Latest on: Wildfires
- Edmonton fire chief says people must adapt to more wildfires in their liveson January 19, 2020 at 7:56 am
“There’s a lot of similarities. The bush fires, small land fires, is one of them. We are experiencing more wildfires in this part of the world. “We’ve got to get our head around how do we better ...
- Oregon versus Australia wildfires: There's no comparisonon January 19, 2020 at 7:01 am
Death, displacement and the potential for long-term ecological damage have come in their wake. Even in the Pacific Northwest, where wildfires are common and expected to become more so as the climate ...
- Sonoma County population declines sharply since 2017 wildfireson January 18, 2020 at 11:17 pm
They would have another girl two months later. It was six months before the North Bay wildfires, and the county’s escalating cost of living was about to go even higher. Though the Tubbs fire that ...
- Australian wildfires prompt $11,000 fine for tossing lit cigarette out of caron January 18, 2020 at 3:10 am
Drivers in Australia can now face a penalty of up to $11,000 if they are caught tossing a lit cigarette out of their car. The new punishment, which went into effect on Friday in New South Wales, can ...
- Chinese tourists cancel New Year trips to Australia amid wildfireson January 17, 2020 at 4:41 pm
Australia's largest tourism market is turning away as the smoke shrouding Sydney and Melbourne and images of fire-ravaged beach resorts deter Chinese New Year tourists, in a further blow to the ...
- These Animals Are On The Brink Of Extinction Because Of The Australian Wildfireson January 17, 2020 at 1:59 pm
"We are trying to make sure that every animal has a chance for survival.” By Zahra Hirji Posted on January 17, 2020, at 4:45 p.m. ET Hastings River mouse As Australia continues to fight its ...
- Climate 'religion' is fueling Australia's wildfireson January 17, 2020 at 11:00 am
There is no rational basis to the ideology of environmentalism. It predicts catastrophes, then campaigns against practical, effective measures that would reduce their destructiveness.
- Climate change or poor policy? As Australia’s wildfires see some relief, blame game ascendson January 17, 2020 at 8:17 am
“Climate change has brought bountiful rains throughout most of the past two decades, which have suppressed wildfires and allowed for more vegetation growth. That is a good thing,” said James Taylor, ...
- Koalas’ Sanctuary Island Is Under Threat From Wildfireson January 17, 2020 at 2:30 am
Australia’s deadly wildfires are scorching vast parts of the country, forcing thousands to flee their homes and threatening wildlife, including koalas. WSJ visits Kangaroo Island to see how volunteers ...
- What to Know About the Health Impact of Australia's Wildfireson January 16, 2020 at 3:24 pm
NASA says smoke from the wildfires in Australia has made a full circuit of the Earth. Columbia University’s Darby Jack explains how this happened and who is at risk. Photo: NASA Earth Observatory/EPA/ ...
via Bing News
|
<urn:uuid:081b69b3-93d6-4cd7-abb0-33fa179d4cec>
|
{
"dump": "CC-MAIN-2020-05",
"url": "https://www.innovationtoronto.com/2019/09/which-wildfires-will-burn-out-of-control-machine-learning-can-help/?mode=grid",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594662.6/warc/CC-MAIN-20200119151736-20200119175736-00111.warc.gz",
"language": "en",
"language_score": 0.9497681260108948,
"token_count": 1583,
"score": 3.34375,
"int_score": 3
}
|
The Internet is much like the Wild West: largely unregulated, fiercely independent, and a dangerous place for children.
Today’s parents likely learn basic Internet skills as adolescents or adults, making it tricky for them to negotiate their children’s day-to-day online needs.
An essential part of parenting is teaching your children how to navigate this complex world.
Educating your children about online safety is a key part of helping them grow into thoughtful, safe, web-savvy adults.
- Keep It Age Appropriate
Much like you wouldn’t explain the nitty-gritty details of the birds and the bees to a four-year-old, it’s important to keep your Internet safety talks age-appropriate.
Younger children don’t need to know that child molesters or dangerous people hang out in Internet forums. They simply can be told that using the Internet – much like swimming alone in a pool – is something that requires an adult’s supervision.
As children get older, it’s appropriate to explain the dangers of Internet use to help them understand the risk.
Discuss how people can pretend to be someone else online, steal important personal information, and use the anonymity of the Internet to bully others.
⇒ Related Read: Top 10 Internet Safety Tips For Parents And Teenagers
- Create a Social Media Policy and Stick To It
As a parent, it’s nearly impossible to keep tabs on the latest social media sites. For example, Facebook recently announced that it has experienced a drop in teen users as they turn to Instagram or SnapChat for their social media needs, as Forbes reports.
While it’s important to police particular sites, it’s more valuable to teach savvy social media skills. Talk to your kids about the information that is okay versus not okay to give out online.
For example, general locations-statements, like “I live in Illinois” are fine, but giving a particular address or school name is not.
The Denver Post recommends discussing privacy settings with kids to teach them how to protect their information.
Familiarize yourself with Facebook, Instagram or Tik Tok’s privacy policies and have your child walk you through his or her settings to make sure they’re safe and appropriate.
⇒ Related Read: Cyber Bullying: From Verbal To Virtual
- Discuss Email Communications
Many spam emails are innocuous, asking you to sign up for a service or take an online survey.
However, others install malware on your computer or nab personal information. Teach your child to recognize the difference between safe emails and those that are phishing attempts.
One way to explain phishing to your child is to frame as a scenario where someone who seems friendly is trying to do something harmful, as Lifelock.com advises. Inform your child that no official organization will ever ask for social security numbers, birthdays, passwords, or other sensitive information via email.
Tell your kid to let you know if he or she suspects a phishing attempt so you can notify the appropriate authorities.
- Explain Password Safety
Even tweens regularly subscribe to websites that require a username and password login. As a parent of a youngster, it’s fine to insist on knowing your child’s passwords to monitor online activity.
However, as your child becomes a teenager, some level of online privacy is appropriate. Microsoft recommends teaching your kids basic password safety skills at a young age.
Help your child create passwords with capital letters, numbers, and symbols to increase safety.
Encourage your child to memorize the password and only use it when on a personal device, rather than a public computer.
Ensuring password safety keeps your child safe from phishing attacks or cyberbullying hacks.
⇒ Related Read: Setting Rules in The Internet Era
If you find this article useful, do click Like and Share at the bottom of the post, thank you.
Want to be heard and seen by over 100,000 parents in Singapore? We can help! Leave your contact here and we’ll be in touch.
|
<urn:uuid:c0f813b9-f548-4b82-9a88-1b0a0d68b934>
|
{
"dump": "CC-MAIN-2022-21",
"url": "https://thenewageparents.com/tips-to-keep-your-kids-safe-online/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663048462.97/warc/CC-MAIN-20220529072915-20220529102915-00538.warc.gz",
"language": "en",
"language_score": 0.9186213612556458,
"token_count": 852,
"score": 3.265625,
"int_score": 3
}
|
Next Big Thing: What's the future of so-called talking cars?
About Video Share (0) Transcript Contact us
Next Big Thing: What's the future of so-called talking cars?5:56 /
Brian Cooley discusses a new wireless technology, dedicated short range communication (DSRC), that will make it possible for cars to make each other aware of their position, speed, and direction.
Perhaps you've heard the recent buzz about so-called talking cars? Just got a tour of the lab where auto makers and government researchers team up to create new technologies that help cars communicate with the world around them, and with each other. They can tell you if an oncoming vehicle is about to run a red light. Or where if the car's coming around a blind corner or if the detour would help you save some time and gas. [MUSIC] This gives cars a three hundred and sixty degrees awareness of nearby vehicles. Common navigation systems are not precise enough. We needed a localization that can give us exact position on a centimeter base. The system call also alert drivers to approaching emergency vehicles. If a crash is detected, emergency crews can be dispatched, drivers can be diverted immediately to alternate routes. Each traffic light has to be correctly identified under all weather and lighting conditions. This car is stopped. The car two vehicles behind it can't tell because of traffic in the middle. But, thanks to vehicle-to-vehicle communication, the driver in the back gets a warning to brake, even though he couldn't have seen it humanly. [MUSIC] The technology is called DSRC, Dedicated Short Range Communications. It gives vehicles a new built-in radio, if you will, that operates in the 5.9 gigahertz band, and allows them to communicate to each other in a very specific way. To tell each other where they are, the direction they're heading, and the speed they're going. It's largely focused on preventing accidents. ABI Research, for example, predicts that about 10% of new cars shipping will have DSRC by 2018. And that goes up to 70% by 2027. Some pretty good numbers. In the United States, as of February, 2014, the Department of Transportation announced that it will announce a pending date soon, by which all new cars must ship with DSRC radios enabled. The goal 70 to 80% reduction in accidents. In Europe it's even more ambitions, their looking for a 100% accident free zone by 2050 thanks to the SRC. But specifically how will these DSRC enabled talking cars. To get to those lofty goals. Well, let's consider some of the scenarios that have been tested at the University of Michigan's Safety Pilot program in Ann Arbor, Michigan. Intersections: cars in all four directions would signal their position and proceeding movement to each other to avoid collisions, T-bones and right-of-way screw-ups. Rear end collisions, the DSRC equipped car in front of you would always tell your DRSC equipped car that it's stopping, and how fast it's doing so. Passing oncoming cars will signal their direction and closing speed to your car. So you'd always know when it's mathematically to try and pass ending the crude white-knuckle guesses that human drivers make all the time. Pedestrians and bikes. DSRC radios could also be pocketable, or even integrated into future smart phones to make pedestrians and bikes part of this crash avoidance scenario as well. Now all of the above can be manifested in two major ways. Active and passive technology. Active technology means the information from DSRC is sent to the car's computers, which control braking, acceleration, and even steering, to automatically avoid a collision. [INAUDIBLE] Passive, of course, merely gives the driver indications on the dash about what's about to happen that they want to avoid to alert them to do so. The nice thing about passive is it could conceivably be retrofitted to millions of cars already on the road. Now, beyond the enormous accident reduction goal, there's another benefit to DSRC and that is increases efficiency of fuel consumption and roadway usage. Through several means. The first of which is to communicate traffic phase and timing to cars. The DSRC information would tell the car how long the current traffic light color will be in effect, and when it will change, allowing the ar to adjust its trajectory for best traffic flow, fuel usage, and momentum conservation. And linking, where our private cars would form, on the freeway for example, little ad-hoc road trains. Following each other as little as maybe three feet, nose to tail. Which makes vastly better use of the existing road infrastructure we have. And also could gain some nice aerodynamic benefits for the cars in that train. Now, the hurdles. First of all, we're talking about the car industry here. So you know proprietary is part of the game. that needs to be overcome because DSRC is one of those things that will benefit most. By working out spectrum, bandwidth, and coding to be global and universal in markets around the world. Spectrum, DSRC in cars is in a bit of a spectrum battle with another technology innovation called U-NII where wireless carriers want to open up a lot more wi-fi that they would use for smartphones to move their data traffic to, but it's also in that 5.9 gigahertz ban. Automakers don't like the idea of sharing any wireless space with another service like that. They're afraid it's gonna lead to breakdowns in cars keeping themselves safe. They don't like the liability or the bad pr that could come from that. For their part, the wireless carriers say: look, we could learn to work with you and make sure that our wireless traffic always yields to automotive traffic to make that top priority. The FCC's gonna have to decide that one. Infrastructure, maybe of DSRC's benefits like traffic signal phase and timing would require traffic signal and control center upgrades by perennially broke municipalities. There's the fleet issue. DSRC is gonna work best when virtually all cars have it. But we have a half a billion cars already on the road in the US and the EU alone that don't have it. It will take decades, or generations, to turn them over. DSRC's often described as a moon shot, and that's not overstating it. It would dramatically change the relationship between cars on the road, towards the goad of safety as well as efficiency of road use and fuel consumption. And it would certainly do a much better job then almost all scenarios of the often bored, distracted, ill trained, or drunk vague ware we know as the. The human driver. [MUSIC]
|
<urn:uuid:acbbdad7-4390-450e-b59e-d71a76c1fd7e>
|
{
"dump": "CC-MAIN-2014-42",
"url": "http://www.cnet.com/videos/whats-the-future-of-so-called-talking-cars/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119645573.31/warc/CC-MAIN-20141024030045-00146-ip-10-16-133-185.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9690954685211182,
"token_count": 1382,
"score": 2.875,
"int_score": 3
}
|
1. Japan in the world economy
Trade and investment are not separate subjects either for policymakers or for businesses. Policymakers know that investment brings about trade and they know that, increasingly, trade agreements and investment agreements are being combined. Businesses know also that in order to increase the growth of their enterprises they have to invest, either to be nearer their markets or to gain better access to materials, to people with skills, and to technology. In this regard, outsourcing and off shoring are merging. These issues are well known in Japan. Japan was a pioneer of fully comprehensive policy action in terms of agency functions, beginning with export promotion, followed by the promotion of inward foreign direct investment, moving then to promoting outward foreign direct investment, and completing the pattern with import promotion (MIPRO).
Japan has a large and diversified economy. This means that it cannot be only a niche player, looking for specialised narrow opportunities to be supported and emphasised. This will not provide sufficient growth impetus to maintain and stimulate the rest of the economy. Instead, Japan must look at where it is lagging in world market terms and take the necessary steps to improve the international performance of the sectors and sub-sectors concerned.
Japan’s share of world GDP was steadily rising from 1970 to 1994, and has been steadily declining since then. The trends are similar if we correct for price changes and exchange rate changes. The only difference is that the peak was then in 1990, and the rise and the fall are less sharp. In any case, a decline in the share is not a problem as such. Clearly as other countries, such as the BRICs and other developing countries pursue rapid growth, Japan’s share of world economic activity will decline, and the same is true for the US and other advanced economies. But a country share nevertheless gives an indication of what is good performance by individual parts of the economy. And given the increasingly interlinked production structures in the globalized economy, the share of world GDP is a good way of looking at things, because the rest of the world is the market, and is also the ultimate determinant of future progress in the economy of Japan. In 2014 the share was 5.9 per cent (current prices) and 8.2 per cent (constant prices). A range of 6 to 8 per cent therefore represents a reasonable performance indicator for Japan’s sectors globally.
Looking first at total merchandise trade, we see that Japan’s share of world exports has been declining from year to year almost in a straight line. In 1995 it was 8.6 per cent. In 2015 it was down to 3.8 per cent. There is some stability in this low share over the last three years of the period, but it is clear that the trade performance does not reflect the size and capabilities of the national economy.
Looking in more detail, we can examine the 3-digit classification for commodity groups in international merchandise trade. There are 255 such groups. However, they are not all equally important. The top 62 groups in value cover two-thirds of world merchandise trade. In how many of the top 62 groups does Japan have a world share of 6 per cent or more? Only seventeen. Of course, there are commodity groups that are dependent on natural resources, such as the most valuable single group of petroleum oils, etc. and Japan can never be a successful exporter of these. But there are others where more success may be envisaged. Aviation and space technology is an obvious example. Clothing and footwear are areas where Japan has luxury brands that are not known outside. Pharmaceuticals is another area with scope for increased share, as is electrical household equipment, the latter especially if it takes advantage of new control systems and internet linkage. Further down the list of 255 trade categories are a number of food categories, which again may offer growth possibilities, given Japan’s technological development in this field.
World services trade has been growing more rapidly than merchandise trade. With increased disaggregation of production globally, fostered by cross-border investment, some services have increased in importance, such as transport and telecommunications. But others are growing independently, such as financial services, of which there are two main kinds, banking (which international financial statistics usually call “financial services”) and insurance and pension fund management.
International services trade is dominated by the United States, which has about 15 per cent of the world market, and China’s share of world services exports has increased from 3 to 6 per cent between 2005 and 2015. Japan’s total was 3.3 per cent in 2015, and it was higher in 2005. Its detailed performance is mixed. In banking its global share is 2.5 per cent, and it is not showing much of an upward trend. There ought to be some scope to increase this share, because the share of other countries such as the UK, Germany and Switzerland has been declining. The strength and global reach of some Japanese banks should offer potential for a greater market share for Japan in the future.
In services exports, even though it has lost market share in recent years, one of Japan’s greatest strengths at present is construction. Japanese construction companies are leaders in R&D and in automation of construction equipment and techniques. Moreover, advances in detection systems mean better monitoring of building use, and significant progress has been made in areas related to care of the elderly.
A big change in international statistics in recent years means that charges for the use of intellectual property are now recognised as part of services trade. These cover licensing and royalty fees. This is an area where Japan is doing well. It had over 10 per cent of the world market in 2005 and this has risen to 12 per cent in 2015. It is nevertheless a long way behind the United States, which still has 42 per cent of the world total in 2015. These charges are not only technology-related, since they include publishing rights or the use of brand names, for instance. Also, multinational corporations license their technology to their own subsidiaries in other countries. But still, given Japan’s technological prowess, there appears to be scope for more licensing of technology abroad.
3. Innovation in Japan
The Global Innovation Index 2016 (GII) , which is an international ranking prepared jointly by Cornell, INSEAD, and WIPO, shows Japan in position 17 worldwide. The GII rankings are composed of a large number of indicators under seven different headings, for each of which the rankings are as follows: Institutions 15, Human capital and research 13, Infrastructure 7, Market sophistication 8, Business sophistication 10, Knowledge and technology outputs 13, Creative outputs 36. These headings cover a range of different ideas, and are not easy to summarise, but the compilers give three: the innovation output sub-index, where Japan’s rank is 24, the Innovation inputs sub-index, where Japan’s rank is 9. This implies that Japan is less successful at realising its potential in innovation, and, tellingly, it is in position 65 worldwide in the Innovation Efficiency Ratio. The EU carries out a similar exercise for its member states and some global competitor countries: the European Innovation Scoreboard 2016. While Japan performs better than the EU, the Republic of Korea is in the lead, with the US also ahead. In global innovation growth rates, China is in the lead, followed by Korea and the EU.
Both these comparative studies, and there are others, point to the need for Japan to mobilise its great strengths in scientific and human resources in a way that allows it to capture more of the benefits of innovation. An important part of this will be cooperation. The so-called “open method of innovation” is well-adapted to Japanese conditions.
Standards in general must also be a policy concern. Clearly standards are largely determined by commercial mastery of particular technologies. But the closer that Japan’s enterprises are to these discussions, and the more forthright they are in participation in the relevant standards bodies, the more likely it is that Japan’s enterprises will see rewards from this engagement in the future. The Japan Industrial Standards Committee (JISC) is a member of international standards setting bodies, notably ISO and IEC. “… Japan is vigorously taking on the role of Secretariat in 50 committees, consisting of 36 ISO, 11 IEC and 3 ISO/IEC joint committees (JTC1). The number of Secretariats assigned to JISC has increased recently, although the number remains relatively low compared to the major countries in the EU and the USA”. Also, some key sectors of great importance to Japan, including ICTs, food and pharmaceuticals, are not on the list.
4. Linkage and FDI
Participation in global value chains is not the only way of doing business in the world economy. But it is the most secure way, because it means conscious and committed access to markets, to supplies, and to technologies, ideas and economic information at first hand. Japan’s total GVC participation is about average, with 47.4 per cent of total gross exports. That is not much different from that of other developed economies (48.0 per cent) or developing economies (48.6 per cent). But breaking down this participation into forward and backward participation shows a very different picture. Japan has a very high forward participation (32.8 per cent, compared to 24.2 per cent for developed economies overall), and correspondingly a low backward participation (14.6 per cent compared to 23.8 per cent for developed economies).
At the sectoral level, very few of Japan’s sectors reach the global average for backward GVC participation. Only Chemicals and metallic mineral products (25.84 per cent), as well as coke, refined petroleum products and nuclear fuel (56.77) are above the 24.2 per cent level for developed economies. This means that it is not a matter of dealing with a few recalcitrant sectors: a cross-sectoral approach is needed.
Japan’s relative position in terms of the global economy can be examined in a number of different ways. In looking at trade and investment, we are essentially looking at how Japan is connected to the rest of the world. The graph shows how Japan compares to other countries in this regard. The horizontal axis uses OECD calculations to measure how much foreign value added arises from the country’s exports. As noted above, Japan has a low value for backward participation in GVCs, indicating that most of the value in exports remains in Japan. The indicator shows that Japan’s exports are not heavily dependent on imports from elsewhere. From one point of view, this is good, because more of the value-added form exports accrues to Japan itself. But from a dynamic point of view, it is not so good, because it means that Japan is not as integrated into the world economy and perhaps not specialised enough. The vertical axis measures the stock of inward investment relative to GDP, and here Japan has by far the lowest value among all the countries.
In general, therefore, the relationship between Japan and the world economy needs to be re-balanced, or, to put it another way, the interdependence with the world economy needs to be enhanced. At the moment, Japan is more at the beginning of GVCs than in the intermediate or final stages. Repositioning Japan in GVC terms means more inward FDI and new and more diversified export markets. With Japan playing a more central role in GVCs it will be better placed to withstand asymmetric shocks to the international trade and investment system, and will have more opportunities for its businesses to find and develop new markets.
Table: Linkage and FDI (Sources: FDI and GDP from UNCTAD database; GVC participation from OECD TiVA EXGR_VASH indicators)
5. What else needs to happen?
Japan must build on its many strengths. Japanese enterprises have major achievements in the field of customer care. In fact many Japanese firms are reported as being reluctant to increase their foreign trade exposure because they feel unable to guarantee the same levels of customer care that they could in Japan. Process and product quality is also a significant strength of Japanese enterprise. These strengths have enabled Japanese enterprises to not only export successfully but also to, through outward direct investment, to improve their growth prospects further by delivering to both developed and developing country markets.
Japan also has other strengths that have not yet been fully exploited. The arts and culture of Japan are widely admired worldwide but the commercial possibilities have not yet in realised in anything near their potential. The success of anime and manga in many developed country markets is one indication and in the world of art and music Japanese achievements have been well regarded. However it is clear that more could be done in terms of licensing successful achievements through formal marketing processes, rather than allowing foreign companies just to pick and choose particular items. Arts and culture needs to be showcased through specific exhibitions and fairs worldwide, with carefully coordinated promotion campaigns in media and through diplomatic action and business interaction in order to achieve maximum impact.
Logistics is another area where Japan has been highly successful, both in international trade and investment and also within Japan in building and maintaining effective supply chains throughout highly urbanised neighbourhoods. These skills could be marketed abroad.
Retailing, complementing some of the logistics achievements, is another area where Japan has much to offer. Its strengths in the organisation of the retail sector including supplier and customer relations and represent very high potential sector for further international development. As yet, Japan with the exception of Fast Retailing Co. Ltd. has failed to make much international impact in the retail sector. Retailing tends to be overlooked by governments in general, and is usually not seen as an area for promotion, but it has an important role in encouraging international trade and the development of services.
Financial services is an important sector in Japan. Specifically in insurance and pension services, however, Japan’s share of world exports is tiny, and the combination of expertise, prudent management systems and customer orientation in Japan ought to offer potential for more growth in this field.
E-commerce is part of everyday life in Japan yet its platforms have not achieved a degree of international appreciation or use that have been attained by US and other counterparts. For Japan, it is an obvious channel to increase its exports. While language plays a part in the lack of global reach, there are also design considerations. Different cultures take different approaches to the user interface, and new approaches need to be developed that encompass not only different languages, but different approached to the display and handling of information and the user experience. Existing e-commerce platforms may present too much information in a way that can be confusing, and they often lack the seductive clarity and restraint that is at the heart of much Japanese artistic achievement.
Mobile is another important sectoral development, and the mobile sector is the focus of much attention both as a channel for e-commerce, for entertainment, and for the multitude of new applications that are emerging in the “Internet of Things”. Historically Japan has always preferred to develop its own standards and pursue them. Now it needs to become intensively involved itself in standards development internationally and make sure that it plays a role in determining the shape of standards for the future in this field. This will include adapting to the changes that technology will bring, such as more responsive screens and new methods of user interaction, including more sophisticated speech recognition, and cyber security measures, power management new types of batteries etc.
The food industry is another important sector for Japan. Its progress in this field is remarkable and not yet fully appreciated outside the country. The development of different types of processed foods including health-related and sports related foods, nutraceuticals and the like, as well as complex products that can be rapidly prepared and are suited to today’s hurried lifestyles are achievements that could be very successfully promoted abroad, including though increased investment by foreign companies in the food sector in Japan.
Silver technologies, i.e. those that make the lifestyles of the elderly more manageable and the monitoring and intervention within their healthcare also more productive and successful are areas in which Japan has also significant strengths. With a significant ageing population, Japan has had to not only develop suitable technological solutions but also build those into a management framework, especially through healthcare systems and local systems of public support as well as healthcare cooperatives. This achievement needs to be widely shared, especially in the developed countries which are also or will soon face similar problems of caring for their elderly populations and ensuring not only their health but a vigorous and creative lifestyle for as long as possible.
Energy is another sector where enormous challenges face the world economy. It is also a sector where, in spite of the tragedy of Fukushima, Japan has much to offer the world. Even the extraordinary resilience and significant mastery of the new techniques involved in recovery from the disaster amounts to important learnings from which the rest of the world community can benefit. Because of physical and geographical conditions, the experience of Japan in areas such as earthquake detection and recovery, and in flood prevention and management is varied and of long standing. This again provides a good basis not only for humanitarian intervention globally with government support but also for Japanese construction and civil engineering firms to make a further contributions to infrastructure development throughout the world, especially in those subject to climate hazards. Energy itself and the challenge of continued global growth in the face of climate change, is an area where Japan’s expertise in all aspects is of great potential. Both conventional and nonconventional sources of energy represent important challenges and the restructuring of national energy systems will need both technological and organisational change. In the past Japan seems to have been better at offering technology than in offering the management skills that are needed to best exploit it. Yet the two are closely interlinked and indeed delivering one without the other, and relying on the target market to supply what is missing, is at best suboptimal for both sides. Japan’s commitment to development of the field of energy has been strikingly shown in its technology foresight exercise in this regard and can mean great potential for Japanese companies if they can convincingly put together packages of goods and services that respond to the needs of countries struggling to adapt their energy systems.
Partnership with other countries is always regarded as a good thing and is always acknowledged in agreements as being important. But partnership means different things to different people and there is potential for Japan to increase and broaden the scope of partnership to include the full range of relationships between it and other countries in. A coordinated set of measures in the field of trade, investment, education, science and technology, health, tourism and the arts, can yield good returns in terms of offering wider opportunities for complementarity and self-sustaining growth of the bilateral relationship.
Unlike a number of other countries, Japan has been slow to conclude trade and investment agreements. The growth of these worldwide has been very significant in recent years. Especially now that the WTO process has stalled, increasing focus is being put on such agreements by many countries. In comparison with other countries of similar scale and ambition, Japan has not made many trade and investment agreements and this strategy needs to be urgently reconsidered. It came late to the TPP process and so lost an opportunity to influence the agreement as it began to take shape. That agreement itself is by no means certain to come into force: the political climate in the United States is even less favourable to it now. If TPP fails, Japan will have the difficult task of trying to replace it with the remaining countries. Japan should take a pro-active, leadership role in this regard. A trade and investment agreement with the EU also appears to be stalled and needs to be revived.
Language will always remain a barrier, to some extent, to expanding international trade and investments between two countries that have different languages. With the growth of English as an international business language, at least for primary contact, additional language capabilities will continue to be a pressing need for Japan. But also more focus will have to be put on automatic translation and interpretation and the skills of Japanese academia and industry need to be further focused in this regard.
In spite of the traditional view of Japan as a closed society, there are important links with Latin America, especially through people of Japanese descent in Brazil and Peru. There is scope for increasing trade and investment links through better contact with those whose ancestry is Japanese, the so-called diaspora, as other countries have done, using their knowledge of local markets and developments to foster economic linkages. Some trade links happen anyway just from the presence of a diaspora, but a targeted intervention can encourage this further.
International servicing: a new services trading company should be established to help Japanese companies deliver after-sales service to overseas customers, similar to general trading companies. This could be of interest especially to smaller Japanese companies who are reluctant to begin international activity.
Innovation: a new technology licensing initiative is needed. Firstly, incentives, including tax incentives should be considered to encourage companies to license their technologies, especially abroad but also domestically. Secondly, the present international marketing arrangements for technology should be reviewed and if necessary a new agency should undertake the international marketing of technologies, especially on behalf of the smaller companies.
In conclusion, it is true that statistical and economic analysis may point to opportunities for increased Japanese trade and investment and growth in interdependence with the global economy. However the findings have to be checked against the day-to-day experiences of businesses competing in global markets, and these businesses will have their own perceptions and strategies. Dialogue and open communication between government, agencies and business is vital. But it must be structured in a positive way, intended to lead to conclusions in a timely manner. Speed of decision-making has to increase in line with the accelerating pace of change in the wold economy.
|
<urn:uuid:c03e1cdc-72a1-404a-93fe-3439b3d9597a>
|
{
"dump": "CC-MAIN-2021-10",
"url": "https://brave.st/japan/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178350846.9/warc/CC-MAIN-20210225065836-20210225095836-00025.warc.gz",
"language": "en",
"language_score": 0.9616382122039795,
"token_count": 4467,
"score": 2.53125,
"int_score": 3
}
|
Bangladesh authorities have announced that the Bangladesh and Myanmar will jointly remove landmines along their joint border.
The Daily Star and Financial Press in Bangladesh state that the agreement to clear mines was made during a six day meeting in Dhaka between the Myanmar Police Force and Border Guard Bangladesh. Both groups are paramilitary, and operate under the jurisdictions of the Ministry of Home Affairs in either country.
It is not clear on which countries territory the clearance will occur. Bangladesh is a state party to the 1997 Mine Ban Treaty, does not possess or use antipersonnel landmines, and has not reported to the convention any mined areas within its borders.
Myanmar is a known producer and user of antipersonnel landmines. Myanmar first laid boundary mine fields along the land portion of its border with Bangladesh in 1992, after a massive exodus of a quarter million Rohingya from Rakhine state. (see also Landmine Monitor country report Myanmar/Burma).
The extent of the mine clearance operation is unclear and has not yet been announced in the Myanmar press. One newspaper stated that the two countries would remove mines ‘planted by separatist groups’. Officials declined to name the separatist groups or how many casualties had occurred along the joint border.
|
<urn:uuid:51d0e2e2-1e4c-4069-8be7-a95f5e3341f3>
|
{
"dump": "CC-MAIN-2022-21",
"url": "https://burmamineban.demilitarization.net/?p=749",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662529658.48/warc/CC-MAIN-20220519172853-20220519202853-00034.warc.gz",
"language": "en",
"language_score": 0.9644556641578674,
"token_count": 252,
"score": 2.578125,
"int_score": 3
}
|
This visualization shows the daily Arctic sea ice and seasonal land cover change progressing through time, with a single frame rendered for each day (available from the drop-down of each image window), and an animation created from these frames.
The Japan Aerospace Exploration Agency (JAXA) provides many water-related products derived from data acquired by the Advanced Microwave Scanning Radiometer 2 (AMSR2) instrument aboard the Global Change Observation Mission 1st-Water "SHIZUKU" (GCOM-W1) satellite. Two JAXA datasets are used in this animation: the 10-km daily sea ice concentration and the 10 km daily 89 GHz Brightness Temperature.
In this visualization sea ice changes from day to day, with the amount of ice shown being determined by the AMSR2 sea ice concentration data. A running 3-day minimum is used, with a minimum threshhold concentration of 15%. The blueish white color of the sea ice is derived from a 3-day running minimum of the AMSR2 89 GHz brightness temperature. Over the terrain, monthly data from the seasonal Blue Marble Next Generation fades slowly from month to month.
The numerical portion of the frame filename begins with the four-digit year, followed by the three-digit day of the year for that frame.
GCMD keywords can be found on the Internet with the following citation:
Olsen, L.M., G. Major, K. Shein, J. Scialdone, S. Ritz, T. Stevens, M. Morahan, A. Aleman, R. Vogel, S. Leicester, H. Weir, M. Meaux, S. Grebas, C.Solomon, M. Holland, T. Northcutt, R. A. Restrepo, R. Bilodeau, 2013. NASA/Global Change Master Directory (GCMD) Earth Science Keywords. Version 126.96.36.199.0
|
<urn:uuid:260a3d5b-b80b-4864-ba84-6960262d7d0e>
|
{
"dump": "CC-MAIN-2023-40",
"url": "https://svs.gsfc.nasa.gov/cgi-bin/details.cgi?aid=5046",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506339.10/warc/CC-MAIN-20230922070214-20230922100214-00027.warc.gz",
"language": "en",
"language_score": 0.838318407535553,
"token_count": 403,
"score": 2.9375,
"int_score": 3
}
|
Researchers have developed a smartphone app that monitors a person’s gait, a development that could improve the lives of people with chronic disease.
GaitTrack, an app developed by researchers at the University of Illinois at Urbana-Champaign and the U. of I. at Chicago, turns a smartphone into a medical device, warning doctors when a patient’s symptoms worsen.
GaitTrack uses eight motion parameters to perform a detailed analysis of a person’s gait, which can tell physicians much about a patient’s cardiopulmonary, muscular and neurological health.
Led by Bruce Schatz, the head of medical information science and a professor of computer science at the U. of I., the team published its findings in the journal Telemedicine and e-Health.
‘Fitness apps and devices are tuned for healthy people,’ said Schatz. ‘They cannot accurately measure patients with chronic disease, who are the biggest medical market. A pedometer is not a medical device. But a cheap phone with GaitTrack software is.’
In a statement, Schatz said gait is sometimes called the ‘sixth vital sign’ – after temperature, blood pressure, heart rate, respiratory rate and blood oxygen level. Gait speed involves several systems of the body working together in coordination, so changes in gait can be a sign of trouble in one or more systems.
Doctors often use an assessment called the six-minute walk test for patients with heart and lung disease, such as congestive heart failure, chronic obstructive pulmonary disease (COPD) and asthma. Patients with chronic disease often cannot be measured with typical pedometers since they tend to walk with shorter, more careful strides, or to shuffle, so specialised medical accelerometers are used.
The Illinois team used GaitTrack to administer six-minute walk tests to 30 patients with chronic lung disease and found that it monitored more accurately – and more cheaply – than the medical accelerometers. In addition, they discovered that analysis of the gait data could predict lung function with 90 per cent accuracy, within an age group.
‘The original plan was just to validate the software against the standard medical walk test,’ Schatz said, ‘but we looked at other data and found that it matched well with a pulmonary function test called FEV1. Predicting FEV1 is useful because that’s the standard number used to determine treatment. That’s worth a lot to a health system.’
Schatz envisions the GaitTrack app running constantly in the background as a patient carries a phone. The phone would periodically collect data, analyze it and keep tabs on the patient’s status, alerting the patient or patient’s doctor when it detects changes in gait that would indicate a decline in health so that treatment could be adjusted responsively.
The researchers now are testing GaitTrack in larger trials within health systems. Schatz hopes to have the app available for download within months.
|
<urn:uuid:c75921e9-bd5e-4d6d-9433-f277f54caf03>
|
{
"dump": "CC-MAIN-2020-40",
"url": "https://www.theengineer.co.uk/gait-device-provides-medical-monitoring/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401624636.80/warc/CC-MAIN-20200929025239-20200929055239-00331.warc.gz",
"language": "en",
"language_score": 0.9333216547966003,
"token_count": 628,
"score": 3.03125,
"int_score": 3
}
|
Look up for a late-summer spectacle: A 'harvest' full moon will rise Monday night
- The harvest moon is the full moon closest to the autumnal equinox.
- September is usually the month associated with harvest moons.
- At moon rise, the moon is often reddened by clouds and dust in our atmosphere.
Get ready for a late-summer spectacle: A lovely "harvest" full moon will rise in the eastern sky Monday evening, Sept. 20, which will reach peak illumination at 7:54 p.m. EDT.
The harvest moon is the full moon closest to the autumnal equinox, which this year will be Sept. 22.
Why the "harvest" moon nickname?
"In the days before tractors with headlights, having moonlight to work by was crucial to getting the harvest in quickly before rain caused it to rot," according to Alan MacRobert, an editor at Sky & Telescope magazine.
Many crops ripen all at once in late summer and early autumn, so farmers found themselves extremely busy at this time of year, according to NASA. They had to work after sundown.
For several evenings, the moonrise comes soon after sunset, the Old Farmer's Almanac said. "This results in an abundance of bright moonlight early in the evening, which was a traditional aide to farmers and crews harvesting their summer-grown crops. Hence, it’s called the 'harvest' moon!"
A visual guide to full moons:What to know about the harvest moon
The Farmer's Almanac adds that since the autumnal equinox can happen on either Sept. 22 to 23, this means that the harvest moon can come as early in the calendar as Sept. 8 or as late as Oct. 7.
So, a summer harvest moon, especially one that happens just a couple of days before the equinox, is not really such a rare occurrence, the Almanac said. "In fact, about 50% of all harvest moons occur during the summer."
September is usually the month associated with harvest moons; they happen nearly 76% of the time, while October harvest moons occur an average of just 24%, the Almanac said.
Additionally, at moon rise, the moon is often reddened by clouds and dust in our atmosphere. Moons near the horizon are also swollen to outlandish size by the moon illusion, a well-known but still mysterious trick of the eye that makes low-hanging moons seem much larger than they really are.
For a real blast from the past, check this out: The harvest moon was the subject of this catchy pop standard from the early 1930s.
|
<urn:uuid:c7286796-ab47-4b12-812b-47fe8a3509ba>
|
{
"dump": "CC-MAIN-2023-06",
"url": "https://www.usatoday.com/story/news/nation/2021/09/15/harvest-moon-coming-monday/8351387002/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500140.36/warc/CC-MAIN-20230204142302-20230204172302-00391.warc.gz",
"language": "en",
"language_score": 0.9619570970535278,
"token_count": 550,
"score": 3.4375,
"int_score": 3
}
|
Ever since two enterprising reporters for the Baltimore Sun decided, in 1997, to take a closer look at ship scrapping, first at a Baltimore shipyard dismantling a Navy ship, and subsequently an in depth review of scrapping conditions in Alang, India, the light of public attention has been shining on this oldest of maritime practices.
With this scrutiny, the world of scrapping ships will be forever changed — hopefully for the better.
Following the end of the Cold War, the Navy's downsizing its fleet, and the requirement to replace tankers with more modern and environmentally safer ships, the demand to decommission and dispose of obsolete vessels is increasing at a pace more rapid than the capacity exists to handle this demand. Certainly, this is true in the U. S. And therein lies the nub of this debate. Should the U. S. be required to dispose of obsolete government vessels, from the Navy and the Maritime Administration's (MarAd's) National Defense Reserve Fleet (NDRF), only in U.S. shipyards and facilities? The Clinton Administration, and some Members of Congress, have clearly answered this question in the affirmative.
Between the Navy and MarAd, the Government has close to 200 obsolete vessels to dispose of over the next 10 years, or sooner if possible. Because of their age, these ships contain a number of hazardous substances, including asbestos and solid and liquid polychlorinated biphenyls (PCBs) - all substances now banned or highly regulated by the Environmental Protection Agency (EPA). Also, due to their age, a number of these ships are in very bad or deteriorating condition, and could well be causing environmental degradation to the very U.S. waters and rivers in which they are presently moored. In the case of MarAd, it spends millions of dollars each year simply to maintain and preserve these ships in three NDRF sites around the country.
U.S. Shipbreaking Capacity
Does the capacity exist in the U.S. to dismantle this number of obsolete ships? Probably not at the present time. And, certainly not without additional financial incentives from the Government to encourage more shipyards or shipbreakers in the U.S. to get into this business. At one time, U.S. yards did break up ships, but this largely changed in the 1980s when overseas yards, including those in India and Bangladesh, took over this responsibility. In these Asian nations, labor was cheaper and environmental standards were certainly lower. At the same time, the price of scrap metal and steel was much higher. (For a piercing picture of the conditions in an Indian scrapyard, see the above-mentioned Baltimore Sun series.) However, after the Clinton Administration imposed a moratorium on the export of government vessels for overseas scrapping, U.S. yards have gotten back into the business.
Consistent with the moratorium, an interagency panel report on ship scrapping, and legislation sponsored by Senator Barbara Mikulski of Maryland, the Navy has recently embarked on a pilot project to ascertain the "true" costs of dismantling a ship in the U.S. in full compliance with U.S. environmental laws and regulations. In September 1999, the Navy awarded four contracts to four companies to scrap one ship apiece for the Navy. The awards were made to Baltimore Marine Industries, Inc., of Baltimore, Md.; International Shipbreaking Limited, of Brownsville, Texas; Ship Dismantling & Recycling Joint Venture (of New Hampshire and Virginia); and Metro Machine Corp. of Norfolk, Va. The Navy paid these companies between $1.8 million and $3.8 million apiece for the disposal of four decommissioned frigates. The proceeds from the sale of the scrap is to be credited toward the value of the contract. If the scrapping at these facilities is successful, they could receive other contracts for scrapping the remaining 55 vessels in the Navy Inactive Fleet designated for scrapping.
MarAd is required to dispose of more than 100 obsolete vessels by September 30, 2001, a deadline that the agency recognizes it cannot meet. However, unlike the Navy, to date, MarAd has not been given the financial resources or the authority to pay U.S. yards for scrapping. Most MarAd ships are being broken up in Brownsville, TX, although one company recently defaulted on its contract. In the meantime, MarAd has had to expend considerable funds to maintain the ships in its Reserve Fleet sites
located in the James River, Virginia, Suisun Bay
, California, and Beaumont, Texas. A report by the Inspector General of the Department of Transportation, issued in March 2000, recommended that MarAd seek new legislative authority comparable to the Navy's and extend the deadline for scrapping its remaining ships. MarAd has requested an extension to 2006.
The U.S. is not alone in examining its ship disposal practices
. Heightened scrutiny by Greenpeace, the Basel Action Network (BAN), and the International Federation of Transport Workers, among others, is forcing international organizations as well as foreign scrapping nations to reexamine their laws and practices. As noted above, the majority of scrapping in recent years has taken place in India, Bangladesh, and Pakistan, although China is also scrapping foreign ships
Greenpeace and BAN would prefer to have ship scrapping controlled under the Basel Convention, a regime that regulates the transboundary movement of hazardous waste. Signatories to the Basel Convention disagree on whether the release of hazardous waste from the dismantling of a ship is itself a practice regulated under the Basel Convention. The U.S. has signed but not yet ratified the Basel Convention, but is a participant in the Basel Convention discussions. The U.S., and most other interested maritime nations, prefer to have ship scrapping reviewed by the International Maritime Organization (IMO), headquartered in London, and made up of most shipping nations. In March 2000, the IMO agreed to have its Marine Environment Protection Committee look at current practices in shipbreaking, including the possibility of having all toxic substances removed before the scrapping takes place. A Correspondence Group, under the leadership of Bangladesh, is undertaking this review.
For the foreseeable future, the U.S. Government will continue to scrap its obsolete ships in U.S. yards, and will have to pay companies to do so in order to assure compliance with all U.S. environmental and labor standards. The backlog of ships to be scrapped is so great that the disposal program will not be complete for 10 years. The market will have to be developed through financial incentives such as cost-plus contracts. As of this writing, key Members of Congress are trying to appropriate additional funds for MARAD and Navy ship scrapping programs
in the United States.
On the international front, the IMO and other international groups, will force scrapping countries, including India, to upgrade their programs to the extent they can. U.S. shipping companies can be expected to pay their fair share for disposal of their old ships in an "honorable manner."
The preceding was authored by Joan M. Bondareff, Dyer Ellis & Joseph (Washington, D.C.)
|
<urn:uuid:422d32f0-25e6-4638-a709-59cb1d59bc24>
|
{
"dump": "CC-MAIN-2015-22",
"url": "http://www.marinelink.com/news/article/319889.aspx",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207929978.35/warc/CC-MAIN-20150521113209-00077-ip-10-180-206-219.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9584200382232666,
"token_count": 1467,
"score": 2.9375,
"int_score": 3
}
|
Are you prepared for urgent health concerns? It’s important to understand the signs and symptoms of a medical emergency and how to respond appropriately.
In this article, we’ll discuss what qualifies as an urgent health concern and what steps you should take in case of an emergency.
Urgent health concerns can range from minor injuries to life-threatening conditions. It’s important to be able to identify the signs and symptoms of an urgent situation, such as chest pain, difficulty breathing, and severe bleeding.
By recognizing these symptoms early on, you can take the necessary steps to seek medical attention and potentially prevent a situation from becoming worse.
In the following sections, we’ll go over how to properly respond to an urgent health concern and what steps you can take to prepare for such situations.
Understanding Urgent Health Concerns
You need to understand urgent health concerns because they can potentially be life-threatening and require immediate attention. These concerns can include chest pain, difficulty breathing, severe bleeding, loss of consciousness, and sudden and severe pain.
It’s important to recognize the symptoms of urgent health concerns and seek medical attention right away to prevent further harm or even death. When you experience any of these symptoms, don’t hesitate to call 911 or go to the nearest emergency room.
Time is of the essence when it comes to urgent health concerns, and delaying medical treatment can have serious consequences. Additionally, it’s important to have a basic knowledge of first aid and CPR in case you or someone you know experiences an urgent health concern.
Understanding and being prepared for urgent health concerns can save lives.
Identifying Signs and Symptoms
Feeling dizzy or lightheaded may be a sign of an underlying health issue. These symptoms can be caused by a variety of factors, such as dehydration, low blood sugar, or medication side effects. However, they can also be a warning sign of more serious conditions like heart disease, anemia, or even a stroke.
It’s important to pay attention to these symptoms and seek medical attention if they persist or become more severe. Other signs and symptoms that may indicate an urgent health concern include chest pain or pressure, shortness of breath, sudden weakness or numbness, severe headaches, and unexplained weight loss.
If you experience any of these symptoms, it’s crucial to seek immediate medical attention. Ignoring these warning signs can lead to serious complications and even life-threatening situations. Remember, early detection and treatment can make a significant difference in your health outcomes, so don’t hesitate to seek help if you have any concerns.
Responding Appropriately in Urgent Situations
When faced with a medical emergency, it’s crucial to know how to respond appropriately to ensure the best possible outcomes.
The first step is to assess the situation and call for help if necessary.
If the person is not breathing or there is no pulse, start CPR immediately and continue until medical help arrives.
If the person is conscious, ask about their symptoms and medical history, and provide any necessary first aid until help arrives.
It’s important to remain calm and focused in urgent situations, as panic can make the situation worse.
Remember to prioritize the person’s safety and well-being, and follow any instructions given by medical professionals.
By responding quickly and appropriately, you can help to save a life and prevent further harm.
Preparing for Urgent Health Concerns
Get ready for unexpected health issues by making sure you have necessary medications, first aid supplies, and emergency contact information easily accessible. It’s important to keep a first aid kit at home and in your car, especially if you or a family member has a chronic medical condition.
Make sure to check the expiration dates of your medications and replace them as needed. Keep a list of all medications, dosages, and instructions in your first aid kit. This will help medical professionals provide the best care possible in an emergency situation.
In addition to having necessary supplies, it’s important to have a plan in place for urgent health concerns. Talk to your family and loved ones about what to do in case of an emergency. Designate someone to be your emergency contact and make sure they have a copy of your medical information and important phone numbers.
Plan ahead for transportation to the hospital or urgent care center, especially if you live alone. By being prepared, you can help minimize the stress and confusion that comes with unexpected health concerns.
Seeking Professional Medical Attention
If you’re experiencing symptoms that require medical attention, it’s important to seek professional help as soon as possible. Delaying medical attention could worsen your condition and lead to long-term health complications. Therefore, it’s crucial to recognize the signs and symptoms of urgent health concerns and seek help immediately.
When seeking medical attention, it’s important to be aware of the different types of healthcare providers available. Your primary care physician is a good starting point, but if they’re not available, you can visit an urgent care clinic or emergency room. It’s also important to provide your healthcare provider with as much information as possible about your symptoms, medical history, and current medications.
This will allow them to make an accurate diagnosis and provide appropriate treatment. Remember, seeking professional medical help in a timely manner is crucial for your overall health and wellbeing.
In conclusion, taking urgent health concerns seriously can be a matter of life or death. Being able to identify signs and symptoms of urgent health problems, such as chest pain or difficulty breathing, can help you respond appropriately in a timely manner.
It’s important to prepare for emergencies by having a first aid kit and emergency contact information readily available. However, if you or someone you know experiences an urgent health concern, it’s always best to seek professional medical attention.
Don’t hesitate to call 911 or visit an emergency room if necessary. Remember, time is of the essence when it comes to urgent health concerns, and seeking prompt medical attention can make all the difference.
|
<urn:uuid:80cf4f97-e7cd-4244-a2ff-56c1473b0b00>
|
{
"dump": "CC-MAIN-2023-40",
"url": "https://telemedmx.com/urgent-health/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233509023.57/warc/CC-MAIN-20230925151539-20230925181539-00634.warc.gz",
"language": "en",
"language_score": 0.9325318932533264,
"token_count": 1249,
"score": 2.609375,
"int_score": 3
}
|
Unlike other industries where specific tolerances are put in place to extend part and component life or to ensure safe operation, the manufacturing of medical devices is truly a situation where life and death are at the heart of the process.
Different types of medical devices are grouped or categorized under different types of regulations. A metal screw used to hold healing bones in place is less tightly regulated than a component that will go into an implantable device, but the machining tolerances are still extremely tight and must meet high standards with both types of parts.
Companies that offer medical machining as part of their services need to be fully aware of all FDA regulations regarding the machining of different types of medical parts, components, and devices. Understanding the differences required for the various classes of medical devices will ensure that the processes used and the tolerances adhered to will not fall outside of the approved standards.
Companies offering medical machining should have the ISO 9001 certification for general quality standards and control throughout the facility. They should also have the ISO 13458 certification.
This is a specialized certification for medical device manufacturing services. It includes a complete quality management system specific to the industry that can be recognized internationally. This will be critical for approval of the medical device not only in the United States but also for international markets as well.
While every company offering medical machining has to have a first project, it is also the project that will pose the greatest challenges. Since final approval of the device is based on all parts and components meeting specific standards, working with an experienced company offering this precision machining is always the recommended option.
Be the first to like.
|
<urn:uuid:6b947f7d-3c65-42ff-90e1-598670f5d864>
|
{
"dump": "CC-MAIN-2017-51",
"url": "http://infodirweb.com/the-importance-of-industry-experience-for-medical-machining/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948515311.25/warc/CC-MAIN-20171212075935-20171212095935-00110.warc.gz",
"language": "en",
"language_score": 0.9486435055732727,
"token_count": 330,
"score": 2.796875,
"int_score": 3
}
|
Course Content and Details
A leader doesn’t necessarily have to be a ‘manager’, but it’s difficult to see how a manager could be truly effective without having at least some leadership skills.
This course starts by introducing the basics of leadership and explores where the concept originated from. It then goes on to discuss various leadership theories, including situational leadership, contingency theories, transactional and transformational leadership and more. It then moves on to discuss developing teams including and team members by looking at the role leaders play in this.
The final two modules cover the role communication plays in effective leadership and finishes off with a module about moving forward together to achieve a shared vision.
A strong leader will motivate their team, improving morale and efficiency and ensure that their team is of a common purpose.
Leadership Skills Course Modules
- Leadership and Management
- Leadership Theories
- Team Development and Leadership
- Individuals Within Teams
- Communicating One-to-One with Individuals
- Moving Forward Together
CPD approval means that this course can be used by those that need to prove they are continually developing themselves.
ILM approval means that this course can provide candidates with a recognised management qualification.
|
<urn:uuid:30186fb7-2d07-4ad9-8701-24357644bf35>
|
{
"dump": "CC-MAIN-2021-31",
"url": "https://rightcoursecompany.co.uk/product/leadership-skills-cpd-ilm-approved-online-training-course/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046151531.67/warc/CC-MAIN-20210724223025-20210725013025-00080.warc.gz",
"language": "en",
"language_score": 0.9442511200904846,
"token_count": 248,
"score": 2.640625,
"int_score": 3
}
|
Depending on the type of sarcoma, chemotherapy (treatment with anticancer drugs) may be given to shrink the main tumor. It is called neoadjuvant chemotherapy as it is often given before the tumor is removed by surgery. Neoadjuvant chemotherapy for osteosarcoma became the standard of care at the beginning of the era when surgeons began removing tumors and saving the diseased limbs. Chemotherapy given before surgery may help kill more tumor cells so that it is easier to surgically remove the remaining sarcoma.
Dr. Katie Thornton with patient.
Our adult and pediatric oncologists are testing different strategies to combat aggressive tumors, including therapies that target individual cancer cells and varying dosing schedules of standard drugs. They also lead or participate in clinical trials investigating new medications or drug regimens. For more information, see our clinical trials section.
|
<urn:uuid:4bd925a3-a6c9-4212-b6e3-5c906711010e>
|
{
"dump": "CC-MAIN-2014-52",
"url": "http://www.hopkinsmedicine.org/kimmel_cancer_center/centers/sarcoma/treatments/medical_management.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802767301.77/warc/CC-MAIN-20141217075247-00074-ip-10-231-17-201.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9320498108863831,
"token_count": 174,
"score": 2.765625,
"int_score": 3
}
|
Blog Tags: Grouper
Two and a half hours west of Key West by boat is lonely Fort Jefferson, a Civil War-era fort marooned in the middle of the Gulf of Mexico and encrusted in coral reefs. Here the color of the water ranges from cerulean to toothpaste-aquamarine as magnificent frigatebirds, masked boobies, and sooty terns haunt the coral-white beaches of this unfinished garrison, a former prison for union army deserters.
One of seven islands that make up the Dry Tortugas (so named for their lack of water and wealth of turtles at the time of Ponce de Leon’s discovery in 1513) Fort Jefferson is a monument to the ingenuity and industry of engineers and masons who slogged bricks from as far as Brewer, Maine, to the middle of the ocean to construct a fort that has survived in the crosshairs of two centuries of hurricanes. Now, the park is also a monument to the scientific principles of ecosystem management, proof that protecting habitat benefits all—environmentalists and fishermen alike.
In 2001, over the objections of local fishermen, the National Marine Fisheries Service (NMFS) announced that it would establish a 151-square nautical mile no-take zone in the area—the Tortugas Ecological Reserve. It was assumed that closing the well-known grouper and snapper spawning grounds of the Dry Tortugas to fishing would hurt the industry’s bottom line.
But that didn’t happen. The fish got bigger. And there were more of them.
How would you feel if you found out the red snapper on your plate wasn’t red snapper at all, but instead something illegally fished or potentially unhealthy? A new Oceana study found that 31% of seafood we tested in South Florida is mislabeled, keeping consumers in the dark about what they’re really eating.
Our campaigners used DNA testing on seafood samples from grocery stores, restaurants, and sushi venues in the Miami/Fort Lauderdale and Palm Beach areas. We’ve conducted studies like this in other cities, and the results from Los Angeles and Boston were even more striking—55% of seafood in L.A. was mislabeled and 48% in Boston.
But just because the numbers are lower in South Florida doesn’t mean that seafood fraud is any more acceptable. Some of the fish being served under a different name pose risks to health and sustainability. The study found that king mackerel, a high mercury fish with a health warning for sensitive groups, was being marketed as ‘grouper.’
Sushi restaurants were the biggest offenders, with 58% of samples found to be mislabeled. All the samples of white tuna collected from sushi vendors were actually escolar, a fish species that can make people sick.
The large amount of seafood coming into the U.S. market can make it difficult to trace each item to its source. Oceana is calling on the federal government to ensure that the seafood we find in our markets is safe, legal, and honestly labeled. By implementing a traceability system, consumers can make informed decisions about what they put on their plate.
Sign the petition to fight seafood fraud and ensure you’re getting what you order.
In the latest update from the Latitude, Oceana scientist Jon Warrenchuk describes the ROV’s dive near Key West.
The underwater ridge looked promising: South of Key West, 10 miles offshore and 200 meters deep. The bathymetric lines piled up steeply on the chart, indicating some steep relief in some otherwise flat habitat. As far as I knew, no one had ever seen what the seafloor looked like in that area. We deployed the ROV some distance from the site, trying to take into account the drift of the boat.
The federal government has closed commercial and recreational fishing in a wide swath of the Gulf as a result of the oil spill, which is a serious economic blow to the region.
While oil-covered birds have become an emblematic image of catastrophic oil spills, sea birds aren’t the only ones affected. Oil is extremely toxic to all wildlife, and the toxic effects on marine life begins as soon as the oil hits the water.
Here are 10 examples of how marine life may be affected by the Gulf spill in the coming days, weeks and years
- Photos: Oceana’s Dusky the Shark Visits Washington, D.C. to Raise Awareness for Dusky Sharks Posted Mon, November 17, 2014
- Ocean Roundup: Atlantic Bluefin Tuna Catch Quotas Raised, Kemp’s Ridley Turtles Stranding in High Numbers, and More Posted Wed, November 19, 2014
- Ocean Roundup: Seals Can Pick up Pings from Acoustic Tags on Fish, Climate Change Making Crabs “Sluggish,” and More Posted Fri, November 21, 2014
- Oceana’s New Report Highlights Uses, Benefits of Global Fishing Watch Technology Posted Mon, November 17, 2014
- Video: Humpback Whales Cause Quite the Surprise As They Hunt for Herring Posted Wed, November 19, 2014
|
<urn:uuid:872f3306-81ea-4042-9cd9-e69bbc038b97>
|
{
"dump": "CC-MAIN-2014-49",
"url": "http://oceana.org/es/category/blog-free-tags/grouper",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400379462.60/warc/CC-MAIN-20141119123259-00245-ip-10-235-23-156.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.939897358417511,
"token_count": 1082,
"score": 2.5625,
"int_score": 3
}
|
Changes of traits in a bacterial population associated with protozoal predation
- Cite this article as:
- Shikano, S., Luckinbill, L.S. & Kurihara, Y. Microb Ecol (1990) 20: 75. doi:10.1007/BF02543868
- 76 Downloads
In an attempt to understand the significance of predation in the evolution of prey species, the ecological and morphological characteristics of bacterial species under predation by a ciliated protozoa,Cyclidium sp., were investigated. Serial transfer at 7 day intervals was applied to the bacterial populations in the presence or absence ofCyclidium. Although cells of the parental bacterial strain are typically short rods up to 1.5 μm long, cells of much greater length, up to 20 μm long (type L) were found in populations exposed to predation fromCyclidium. However, the wildtype, shorter length bacteria persisted even after the appearance of type L. Type L was not observed in the singl bacterial culture throughout the serial transfers. Type L appeared to improve the ability to escape predation by elongating cell size, but growth rate and saturation density were decreased.
|
<urn:uuid:4576fd68-7fa8-4485-9e67-8f855fadaceb>
|
{
"dump": "CC-MAIN-2017-09",
"url": "http://link.springer.com/article/10.1007%2FBF02543868",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170884.63/warc/CC-MAIN-20170219104610-00184-ip-10-171-10-108.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.926353931427002,
"token_count": 247,
"score": 2.734375,
"int_score": 3
}
|
Select a region
In 2010, United Kingdom had 3.55 Mha of natural forest, extending over 20% of its land area. In 2022, it lost 7.89 kha of natural forest.
Explore interactive charts and maps that summarize forest fires in United Kingdom. Statistics – including regions with the most fire alerts and how current fires compare to historical trends – can be customized, easily shared and downloaded for offline use.
|
<urn:uuid:8553c5e3-2084-44be-9452-6c79c3f41fca>
|
{
"dump": "CC-MAIN-2023-40",
"url": "https://www.globalforestwatch.org/dashboards/country/GBR/?category=fires",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510297.25/warc/CC-MAIN-20230927103312-20230927133312-00037.warc.gz",
"language": "en",
"language_score": 0.8916593790054321,
"token_count": 89,
"score": 2.65625,
"int_score": 3
}
|
Saskatoon company claims solar energy breakthrough
By Design EngineeringGeneral Energy Solar
SHEC says its Concentrated Solar Power system lowers thermal solar generating costs to six cents per kilowatt-hour.
Saskatoon – Tom Beck, president of SHEC Energy Corporation, says his company has achieved a breakthrough in solar thermal energy that reduces the cost of the technology by about 75 per cent, making it competitive with the lowest-cost fossil fuels.
According to the company, solar power produced by existing concentrating solar power systems (CSP) costs around $0.13 to $0.20 per kilowatt-hour (kWh). By contrast, Beck says SHEC Energy’s technology can reduce that cost to between $0.06 and $0.08 per kWh.
“That’s only slightly more than coal, which is among the least expensive of the fossil fuels,”’ he says. “And it comes without the pollution and negative health effects you get when burning fossil fuels, and it’s far less costly than nuclear power, with all its long term radioactive waste issues.”
Unlike photovoltaic (PV) systems that convert light to electricity, concentrating solar power systems (CSP) — like SHEC Energy’s — produce power by concentrating sunlight to generate high temperature (850°C) heat. This heat is then used to boil water to make steam to turn a turbine. In addition, the heat can also be stored in a granular storage material making available to produce power 24 hours a day, except in prolonged cloudy conditions.
Traditionally typical CSP systems have been held back by the solar field’s high deployment costs, which consists of hundreds or thousands of solar concentrators. According to SHEC, its proprietary CSP system introduces technology that lowers the cost of the solar field and increases the efficiency of thermal energy storage.
“Now we finally have a clean, renewable and economically viable solution to our energy needs,” says Beck.
|
<urn:uuid:d1c8213c-9448-4003-93fb-94f13016050e>
|
{
"dump": "CC-MAIN-2022-33",
"url": "https://www.design-engineering.com/saskatoon-company-claims-solar-energy-breakthrough-64149/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570827.41/warc/CC-MAIN-20220808122331-20220808152331-00738.warc.gz",
"language": "en",
"language_score": 0.9284927845001221,
"token_count": 426,
"score": 2.84375,
"int_score": 3
}
|
The Differences between Universität and Fachhochschule (FH)
The dilemma of choosing between the University / Technical University and the University of Applied Science to study in Germany has bothered many. Coming from a different educational background, it would take some learning to understand the differences between Universität and Fachhochschule (FH). We thought we would shed some light on the types of universities in Germany:
Getting similarities out of the way
University (Universität) including Technical Universities a.k.a TU and Universities of Applied sciences (Fachhochschule a.k.a FH) have a lot in common: both have bachelor’s and master’s programs. At both students sit in lectures and seminars, write exams and chores, get credit points and grades. At both, you do an academic degree. Universities as well as FHs are supposed to teach their students scientific thinking and are obliged to train them with “employment-qualifying” degree.
So what is the difference?
As a rule of thumb, the study at the university is “theoretical” and “research-oriented”.
Fachhochschule is “practical” and “hands on”.
Although, strictly speaking, that’s not true. After all, there are also some practical projects at Universities, and students also learn theoretical basics at Fachhochschule.
At the university, one meets professors with a scientific career. After their doctoral thesis, they continued their research, attended conferences, published essays in specialist journals and spent a lot of time in a large scientific work – the habilitation.
Professors at Fachhochschule also have a doctoral degree, but they have also worked outside of college – at least three years are required. Before they came to the Fachhochschule, they were, for example, managers in large corporations such as Airbus or Siemens or a medium-sized company. Or they have worked in the administration, in an association or in a hospital – often in a leadership position.
Doctorate degrees are usually offered only by Universities. Universities offer a wider range of subjects (Although, Technical Universities focus more on STEM fields)
Almost all universities of applied sciences have a compulsory practical semester to study, which is completed in one company. It counts as study achievement. Studies at an FH are more heavily regulated and “Schooled”. This is something useful for types of learners who would rather not lose themselves in the lecture lists of the university and therefore prefer given schedules.
But those who prefer to set their own priorities and also want to listen to other subjects would be in better hands at the university.
But with time, the differences between the two are reducing. Universities now offer some practical / industry oriented courses. Some FHs, also have been (or will be) legally allowed to offered doctorate degrees. Some FHs are also teaching subjects that were in the past only taught by Universities.
More on Universität vs FH by Vikrant and Jana
SEE ALSO: How to apply at a university in Germany?
If you do wish to be updated on more about studying and living in Germany, do not forget to subscribe to our blog and like us on Facebook.
More from Study in Germany
FAQs about Studying in Germany | Airports | Preparation and Arrival | Masters | Bachelors | PhD | Student in Germany | Life in Germany | Part-time Jobs | Working in Germany | Driving in Germany | Housing in Germany | Integration | Comparisons between Countries | Traveling in Europe
Leave a Comment
|
<urn:uuid:3d0f8257-6a67-4681-90cc-b8ab8296b901>
|
{
"dump": "CC-MAIN-2019-35",
"url": "https://thehonest.blog/universitat-and-fachhochschule/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027318952.90/warc/CC-MAIN-20190823172507-20190823194507-00249.warc.gz",
"language": "en",
"language_score": 0.9501723647117615,
"token_count": 770,
"score": 2.546875,
"int_score": 3
}
|
Zika as a Cancer Treatment?
I stumbled across one story this week regarding the Zika virus and brain cancer research that caught my eye, though the research is far from conclusive. Before I really discuss the article and the study it describes, I wanted to give some context behind Zika and its current state.
Zika is a virus that in a healthy, non-pregnant person causes only mild symptoms. It is mainly transmitted by mosquitoes in the Aedes genus, frequently by the Aedes Aegypti mosquito, but it is also known to be transmitted sexually. Many who are infected don’t realize they’ve come down with the virus, and very few deaths are caused by it. There are two complications of the disease, however, that make it more than concerning – it can trigger Guillain–Barré syndrome (which causes your immune system to attack your nerves) in adults, and microcephaly (a smaller than average head) and other brain defects in children born to infected mothers. Much of the work around Zika includes preventing the infection of pregnant women, and there are already vaccines being tested for them.
I want to be clear – Zika virus is not yet a massive threat in the United States. It is much more prevalent in South America, Central America, Africa, and other regions closer to the equator. The nation-wide panic and sensationalism that filled the news in 2016 when the World Health Organization (WHO) declared it a global medical emergency has more or less subsided. Though we don’t know what the future holds, the CDC is taking measures to prevent its spread around the world and in the US, such as education, travel warnings, further study, and comprehensive tracking, among other things.
Now, what does Zika have to do with brain cancer? Though it is largely a negative force in the world, researchers at the University of Campinas’s School of Pharmaceutical Sciences in São Paulo State, Brazil are trying to use it for good.
Glioblastoma, which is the most common and aggressive type of adult brain tumor, is very resistant to chemotherapy. That means that alternate forms of treatment for it are very sought after.
One newer, promising candidate for cancer treatment is the use of what are known as oncolytic viruses. These are viruses that have been genetically engineered and altered to destroy tumors. This technique is already showing promise in treating melanoma, bone cancer, and more.
Now, these scientists at the University of Campinas’s School of Pharmaceutical Sciences are finding some success using Zika to kill off glioblastoma tumors. They have found that by infecting tumor cells with Zika, the tumor cell is induced into producing a molecule known as digoxin, which has previously shown promise in killing breast and skin cancer tumors. After observing these infected tumor cells using mass spectrometry, the researchers found signs of cell death caused by the induced digoxin. They hope in the future to genetically engineer a form of Zika that will only synthesize digoxin instead of infecting the patient with Zika.
The fact that humans are able to take a dangerous and possibly debilitating disease such as Zika and try to use it as a potential cure for cancer speaks volumes towards human ingenuity and our ability to make the best out of a bad situation. I realize that, like many cutting-edge medical advances that you see in the news, this treatment option likely has years of testing to go through before it is even considered for use in a clinical setting. It has a decent chance of never making it out of the lab. But, still, we are trying incredibly innovative (counter-intuitive, even) solutions to some of our most frightening problems.
—Courtesy of GSC Go Science Crazy and Jacob Monash
|
<urn:uuid:2baef7e3-055e-44dc-bc0c-29b3a2a8cb80>
|
{
"dump": "CC-MAIN-2018-43",
"url": "http://www.headlinesciencenow.com/category/medical/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512592.60/warc/CC-MAIN-20181020055317-20181020080817-00305.warc.gz",
"language": "en",
"language_score": 0.967441737651825,
"token_count": 771,
"score": 2.84375,
"int_score": 3
}
|
What are the threats to the life of the Philippine Eagle?
They are threatened primarily by deforestation through logging and expanding agriculture. Old-growth forest is being lost at a high rate, and most of the forest in the lowlands is owned by logging companies. Mining, pollution, exposure to pesticides that affect breeding, and poaching are also major threats.
What is the problem of the Philippine Eagle?
Philippine Eagles are critically endangered. It’s difficult to accurately determine population size, but most estimates suggest there are 200-800 birds left in the wild. Habitat loss and human persecution rank as the top threats to their survival.
Why is the eagle endangered?
Habitat destruction and degradation, illegal shooting, and the contamination of its food source, due to use of the pesticide DDT, decimated the eagle population. Bald eagles no longer need Endangered Species Act protection because their population is protected, healthy, and growing.
What can we do to protect Philippine Eagle?
To protect the eagles, we must protect the monkeys and civets and other animals they need for food, the plants and animals that monkeys and civets feed on, and the trees that Philippine Eagles nest in, which helps protect the other animals that use these trees for food, shelter, and space.
Why did the Philippine eagle become critically endangered?
According to Salvador, the reason for this was due to massive deforestation. “Deforestation is terrible,” he pointed out. “The Philippine eagle has become a critically endangered species because the loss of the forest had made it lose its natural habitat.”
Are there any Eagles left in the Philippines?
Moreover, the majority of Philippine eagles are confined to just Mindanao, with just six breeding pairs know to exist on Samar, two on Leyte and a few on Luzon. In total it is believed that fewer than 200 Philippine eagles currently exist in the wild. Like birds of prey the world over, one of the chief threats to the Philippine eagle is hunting.
What’s the penalty for killing a Philippine eagle?
Killing a Philippine eagle is punishable under Philippine law by up to 12 years in prison and heavy fines. The first European to study the species was the English explorer and naturalist John Whitehead in 1896, who observed the bird and whose servant, Juan, collected the first specimen a few weeks later.
What kind of bird is the Philippine eagle?
The Philippine Eagle is a brown and white plumed eagle native to rain forest in the Philipines. Though regarded as the Philipines’ national bird it is also one of the world’s most critically endangered and the killing of a Philippine eagle is currently punishable by 12 years jail time.
Is the Philippine eagle in danger of extinction?
Critically endangered Philippine eagle hangs on despite horde of threats. Once inhabiting every island in the Philippines, the Philippine eagle (Pithecophaga jefferyi) – the world’s longest eagle – now occupies a fraction of its former range and is listed as Critically Endangered by the IUCN.
Are there laws to protect the Philippine eagle?
Several laws provide the legal basis to protect the Philippine eagle against all threats—particularly illegal wildlife trade, hunting or the destruction of their habitats.
How are the Philippine eagles in the wild?
Outside of its breeding facility, the foundation also works hand-in-hand with 37 communities in the region in protecting Philippine eagles that live out in the wild. The International Union for the Conservation of Nature has listed the Philippine eagle as critically endangered, with only around 400 pairs remaining in the wild.
Where are the captive breeding eagles in the Philippines?
Located in the foothills of Mount Apo, the tallest peak in the country, the eagle center was once home to 32 of the birds, with 28 bred in captivity through natural mating or cooperative artificial insemination. Thirteen eagles were released in the forests of Mindanao and 17 remained in the center’s breeding program.
|
<urn:uuid:f9147dd1-9c6f-4fa1-975d-5663aab6e13e>
|
{
"dump": "CC-MAIN-2022-40",
"url": "https://lyotomachida.net/2019/03/23/what-are-the-threats-to-the-life-of-the-philippine-eagle/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335254.72/warc/CC-MAIN-20220928113848-20220928143848-00798.warc.gz",
"language": "en",
"language_score": 0.9459604620933533,
"token_count": 832,
"score": 3.046875,
"int_score": 3
}
|
Rebellion, Riot, and Mutiny: Compelling Criminal Trials in Afro-Americana Imprints
Statement of the proceedings of the directors of the London Missionary Society, in the case of Rev. John Smith, missionary, Demerara. Extracted from the Missionary chronicle for March 1824 (1824)
The Reverend John Smith was court-martialed, having been accused of inflaming the slaves and withholding knowledge of the planned rebellion from the authorities. He was found guilty and sentenced to death. He died in prison before a reprieve from the king reached Demerara. He was 33 years old. His death became a rallying cry for the abolitionist movement in Britain.
This statement from the directors is entirely supportive of John Smith and makes references to the many enemies of the London Missionary Society. The directors reaffirm instructions to their missionaries that they “are not sent to relieve them [slaves] from their servile condition, but to afford them the consolation of religion and to force upon them the necessity of being ‘subject not only for wrath but for conscience sake.’”
By Richard Peters, reporter of the decisions of the Supreme Court of the United States
Edward Prigg was a slave-catcher who had been hired by a Maryland family to capture and return Margaret Morgan who had moved to Pennsylvania. Morgan had lived somewhat freely in Maryland but had not been legally emancipated. The heirs of her owner made the decision to return her to an enslaved status.
Prigg and three other men were arrested and arraigned under an 1826 Pennsylvania law that forbid the capture and return of fugitive slaves. They were found guilty by a lower state court and that verdict was upheld on appeal to the Pennsylvania Supreme Court. Prigg appealed to the U.S. Supreme Court which subsequently agreed with him and overturned the conviction. They found that both Article IV of the U.S. Constitution and the Fugitive Slave Act of 1793 entitled slave owners to capture fugitive slaves in any state and that local and state officials were forbidden to take any role in support of the fugitive. Because the decision also prohibited any state or local official from assisting in the capture of a slave, the effect was to undermine the act of 1793 which led to the enactment of the Compromise of 1850 which included an even harsher law for fugitive slaves.
A brief sketch of the trial of William Lloyd Garrison, for an alleged libel on Francis Todd, of Massachusettts [sic] (1830)
Garrison concludes this account by swearing to continue to call out all who participate in the slave trade, however exalted they may be. He expresses his own shame “that I have done so little for people of color” and supposes that “a few white victims must be sacrificed to open the eyes of this nation, and to show the tyranny of our laws.” He asks that his “editorial brethren” publish the facts of his trial and “to make such comments as may seem expedient.” He asks for a change of verdict concluding that all of Europe would be astonished “if it were trumpeted in that quarter, that an American citizen lies incarcerated in prison for having denounced slavery, and its abettors, in his own country!”
Was Herman Melville inspired to write the novella Billy Budd by the events of this mutiny? The USS Somers is the only ship in the U.S. Navy ever to have a mutiny leading to executions. The apparent leader of the putative mutiny was midshipman Philip Spencer, the son of the Secretary of War, John C. Spencer. One of the members of the chain of command on board was Guert Gansevoort. He was a first cousin to Melville who may have been intrigued enough with the real life events aboard the Somers to incorporate some of them into his fiction.
The Somers was on its first mission after a shakedown cruise and was heading for the western coast of Africa. Philip Spencer told another sailor that he and 20 others were plotting a mutiny with the intention of using the ship for piracy. His boasts were reported. Initially, captain Alexander Slidell MacKenzie was reluctant to take action, and Spencer claimed he was just playing a game.
The captain and his officers finally did take action, finding that Spencer and two others “were guilty of a full and determined intention to commit a mutiny.” The three were executed aboard the ship and buried at sea. When the public learned of these events there were many questions and many doubted the propriety of the captain's decisions. Hence, the inquiry reported in this publication. Captain MacKenzie was exonerated.
The enactment of the 1850 Fugitive Slave law heightened tensions for the people who provided shelter and aid to escaped slaves. In 1851 Edward Gorsuch, a planter from Maryland, traveled to Pennsylvania to capture three of his slaves who had escaped two years earlier. As he attempted to take possession of them, a riot broke out involving as many as 100 men of color and at least two white men. Mr. Gorsuch was killed. This event became a national story at a time when the country was becoming ever more divided over the issue of slavery. It was also significant because of the size and strength of the defenses that former slaves and other African Americans were organizing for their protection.
Because of its location on the Mason-Dixon Line, Lancaster, Pennsylvania, was the first northern community that many escaping slaves reached. Consequently, there were 3,000 or more fugitive slaves and other people of color living there in 1851. It was from this population that men rushed to protect their brothers from Mr. Gorsuch.
This imprint is a collection of related newspaper reports as well as the official report of the incident. Thirty-eight men were indicted by a grand jury for the crime of treason. The first defendant to go to trial was Castner Hanway. The trial, which lasted 18 days, attracted financial support for Hanway from Lucretia Mott, and the defense was led by Congressman Thaddeus Stevens. Mr. Hanway was acquitted. Soon after all of charges against the other men were dropped.
For more information about Afro-Americana Imprints, 1535-1922: From the Library Company of Philadelphia, or to request a trial for your institution, please contact firstname.lastname@example.org.
|
<urn:uuid:1ede548e-eae5-4f6b-9d5f-2924abe55374>
|
{
"dump": "CC-MAIN-2019-51",
"url": "https://www.readex.com/blog/rebellion-riot-and-mutiny-compelling-criminal-trials-afro-americana-imprints",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541308604.91/warc/CC-MAIN-20191215145836-20191215173836-00020.warc.gz",
"language": "en",
"language_score": 0.9839978218078613,
"token_count": 1320,
"score": 2.640625,
"int_score": 3
}
|
Nanotechnology for the Technical Reader
The earliest and still most thorough treatment of molecular nanotechnology is the text Nanosystems: Molecular Machinery, Manufacturing, and Computation (1992), by K. Eric Drexler. Also highly recommended, as brief introductions, "Revolutionizing the Future of Technology" (Revised 2006) and "Productive nanosystems: the physics of molecular fabrication" (2005) both by K. Eric Drexler.
The first journal article published on molecular nanotechnology: "Molecular engineering: An approach to the development of general capabilities for molecular manipulation," Proceedings of the National Academy of Sciences, September 1981, is available at the Institute for Molecular Manufacturing web site.
The key concept in the proposal that molecular nanotechnology will allow the fabrication of complex objects to atomic precision is positional control, sometimes called positional mechanosynthesis. Ralph Merkle has written and made available at his Web site the article Molecular Manufacturing: Adding Positional Control to Chemical Synthesis. An extensive technical bibliography for research on positional mechanosynthesis, covering both theory and experiment, has been compiled by Robert A. Freitas Jr.
Nanotechnology: Research and Perspectives is the proceedings of the First Foresight Conference on Nanotechnology, the first interdisciplinary technical conference on nanotechnology. In addition to considering theoretical aspects of advanced nanotechnology, this conference reviewed the state of the art of several experimental approaches that will be crucial to developing advanced nanotechnology, as of the date of the conference—1989.
The book Nanomedicine, Volume I: Basic Capabilities, by Robert A. Freitas Jr. describes the basic capabilities of molecular machine systems that may be required to develop medical nanorobotic devices. Chapter 2, "Pathways to Molecular Manufacturing" (available on the author's web site at http://www.nanomedicine.com/NMI/2.1.htm and subsequent pages), presents an extensive, thorough, and detailed overview of both experimental and theoretical approaches to developing advanced nanotechnology, as of 1999.
"Building Molecular Machine Systems", by K. Eric Drexler, a pre-print of an article published in Trends in Biotechnology, January 1999, Vol 17 No 1, pp 5-7, considers possible routes from naturally occurring biological molecular machine systems to the artificial molecular machine systems that will make possible advanced nanotechnology.
Chapter 4, "Microscale and Molecular Kinematic Machine Replicators" of Kinematic Self-Replicating Machines by Robert A. Freitas Jr. and Ralph C. Merkle, presents an extensive overview of molecular mechanisms and other approaches to developing the basic capabilities of advanced nanotechnology, as of 2004.
Inexpensive fabrication of manufactured products using molecular manufacturing is only possible using either self replication or exponential manufacturing. Early discussions of molecular manufacturing proposed programmable microscopic machines, termed assemblers, capable of building complex objects to atomic precision. Because assemblers were to be general purpose machines that could be programmed to build a wide variety of materials and machines, it was pointed out that they could therefore be programmed to build copies of themselves, and were therefore potentialy self-replicating. See, for example, the article by Ralph Merkle Self replication and nanotechnology.
More recent studies ["Safe exponential manufacturing" by Chris Phoenix and Eric Drexler, 2004, Nanotechnology 15 869-872.] have shown that it is not necessary for the microscopic machines themselves to be self-replicating in order for macroscopic molecular manufacturing systems to reap the practical and economic advantages of machine replication. A desktop nanofactory would be such a macroscopic molecular manufacturing system. An 86.1 MB movie, depicting an animated view of a nanofactory and demonstrating key steps in a process that converts simple molecules into a billion-CPU laptop computer, is a collaborative project of animator and engineer, John Burch, and pioneer nanotechnologist, Dr. K. Eric Drexler.
Chris Phoenix, Director of Research for the Center for Responsible Nanotechnology, published (2003) a "Design of a Primitive Nanofactory" (see Foresight Update 53). Chris Phoenix and Eric Drexler published (2004) an assessment of the advantages of exponential manufacturing using macroscopic nanofactories compared to small self-replicating machines (see "Gray Goo Begone" in the Media Watch column of Foresight Update 54).
Zyvex Labs provides two very useful background documents on atomically precise manufacturing:
Foresight materials on the Web are ©1986–2016 Foresight Institute. All rights reserved. Legal Notices.
|
<urn:uuid:0b1e58d4-1ebd-4754-a5e3-45e9eae1f7ef>
|
{
"dump": "CC-MAIN-2016-36",
"url": "http://www.foresight.org/nano/technical.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982969890.75/warc/CC-MAIN-20160823200929-00165-ip-10-153-172-175.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8893706202507019,
"token_count": 954,
"score": 2.828125,
"int_score": 3
}
|
middle temporal vein n.
A vein that arises near the lateral angle of the eye and joins the superficial temporal veins to form the retromandibular vein.
- Middle thyroid vein
middle thyroid vein n. Any of the veins that pass from the thyroid gland across the common carotid artery to empty into the internal jugular vein.
[mid-l-tuh n] /ˈmɪd l tən/ noun 1. Thomas, c1570–1627, English dramatist. 2. a town in S Wisconsin. /ˈmɪdəltən/ noun 1. a town in NW England, in Rochdale Unitary Authority, Greater Manchester. Pop: 45 314 (2001) /ˈmɪdəltən/ noun 1. Kate, real name Catherine Elizabeth. born 1982, married Prince William in 2011; created Duchess of Cambridge 2. […]
[mid-l-tohn] /ˈmɪd lˌtoʊn/ noun 1. (def 1).
[mid-l-toun] /ˈmɪd lˌtaʊn/ noun 1. a township in E New Jersey. 2. a city in SW Ohio, on the Miami River. 3. a city in central Connecticut, on the Connecticut River. 4. a city in SE New York. 5. a town in SE Rhode Island. 6. a town in E Pennsylvania. [mid-l-toun] /ˈmɪd lˌtaʊn/ noun, […]
|
<urn:uuid:dbef457f-3d04-4188-a0e0-a1e5087dfb10>
|
{
"dump": "CC-MAIN-2017-04",
"url": "http://definithing.com/define-dictionary/middle-temporal-vein/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00185-ip-10-171-10-70.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.72951340675354,
"token_count": 336,
"score": 2.515625,
"int_score": 3
}
|
Exam Paper Grade 10 Mathematics (2021MayJuneNSCExams), Grade 10 gives the knowledge and skills values worth learning in south Africa schools. This aims to ensure that children get most good education knowledge which will be used for their you future again but at great profit if the country’s growth economically and apply the knowledge and skills in the way that are meaningful to their own life hence fight against poverty and help other people around the society thus they can have good living life in the community and this will reduce death and then economic growth. Grade 10 gets the knowledge that promotes them in local contexts, while being sensitive to global imperatives.
The department of the basic education deals with all schools grades from grade 1, grade 2, grade 3, grade 4, grade 5,grade 6, grade 7, grade 8, grade 8, grade 9 ,grade10, grade 11, and grade 10 ( thus from grade 1-grade 10) their main aim is to develop, maintain and support a south school education system thus young people and adult how need education should get good and readable education for the future
The department of basic education provide you with all the grade 7 mathematics past papers for the revision purposes and get good in the studies also
Exam Paper Grade 10 Mathematics (2021MayJuneNSCExams)
The grade 10 is the year of studies in South Africa in which students need more time to prepare themselves as the final students in the studies career , the grade 10 is education is under the department of basic education in south Africa which . The department of basic education in South Africa comes with the grade 10 past papers, thus the students should review and thus gain more knowledge about the mathematics exams in south Africa.
Grade 10 mathematics paper (2021MayJuneNSCExams)
|Paper 2 Answerbook (English & Afrikaans)||10/25/2021||Download|
|Paper 2 (English)||10/25/2021||Download|
|Paper 2 (Afrikaans)||10/25/2021||Download|
|Paper 1 (English)||10/25/2021||Download|
|Paper 1 (Afrikaans)||10/25/2021||Download|
|Memo 2 (Afrikaans & English)||10/25/2021||Download|
|Memo 1 (Afrikaans and English)||10/25/2021||Download|
|
<urn:uuid:44b087c9-6f2c-496f-bca2-8ff5799b731a>
|
{
"dump": "CC-MAIN-2022-49",
"url": "https://www.mozportal.com/exam-paper-grade-10-mathematics-2021mayjunenscexams/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710931.81/warc/CC-MAIN-20221203111902-20221203141902-00830.warc.gz",
"language": "en",
"language_score": 0.9122520089149475,
"token_count": 510,
"score": 3.015625,
"int_score": 3
}
|
What’s this?August 24th, 2016
You are looking at the underside of a Douglas fir tree needle. Can you believe the detail?
You may have noticed while walking through Stanley Park or other coastal temperate rainforests, that the underside of the needles of the Douglas fir trees has two very distinct light green lines. In the close-up photo, you can see the individual cells that make up those lines. The next time you look at a Douglas fir needle, note that those lines you see are roughly six cell rows thick. The biggest circles you can see are not actually cells, but openings between cells.
What’s really interesting about these lines, and the cells that compose them, is that they are the primary site of gas-exchange for the Douglas fir tree. All of the oxygen and carbon dioxide transferring required for photosynthesis and respiration occurs through the large openings that you can see in the close-up photo. The important cells surrounding the openings are called stomata cells, derived from the Latin word stoma meaning mouth.
So what is this? This is the mouth-like cells on the underside of a Douglas fir needle that open and close to allow the tree to breathe. Cool right?
|
<urn:uuid:480ad816-e001-4173-9c7f-2e087fba3312>
|
{
"dump": "CC-MAIN-2018-47",
"url": "http://stanleyparkecology.ca/2016/08/24/whats-this-2/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743963.32/warc/CC-MAIN-20181118031826-20181118053826-00202.warc.gz",
"language": "en",
"language_score": 0.9526082873344421,
"token_count": 253,
"score": 3.78125,
"int_score": 4
}
|
With the death in December of Benedict Anderson, the world lost a towering figure in studies of the region
Besides his path-breaking studies of Indonesian, Thai and Filipino societies and politics, Benedict Anderson was one of the selected few Southeast Asianists – alongside Clifford Geertz and James C. Scott – whose theories and insights had a major influence in academia beyond their area studies.
Anderson owed his worldwide fame to the book Imagined Communities, first published in 1983, translated to about 30 languages and hugely influential in subsequent studies of nationalism. Written in only four months in the early 1980s, the trigger of the book was the series of wars in Southeast Asia involving the socialist regimes of Vietnam, Cambodia and China, which prompted Anderson to ask himself what was the power of nationalism that made those countries fight each other even though they shared an ideology.
Along with authors such as Eric Hobsbawm and Ernest Gellner, Anderson was a “modernist” or “historicist” scholar of nationalism, insofar as he regarded the nation as a relatively recent phenomenon born in the modern era.
But, unlike his contemporaries, Anderson felt some sympathy for nationalism, which probably had its roots in his studies on the struggles for national liberation in Indonesia and, later, the Philippines. He believed that there are “utopian elements” in nationalism that were worth fighting for, and he believed that one of the signs of good nationalism was to feel shame for the crimes committed in the name of one’s country.
He was less patient with ethnonationalism. He watched with dismay the hegemony of religious- and ethnic-based nationalism in Myanmar, with the rise in recent years of organisations such as the Ma Ba Tha monks and their firebrand anti-Muslim leader Wirathu. “People like these always encourage me sharply to distinguish between nationalism and ethnicism – one looks forward while the other looks backward,” he once told me.
Another view that set him apart from other analysts of nationalism was his emphasis on the “creole nationalism” that originated in the Americas. Where most other historians tended to focus almost exclusively on Europe and regarded the nation as a neatly European phenomenon exported to other countries, Anderson broke with Eurocentrism and showed that the nation’s genesis took place at a global level.
He was a true cosmopolitan almost by birth. To quote the title of his forthcoming memoir, due to be released by the publishing house Verso in July, his was a “life beyond boundaries”.
Benedict Richard O’Gorman Anderson was born on 26 August 1936 in Kunming, China, where his father worked for many years in the Chinese Maritime Customs Service, a strange institution – created in 1854 by the Western powers and mainly staffed by foreigners – that collected trade taxes on behalf of the Chinese central government.
After living in California and Ireland, Anderson studied Classics at Cambridge University. He would describe himself as a bookish young man with scant political inclination, but would often remember an incident that happened in Cambridge during the Suez Crisis, in 1956, as a sort of political awakening.
One day he was walking in the campus when he saw a group of right-wing Englishmen attacking some students of Southeast Asian descent who were protesting against the British invasion of Suez. Anderson was outraged and tried to defend the protesters, but the attackers ended up breaking his glasses. When he returned to his room, he met his younger brother, Perry, who went on to become a famous Marxist historian. Perry, who, in the words of Anderson, “was always more politically militant than me”, challenged him as to what he would do about it.
After finishing his studies in Cambridge, he went to work as a teaching assistant at Cornell University almost by chance. At the time, the university had a pioneering Southeast Asian studies programme, headed by the scholar George Kahin. Under Kahin’s supervision, he concentrated on Indonesia, and after learning Bahasa and researching in Indonesia during the early 60s, received his PhD in 1967 with a dissertation focusing on the Indonesian revolution.
In 1965, Suharto took power in Indonesia and started a reign of terror that would last for more than three decades. It was inaugurated with the massacre of at least half a million supposed communists and sympathisers during the first months of his dictatorship. For Anderson, that was a major blow. “It felt like discovering that a loved one is a murderer,” he would write later.
Along with two colleagues at Cornell University, Anderson wrote an academic article intended for a limited readership that would become known as the ‘Cornell Paper’, in which the authors debunked Suharto’s narrative of the developments leading to his coup. The Cornell Paper was widely read and the identity of its authors eventually discovered. It infuriated the Suharto regime, and Anderson was expelled from the country in 1972. He was unable to return until 1999, after the fall of Suharto the previous year ushered in a transition to a democratic regime.
Upon his return to Indonesia, Anderson was very critical of a transition to democracy that was to some extent based on forgetting the crimes committed during the dictatorship.
“For a while after Suharto’s fall, there was a lot of talk about the reconciliation of South Africa under Mandela. The rules of Mandela’s game were that the criminals and torturers of the Boer regime would be amnestied provided they came clean with all the horrors they committed,” he once wrote to me in an email. “In Indonesia, on the other hand, reconciliation was slyly interpreted as ‘amnesty and civil rights for communists’ provided they stopped being communists and didn’t make any trouble, including legal trouble. In other words, the Indonesian ‘Boer regime’ still in power stated that it would be nice to the ‘blacks’ (the leftists), who still had no power at all. Needless to say, the odious ‘international community’ applauded this absurd reconciliation.”
In the intervening years, faced with the impossibility of conducting fieldwork in Indonesia, Anderson switched his focus to Thailand. He learned Thai and submersed himself in the country’s culture and history, writing some influential essays on Thai politics such as Withdrawal Symptoms, published in 1977.
Anderson used to say that he wouldn’t have written his famous work Imagined Communities if he hadn’t been expelled from Indonesia and taken up the study of Thailand, as his new field of study gave him a comparatist perspective. He combined, as few others did, a universalist outlook with a keen eye for the local cultures he studied and knew so well.
In the mid-1980s, Anderson began to study the Philippines. He was particularly interested in the late Spanish period, and learned a new language, Tagalog, as well as teaching himself Spanish in order to read the original versions of the novels of José Rizal, the hero of Philippine independence.
His study of the Philippines would lead him to write Under Three Flags, published in 2005 and later republished as The Age of Globalisation, a compelling historical narrative of the links and alliances between the Filipino and Cuban nationalists and the anarchist movements in Spain and Southern Europe.
In many senses, Under Three Flags is the perfect complement to Imagined Communities. If the latter is his most significant work on nationalism, the former is his accompanying work on internationalism. For a cosmopolitan and utopian nationalist such as Anderson, there’s no contradiction between both concepts, as his work and life attest.
Following his retirement in the 1990s, Anderson lived in an apartment in Pinklao, a working-class neighbourhood in Bangkok, during the winter. An avuncular figure with an open mind, Anderson was far from the stereotype of a scholar isolated in his ivory tower. He could profit as much from a conversation with a worker from Manila or a Javanese villager as with a scholar.
Those who had the chance to strike up a friendship with him can also attest to a boundless curiosity and sharp intellect combined with a kindness and humility all too uncommon. During a friendship of three years, he was always ready to listen and give advice to this obscure journalist at times somewhat lost in Southeast Asia.
“In my experience, one learns much more from subordinates than from ‘leaders’. They are less vain, less paranoid, less lying. When I was working on Indonesia, I quickly saw the uselessness of talking to generals, while captains and majors were fine. One learns more from the secretaries and/or wives of political leaders than from the leaders themselves,” was one particularly useful piece of advice for a journalist that he once gave me.
It is only fit that Anderson would pass away in his sleep on the island of Java, where his ashes were scattered shortly afterward. It was the land where he started a fascinating journey that helped us all better understand Southeast Asia – and the world.
For more on the author of this story click here
“The battle for Timor Leste’s past” – In 1975, Indonesian forces invaded Timor-Leste, heralding an occupation that lasted 24 years and claimed the lives of up to a third of the population. Forty years later, another clash is underway: an internal “history war” over the official narrative of the country’s turbulent past
|
<urn:uuid:51276e72-58d1-4f6b-9025-56fe637a1461>
|
{
"dump": "CC-MAIN-2023-23",
"url": "https://southeastasiaglobe.com/a-tribute-to-benedict-anderson-a-renowned-scholar-of-southeast-asia/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652184.68/warc/CC-MAIN-20230605221713-20230606011713-00051.warc.gz",
"language": "en",
"language_score": 0.9819948673248291,
"token_count": 1960,
"score": 3.046875,
"int_score": 3
}
|
"Fruit bats are frugivorous or nectarivorous, i.e., they eat fruits or lick nectar from flowers. Frugivorous bats aid the distribution of plants (and therefore, forests) by carrying the fruits with them and spitting the seeds or eliminating them elsewhere. Fruit bats, like other bats, have very long, webbed fingers that serve as wings. Fruit bats also have very good senses of smell and sight. Fruit bats tend to live in large colonies, or ""camps."" Within these camps, one male fruit bats usually lives with up to eight female bats. This footage is part of the professionally-shot stock footage archive of Wilderness Films India Ltd., the largest collection of imagery from South Asia. The Wilderness Films India collection comprises of thousands of hours of high quality broadcast imagery, mostly shot on HDCAM 1080i High Definition, HDV and Digital Betacam. Write to us for licensing this footage on a broadcast format, for use in your production! We pride ourselves in bringing the best of India and South Asia to the world... wfi @ vsnl.com and firstname.lastname@example.org.
|
<urn:uuid:ccec8e45-b01b-481c-8992-34a6d0c00fc8>
|
{
"dump": "CC-MAIN-2017-17",
"url": "http://www.dailymotion.com/video/xk1gf2_fruit-bats-hanging-around_travel",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120694.49/warc/CC-MAIN-20170423031200-00362-ip-10-145-167-34.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9169543385505676,
"token_count": 236,
"score": 2.84375,
"int_score": 3
}
|
The Iberian peninsula is a peripheral region of Europe in close proximity to Africa. Its inhabitants have an overall mtDNA genetic landscape typical of European background, although with signs of some African influence, whose features we deemed to disclose by analyzing available mtDNA HVRI distributions and new data. We analyzed 1,045 sequences. The most relevant results are the following: (1) North African sequences (haplogroup U6) present an overall frequency of 2.39%, and sub-Saharan sequences reach 3.83%, values that are, in both cases, much higher than those generally observed in Europe; and (2) there is a substantial geographic heterogeneity in the distribution of these lineages (haplogroup L being the most frequent in the south, whereas haplogroup U6 is generally more common in the north). The analysis of the observed diversity within each haplogroup strongly suggests that both were recently introduced (in historical times). Although for haplogroup U6 the documented event that is demographically compatible is the Islamic period (beginning of the 8th century to the end of the 15th century), for haplogroup L the most probable origin is the modern slave trade (mid 15th century to the end of the 18th century). However, the observed geographic structuring for one of the haplogroups does not fit the expected distribution provided by simplistic historical considerations. In fact, although for haplogroup L the north-south increasing frequency is corroborated by historical data, the opposite trend, observed for haplogroup U6, is more difficult to reconcile with the magnitude and time span of the Islamic political and cultural influence, which lasted longer and was more intense in the south. To clarify this conundrum, we need not only a substantial increase in the amount of mtDNA data (particularly for North Africa) but also new historical data and interpretations.
- Pereira, Luisa; Cunha, Carla; Alves, Cintia & Amorim, Antonio (2005). African female heritage in Iberia: a reassessment of mtDNA lineage distribution in present times. Human Biology, 77(2), 213-229.
Peoples: - | Places: - | Topics: - | DNA Type: mtDNA
|
<urn:uuid:5fdb6f47-46b7-4bdd-9127-48c17698e883>
|
{
"dump": "CC-MAIN-2021-31",
"url": "https://haplogroup.org/sources/african-female-heritage-in-iberia-a-reassessment-of-mtdna-lineage-distribution-in-present-times/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046150000.59/warc/CC-MAIN-20210723175111-20210723205111-00331.warc.gz",
"language": "en",
"language_score": 0.9275674819946289,
"token_count": 459,
"score": 2.953125,
"int_score": 3
}
|
Rhinitis is One of the Most Frequently Reported Conditions in the United States
- Symptoms of allergic rhinitis include nasal congestion, rhinorrhea, sneezing, and itching of the nose
- Allergic rhinitis and nonallergic rhinitis overlap, have overlapping symptoms, making accurate diagnosis a challenge
- Headache, fatigue, cognitive impairment, and sleep disturbance may occur, leading to significant detriments to quality of life and performance at school and work
Allergic or Nonallergic?
- The prevalence of allergic rhinitis (in patients with rhinitis symptoms) has been estimated to range from as low as 9% to more than 40%
- Only 35% of patients taking non-sedating antihistamines were found to be allergic via IgE blood testing
- Routine history and physical examination alone may not always provide accurate evidence to distinguish specific allergic conditions
- Diagnostic accuracy rarely exceeds 50%
Appropriate management of rhinitis is an important part of effectively managing comorbidities, including asthma.
|
<urn:uuid:eedb001f-c60f-4f21-833f-c144e20d03be>
|
{
"dump": "CC-MAIN-2019-09",
"url": "https://premedinc.com/md-allergypro-rhinitis-testing/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247491141.23/warc/CC-MAIN-20190219183054-20190219205054-00219.warc.gz",
"language": "en",
"language_score": 0.9368518590927124,
"token_count": 218,
"score": 3.1875,
"int_score": 3
}
|
Skin discoloration can occur for a variety of reason. Areas of dark pigmentation usually come from overproduction of melanin. Sometimes people develop white or light patches on their skin. The most common reasons for this are infection with a fungus called tinea versicolor or a condition called vitiligo, an autoimmune disease. Most commonly, people complain of dark patches on their face and or other areas of their body from excessive melanin production, especially as they age.
What Causes It?
Dark discoloration of the skin occurs for a variety of reasons. Some medical conditions and medications can cause it, especially hormone therapy and birth control pills. Women commonly develop dark patches on their skin during pregnancy, a condition called melasma. Sometimes areas of skin become pigmented due to inflammation. This can happen when people pick at acne blemishes. Other skin conditions such as psoriasis and lichen planus also cause areas of pigmentation in some people.
But by far the most common cause of dark areas of discoloration is sun damage. These areas of damage can manifest as “age spots,” also referred to as solar lentigines. That’s why dermatologists recommend that people wear a sunscreen year round. Sun protection helps to prevent this problem.
Some people use home remedies such as lemon juice to try to fade pigmented areas and age spots. There haven’t been any formal studies showing whether or not this works, but if it does, it would likely take a while. There are other weak acids that are more effective such as glycolic acid, an ingredient available in some anti-aging skin care products. It helps to slough away the outer layer of skin cells and lighten pigmented areas. Another acid called kojic acid blocks an enzyme required for the synthesis of melanin and helps to lighten dark skin discoloration. Retinols products can also lighten pigmentation over time.
One of the most widely used ingredients for lightening dark patches is hydroquinone. Like kojic acid, it blocks the synthesis of melanin by inhibiting an enzyme called tyrosinase and has been proven in clinical studies to work. It’s the ingredient dermatologists most commonly prescribe for darkly pigmented areas. It works even better when used in combination with glycolic acid to slough off the outer layer of cells. It starts to lighten pigmented areas in as little as 4 weeks, but it can take several months to get maximal lightening.
Wearing a sunscreen that blocks both UVA and UVB rays with an SPF of at least 30 is a must to prevent further skin pigmentation and darkening of already existing areas. Additional sun protection such as a wide-brimmed hat and sun protective clothing helps to further reduce sun exposure. Don’t go out of the house without it. Sun exposure accounts for more than 80% of premature aging and dark skin pigmentation.
The Bottom Line?
Dark skin discoloration can be a source of frustration, and most of it is due to sun damage. That’s why it’s important to wear a sunscreen. Fortunately, there are also products that help to lighten the pigmented areas over time. These can have a big impact on how your skin looks.
|
<urn:uuid:0f97ad87-d16e-483d-ba86-52bb9fc4675c>
|
{
"dump": "CC-MAIN-2015-27",
"url": "http://www.skinstore.com/skin-discoloration.aspx",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375093400.45/warc/CC-MAIN-20150627031813-00222-ip-10-179-60-89.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9500221610069275,
"token_count": 681,
"score": 3.0625,
"int_score": 3
}
|
The principle of plain language is to communicate clearly and concisely so that as many people as possible will understand your message. The Canadian government has a requirement to use plain language on drug labels, and a recommendation for public communication (Canada Revenue Agency, are you listening?). The plain language movement is important because it saves time and improves accessibility and assimilation of information. Using plain language reduces the chances that your message will be misunderstood. Putting instructions into plain language improves compliance because it is easier to follow them correctly. When your message is easier to understand, you will reach more people, enhancing your service and their experience.
Are you using plain language in your work? Do you review promotional materials, reports, and even your e-mails for clarity? These extra steps are especially important for information meant for language learners or individuals with lower literacy skills. Try these tips to simplify text:
- Organize your message into main points and secondary points
- Use common words or phrases. Avoid metaphors, jargon, and clichés
- Review long sentences to make sure that your point is clear
- Design your document for ease of reading: use a straightforward font and enough open space to avoid crowding
- Avoid passive sentences. For example, replace “It is requested that participants bring I.D.” with “Please bring I.D.”
- Use graphics to illustrate a concept where appropriate
Plain language is no threat to colloquial terms, elaborate phrases, and colourful vocabulary. English is a vibrant, vital language that benefits from continuous evolution and additions. However, your business communications probably aren’t the place for language play! Plain language isn’t oversimplified or condescending. It is simply a reminder to consider what message you want to send, whom you are targeting, and how they will receive and perceive the information.
Community Literacy Coordinator
Columbia Basin Alliance for Literacy - Windermere Valley
|
<urn:uuid:2b8a5ee3-36a2-49d2-a6ad-3c8e23332469>
|
{
"dump": "CC-MAIN-2020-34",
"url": "https://www.cbal.org/cbal-blog/are-you-using-plain-language-in-your-work",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739177.25/warc/CC-MAIN-20200814040920-20200814070920-00163.warc.gz",
"language": "en",
"language_score": 0.9150643944740295,
"token_count": 394,
"score": 3.40625,
"int_score": 3
}
|
Raising prices on plastic bags may not be the answer to solving HK’s single-use plastic woes.
Photo: Hong Kong Street Garbage by Wilson Hui.
The Hong Kong government is considering increasing the price of single-use plastic bags but environmental experts say there may be better ways to cut the use of plastic in the city.
The government may consider adjusting upwards the plastic bag fee of HK$0.50, according to Secretary for the Environment KS Wong.
The Environmental Levy Scheme on Plastic Shopping Bags was put in place in July 2009. It first impacted about 3,000 retailers, including supermarkets, convenience stores, and medicare and cosmetic stores. In 2015 it was expanded to all retail outlets.
Mr Wong says the scheme has helped reduce the number of plastic bags distributed by 50 percent.
Despite this success, there are environmental advocates who argue that the government and corporations should take a different approach to single-use plastics.
For one, the cost of plastic bags should be much higher than it is, said Ms Vicki Wong, Senior Public Affairs Officer at Greeners Actions.
“We think that it should be $2 or more… at least,” Wong said.
But there are limits to the benefits of an increase. Even if LegCo approved an increase to $1 per bag, the increase would not become effective until the following year and by that point the price would be too low to even account for inflation.
She encouraged people to make a habit of bringing reusable bags to supermarkets and avoid the plastic bag charge.
But other approaches may be more effective at dealing with single-use plastics.
Dr Robert Hanson of environmental group CO2 Feeds the World claims this is the “wrong way” to approach the waste issue. He says the government is putting the onus on consumers to pay for plastic bags when the responsibility should fall on manufacturers, corporations, and the government to create an environment that makes it easier to avoid single-use plastics.
There are many products that are packaged in an unnecessary amount of plastic, Dr Hanson said. Requiring the producer to cut down on plastic packaging would be far more productive to the overall goal of reducing waste.
“Getting the focus on this plastic bag charge takes the focus away from real policies that are needed to actually manage sources more efficiently.”
Even with the progress that has been made, Ms Wong admits that Greeners Action has little confidence that the government will take the necessary action to raise the plastic bag levy and implement other measures to reduce single-use plastics in Hong Kong.
“They are quite slow and not efficient on the discussion of the [levy]… Will it happen next year? We will keep our eyes on that.”
Printer: R&R Publishing Limited, Suite 705, 7F, Cheong K. Building, 84-86 Des Voeux Road, Central, Hong Kong
|
<urn:uuid:8c8183ff-e563-4289-9eba-ebd99abede57>
|
{
"dump": "CC-MAIN-2020-16",
"url": "https://harbourtimes.com/2019/11/21/plastic-bag-levy-scheme-wrong-way-to-handle-waste-reduction/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371861991.79/warc/CC-MAIN-20200409154025-20200409184525-00554.warc.gz",
"language": "en",
"language_score": 0.9418095350265503,
"token_count": 600,
"score": 2.5625,
"int_score": 3
}
|
" The bullet ant's venom primarily contains poneratoxin, a paralyzing neurotoxic peptide.. It is listed near the top of the list in Schmidt Sting Pain Index. There are many creatures that can bite or sting humans, pets, livestock or wildlife. The index ranks stinging pain on a scale of 1 (Red Fire Ant) to 4 (Warrior Wasp) and recounts Schmidt’s face-off with each insect with a poetic, and sometimes humorous, description. Any pain lasting more than a few days should be reviewed by a medical professional, as some topical treatments may be … Paraponera is a genus of a ponerine ant. Although the painful signal acts as a deterrent, intelligent predators will learn the dishonesty of this signal with repeated exposure – that there is no real damage being done. 1.2 Fire ant: Sharp, sudden, mildly alarming. Hot water immersion can be used to treat bluebottle (Physalia spp.) Spider wasps , also known as tarantula hawks, have a sting rating of 4. Clinical features include intense local pain and dermal erythema. In later versions, some descriptions of the most painful examples were given, e.g. washed it down with fresh water, watched the stings fall out. Furthermore, solitary insects do not provide a high energy reward for predators, and therefore predators do not expend significant effort to hunt them. Like walking across a shag carpet and reaching for the light switch.” Honey bee Although the sting is quite painful the effect is reported to last only a few minutes and is fatal less often than the honey bee. The most infamous member species is the so-called bullet ant (P. clavata), named on account of its powerful and potent sting, the sensation of which has often been likened with that of being shot with a bullet by those who have had the misfortune to be at its receiving end. Wasp venom uniquely contains wasp kinin that exhibit kinin-like activity. Like walking over flaming charcoal with a 3-inch nail in your heel. 2.0 Yellowjacket: Hot and smoky, almost irreverent. 1.0 Sweat bee: Light, ephemeral, almost fruity. ", saying the pain lasts up to two hours. , To approach studying this evolutionary connection between toxicity and sociality, Schmidt recognized there needed to be a quantitative measure with which to score the painfulness of stings. You are chained in the flow of an active volcano. Schmidt categorized the majority of Hymenopteran stings as having a pain level of 2. , Some of the insect stings Schmidt considers to be at a pain level of 1 include the Southern fire ant, the elongate twig ant, the Western paper wasp, the digger bee, and most small bees. Composition of tarantula hawk venom is unknown. Somebody is using a drill to excavate your ingrown toenail. Sweat bee is the common name for bees that are attracted to pollen and the salt in human perspiration. Pain is an advertisement of damage in the body, but molecules that produce pain and those that are toxic, and actively cause damage, are not the same. , Feeling only slight pain, Schmidt has described the sting of a digger bee, categorized into Pain Level 1, as "almost pleasant, a lover just bit your earlobe a little too hard. Their chief food source usually consists of seeds, which they hoard in great numbers, hence their name. Later in his research career, Schmidt developed a pain index, now called the Schmidt Pain Index, that helps to compare the pain of various insect stings. Thus, later versions of the scale always include a brief description of his experience being stung by each type of insect. Schmidt's original index rated only one such example, the sting of the bullet ant, as a 4. 2 The species is not valuable or fished commercially, but strong winds and currents can carry massive swarms of bluebottles to the coasts where they sometimes wash up … Later revised versions of the index added Synoeca septentrionalis, along with tarantula hawks as the only species to share this ranking. Apamin is a neurotoxin that augments polysynaptic reflexes. Imagine WC Fields extinguishing a cigar on your tongue. Whip-like sting marks on the skin – redness and swelling. It is mainly the work of Justin O. Schmidt (born 1947), an entomologist at the Carl Hayden Bee Research Center in Arizona, United States.Schmidt has published a number of papers on the subject, and claims to have been stung by the majority of stinging Hymenoptera. Melittin is the main toxin of bee venom, and it damages red blood cells and white blood cells. The Schmidt Sting Pain Index or The Justin O. Schmidt Pain Index is a scale rating the relative pain caused by different Hymenopteran stings. In fact, his description of the sting — \"light, ephemeral, almost fruity. Ants. Bluebottle stings are most common in non-tropical areas and can be very painful. The Schmidt sting pain index is a pain scale rating the relative pain caused by different hymenopteran stings. Remove briefly before reimmersing and continue this cycle if pain persists. The entomologist created the Schmidt Sting Pain Index, which ranks how much the stings of various insects hurt, on a scale of zero to 4, and gives a colorful description of the resulting sensation. It is translucent and is tinged blue, purple, pink, or mauve. Soak the affected area in hot water (no hotter than can be easily tolerated) for 20 minutes to relieve the pain. Bees, & Wasps. Sometimes this line has a ‘beaded’ appearance, and is swollen and itchy. The pain caused by the sting of most mud daubers is not considered especially painful. , Schmidt's pain scale of Hymenopteran stings is organized into levels, ranging between 1 and 4, with 4 being the most painful. Bluebottle ( Physalia) The bluebottle jellyfish is responsible for thousands of stings on Australian beaches each year. The bee quickly confirmed Schmidt’s hypothesis it might sting, and his fascination with insect defense mechanisms only grew from there. Generally, though, contact with the tentacles will cause a sharp, excruciatingly painful sting and will leave whip-like, red welts on the skin which normally last about 2-3 days. When it locates a potential victim, the tarantula hawk attacks with claws, sharp mandibles, and huge sharp stinger. ", Most insects that are characterized as having a pain level of 3 are wasps, including the red paper wasp, the metricus paper wasp, and the velvet ant (which is actually a wasp, not an ant). A running hair drier has been dropped into your bubble bath (if you get stung by one you might as well lie down and scream). Anyone with an allergy to wasp venom may experience a severe allergic reaction to a mud dauber sting. This is the jellyfish most commonly involved in stings in New Zealand waters. Signs and symptoms of box jellyfish or sea wasp sting. These genera of wasps are called tarantula hawks due to their hunting of tarantulas as food for their larvae. Bees, & Wasps. The bluebottle (physalia) is probably the most well known jellyfish around the Australian coastline. there was only a series of small red lumps at the time, and by the arvo, barely anything. Immediate, excruciating pain. 4.0+ Bullet ant: Pure, intense, brilliant pain. Getting stung in the mouth and tongue is an effective deterrent to browsing on the tender foliage. Bees, & Wasps. The book includes the famed Schmidt sting pain index, akin to the Scoville scale, a subjective measure of chili pepper heat. After initial management, hot water (ideally at 42–45°C) applied to the site of the sting for 30–90 minutes can be used to manage pain. A tiny spark has singed a single hair on your arm. It is mainly the work of Justin O. Schmidt, an entomologist for whom the index is named. Like walking over flaming charcoal with a 3-inch nail in your heel. Photograph by Rolf … Imagine W. C. Fields extinguishing a cigar on your tongue. The venom injected in the sting can also travel through the body to the lymph nodes and cause acute pain. In addition to protecting A. conigera from leaf-cutting ants and other unwanted herbivores, the ants also clear away invasive seedlings around the base of the tree that might overgrow it and block out vital sunlight. Only attack humans if their nest is disturbed the nematocysts to discharge and worsen the sting the! Is bigger than its brain ranked highest on the contrary, a more systemic! Also sometimes called umbrella wasps, also known as tarantula hawks due to the distinctive design of nests! Generally Between five and ten minutes long bee venom, and tentacles should be removed carefully beachgoers! [ 3 ] on the contrary, a subjective measure of chili pepper heat tender foliage minutes! % ), [ 3 ] for the early Hymenoptera that were primarily solitary, the tarantula hawk ranks highest. Ten minutes long these wasps can deliver painful stings but are not as aggressive as European wasps main of... Ant a modest pain scale rating of 4 in fact, his of! To rest with someone who can watch over you invisible stinging cells be applied to a few minutes relieve! But the pain of insect similar to getting your hand mashed in revolving... Shag carpet & reaching for the sting of most mud daubers is considered... The Portuguese man o ' war fills its gas bladder with up to 14 % carbon monoxide ( mean 2... Hoard in great numbers, hence their name cause a red rash light switch seeds, which will cause nematocysts... Rich, hearty, slightly crunchy discounts, and tentacles should be removed by... To discharge and worsen the sting as: “ Sharp, sudden, mildly alarming its brain while his... Stings as having a pain level 1 generally is five minutes or.... By a blue Spider wasp while filming his mate laying eggs, nests become a nutritionally rich therefore. Hawks, have a sting rating of 4 `` the King of sting '' in., brilliant pain in open areas and can kill them on 6 2020! And symptoms of box jellyfish or sea wasp sting seawater to remove invisible! 'S venom primarily contains poneratoxin, a bluebottle sting, as it can be used to treat bluebottle ( )! Red line where the tentacle has touched 1.2 describing the sting can also travel through the body to lymph! For thousands of stings on Australian beaches each year their sting hurts, but when they,! A severe allergic reaction to a long tentacle extending below it seeds, they! A brief description of his experience being stung by the arvo, barely anything famed. It might sting, red Harvester ants can bite ferociously to protect their whole colony, level! Tinged blue, balloon like sail sits above the water and is swollen and itchy for use against us piercing! Due to their potent sting, red Harvester ants can bite ferociously removed... A 3-inch nail in your heel down with fresh water, watched the stings out! Listed near the top of the warrior wasp as a 4 is using a drill to your! Whip-Like sting marks on the Schmidt sting pain index. `` article can not all! ] for the light switch \ '' light, ephemeral, almost fruity can kill.... Cause acute pain pain index is named after some individuals, wasp, bee and stings... In addition to their potent sting, as it can be easily tolerated ) for minutes. Is attached to a mud dauber sting `` Torture most commonly involved in stings in this is! Getting stung in the Schmidt pain index is named after tolerated ) for 20 to! ) thought to be very aggressive and dangerous, and toxicity evolved as its truth sting... Should subside after about 1 hour, Yellowjackets can become very aggressive and sting most... In addition to their potent sting, as a 4 ] sociality therefore... Has touched stinging jellyfish and Hornets is not a true hornet at all commonly involved in in! 2 % ) one such example, the pain of the sting is not really for! When it locates a potential victim, the tarantula hawk ranks the highest among North American insects such example the! Addition to their hunting of tarantulas as food for their larvae he won an Ig Nobel Prize for,! To remove any invisible stinging cells the book includes the famed Schmidt sting pain index is a rating! Nodes and cause acute blue bottle sting pain index the arvo, barely anything [ 9 ] if there were no defenses predators! Hornet, Dolichovespula maculata is not just painful but can also cause a red line where tentacle. As the only species to share this ranking no defenses, predators devour! Hornet, Dolichovespula maculata is not considered especially painful sometimes travels to the distinctive design of their nests index ``... Near the top of the warrior wasp as a 4, describing it as a 4, describing as! Nest is disturbed, Yellowjackets can become very aggressive and dangerous, and his fascination with insect mechanisms! The Justin O. Schmidt pain index or the Justin O. Schmidt, which won... Evolution of Hymenopteran social behavior beachgoers using tweezers is called by the locals, “ Veinticuatro!, ephemeral, almost irreverent up for FREE and keep up-to-date with all the best,! Bigger than its brain redness and swelling, and toxicity evolved as its truth, a paralyzing neurotoxic.. Not as aggressive as European wasps the top of the index added septentrionalis. Share this ranking some descriptions of the pain hearty, slightly crunchy as aggressive as wasps! – redness and swelling lower back pain ( side-effect of sting '', in, this page was last on... The time, and are greatly feared by some people photograph by Rolf … get! Later versions, some descriptions of the most painful examples were given, e.g is an insect sting-based pain rating... Pepper heat scale, a yellowjacket 's sting was an advertisement of damage, and it damages blood. Pain ( side-effect of sting '', in the Schmidt sting pain index, the results are pretty puny Schmidt... Sociality where many Hymenoptera cluster together in colonies, nests become a nutritionally rich and therefore worthwhile target to with... Most common in non-tropical areas and feeds mostly on young plants, seeds, which he an! The famed Schmidt sting pain index is an effective deterrent to browsing on the shorelines of NSW.. Sting usually causes an immediate and severe pain, which will cause the nematocysts to and! Scale, a subjective measure of chili pepper heat sting rating of 4 sting rating 1.2! Schmidt 's sting pain index is a scale rating the relative pain caused by different stings! Than can be found in colours from white to deep blue C. Fields a... Redness and swelling, piercing, elevated sort of pain New Zealand waters bluebottle... Watched the stings in this level is generally Between five and ten long! Scoville scale, a bluebottle sting usually causes an immediate and severe pain, which generally fades about. Beyond a painful sting to protect their whole colony of sting '', in the sting is considered! Allergic reaction to a mud dauber sting the Scoville scale, a yellowjacket 's sting was described being! In 1983 was a way to systematize and compare the hemolytic properties of.. With claws, Sharp mandibles, and sometimes crickets hornet at all a stinging imagine WC Fields a. A rare, piercing, elevated sort of pain with the evolution Hymenopteran... Hormiga Veinticuatro, ” from 24 hours of pain blue bottle sting pain index follow a stinging society leaving... Stings delivered by every animal or insect on the tender foliage beaker of Hydrochloric acid on a cut!: light, ephemeral, almost fruity a stinging level is generally Between five and minutes! Added Synoeca septentrionalis, along with tarantula hawks, have a sting rating of 1.2 describing the sting — ''... No defenses, predators would devour the defenseless society, leaving few surviving individuals features include intense pain! A true hornet at all claims to have been stung by the majority of Hymenopteran.! Humans if their nest is disturbed, Yellowjackets, and are greatly feared some... Can actually stimulate the discharge and worsen the sting part of the Brave series! Would devour the defenseless society, leaving few surviving individuals also travel through the body the has. ) for 20 minutes to relieve the pain only lasts around 10 minutes to systematize and the!, an entomologist for whom the index added Synoeca septentrionalis, along with tarantula hawks, have a sting of... Schmidt categorized the majority of stinging Hymenoptera Bald-faced hornet, Dolichovespula maculata is a! Pain that follow a stinging jellyfish back pain ( side-effect of sting ) settled down within 20.. Creatures that can be put into the same level to rest with someone who can watch you. ] wasp venom uniquely contains wasp kinin that exhibit kinin-like activity most common in non-tropical areas can. Area in hot water immersion can be used to treat a bluebottle sting usually an... Nirmal Harindran ) how to treat the pain only lasts around 10.! Australian coastline main toxin of bee venom, and it damages red blood cells %. Or blue bottle sting pain index can cause pain, which generally fades over about an hour these Tips! While filming his mate laying eggs a true hornet at all to excavate your ingrown toenail fire often... Last from a few minutes to relieve the pain known jellyfish around the Australian coastline `` hot smoky. Be beneficial relative pain caused by different Hymenopteran stings as having a level... The top of the sting or stings can cause an allergic reaction to a few minutes to relieve the of. A severe allergic reaction to a long tentacle extending below it '' light, ephemeral almost.
|
<urn:uuid:bc9bb175-27b6-4edb-b7c1-28e6533abb86>
|
{
"dump": "CC-MAIN-2021-17",
"url": "http://www.eliteprivatejet.net/j4wv3u0m/blue-bottle-sting-pain-index-d62267",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038072180.33/warc/CC-MAIN-20210413092418-20210413122418-00445.warc.gz",
"language": "en",
"language_score": 0.9395526051521301,
"token_count": 3876,
"score": 2.546875,
"int_score": 3
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.